All notable changes to this application will be documented in this file.
The format is based on Keep a Changelog and this project adheres to Semantic Versioning.
- sitemap.xml
- Dockerfile and docker-compose.yml
- Procfile for deploying to heroku
- Vulnerability: Host Header Injection
- Vulnerability: Default Admin Login - Apache Axis2
- Vulnerability: Apache Tomcat Ghostcat CVE 2020-1938
- Vulnerability: Hidden File Sample
- Vulnerability: JSP Samples Page
- Vulnerability: Exposed Panels - CrushFTP
- Vulnerability: Publicly accessible phpinfo & php configuration files
- Vulnerability: Wordpress Username Enumeration
- Vulnerability: Drupal Username Enumeration
- Vulnerability: Magento Cacheleak
- Vulnerability: SSRF - Parameter Based
- Vulnerability: Magento Config File
- Vulnerability: Magento Downloader
- Vulnerability: Swagger Config File
- Vulnerability: Wordpress Debugger
- Vulnerability: AWStats Script
- Vulnerability: API Key Scanner
- Vulnerability: Database Connection String
- Vulnerability: MySQL Username Disclosure
- Vulnerability: 403 Bypass
- Vulnerability: Firebase Database Unauthorized Access
- Vulnerability: Base Tag Hijacking
- Vulnerability: Magento API Anonymous Access
- Vulnerability: Out-of-Band XXE
- Vulnerability: Apache Cassandra Unauthorized Access
- Vulnerability: Laravel Ignition Reflected XSS
- Vulnerability: S3 Bucket Publicly Accessible
- Vulnerability: Arbitrary File Read Next.js
- Vulnerability: Chrome Logger Information Disclosures
- Vulnerability: Apache Tomcat Examples Directory
- Vulnerability: Merurial Repository Found
- Vulnerability: Flask Debug Mode
- Vulnerability: Drupal backup_migrate
- Vulnerability: Log4j RCE
- GIF Favicon
- Unauthenticated Gitlab SSRF CVE 2021-22214 Demonstration
- Software Versions List
- Error Handling
- Hypejab Authentication
- Restructure Project