Findings

In the listbox below, you will see the 73 findings for this scan request.

(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/README.md:16 Password 'admin' found in URL inside 'Password: admin'.

:16
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:81 Password ''$c_pass'' found in URL inside 'select * from customers where customer_pass='$c_pass' AND customer_email='$c_email''.

/home/masacre/docker_data/git/travel-agency/includes/customer_login.php:81
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:81 Password ''$c_pass'' found in URL inside 'select * from customers where customer_pass='$c_pass' AND customer_email='$c_email''.

/home/masacre/docker_data/git/travel-agency/includes/customer_login.php:81
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:51 Password '</td>' found in URL inside '"</td> </tr> <tr> <td align="right">Password:</td> <td><input type="password" name="c_pass" value="'.

/home/masacre/docker_data/git/travel-agency/customer/edit_account.php:51
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:133 Password ''$c_pass',' found in URL inside 'update customers set customer_name='$c_name', customer_email='$c_email', customer_pass='$c_pass', customer_city='$c_city', customer_contact='$c_contact', customer_address='$c_address' where customer_id='$customer_id''.

/home/masacre/docker_data/git/travel-agency/customer/edit_account.php:133
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:137 Password ''$c_pass',' found in URL inside 'update customers set customer_name='$c_name', customer_email='$c_email', customer_pass='$c_pass', customer_city='$c_city', customer_contact='$c_contact', customer_address='$c_address', customer_image='$c_image' where customer_id='$customer_id''.

/home/masacre/docker_data/git/travel-agency/customer/edit_account.php:137
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:133 Password ''$c_pass',' found in URL inside 'update customers set customer_name='$c_name', customer_email='$c_email', customer_pass='$c_pass', customer_city='$c_city', customer_contact='$c_contact', customer_address='$c_address' where customer_id='$customer_id''.

/home/masacre/docker_data/git/travel-agency/customer/edit_account.php:133
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:137 Password ''$c_pass',' found in URL inside 'update customers set customer_name='$c_name', customer_email='$c_email', customer_pass='$c_pass', customer_city='$c_city', customer_contact='$c_contact', customer_address='$c_address', customer_image='$c_image' where customer_id='$customer_id''.

/home/masacre/docker_data/git/travel-agency/customer/edit_account.php:137
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:133 Password ''$c_pass',' found in URL inside 'update customers set customer_name='$c_name', customer_email='$c_email', customer_pass='$c_pass', customer_city='$c_city', customer_contact='$c_contact', customer_address='$c_address' where customer_id='$customer_id''.

/home/masacre/docker_data/git/travel-agency/customer/edit_account.php:133
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:137 Password ''$c_pass',' found in URL inside 'update customers set customer_name='$c_name', customer_email='$c_email', customer_pass='$c_pass', customer_city='$c_city', customer_contact='$c_contact', customer_address='$c_address', customer_image='$c_image' where customer_id='$customer_id''.

/home/masacre/docker_data/git/travel-agency/customer/edit_account.php:137
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:25 Password '</td>' found in URL inside '<h2 style="text-align: center; margin-top: 20px;">Change Your Password</h2>
<form action="" method="post"> <table align="center" width="550"> <tr align="right"> <td><b>Enter current password:</td> <td><input type="password" name="current_pass" required=""></b></td> </tr> <tr align="right"> <td><b>Enter new password:</b></td> <td><input type="password" name="new_pass" required=""></td> </tr> <tr align="right"> <td><b>Re-enter new password:</b></td> <td><input type="password" name="new_pass_again" required=""></td> </tr> <tr align="right"> <td></td> <td colspan="8"><input type="submit" name="change_pass" value="Change Password"></td> </tr> </table> </form> '.

/home/masacre/docker_data/git/travel-agency/customer/change_pass.php:25
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:33 Password ''$current_pass'' found in URL inside 'select * from customers where customer_pass='$current_pass' AND customer_email='$user''.

/home/masacre/docker_data/git/travel-agency/customer/change_pass.php:33
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:48 Password ''$new_pass'' found in URL inside 'update customers set customer_pass='$new_pass' where customer_email='$user''.

/home/masacre/docker_data/git/travel-agency/customer/change_pass.php:48
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:48 Password ''$new_pass'' found in URL inside 'update customers set customer_pass='$new_pass' where customer_email='$user''.

/home/masacre/docker_data/git/travel-agency/customer/change_pass.php:48
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:33 Password ''$current_pass'' found in URL inside 'select * from customers where customer_pass='$current_pass' AND customer_email='$user''.

/home/masacre/docker_data/git/travel-agency/customer/change_pass.php:33
(Vulnerability) Secret in URL

/home/masacre/docker_data/git/travel-agency/styles/style.css:48 Password ''$new_pass'' found in URL inside 'update customers set customer_pass='$new_pass' where customer_email='$user''.

/home/masacre/docker_data/git/travel-agency/customer/change_pass.php:48
(Error) PHP Scanner

UnknownFilename: PHP file '/home/masacre/docker_data/git/travel-agency/includes/payment.php' without PHP open tag <?php or <? could mean a code snippet or a mistake?

(Error) PHP Scanner

UnknownFilename: PHP file '/home/masacre/docker_data/git/travel-agency/includes/footer.php' without PHP open tag <?php or <? could mean a code snippet or a mistake?

(Error) PHP Scanner

UnknownFilename: PHP file '/home/masacre/docker_data/git/travel-agency/includes/header.php' without PHP open tag <?php or <? could mean a code snippet or a mistake?

(Error) PHP Scanner

UnknownFilename: PHP file '/home/masacre/docker_data/git/travel-agency/includes/navbar.php' without PHP open tag <?php or <? could mean a code snippet or a mistake?

(Research) (Info) Parsing problem

Was not able to detect a programming language for files '/home/masacre/docker_data/git/travel-agency/README.md', '/home/masacre/docker_data/git/travel-agency/paypal.jpg', '/home/masacre/docker_data/git/travel-agency/.gitignore', '/home/masacre/docker_data/git/travel-agency/.gitattributes', '/home/masacre/docker_data/git/travel-agency/.git/description', '/home/masacre/docker_data/git/travel-agency/.git/HEAD', '/home/masacre/docker_data/git/travel-agency/.git/packed-refs', '/home/masacre/docker_data/git/travel-agency/.git/index', '/home/masacre/docker_data/git/travel-agency/.git/config', '/home/masacre/docker_data/git/travel-agency/.git/refs/remotes/origin/HEAD', '/home/masacre/docker_data/git/travel-agency/.git/refs/heads/master', ...

(Message) Scan Request Complete

Finished scanning, we have 67 findings.

(Warning) SQL Queries

SQL query-like string literal 'SELECT * FROM cart WHERE ip_add='$ip'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/cart.php:62
(Warning) SQL Queries

SQL query-like string literal 'SELECT * FROM packages WHERE package_id='$pack_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/cart.php:67
(Warning) SQL Queries

SQL query-like string literal 'UPDATE cart SET qty='$qty'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/cart.php:96
(Warning) SQL Queries

SQL query-like string literal 'select * from packages where package_id='$package_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/details.php:36
(Research) Os Network Web Upload Php

Uploaded files are handled with 'move_uploaded_file'. Could be a interesting start for research.

/home/masacre/docker_data/git/travel-agency/customer_register.php:20
(Warning) SQL Queries

SQL query-like string literal 'INSERT INTO customers (customer_ip,customer_name,customer_email,customer_pass,c_passport,customer_country,customer_city,customer_contact,customer_address,customer_image) VALUES ('$ip','$c_name','$c_email','$c_pass','$c_passport','$c_country','$c_city','$c_contact','$c_address','$c_image')' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer_register.php:22
(Warning) SQL Queries

SQL query-like string literal 'SELECT * FROM cart WHERE ip_add='$ip'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer_register.php:26
(Warning) SQL Queries

SQL query-like string literal 'SELECT * FROM packages WHERE package_keywords LIKE '%$search_query%'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/results.php:37
(Warning) SQL Queries

SQL query-like string literal 'select * from customers where customer_pass='$c_pass' AND customer_email='$c_email'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/includes/customer_login.php:81
(Warning) SQL Queries

SQL query-like string literal 'select * from cart where ip_add='$ip'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/includes/customer_login.php:93
(Warning) SQL Queries

SQL query-like string literal 'select * from packages where package_id='$get_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_pack.php:5
(Warning) SQL Queries

SQL query-like string literal 'select * from categories where cat_id='$pack_cat'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_pack.php:18
(Warning) SQL Queries

SQL query-like string literal 'select * from types where type_id='$pack_type'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_pack.php:26
(Warning) SQL Queries

SQL query-like string literal 'update packages set package_cat='$package_cat', package_type='$package_type', package_title='$package_title', package_price='$package_price', package_desc='$package_desc', package_keywords='$package_keywords' where package_id='$update_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_pack.php:135
(Research) Os Network Web Upload Php

Uploaded files are handled with 'move_uploaded_file'. Could be a interesting start for research.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_pack.php:137
(Warning) SQL Queries

SQL query-like string literal 'update packages set package_cat='$package_cat', package_type='$package_type', package_title='$package_title', package_price='$package_price', package_desc='$package_desc', package_image='$package_image', package_keywords='$package_keywords' where package_id='$update_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_pack.php:138
(Warning) SQL Queries

SQL query-like string literal 'select * from categories where cat_id='$cat_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_cat.php:12
(Warning) SQL Queries

SQL query-like string literal 'update categories set cat_title='$new_cat' where cat_id='$update_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_cat.php:76
(Warning) SQL Queries

SQL query-like string literal 'update employees set emp_name='$employee_name', emp_email='$employee_email', emp_designation='$employee_designation', emp_location='$employee_location', emp_address='$employee_address', emp_contact='$employee_contact' where emp_id='$update_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_emp.php:13
(Warning) SQL Queries

SQL query-like string literal 'select * from employees where emp_id='$get_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_emp.php:32
(Warning) SQL Queries

SQL query-like string literal 'insert into categories (cat_title) values ('$new_cat')' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/insert_cat.php:63
(Warning) SQL Queries

SQL query-like string literal 'insert into types (type_title) values ('$new_type')' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/insert_type.php:62
(Warning) SQL Queries

SQL query-like string literal 'select * from types where type_id='$type_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_type.php:12
(Warning) SQL Queries

SQL query-like string literal 'update types set type_title='$new_type' where type_id='$update_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/edit_type.php:77
(Research) Os Network Web Upload Php

Uploaded files are handled with 'move_uploaded_file'. Could be a interesting start for research.

/home/masacre/docker_data/git/travel-agency/customer/edit_account.php:136
(Warning) SQL Queries

SQL query-like string literal 'insert into employees (emp_name, emp_email, emp_designation, emp_location, emp_address, emp_contact) values ('$emp_name','$emp_email','$emp_designation','$emp_location','$emp_address','$emp_contact')' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/insert_employee.php:60
(Warning) SQL Queries

SQL query-like string literal 'select * from admins where user_email='$email' AND user_pass='$pass'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/login.php:8
(Research) Os Network Web Upload Php

Uploaded files are handled with 'move_uploaded_file'. Could be a interesting start for research.

/home/masacre/docker_data/git/travel-agency/admin_area/insert_package.php:16
(Warning) SQL Queries

SQL query-like string literal 'insert into packages (package_cat, package_type, package_title, package_price, package_desc, package_image, package_keywords) values ('$package_cat','$package_type','$package_title','$package_price','$package_desc','$package_image','$package_keywords')' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/admin_area/insert_package.php:18
(Warning) SQL Queries

SQL query-like string literal 'select * from customers where customer_email='$user'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/my_account.php:49
(Warning) SQL Queries

SQL query-like string literal 'select * from customers where customer_email='$user'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/edit_account.php:16
(Warning) SQL Queries

SQL query-like string literal 'update customers set customer_name='$c_name', customer_email='$c_email', customer_pass='$c_pass', customer_city='$c_city', customer_contact='$c_contact', customer_address='$c_address' where customer_id='$customer_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/edit_account.php:133
(Warning) SQL Queries

SQL query-like string literal 'update customers set customer_name='$c_name', customer_email='$c_email', customer_pass='$c_pass', customer_city='$c_city', customer_contact='$c_contact', customer_address='$c_address', customer_image='$c_image' where customer_id='$customer_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/edit_account.php:137
(Warning) SQL Queries

SQL query-like string literal 'select * from customers where customer_pass='$current_pass' AND customer_email='$user'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/change_pass.php:33
(Warning) SQL Queries

SQL query-like string literal 'update customers set customer_pass='$new_pass' where customer_email='$user'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/change_pass.php:48
(Warning) SQL Queries

SQL query-like string literal 'SELECT * FROM cart WHERE ip_add='$ip' and p_id='$pack_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/functions/functions.php:29
(Warning) SQL Queries

SQL query-like string literal 'INSERT INTO cart (p_id, ip_add) VALUES ('$pack_id','$ip')' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/functions/functions.php:36
(Warning) SQL Queries

SQL query-like string literal 'SELECT * FROM cart WHERE ip_add='$ip'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/functions/functions.php:51
(Warning) SQL Queries

SQL query-like string literal 'SELECT * FROM cart WHERE ip_add='$ip'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/functions/functions.php:57
(Warning) SQL Queries

SQL query-like string literal 'SELECT * FROM cart WHERE ip_add='$ip'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/functions/functions.php:72
(Warning) SQL Queries

SQL query-like string literal 'SELECT * FROM packages WHERE package_id='$pack_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/functions/functions.php:77
(Warning) SQL Queries

SQL query-like string literal 'SELECT * FROM packages WHERE package_cat='$cat_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/functions/functions.php:157
(Warning) SQL Queries

SQL query-like string literal 'SELECT * FROM packages WHERE package_type='$type_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/customer/functions/functions.php:194
(Warning) SQL Queries

SQL query-like string literal 'select * from cart where ip_add='$ip' and p_id='$pack_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/functions/functions.php:29
(Warning) SQL Queries

SQL query-like string literal 'insert into cart (p_id, ip_add) values ('$pack_id','$ip')' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/functions/functions.php:36
(Warning) SQL Queries

SQL query-like string literal 'select * from cart where ip_add='$ip'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/functions/functions.php:49
(Warning) SQL Queries

SQL query-like string literal 'select * from cart where ip_add='$ip'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/functions/functions.php:54
(Warning) SQL Queries

SQL query-like string literal 'select * from cart where ip_add='$ip'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/functions/functions.php:67
(Warning) SQL Queries

SQL query-like string literal 'select * from packages where package_id='$pack_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/functions/functions.php:72
(Warning) SQL Queries

SQL query-like string literal 'select * from packages where package_cat='$cat_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/functions/functions.php:151
(Warning) SQL Queries

SQL query-like string literal 'select * from packages where package_type='$type_id'' contains '$', which could mean variable concaternation.

/home/masacre/docker_data/git/travel-agency/functions/functions.php:187