Professional Documents
Culture Documents
2.
3.
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<!--
MM_reloadPage(true);
//-->
</script>
</head>
<body>
<div id="masthead">
<h1 id="siteName">
<a href="https://www.acunetix.com/">
</a>
</h1>
</h6>
<div id="globalNav">
<td align="left">
<a href="index.php">home</a>|
<a href="categories.php">categories</a>|
<a href="artists.php">artists</a>|
<a href="disclaimer.php">disclaimer</a>|
<a href="guestbook.php">guestbook</a>|
</td>
<td align="right">
</td>
</tr>
</table>
</div>
</div>
<div id="content">
<div class="story">
</div>
</div>
<div id="navBar">
<div id="search">
<label>search art</label>
</form>
</div>
<div id="sectionLinks">
<ul>
<li>
</li>
<li>
</li>
<li>
</li>
<li>
<a href="login.php">Signup</a>
</li>
<li>
</li>
<li>
</li>
<li>
<a href="AJAX/index.php">AJAX Demo</a>
</li>
</li>
</ul>
</div>
<div class="relatedLinks">
<h3>Links</h3>
<ul>
<li>
</li>
<li>
</li>
<li>
<a href="https://www.acunetix.com/blog/articles/prevent-sql-injection-vulnerabilities-in-php-
applications/">PHP vuln help</a>
</li>
<li>
</li>
</ul>
</div>
<div id="advert">
<p>
<object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000"
codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,29,0"
width="107" height="66">
</embed>
</object>
</p>
</div>
</div>
<div id="siteInfo">
<a href="/Mod_Rewrite_Shop/">Shop</a>|
<br>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:12px;padding:1px">
<p style="padding-left:5%;padding-right:5%">
<b>Warning</b>: This is not a real shop. This is an example PHP application, which is intentionally
vulnerable to web attacks. It is intended to help you test Acunetix. It also helps you understand how developer
errors and bad configuration may let someone break into your website. You can use it to test other tools and
your manual hacking skills as well. Tip: Look for potential SQL Injections, Cross-site Scripting (XSS), and Cross-
site Request Forgery (CSRF), and more.</p>
</div>
</div>
</body>
</html>
4.
<loc>http://testphp.vulnweb.com/showimage.php?file=./pictures/1.jpg</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/product.php?pic=2</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/showimage.php?file=./pictures/2.jpg</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/product.php?pic=3</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/showimage.php?file=./pictures/3.jpg</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/product.php?pic=4</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/showimage.php?file=./pictures/4.jpg</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/product.php?pic=5</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/showimage.php?file=./pictures/5.jpg</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/product.php?pic=7</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/showimage.php?file=./pictures/7.jpg</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/product.php?pic=6</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/showimage.php?file=./pictures/6.jpg</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/listproducts.php?artist=1</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/listproducts.php?artist=2</loc>
</url>
<url>
<loc>http://testphp.vulnweb.com/listproducts.php?artist=3</loc>
</url>
</urlset>