0a166a71556b462966fb99e48ae44416f87bdbf2,w3af/core/controllers/sql_tools/blind_sqli_time_delay.py,BlindSQLTimeDelay,is_injectable,#BlindSQLTimeDelay#,112

Before Change


            // Now I can be sure that I found a vuln, we control the response
            // time with the delay
            desc = "Blind SQL injection using time delays was found at: %s"
            desc = desc % mutant.found_at()

            response_ids = [r.id for r in responses]

            v = Vuln.from_mutant("Blind SQL injection vulnerability", desc,
                                 severity.HIGH, response_ids, "blind_sqli",
                                 mutant)

After Change


            // Now I can be sure that I found a vuln, we control the response
            // time with the delay
            desc = "Blind SQL injection using time delays was found at: %s"
            desc %= mutant.found_at()

            response_ids = [r.id for r in responses]

            v = Vuln.from_mutant("Blind SQL injection vulnerability", desc,
                                 severity.HIGH, response_ids, "blind_sqli",
                                 mutant)
Italian Trulli
In pattern: SUPERPATTERN

Frequency: 3

Non-data size: 3

Instances


Project Name: andresriancho/w3af
Commit Name: 0a166a71556b462966fb99e48ae44416f87bdbf2
Time: 2018-02-06
Author: andres.riancho@gmail.com
File Name: w3af/core/controllers/sql_tools/blind_sqli_time_delay.py
Class Name: BlindSQLTimeDelay
Method Name: is_injectable


Project Name: andresriancho/w3af
Commit Name: c08c98415395b76371581432be55381f0f6e2b40
Time: 2018-01-09
Author: andres.riancho@gmail.com
File Name: w3af/plugins/audit/format_string.py
Class Name: format_string
Method Name: _analyze_result


Project Name: andresriancho/w3af
Commit Name: ea194224de09883a57c6320046e0b82590bf105e
Time: 2017-11-29
Author: andres.riancho@gmail.com
File Name: w3af/plugins/audit/file_upload.py
Class Name: file_upload
Method Name: _confirm_file_upload