You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/main/resources/messages.properties
+19-19
Original file line number
Diff line number
Diff line change
@@ -1,15 +1,15 @@
1
1
description.access.history = Access history in this page (The latest 15 records).
2
-
description.all = Warning: Several links cause severe memory leaks or increase a CPU usage rate. They can make your computer unstable.The result may change depending on JRE type / version, JVM option, OS, hardware (memory, CPU) or etc.
3
-
description.capitalize.string = If you enter a string, then the capitalized string is shown. For example: capitalize string -> Capitalize String
2
+
description.all = Warning: Several links cause severe memory leaks or increase CPU usage rate. They can make your computer unstable.The results may change depending on JRE type / version, JVM option, OS, hardware (memory, CPU) or etc.
3
+
description.capitalize.string = When you enter a string, the capitalized string is shown. For example: capitalize string -> Capitalize String
4
4
description.design.page = You can change design of this page. Please click one of the links below and change this page to your style.
5
5
description.design.test = Please click on one of the links below.
6
-
description.endless.waiting = If you enter a character count, then a batch (including echo characters of the count) is created and executed.
6
+
description.endless.waiting = When you enter a character count, a batch file (including echo characters of the count) is created and executed.
7
7
description.errors = OutOfMemoryError, StackOverflowError, NoClassDefFoundError, and so on:
8
-
description.parse.json = If you enter a JSON string, then a result checked by JSON.parse() of JavaScript is shown.
8
+
description.parse.json = When you enter a JSON string, a result checked by JSON.parse() of JavaScript is shown.
9
9
description.performance.issue = Issues for performance
10
-
description.random.string.generator = If you enter a character count, then a random characters of the count is created.
11
-
description.response.time = If you add pingurl=[a URL] to query string, the response code and time from the url is shown.
12
-
description.reverse.string = If you enter a string, then the reversed string is shown.
10
+
description.random.string.generator = When you enter a character count, a random characters of the count is created.
11
+
description.response.time = When you add pingurl=[a URL] to query string, the response code and time from the url is shown.
12
+
description.reverse.string = When you enter a string, the reversed string is shown.
13
13
description.section.exceptions = Exceptions, extending from java.lang.RuntimeException:
14
14
description.send.mail = You can send a mail to the site administrator.
15
15
description.test.regular.expression = Please test if an input string matches the regular expression <code>^([a-z0-9]+[-]{0,1}){1,100}$</code>.
@@ -46,9 +46,9 @@ function.description.path.traversal = There is a path traver
46
46
function.description.redirect.loop = Redirect loop occurs if you click this link.
47
47
function.description.round.off.error = Round off error can occur.
48
48
function.description.session.fixation = This login page is vulnerable for session fixation attack.
49
-
function.description.slow.regular.expression = It takes time to parse the regular expression if you enter a specific string.
50
-
function.description.slow.string.plus.operation = It takes time to append strings if you enter a large number.
51
-
function.description.slow.unnecessary.object.creation = If you input a large number, it takes time to respond due to unnecessary object creation.
49
+
function.description.slow.regular.expression = It takes time to parse a regular expression.
50
+
function.description.slow.string.plus.operation = It takes time to append strings.
51
+
function.description.slow.unnecessary.object.creation = It takes time to respond due to unnecessary object creation.
52
52
function.description.sql.injection = There is an SQL injection vulnerability in this page.
53
53
function.description.thread.leak = Thread leak occurs every time you load this page.
54
54
function.description.throwable = {0} is thrown if you click this link.
@@ -166,7 +166,7 @@ label.your.mail = Your Mail Address
166
166
label.your.name = Your Name
167
167
168
168
msg.account.locked = Your account is locked out because the number of login failures exceeds {0} times.
169
-
msg.add.users.by.xml = If you upload an XML file of the following format, users can be registered all at once.
169
+
msg.add.users.by.xml = When you upload an XML file of the following format, users can be registered all at once.
@@ -189,8 +189,8 @@ msg.enter.json.string = Please enter JSON string.
189
189
msg.enter.mail = Please enter your mail address.
190
190
msg.enter.math.expression = Please enter a mathematical expression. You can use <code>java.lang.Math</code> in the expression. For example, <code>Math.sqrt(Math.pow(2, 6)) - 5</code>
191
191
msg.enter.name = Please enter your name.
192
-
msg.enter.name.and.passwd = If you enter your name and password, then your secret number is shown.
193
-
msg.enter.passwd = If you enter a new password and click the submit button, then your password will be changed.
192
+
msg.enter.name.and.passwd = When you enter your name and password, your secret number is shown.
193
+
msg.enter.passwd = When you enter a new password and click the submit button, your password will be changed.
194
194
msg.enter.positive.number = Please enter a positive number.
195
195
msg.enter.string = Please enter a string.
196
196
msg.error.user.not.exist = User does not exist or password does not match.
@@ -213,7 +213,7 @@ msg.note.clickjacking = This page receives a request that a user doe
213
213
msg.note.clientinfo = If the directory listing feature works and you access to http://localhost:8080/uid/, then you can see the file list in the uid directory. If you login as an acount written in http://localhost:8080/uid/adminpassword.txt you can access to /uid/serverinfo.jsp.
214
214
msg.note.codeinjection = If you enter <code>{}');java.lang.System.exit(0);//</code> , then JavaVM is forcibly finished due to code injection.
215
215
msg.note.commandinjection = If you enter <code>@Runtime@getRuntime().exec('rm -fr /your-important-dir/')</code> , then your important directory is removed on your server.
216
-
msg.note.createobjects = If you enter a large number, it takes time to respond due to unnecessary object creation.
216
+
msg.note.createobjects = If you enter a large number, then it takes time to respond due to unnecessary object creation.
217
217
msg.note.csrf = This page receives a request that a user does not intend and changes the user's password.
218
218
msg.note.dangerous.file.inclusion = Change the query string to <code>template=[URL where malicious JSP file is deployed]</code>, then a malicious code is executed.
219
219
msg.note.db.connection.leak.occur = DB connection leak occurs every time you load this page.
@@ -230,14 +230,14 @@ msg.note.memoryleak3 = Memory leak occurs in C heap space every tim
230
230
msg.note.mojibake = Mojibake occurs if you enter a multi-byte string.
231
231
msg.note.netsocketleak = Network socket leak occurs every time you load this page.
232
232
msg.note.not.use.ext.db = Database connection leak occurs if using an external RDBMS such as MySQL. Please edit <code>application.properties</code> if using an external RDBMS.
233
-
msg.note.nullbyteinjection = If using Java earlier than version 1.7.0_40 and you add <code>fileName=../WEB-INF/web.xml%00</code> to the query string, you can download a file which includes the content of web.xml.
233
+
msg.note.nullbyteinjection = If using Java earlier than version 1.7.0_40 and you add <code>fileName=../WEB-INF/web.xml%00</code> to the query string, then you can download a file which includes the content of web.xml.
234
234
msg.note.open.redirect = You can login with <code>admin</code> and <code>password</code>. If you add <code>goto=[an URL of a malicious site]</code> to the query string, you can redirect to the malicious site.
235
235
msg.note.path.traversal = Change the query string to <code>template=../uid/adminpassword.txt?</code>, then you can see the content of adminpassword.txt in this page.
236
236
msg.note.roundofferror = Round off error occurs if you enter 1.
237
237
msg.note.session.fixation = You can login with <code>admin</code> and <code>password</code>. The URL rewriting feature works on this page in order to support clients that cannot use cookie, so the session fixation attack is possible.
238
-
msg.note.slowregex = If you enter string to <code>aaaaaaaaaaaaaaaaaaaaaaaaaaaaaあ</code>, parse processing will take several tens of seconds<br> If you enter string to <code>aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaあ</code>, then no response will be received.
238
+
msg.note.slowregex = If you enter string to <code>aaaaaaaaaaaaaaaaaaaaaaaaaaaaaあ</code>, then the parse processing will take several tens of seconds.<br> If you enter string to <code>aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaあ</code>, then no response will be received.
239
239
msg.note.sqlijc = You can see a secret number if you enter <code>Mark</code> and <code>password</code>. You can see other users information if you enter password to <code>' OR '1'='1</code>
240
-
msg.note.strplusopr = If you enter a large number then the processing will take several tens of seconds because the string is created by "+" (plus) operator.
240
+
msg.note.strplusopr = If you enter a large number, then the processing will take several tens of seconds because the string is created by "+" (plus) operator.
241
241
msg.note.threadleak = Thread leak occurs every time you load this page.
242
242
msg.note.truncationerror = Truncation error occurs if you enter 3 or 7 or 9.
243
243
msg.note.unrestrictedextupload = If you upload JSP file (named exit.jsp) including <code><% System.exit(0); %></code> and access to http://localhost:8080/uploadFiles/exit.jsp, then JavaVM is forcibly finished.
@@ -246,7 +246,7 @@ msg.note.verbose.errror.message = You can login with <code>admin</code> and <c
246
246
msg.note.xee = If you upload the following XML file, it will waste server resources.
247
247
msg.note.xss = Session ID is shown if you enter name to <code>>tpircs/<;)eikooc.tnemucod(trela>tpIrcs<</code>
248
248
msg.note.xxe.step1 = If you create the following DTD file on a web server that can be accessed from this server, for example, http://attacker.site/vulnerable.dtd
249
-
msg.note.xxe.step2 = and upload the following XML file, you can display the password file (/etc/passwd) on the Linux server.
249
+
msg.note.xxe.step2 = and upload the following XML file, then you can display the password file (/etc/passwd) on the Linux server.
0 commit comments