From 2a5e9b139a2e9d99db424009ae0109bc48988d53 Mon Sep 17 00:00:00 2001 From: Joas A Santos <34966120+CyberSecurityUP@users.noreply.github.com> Date: Mon, 19 Jan 2026 23:01:11 -0300 Subject: [PATCH] Add files via upload --- ...eurosploit-report-a29c170f-2026-01-20.html | 1780 +++++++++++++++++ 1 file changed, 1780 insertions(+) create mode 100644 reports/neurosploit-report-a29c170f-2026-01-20.html diff --git a/reports/neurosploit-report-a29c170f-2026-01-20.html b/reports/neurosploit-report-a29c170f-2026-01-20.html new file mode 100644 index 0000000..7070ff4 --- /dev/null +++ b/reports/neurosploit-report-a29c170f-2026-01-20.html @@ -0,0 +1,1780 @@ + + + + + + NeuroSploit Security Report - a29c170f + + + +
+
+

🛡️ NeuroSploit Security Assessment Report

+

Target: http://testphp.vulnweb.com/ | Agent ID: a29c170f | Mode: AI Prompt Mode

+

Date: Monday, January 19, 2026

+
+ + +
+

📊 Executive Summary

+

+ This security assessment of http://testphp.vulnweb.com/ was conducted using NeuroSploit AI-powered penetration testing platform. + The assessment identified 21 security findings across various severity levels. + 4 critical vulnerabilities require immediate attention. + 1 high-severity issues should be addressed promptly. +

+
+
+
Overall Risk Score
+
100/100
+
+
+
+
+
+
Critical Risk
+
+
+
+ + +
+
21
Total
+
4
Critical
+
1
High
+
6
Medium
+
10
Low
+
0
Info
+
+ +

🔍 Detailed Findings

+
+ +
+
+
+
+ + critical + + Finding #1 +
+

SQLI in /listproducts.php

+

http://testphp.vulnweb.com/listproducts.php?cat='

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 9.1 + Critical +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+
+ + + +
+
OWASP Top 10
+
A03:2021 - Injection
+
+ +
+
Vulnerability Type
+
sqli
+
+
+ + + + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/listproducts.php?cat='
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
SQL error message: 'sql syntax'
+
+ + + + + + + + + + +
+
+ +
+
+
+
+ + critical + + Finding #2 +
+

SQLI in /artists.php

+

http://testphp.vulnweb.com/artists.php?artist='

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 9.1 + Critical +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+
+ + + +
+
OWASP Top 10
+
A03:2021 - Injection
+
+ +
+
Vulnerability Type
+
sqli
+
+
+ + + + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/artists.php?artist='
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
SQL error message: 'sql syntax'
+
+ + + + + + + + + + +
+
+ +
+
+
+
+ + critical + + Finding #3 +
+

SQLI in /search.php

+

http://testphp.vulnweb.com/search.php?test='

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 9.1 + Critical +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+
+ + + +
+
OWASP Top 10
+
A03:2021 - Injection
+
+ +
+
Vulnerability Type
+
sqli
+
+
+ + + + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/search.php?test='
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
SQL error message: 'sql syntax'
+
+ + + + + + + + + + +
+
+ +
+
+
+
+ + medium + + Finding #4 +
+

Missing Clickjacking Protection

+

http://testphp.vulnweb.com/

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 4 + Medium +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-1021 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
clickjacking
+
+
+ + + +
+

📋 Description

+

The page lacks X-Frame-Options header and CSP frame-ancestors directive, making it vulnerable to clickjacking attacks.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
X-Frame-Options: Not set
+CSP: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Add 'X-Frame-Options: DENY' or 'X-Frame-Options: SAMEORIGIN' header, or use 'frame-ancestors' in CSP.

+
+ + + + +
+
+ +
+
+
+
+ + low + + Finding #5 +
+

Missing X-Content-Type-Options Header

+

http://testphp.vulnweb.com/

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 3 + Low +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-693 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
missing_xcto
+
+
+ + + +
+

📋 Description

+

Missing nosniff header allows MIME-sniffing attacks.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
X-Content-Type-Options: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Add 'X-Content-Type-Options: nosniff' header.

+
+ + + + +
+
+ +
+
+
+
+ + low + + Finding #6 +
+

Missing Content-Security-Policy Header

+

http://testphp.vulnweb.com/

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 3 + Low +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-693 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
missing_csp
+
+
+ + + +
+

📋 Description

+

No Content-Security-Policy header, increasing XSS risk.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
Content-Security-Policy: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Implement a restrictive Content-Security-Policy.

+
+ + + + +
+
+ +
+
+
+
+ + medium + + Finding #7 +
+

Missing Clickjacking Protection

+

http://testphp.vulnweb.com/Mod_Rewrite_Shop/

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 4 + Medium +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-1021 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
clickjacking
+
+
+ + + +
+

📋 Description

+

The page lacks X-Frame-Options header and CSP frame-ancestors directive, making it vulnerable to clickjacking attacks.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/Mod_Rewrite_Shop/
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
X-Frame-Options: Not set
+CSP: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Add 'X-Frame-Options: DENY' or 'X-Frame-Options: SAMEORIGIN' header, or use 'frame-ancestors' in CSP.

+
+ + + + +
+
+ +
+
+
+
+ + low + + Finding #8 +
+

Missing X-Content-Type-Options Header

+

http://testphp.vulnweb.com/Mod_Rewrite_Shop/

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 3 + Low +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-693 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
missing_xcto
+
+
+ + + +
+

📋 Description

+

Missing nosniff header allows MIME-sniffing attacks.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/Mod_Rewrite_Shop/
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
X-Content-Type-Options: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Add 'X-Content-Type-Options: nosniff' header.

+
+ + + + +
+
+ +
+
+
+
+ + low + + Finding #9 +
+

Missing Content-Security-Policy Header

+

http://testphp.vulnweb.com/Mod_Rewrite_Shop/

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 3 + Low +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-693 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
missing_csp
+
+
+ + + +
+

📋 Description

+

No Content-Security-Policy header, increasing XSS risk.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/Mod_Rewrite_Shop/
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
Content-Security-Policy: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Implement a restrictive Content-Security-Policy.

+
+ + + + +
+
+ +
+
+
+
+ + medium + + Finding #10 +
+

Missing Clickjacking Protection

+

http://testphp.vulnweb.com/hpp/

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 4 + Medium +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-1021 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
clickjacking
+
+
+ + + +
+

📋 Description

+

The page lacks X-Frame-Options header and CSP frame-ancestors directive, making it vulnerable to clickjacking attacks.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/hpp/
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
X-Frame-Options: Not set
+CSP: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Add 'X-Frame-Options: DENY' or 'X-Frame-Options: SAMEORIGIN' header, or use 'frame-ancestors' in CSP.

+
+ + + + +
+
+ +
+
+
+
+ + low + + Finding #11 +
+

Missing X-Content-Type-Options Header

+

http://testphp.vulnweb.com/hpp/

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 3 + Low +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-693 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
missing_xcto
+
+
+ + + +
+

📋 Description

+

Missing nosniff header allows MIME-sniffing attacks.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/hpp/
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
X-Content-Type-Options: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Add 'X-Content-Type-Options: nosniff' header.

+
+ + + + +
+
+ +
+
+
+
+ + low + + Finding #12 +
+

Missing Content-Security-Policy Header

+

http://testphp.vulnweb.com/hpp/

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 3 + Low +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-693 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
missing_csp
+
+
+ + + +
+

📋 Description

+

No Content-Security-Policy header, increasing XSS risk.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/hpp/
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
Content-Security-Policy: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Implement a restrictive Content-Security-Policy.

+
+ + + + +
+
+ +
+
+
+
+ + medium + + Finding #13 +
+

Missing Clickjacking Protection

+

http://testphp.vulnweb.com/admin

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 4 + Medium +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-1021 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
clickjacking
+
+
+ + + +
+

📋 Description

+

The page lacks X-Frame-Options header and CSP frame-ancestors directive, making it vulnerable to clickjacking attacks.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/admin
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
X-Frame-Options: Not set
+CSP: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Add 'X-Frame-Options: DENY' or 'X-Frame-Options: SAMEORIGIN' header, or use 'frame-ancestors' in CSP.

+
+ + + + +
+
+ +
+
+
+
+ + low + + Finding #14 +
+

Missing X-Content-Type-Options Header

+

http://testphp.vulnweb.com/admin

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 3 + Low +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-693 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
missing_xcto
+
+
+ + + +
+

📋 Description

+

Missing nosniff header allows MIME-sniffing attacks.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/admin
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
X-Content-Type-Options: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Add 'X-Content-Type-Options: nosniff' header.

+
+ + + + +
+
+ +
+
+
+
+ + low + + Finding #15 +
+

Missing Content-Security-Policy Header

+

http://testphp.vulnweb.com/admin

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 3 + Low +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-693 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
missing_csp
+
+
+ + + +
+

📋 Description

+

No Content-Security-Policy header, increasing XSS risk.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/admin
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
Content-Security-Policy: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Implement a restrictive Content-Security-Policy.

+
+ + + + +
+
+ +
+
+
+
+ + medium + + Finding #16 +
+

Missing Clickjacking Protection

+

http://testphp.vulnweb.com/listproducts.php?cat=1

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 4 + Medium +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-1021 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
clickjacking
+
+
+ + + +
+

📋 Description

+

The page lacks X-Frame-Options header and CSP frame-ancestors directive, making it vulnerable to clickjacking attacks.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/listproducts.php?cat=1
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
X-Frame-Options: Not set
+CSP: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Add 'X-Frame-Options: DENY' or 'X-Frame-Options: SAMEORIGIN' header, or use 'frame-ancestors' in CSP.

+
+ + + + +
+
+ +
+
+
+
+ + low + + Finding #17 +
+

Missing X-Content-Type-Options Header

+

http://testphp.vulnweb.com/listproducts.php?cat=1

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 3 + Low +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-693 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
missing_xcto
+
+
+ + + +
+

📋 Description

+

Missing nosniff header allows MIME-sniffing attacks.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/listproducts.php?cat=1
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
X-Content-Type-Options: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Add 'X-Content-Type-Options: nosniff' header.

+
+ + + + +
+
+ +
+
+
+
+ + low + + Finding #18 +
+

Missing Content-Security-Policy Header

+

http://testphp.vulnweb.com/listproducts.php?cat=1

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 3 + Low +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
+
+ + +
+
CWE Reference
+ CWE-693 +
+ + +
+
OWASP Top 10
+
A05:2021 - Security Misconfiguration
+
+ +
+
Vulnerability Type
+
missing_csp
+
+
+ + + +
+

📋 Description

+

No Content-Security-Policy header, increasing XSS risk.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/listproducts.php?cat=1
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
Content-Security-Policy: Not set
+
+ + + + + + + +
+

✅ Remediation

+

Implement a restrictive Content-Security-Policy.

+
+ + + + +
+
+ +
+
+
+
+ + medium + + Finding #19 +
+

Cross-Site Request Forgery (CSRF)

+

http://testphp.vulnweb.com/listproducts.php?cat=1&action=delete&id=1

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 6.8 + Medium +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
+
+ + +
+
CWE Reference
+ CWE-352 +
+ + +
+
OWASP Top 10
+
A01:2021 - Broken Access Control
+
+ +
+
Vulnerability Type
+
cross-site_request_forgery_(csrf)
+
+
+ + + +
+

📋 Description

+

CSRF attacks force authenticated users to perform unintended actions on web applications where they're authenticated. Attackers can trick users into executing actions without their knowledge through malicious requests. + +AI Explanation: This represents a classic CSRF vulnerability where a destructive action (delete) can be triggered via GET request. State-changing operations should never use GET methods as they can be easily exploited through CSRF attacks via image tags, links, or other GET-based requests.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/listproducts.php?cat=1&action=delete&id=1
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
URL contains state-changing action (delete) via GET method: /listproducts.php?cat=1&action=delete&id=1
+
+ + + + + + + +
+

✅ Remediation

+

Implement proper CSRF tokens for all state-changing operations +Use POST requests exclusively for all destructive or state-changing actions +Add SameSite cookie attributes to session cookies +Implement Origin/Referer header validation for sensitive operations +Review and secure the delete functionality in listproducts.php to require POST with CSRF protection +Conduct follow-up testing on the admin panel and user registration endpoints after accessing the actual forms

+
+ + + + +
+
+ +
+
+
+
+ + high + + Finding #20 +
+

Brute Force Attack

+

http://testphp.vulnweb.com/secured/newuser.php

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 7.5 + High +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
+
+ + +
+
CWE Reference
+ CWE-307 +
+ + +
+
Vulnerability Type
+
brute_force_attack
+
+
+ + + +
+

📋 Description

+

Brute force attacks attempt to gain unauthorized access by systematically trying multiple combinations of usernames and passwords, or by exploiting weak authentication mechanisms. This includes testing for weak credentials, lack of account lockout mechanisms, and insufficient rate limiting. + +AI Explanation: The 'secured' directory is accessible without authentication, returning a complete HTML page for adding new users. This bypasses intended access controls and allows unauthorized access to administrative functions.

+
+ + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/secured/newuser.php
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
HTTP 200 status code with full page content (415 bytes) for /secured/newuser.php without authentication. Page title 'add new user' indicates administrative functionality.
+
+ + + + + + + +
+

✅ Remediation

+

Implement proper authentication controls for the /secured/ directory using .htaccess, server configuration, or application-level authentication +Review all directories named 'secured', 'admin', or similar to ensure proper access controls are enforced +Implement session-based authentication for administrative functions like user creation +Add input validation and authorization checks to administrative endpoints +Consider implementing rate limiting and account lockout mechanisms for authentication endpoints +Regularly audit directory permissions and access controls

+
+ + + + +
+
+ +
+
+
+
+ + critical + + Finding #21 +
+

SQLI in /product.php

+

http://testphp.vulnweb.com/product.php?pic='

+
+
+ +
+ +
+ +
+
CVSS 3.1 Score
+
+ 9.1 + Critical +
+
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+
+ + + +
+
OWASP Top 10
+
A03:2021 - Injection
+
+ +
+
Vulnerability Type
+
sqli
+
+
+ + + + + +
+

🎯 Affected Endpoint

+
http://testphp.vulnweb.com/product.php?pic='
+
+ + + +
+

🔍 Evidence / Proof of Concept

+
SQL error message: 'sql syntax'
+
+ + + + + + + + + + +
+
+ +
+ + +
+ + \ No newline at end of file