Found
Duration
Date
IP
- Nikto --------------------------------------------------------------------------- + Multiple IPs found: 104.26.6.95, 104.26.7.95, 172.67.73.98, 2606:4700:20::681a:65f, 2606:4700:20::681a:75f, 2606:4700:20::ac43:4962 + Target IP: 104.26.6.95 + Target Hostname: temp-mail.org + Target Port: 80 + Start Time: 2025-10-13 15:46:08 (GMT-7) --------------------------------------------------------------------------- + Server: cloudflare + /: Uncommon header 'server-timing' found, with contents: cfEdge;dur=5,cfOrigin;dur=0. + /: Uncommon header 'proxy-status' found, with contents: Cloudflare-Proxy;error=http_request_error. + /cgi.cgi/cart32.exe: request cart32.exe/cart32clientlist. + /cgi-914/cart32.exe: request cart32.exe/cart32clientlist. + /cgi-sys/cart32.exe: request cart32.exe/cart32clientlist. + /htbin/cart32.exe: request cart32.exe/cart32clientlist. + /cgi-win/cart32.exe: request cart32.exe/cart32clientlist. + /fcgi-bin/cart32.exe: request cart32.exe/cart32clientlist. + /cgi-home/cart32.exe: request cart32.exe/cart32clientlist. + /scgi-bin/cart32.exe: request cart32.exe/cart32clientlist. + /cgi.cgi/flexform: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /bin/flexform: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /cgi-local/flexform: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /htbin/flexform: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /cgi-win/flexform: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /cgi-home/flexform: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /scgi-bin/flexform: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /cgi.cgi/lwgate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /webcgi/lwgate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /fcgi-bin/lwgate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi.cgi/LWGate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /webcgi/LWGate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-914/LWGate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /bin/LWGate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-sys/LWGate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-local/LWGate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-win/LWGate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /fcgi-bin/LWGate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-home/LWGate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /tiki/tiki-install.php: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin. + /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0709 + /cgi.cgi/finger: finger other users, may be other commands?. + /webcgi/finger: finger other users, may be other commands?. + /bin/finger: finger other users, may be other commands?. + /cgi-local/finger: finger other users, may be other commands?. + /fcgi-bin/finger: finger other users, may be other commands?. + /cgi-home/finger: finger other users, may be other commands?. + /cgi.cgi/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /webcgi/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /bin/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgi-sys/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgi-local/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /htbin/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /fcgi-bin/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgi-home/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /scgi-bin/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgi-home/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file. + /scgi-bin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file. + /forums//admin/config.php: PHP Config file may contain database IDs and passwords. + /forums/config.php: PHP Config file may contain database IDs and passwords. + /guestbook/pwd: PHP-Gastebuch 1.60 Beta reveals the md5 hash of the admin password. + /inc/dbase.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1253 + /webcgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /cgi-sys/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /htbin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /fcgi-bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /scgi-bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /cgi.cgi/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /webcgi/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-914/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-sys/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-local/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /htbin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-win/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /webcgi/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory. + /cgi-sys/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory. + /htbin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory. + /fcgi-bin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory. + /cgi-home/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory. + /scgi-bin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory. + /gb/index.php?login=true: gBook may allow admin login by setting the value 'login' equal to 'true'. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1560 + /getaccess: This may be an indication that the server is running getAccess for SSO. + /cfdocs/expeval/openfile.cfm: Can use to expose the system/server path. + /vgn/performance/TMT: Vignette CMS admin/maintenance script available. + /vgn/performance/TMT/Report: Vignette CMS admin/maintenance script available. + /vgn/performance/TMT/Report/XML: Vignette CMS admin/maintenance script available. + /vgn/vr/Deleting: Vignette CMS admin/maintenance script available. + /vgn/vr/Select: Vignette CMS admin/maintenance script available. + /scripts/iisadmin/bdir.htr: This default script shows host info, may allow file browsing and buffer a overrun in the Chunked Encoding data transfer mechanism, request /scripts/iisadmin/bdir.htr??c:\<dir>. See: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/MS02-028 + /vgn/style: Vignette server may reveal system information through this file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0401 + /scripts/tools/dsnform: Allows creation of ODBC Data Source. + /readme.eml: Remote server may be infected with the Nimda virus. + /PDG_Cart/order.log: PDG Commerce log found. See: http://zodi.com/cgi-bin/shopper.cgi?display=intro&template=Intro/commerce.html + /cgi-local/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-home/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /webcgi/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x. + /bin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x. + /cgi-local/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x. + /cgi-win/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x. + /scgi-bin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x. + /administrator/gallery/uploadimage.php: Mambo PHP Portal/Server 4.0.12 BETA and below may allow upload of any file type simply putting '.jpg' before the real file extension. + /pafiledb/includes/team/file.php: paFileDB 3.1 and below may allow file upload without authentication. + /webcgi/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /cgi-914/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /htbin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /scgi-bin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /wa.exe: An ASP page that allows attackers to upload files to server. + /cgi-914/fpsrvadm.exe: Potentially vulnerable CGI program. + /bin/fpsrvadm.exe: Potentially vulnerable CGI program. + /fcgi-bin/fpsrvadm.exe: Potentially vulnerable CGI program. + /cgi-home/fpsrvadm.exe: Potentially vulnerable CGI program. + /scgi-bin/fpsrvadm.exe: Potentially vulnerable CGI program. + /vgn/ac/edit: Vignette CMS admin/maintenance script available. + /vgn/asp/MetaDataUpdate: Vignette CMS admin/maintenance script available. + /vgn/asp/previewer: Vignette CMS admin/maintenance script available. + /vgn/asp/style: Vignette CMS admin/maintenance script available. + /vgn/errors: Vignette CMS admin/maintenance script available. + /vgn/jsp/controller: Vignette CMS admin/maintenance script available. + /vgn/jsp/errorpage: Vignette CMS admin/maintenance script available. + /vgn/jsp/previewer: Vignette CMS admin/maintenance script available. + /vgn/jsp/style: Vignette CMS admin/maintenance script available. + /vgn/legacy/edit: Vignette CMS admin/maintenance script available. + /vgn/login: Vignette server may allow user enumeration based on the login attempts to this file. + /webcgi/.cobalt: May allow remote admin of CGI scripts. + /bin/.cobalt: May allow remote admin of CGI scripts. + /cgi-sys/.cobalt: May allow remote admin of CGI scripts. + /htbin/.cobalt: May allow remote admin of CGI scripts. + /cgi-home/.cobalt: May allow remote admin of CGI scripts. + /scgi-bin/.cobalt: May allow remote admin of CGI scripts. + /cgi.cgi/.access: Contains authorization information. + /cgi-914/.access: Contains authorization information. + /bin/.access: Contains authorization information. + /htbin/.access: Contains authorization information. + /fcgi-bin/.access: Contains authorization information. + /webcgi/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0544 + /cgi-914/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0544 + /cgi-win/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0544 + /fcgi-bin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0544 + /contents.php?new_language=elvish&mode=select: Requesting a file with an invalid language selection from DC Portal may reveal the system path. + /typo3conf/localconf.php: TYPO3 config file found. + /cms/typo3conf/localconf.php: TYPO3 config file found. + /typo3/typo3conf/localconf.php: TYPO3 config file found. + /vgn/license: Vignette server license file found. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0403 + /cgi-914/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /bin/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /cgi-win/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /fcgi-bin/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /cgi-home/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities. + /webcgi/aglimpse: This CGI may allow attackers to execute remote commands. + /cgi-914/aglimpse: This CGI may allow attackers to execute remote commands. + /cgi-sys/aglimpse: This CGI may allow attackers to execute remote commands. + /cgi-local/aglimpse: This CGI may allow attackers to execute remote commands. + /htbin/aglimpse: This CGI may allow attackers to execute remote commands. + /cgi-win/aglimpse: This CGI may allow attackers to execute remote commands. + /scgi-bin/aglimpse: This CGI may allow attackers to execute remote commands. + /servlet/SchedulerTransfer: PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0104 + /servlet/sunexamples.BBoardServlet: This default servlet lets attackers execute arbitrary commands. + /servlets/SchedulerTransfer: PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0104 + /cgi.cgi/cmd.exe?/c+dir: cmd.exe can execute arbitrary commands. + /cgi-914/cmd.exe?/c+dir: cmd.exe can execute arbitrary commands. + /cgi-local/cmd.exe?/c+dir: cmd.exe can execute arbitrary commands. + /cgi-win/cmd.exe?/c+dir: cmd.exe can execute arbitrary commands. + /fcgi-bin/cmd.exe?/c+dir: cmd.exe can execute arbitrary commands. + /cgi-home/cmd.exe?/c+dir: cmd.exe can execute arbitrary commands. + /webcgi/cmd1.exe?/c+dir: cmd1.exe can execute arbitrary commands. + /bin/cmd1.exe?/c+dir: cmd1.exe can execute arbitrary commands. + /cgi-sys/cmd1.exe?/c+dir: cmd1.exe can execute arbitrary commands. + /cgi-local/cmd1.exe?/c+dir: cmd1.exe can execute arbitrary commands. + /cgi-win/cmd1.exe?/c+dir: cmd1.exe can execute arbitrary commands. + /cgi-home/cmd1.exe?/c+dir: cmd1.exe can execute arbitrary commands. + /scgi-bin/cmd1.exe?/c+dir: cmd1.exe can execute arbitrary commands. + /cgi.cgi/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /bin/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /htbin/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /scgi-bin/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /siteminder: This may be an indication that the server is running Siteminder for SSO. + /smg_Smxcfg30.exe?vcc=3560121183d3: This may be a Trend Micro Officescan 'backdoor'. + /nsn/..%5Cutil/attrib.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/chkvol.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/copy.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/dir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/glist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/md.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/ren.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/set.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/slist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/type.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cweb/env.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cwebdemo/fdir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /webcgi/archie: Gateway to the unix command, may be able to submit extra commands. + /bin/archie: Gateway to the unix command, may be able to submit extra commands. + /cgi-sys/archie: Gateway to the unix command, may be able to submit extra commands. + /cgi-local/archie: Gateway to the unix command, may be able to submit extra commands. + /fcgi-bin/archie: Gateway to the unix command, may be able to submit extra commands. + /scgi-bin/archie: Gateway to the unix command, may be able to submit extra commands. + /cgi.cgi/calendar: Gateway to the unix command, may be able to submit extra commands. + /webcgi/calendar: Gateway to the unix command, may be able to submit extra commands. + /cgi-914/calendar: Gateway to the unix command, may be able to submit extra commands. + /cgi-sys/calendar: Gateway to the unix command, may be able to submit extra commands. + /cgi-local/calendar: Gateway to the unix command, may be able to submit extra commands. + /htbin/calendar: Gateway to the unix command, may be able to submit extra commands. + /cgi-win/calendar: Gateway to the unix command, may be able to submit extra commands. + /cgi.cgi/date: Gateway to the unix command, may be able to submit extra commands. + /cgi-914/date: Gateway to the unix command, may be able to submit extra commands. + /bin/date: Gateway to the unix command, may be able to submit extra commands. + /cgi-sys/date: Gateway to the unix command, may be able to submit extra commands. + /cgi-local/date: Gateway to the unix command, may be able to submit extra commands. + /cgi-win/date: Gateway to the unix command, may be able to submit extra commands. + /cgi-home/date: Gateway to the unix command, may be able to submit extra commands. + /scgi-bin/date: Gateway to the unix command, may be able to submit extra commands. + /bin/fortune: Gateway to the unix command, may be able to submit extra commands. + /htbin/fortune: Gateway to the unix command, may be able to submit extra commands. + /cgi-win/fortune: Gateway to the unix command, may be able to submit extra commands. + /fcgi-bin/fortune: Gateway to the unix command, may be able to submit extra commands. + /cgi-home/fortune: Gateway to the unix command, may be able to submit extra commands. + /scgi-bin/fortune: Gateway to the unix command, may be able to submit extra commands. + /cgi.cgi/redirect: Redirects via URL from form. + /webcgi/redirect: Redirects via URL from form. + /bin/redirect: Redirects via URL from form. + /cgi-sys/redirect: Redirects via URL from form. + /htbin/redirect: Redirects via URL from form. + /cgi-914/uptime: Gateway to the unix command, may be able to submit extra commands. + /cgi-sys/uptime: Gateway to the unix command, may be able to submit extra commands. + /cgi-home/uptime: Gateway to the unix command, may be able to submit extra commands. + /scgi-bin/uptime: Gateway to the unix command, may be able to submit extra commands. + /cgi.cgi/mail: Simple Perl mailing script to send form data to a pre-configured email address. + /webcgi/mail: Simple Perl mailing script to send form data to a pre-configured email address. + /htbin/mail: Simple Perl mailing script to send form data to a pre-configured email address. + /fcgi-bin/mail: Simple Perl mailing script to send form data to a pre-configured email address. + /cgi.cgi/query: Echoes back result of your GET. + /cgi-914/query: Echoes back result of your GET. + /bin/query: Echoes back result of your GET. + /cgi-914/test-cgi.tcl: May echo environment variables or give directory listings. + /cgi-local/test-cgi.tcl: May echo environment variables or give directory listings. + /fcgi-bin/test-cgi.tcl: May echo environment variables or give directory listings. + /cgi-home/test-cgi.tcl: May echo environment variables or give directory listings. + /cgi-914/test-env: May echo environment variables or give directory listings. + /cgi-sys/test-env: May echo environment variables or give directory listings. + /cgi-local/test-env: May echo environment variables or give directory listings. + /cgi-win/test-env: May echo environment variables or give directory listings. + /fcgi-bin/test-env: May echo environment variables or give directory listings. + /cgi-home/test-env: May echo environment variables or give directory listings. + /ht_root/wwwroot/-/local/httpd$map.conf: WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site. + /local/httpd$map.conf: WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site. + /webcgi/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /bin/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /cgi-local/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /htbin/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /cgi-home/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /scgi-bin/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /cgi.cgi/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /webcgi/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /cgi-914/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /cgi-local/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /cgi-win/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /cgi-home/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /scgi-bin/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /cgi-sys/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-local/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-win/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /fcgi-bin/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-home/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /scgi-bin/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-914/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-local/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-win/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /fcgi-bin/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /scgi-bin/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-win/cgitest.exe: This CGI may allow the server to be crashed remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi.cgi/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgi-914/snorkerz.bat: Arguments passed to DOS CGI without checking. + /bin/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgi-sys/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgi-local/snorkerz.bat: Arguments passed to DOS CGI without checking. + /htbin/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgi-home/snorkerz.bat: Arguments passed to DOS CGI without checking. + /scgi-bin/snorkerz.bat: Arguments passed to DOS CGI without checking. + /postnuke/My_eGallery/public/displayCategory.php: My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection. displayCategory.php calls imageFunctions.php without checking URL/location arguments. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6795 + /postnuke/html/My_eGallery/public/displayCategory.php: My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection. displayCategory.php calls imageFunctions.php without checking URL/location arguments. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6795 + /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1724 + /openautoclassifieds/friendmail.php?listing=<script>alert(document.domain);</script>: OpenAutoClassifieds 1.0 is vulnerable to a XSS attack. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1145 + /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). + /modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). + /guestbook/?number=5&lng=%3Cscript%3Ealert(document.domain);%3C/script%3E: MPM Guestbook 1.2 and previous are vulnreable to XSS attacks. See: OSVDB-2754 + /anthill/login.php: Anthill bug tracking system may be installed. Versions lower than 0.1.6.1 allow XSS and may allow users to bypass login requirements. + /cbms/passgen.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/. + /cbms/realinv.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/. + /webcgi/mkilog.exe: This CGI can give an attacker a lot of information. + /cgi-sys/mkilog.exe: This CGI can give an attacker a lot of information. + /cgi-local/mkilog.exe: This CGI can give an attacker a lot of information. + /htbin/mkilog.exe: This CGI can give an attacker a lot of information. + /cgi-home/mkilog.exe: This CGI can give an attacker a lot of information. + /scgi-bin/mkilog.exe: This CGI can give an attacker a lot of information. + /cgi.cgi/mkplog.exe: This CGI can give an attacker a lot of information. + /cgi-local/mkplog.exe: This CGI can give an attacker a lot of information. + /htbin/mkplog.exe: This CGI can give an attacker a lot of information. + /cgi-home/mkplog.exe: This CGI can give an attacker a lot of information. + /cgi.cgi/rpm_query: This CGI allows anyone to see the installed RPMs. + /webcgi/rpm_query: This CGI allows anyone to see the installed RPMs. + /cgi-914/rpm_query: This CGI allows anyone to see the installed RPMs. + /cgi-sys/rpm_query: This CGI allows anyone to see the installed RPMs. + /cgi-local/rpm_query: This CGI allows anyone to see the installed RPMs. + /cgi-win/rpm_query: This CGI allows anyone to see the installed RPMs. + /fcgi-bin/rpm_query: This CGI allows anyone to see the installed RPMs. + /scgi-bin/rpm_query: This CGI allows anyone to see the installed RPMs. + /Admin_files/order.log: Selena Sol's WebStore 1.0 exposes order information. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /admin/cplogfile.log: DevBB 1.0 final log file is readable remotely. Upgrade to the latest version. See: http://www.mybboard.com + /admin/system_footer.php: myphpnuke version 1.8.8_final_7 reveals detailed system information. + /chat/data/usr: SimpleChat! 1.3 allows retrieval of user information. See: OSVDB-53304 + /config.php: PHP Config file may contain database IDs and passwords. + /cplogfile.log: XMB Magic Lantern forum 1.6b final log file is readable remotely. Upgrade to the latest version. See: https://securitytracker.com/id/1004318,http://www.xmbforum.com + /cgi.cgi/view-source?view-source: This allows remote users to view source code. + /cgi-sys/view-source?view-source: This allows remote users to view source code. + /fcgi-bin/view-source?view-source: This allows remote users to view source code. + /cgi-home/view-source?view-source: This allows remote users to view source code. + /scgi-bin/view-source?view-source: This allows remote users to view source code. + /cgi.cgi/ibill.pm: iBill.pm is installed. This may allow brute forcing of passwords. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0839 + /bin/ibill.pm: iBill.pm is installed. This may allow brute forcing of passwords. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0839 + /cgi-sys/ibill.pm: iBill.pm is installed. This may allow brute forcing of passwords. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0839 + /htbin/ibill.pm: iBill.pm is installed. This may allow brute forcing of passwords. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0839 + /fcgi-bin/ibill.pm: iBill.pm is installed. This may allow brute forcing of passwords. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0839 + /cgi-home/ibill.pm: iBill.pm is installed. This may allow brute forcing of passwords. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0839 + /scgi-bin/ibill.pm: iBill.pm is installed. This may allow brute forcing of passwords. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0839 + /cgi.cgi/SGB_DIR/superguestconfig: Super GuestBook 1.0 from lasource.r2.ru stores the admin password in a plain text file. See: OSVDB-4663 + /webcgi/SGB_DIR/superguestconfig: Super GuestBook 1.0 from lasource.r2.ru stores the admin password in a plain text file. See: OSVDB-4663 + /cgi-914/SGB_DIR/superguestconfig: Super GuestBook 1.0 from lasource.r2.ru stores the admin password in a plain text file. See: OSVDB-4663 + /cgi-sys/SGB_DIR/superguestconfig: Super GuestBook 1.0 from lasource.r2.ru stores the admin password in a plain text file. See: OSVDB-4663 + /htbin/SGB_DIR/superguestconfig: Super GuestBook 1.0 from lasource.r2.ru stores the admin password in a plain text file. See: OSVDB-4663 + /fcgi-bin/SGB_DIR/superguestconfig: Super GuestBook 1.0 from lasource.r2.ru stores the admin password in a plain text file. See: OSVDB-4663 + /scgi-bin/SGB_DIR/superguestconfig: Super GuestBook 1.0 from lasource.r2.ru stores the admin password in a plain text file. See: OSVDB-4663 + /cfdocs/snippets/evaluate.cfm: This allows you to enter Coldfusion code to be evaluated, or potentially create denial of service. + /cfide/Administrator/startstop.html: Can start/stop the Coldfusion server. + /webcgi/icat: Multiple versions of icat allow attackers to read arbitrary files. Make sure the latest version is running. + /cgi-914/icat: Multiple versions of icat allow attackers to read arbitrary files. Make sure the latest version is running. + /bin/icat: Multiple versions of icat allow attackers to read arbitrary files. Make sure the latest version is running. + /cgi-local/icat: Multiple versions of icat allow attackers to read arbitrary files. Make sure the latest version is running. + /htbin/icat: Multiple versions of icat allow attackers to read arbitrary files. Make sure the latest version is running. + /fcgi-bin/icat: Multiple versions of icat allow attackers to read arbitrary files. Make sure the latest version is running. + /cgi-914/nph-showlogs.pl?files=../../&filter=.*&submit=Go&linecnt=500&refresh=0: nCUBE Server Manager 1.0 nph-showlogs.pl directory traversal bug. + /cgi-sys/nph-showlogs.pl?files=../../&filter=.*&submit=Go&linecnt=500&refresh=0: nCUBE Server Manager 1.0 nph-showlogs.pl directory traversal bug. + /htbin/nph-showlogs.pl?files=../../&filter=.*&submit=Go&linecnt=500&refresh=0: nCUBE Server Manager 1.0 nph-showlogs.pl directory traversal bug. + /cgi-win/nph-showlogs.pl?files=../../&filter=.*&submit=Go&linecnt=500&refresh=0: nCUBE Server Manager 1.0 nph-showlogs.pl directory traversal bug. + /fcgi-bin/nph-showlogs.pl?files=../../&filter=.*&submit=Go&linecnt=500&refresh=0: nCUBE Server Manager 1.0 nph-showlogs.pl directory traversal bug. + /scgi-bin/nph-showlogs.pl?files=../../&filter=.*&submit=Go&linecnt=500&refresh=0: nCUBE Server Manager 1.0 nph-showlogs.pl directory traversal bug. + /cgi-914/view-source: This may allow remote arbitrary file retrieval. + /bin/view-source: This may allow remote arbitrary file retrieval. + /htbin/view-source: This may allow remote arbitrary file retrieval. + /cgi-win/view-source: This may allow remote arbitrary file retrieval. + /cgi-home/view-source: This may allow remote arbitrary file retrieval. + /scgi-bin/view-source: This may allow remote arbitrary file retrieval. + /cgi.cgi/wrap: This CGI lets users read any file with 755 perms. It should not be in the CGI directory. + /webcgi/wrap: This CGI lets users read any file with 755 perms. It should not be in the CGI directory. + /cgi-914/wrap: This CGI lets users read any file with 755 perms. It should not be in the CGI directory. + /bin/wrap: This CGI lets users read any file with 755 perms. It should not be in the CGI directory. + /cgi.cgi/cgiwrap: Some versions of cgiwrap allow anyone to execute commands remotely. + /bin/cgiwrap: Some versions of cgiwrap allow anyone to execute commands remotely. + /cgi-sys/cgiwrap: Some versions of cgiwrap allow anyone to execute commands remotely. + /htbin/cgiwrap: Some versions of cgiwrap allow anyone to execute commands remotely. + /fcgi-bin/cgiwrap: Some versions of cgiwrap allow anyone to execute commands remotely. + /cgi-914/echo.bat: This CGI may allow attackers to execute remote commands. + /bin/echo.bat: This CGI may allow attackers to execute remote commands. + /cgi-local/echo.bat: This CGI may allow attackers to execute remote commands. + /cgi-win/echo.bat: This CGI may allow attackers to execute remote commands. + /scgi-bin/echo.bat: This CGI may allow attackers to execute remote commands. + /cgi.cgi/info2www: This CGI allows attackers to execute commands. + /bin/info2www: This CGI allows attackers to execute commands. + /cgi-local/info2www: This CGI allows attackers to execute commands. + /htbin/info2www: This CGI allows attackers to execute commands. + /cgi-win/info2www: This CGI allows attackers to execute commands. + /fcgi-bin/info2www: This CGI allows attackers to execute commands. + /webcgi/perl?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /cgi-914/perl?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /cgi-local/perl?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /htbin/perl?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /cgi-914/perl.exe?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove perl.exe from the CGI dir. + /bin/perl.exe?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove perl.exe from the CGI dir. + /cgi-sys/perl.exe?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove perl.exe from the CGI dir. + /cgi-local/perl.exe?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove perl.exe from the CGI dir. + /htbin/perl.exe?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove perl.exe from the CGI dir. + /cgi-home/perl.exe?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove perl.exe from the CGI dir. + /webcgi/perl.exe: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /cgi-914/perl.exe: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /bin/perl.exe: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /cgi-sys/perl.exe: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /cgi-win/perl.exe: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /scgi-bin/perl.exe: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /webcgi/perl: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /cgi-914/perl: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /bin/perl: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /cgi-local/perl: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /scgi-bin/perl: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir. + /cgi.cgi/plusmail: This CGI may allow attackers to execute commands remotely. + /cgi-914/plusmail: This CGI may allow attackers to execute commands remotely. + /bin/plusmail: This CGI may allow attackers to execute commands remotely. + /cgi-local/plusmail: This CGI may allow attackers to execute commands remotely. + /scgi-bin/plusmail: This CGI may allow attackers to execute commands remotely. + /cgi-sys/scripts/slxweb.dll/getfile?type=Library&file=invalidfileNikto: SalesLogix WebClient may allow attackers to execute arbitrary commands on the host. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1607 http://www.securityfocus.com/archive/1/378637 + /fcgi-bin/scripts/slxweb.dll/getfile?type=Library&file=invalidfileNikto: SalesLogix WebClient may allow attackers to execute arbitrary commands on the host. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1607 http://www.securityfocus.com/archive/1/378637 + /cgi-home/scripts/slxweb.dll/getfile?type=Library&file=invalidfileNikto: SalesLogix WebClient may allow attackers to execute arbitrary commands on the host. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1607 http://www.securityfocus.com/archive/1/378637 + /cgi-914/scripts/slxweb.dll/getfile?type=Library&file=invalidfilename: SalesLogix WebClient may allow attackers to execute arbitrary commands on the host. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1607 http://www.securityfocus.com/archive/1/378637 + /cgi-sys/scripts/slxweb.dll/getfile?type=Library&file=invalidfilename: SalesLogix WebClient may allow attackers to execute arbitrary commands on the host. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1607 http://www.securityfocus.com/archive/1/378637 + /cgi-win/scripts/slxweb.dll/getfile?type=Library&file=invalidfilename: SalesLogix WebClient may allow attackers to execute arbitrary commands on the host. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1607 http://www.securityfocus.com/archive/1/378637 + /scgi-bin/scripts/slxweb.dll/getfile?type=Library&file=invalidfilename: SalesLogix WebClient may allow attackers to execute arbitrary commands on the host. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1607 http://www.securityfocus.com/archive/1/378637 + /cgi.cgi/smartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|: To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command. + /webcgi/smartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|: To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command. + /cgi-914/smartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|: To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command. + /cgi-sys/smartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|: To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command. + /cgi-win/smartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|: To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command. + /fcgi-bin/smartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|: To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command. + /cgi.cgi/webgais: The webgais allows attackers to execute commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0176 + /cgi-914/webgais: The webgais allows attackers to execute commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0176 + /cgi-sys/webgais: The webgais allows attackers to execute commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0176 + /htbin/webgais: The webgais allows attackers to execute commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0176 + /fcgi-bin/webgais: The webgais allows attackers to execute commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0176 + /scgi-bin/webgais: The webgais allows attackers to execute commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0176 + /cgi.cgi/websendmail: This CGI may allow attackers to execute arbitrary commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0196 + /cgi-914/websendmail: This CGI may allow attackers to execute arbitrary commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0196 + /cgi-sys/websendmail: This CGI may allow attackers to execute arbitrary commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0196 + /scgi-bin/websendmail: This CGI may allow attackers to execute arbitrary commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0196 + /cgi.cgi/wwwwais: wwwais has a vulnerability that lets attackers run commands as http daemon owner. Request 'CGIDIR/wwwais?version=version=123&' and 4096 bytes of garbage. + /cgi-sys/wwwwais: wwwais has a vulnerability that lets attackers run commands as http daemon owner. Request 'CGIDIR/wwwais?version=version=123&' and 4096 bytes of garbage. + /cgi-win/wwwwais: wwwais has a vulnerability that lets attackers run commands as http daemon owner. Request 'CGIDIR/wwwais?version=version=123&' and 4096 bytes of garbage. + /cgi-home/wwwwais: wwwais has a vulnerability that lets attackers run commands as http daemon owner. Request 'CGIDIR/wwwais?version=version=123&' and 4096 bytes of garbage. + /cgi-bin/handler: This program allows remote users to run arbitrary commands. + /instantwebmail/message.php: Instant Web Mail is installed. Versions 0.59 and lower can allow remote users to embed POP3 commands in URLs contained in email. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0490 + /webcgi/ppdscgi.exe: PowerPlay Web Edition may allow unauthenticated users to view pages. See: BID-491 + /bin/ppdscgi.exe: PowerPlay Web Edition may allow unauthenticated users to view pages. See: BID-491 + /cgi-sys/ppdscgi.exe: PowerPlay Web Edition may allow unauthenticated users to view pages. See: BID-491 + /htbin/ppdscgi.exe: PowerPlay Web Edition may allow unauthenticated users to view pages. See: BID-491 + /cgi-win/ppdscgi.exe: PowerPlay Web Edition may allow unauthenticated users to view pages. See: BID-491 + /fcgi-bin/ppdscgi.exe: PowerPlay Web Edition may allow unauthenticated users to view pages. See: BID-491 + /scgi-bin/ppdscgi.exe: PowerPlay Web Edition may allow unauthenticated users to view pages. See: BID-491 + /admin/admin_phpinfo.php4: Mon Album version 0.6.2d allows remote admin access. This should be protected. + /cgi-914/webdriver: This CGI often allows anyone to access the Informix DB on the host. + /bin/webdriver: This CGI often allows anyone to access the Informix DB on the host. + /cgi-sys/webdriver: This CGI often allows anyone to access the Informix DB on the host. + /cgi-local/webdriver: This CGI often allows anyone to access the Informix DB on the host. + /htbin/webdriver: This CGI often allows anyone to access the Informix DB on the host. + /cgi-win/webdriver: This CGI often allows anyone to access the Informix DB on the host. + /dostuff.php?action=modify_user: Blahz-DNS allows unauthorized users to edit user information. Upgrade to version 0.25 or higher. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0599,https://sourceforge.net/projects/blahzdns/ + /cgi-local/c32web.exe/ChangeAdminPassword: This CGI may contain a backdoor and may allow attackers to change the Cart32 admin password. + /cgi-home/c32web.exe/ChangeAdminPassword: This CGI may contain a backdoor and may allow attackers to change the Cart32 admin password. + /cgi.cgi/nimages.php: Alpha versions of the Nimages package vulnerable to non-specific 'major' security bugs. + /cgi-914/nimages.php: Alpha versions of the Nimages package vulnerable to non-specific 'major' security bugs. + /cgi-sys/nimages.php: Alpha versions of the Nimages package vulnerable to non-specific 'major' security bugs. + /cgi-local/nimages.php: Alpha versions of the Nimages package vulnerable to non-specific 'major' security bugs. + /fcgi-bin/nimages.php: Alpha versions of the Nimages package vulnerable to non-specific 'major' security bugs. + /cgi-home/nimages.php: Alpha versions of the Nimages package vulnerable to non-specific 'major' security bugs. + /agentadmin.php: Immobilier agentadmin.php contains multiple SQL injection vulnerabilities. See: OSVDB-35876 + /logs/str_err.log: Bmedia error log, contains invalid login attempts which include the invalid usernames and passwords entered (could just be typos & be very close to the right entries). + /megabook/files/20/setup.db: Megabook guestbook configuration available remotely. See: OSVDB-3204 + /order/order_log.dat: Web shopping system exposes order information. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0606 + /pmlite.php: A Xoops CMS script was found. Version RC3 and below allows all users to view all messages (untested). See: https://seclists.org/bugtraq/2002/Dec/129 + /session/admnlogin: SessionServlet Output, has session cookie info. + /logjam/showhits.php: Logjam may possibly allow remote command execution via showhits.php page. + /manual.php: Does not filter input before passing to shell command. Try 'ls -l' as the man page entry. + /ncl_items.html: This may allow attackers to reconfigure your Tektronix printer. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1508 + /SetSecurity.shm: Cisco System's My Access for Wireless. This resource should be password protected. + /submit?setoption=q&option=allowed_ips&value=255.255.255.255: MLdonkey 2.x allows administrative interface access to be access from any IP. This is typically only found on port 4080. See: OSVDB-3126 + /_vti_bin/shtml.dll/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611: Gives info about server settings. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0413,http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0709,http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0710 + /_vti_bin/shtml.exe/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611: Gives info about server settings. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0413,http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0709,http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0710 + /_vti_bin/_vti_aut/author.exe?method=list+documents%3a3%2e0%2e2%2e1706&service%5fname=&listHiddenDocs=true&listExplorerDocs=true&listRecurse=false&listFiles=true&listFolders=true&listLinkInfo=true&listIncludeParent=true&listDerivedT=false&listBorders=false: We seem to have authoring access to the FrontPage web. + /jk-status/contextAdmin/contextAdmin.html: Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0672 + /host-manager/contextAdmin/contextAdmin.html: Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0672 + /level/16/exec/-///pwd: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/16: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/16/exec//show/access-lists: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/16/level/16/exec//show/interfaces/status: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/16/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/19/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/20/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/21/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/24/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/27/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/28/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/29/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/32/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/34/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/36/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/37/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/38/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/41/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/42/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/43/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/46/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/48/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/51/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/55/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/56/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/59/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/60/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/62/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/64/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/65/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/66/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/74/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/79/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/84/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/85/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/86/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/94/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/95/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/97/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/98/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /level/99/exec//show: CISCO HTTP service allows remote execution of commands. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537 + /WS_FTP.LOG: WS_FTP.LOG file was found. It may contain sensitive information. See: OSVDB-13405 + Scan terminated: 0 error(s) and 498 item(s) reported on remote host + End Time: 2025-10-13 15:47:09 (GMT-7) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested