Found
Duration
Date
IP
- Nikto v2.5.0 --------------------------------------------------------------------------- + Multiple IPs found: 172.67.70.16, 104.26.0.10, 104.26.1.10, 2606:4700:20::681a:a, 2606:4700:20::ac43:4610, 2606:4700:20::681a:10a + Target IP: 172.67.70.16 + Target Hostname: web.speaky.com + Target Port: 80 + Start Time: 2024-06-22 13:54:17 (GMT-4) --------------------------------------------------------------------------- + Server: cloudflare + /: An alt-svc header was found which is advertising HTTP/3. The endpoint is: ':443'. Nikto cannot test HTTP/3 over QUIC. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/alt-svc + All CGI directories 'found', use '-C none' to test none + /webcgi/cart32.exe: request cart32.exe/cart32clientlist. + /cgi-915/cart32.exe: request cart32.exe/cart32clientlist. + /mpcgi/cart32.exe: request cart32.exe/cart32clientlist. + /cgi-bin/cart32.exe: request cart32.exe/cart32clientlist. + /cgi-sys/cart32.exe: request cart32.exe/cart32clientlist. + /htbin/cart32.exe: request cart32.exe/cart32clientlist. + /cgis/cart32.exe: request cart32.exe/cart32clientlist. + /cgi-win/cart32.exe: request cart32.exe/cart32clientlist. + /fcgi-bin/cart32.exe: request cart32.exe/cart32clientlist. + /cgi-home/cart32.exe: request cart32.exe/cart32clientlist. + /scgi-bin/cart32.exe: request cart32.exe/cart32clientlist. + /cgi-mod/cart32.exe: request cart32.exe/cart32clientlist. + /cgi.cgi/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-914/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-915/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /mpcgi/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /ows-bin/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-sys/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-local/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /htbin/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgibin/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-win/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /fcgi-bin/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-home/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-perl/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-bin-sdb/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-mod/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi.cgi/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /webcgi/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /mpcgi/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /ows-bin/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-local/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /htbin/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgis/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /fcgi-bin/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /scgi-bin/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-bin-sdb/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-mod/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi.cgi/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /cgi-915/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /cgi-bin/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /ows-bin/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /htbin/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /cgibin/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /scripts/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /fcgi-bin/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /cgi-exe/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /cgi-perl/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /cgi-mod/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /bin/lwgate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi/lwgate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-bin/lwgate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /ows-bin/lwgate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /htbin/lwgate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgibin/lwgate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /scripts/lwgate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /scgi-bin/lwgate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-bin-sdb/lwgate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-mod/lwgate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /webcgi/LWGate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-914/LWGate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /mpcgi/LWGate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-bin/LWGate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /ows-bin/LWGate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /htbin/LWGate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgibin/LWGate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /fcgi-bin/LWGate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-home/LWGate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /scgi-bin/LWGate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi.cgi/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-914/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-915/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /mpcgi/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-local/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /htbin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /scripts/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-win/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /scgi-bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /cgi-bin-sdb/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /sshome/: Siteseed pre 1.4.2 has 'major' security problems. + /tiki/: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin. + /tiki/tiki-install.php: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin. + /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0709 + /cgi.cgi/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /webcgi/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /cgi-915/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /mpcgi/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /ows-bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /cgi-sys/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /cgibin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /cgi-win/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /fcgi-bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /cgi-exe/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /cgi-home/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /scgi-bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /cgi-bin-sdb/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /webcgi/finger.pl: finger other users, may be other commands?. + /cgi-915/finger.pl: finger other users, may be other commands?. + /bin/finger.pl: finger other users, may be other commands?. + /cgi/finger.pl: finger other users, may be other commands?. + /cgi-sys/finger.pl: finger other users, may be other commands?. + /cgibin/finger.pl: finger other users, may be other commands?. + /cgis/finger.pl: finger other users, may be other commands?. + /fcgi-bin/finger.pl: finger other users, may be other commands?. + /cgi-mod/finger.pl: finger other users, may be other commands?. + /cgi-914/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgi-915/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgi/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /ows-bin/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgi-sys/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgibin/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgis/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /scripts/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgi-win/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgi-mod/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /cgi.cgi/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /webcgi/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-914/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-bin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-local/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /htbin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgis/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-home/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-bin-sdb/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi.cgi/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /cgi/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /cgi-bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /ows-bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /htbin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /cgibin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /scripts/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /fcgi-bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /cgi-exe/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /cgi-home/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /cgi-perl/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /scgi-bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /cgi.cgi/wrap.cgi: Allows viewing of directories. + /webcgi/wrap.cgi: Allows viewing of directories. + /cgi-914/wrap.cgi: Allows viewing of directories. + /mpcgi/wrap.cgi: Allows viewing of directories. + /cgi-bin/wrap.cgi: Allows viewing of directories. + /cgibin/wrap.cgi: Allows viewing of directories. + /cgis/wrap.cgi: Allows viewing of directories. + /scripts/wrap.cgi: Allows viewing of directories. + /cgi-win/wrap.cgi: Allows viewing of directories. + /fcgi-bin/wrap.cgi: Allows viewing of directories. + /cgi-exe/wrap.cgi: Allows viewing of directories. + /cgi-home/wrap.cgi: Allows viewing of directories. + /cgi-perl/wrap.cgi: Allows viewing of directories. + /cgi-bin-sdb/wrap.cgi: Allows viewing of directories. + /cgi-mod/wrap.cgi: Allows viewing of directories. + /~root/: Allowed to browse root's home directory. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1013 + /forums//admin/config.php: PHP Config file may contain database IDs and passwords. + /forums//adm/config.php: PHP Config file may contain database IDs and passwords. + /forums/config.php: PHP Config file may contain database IDs and passwords. + /help/: Help directory should not be accessible. + /hola/admin/cms/htmltags.php?datei=./sec/data.php: hola-cms-1.2.9-10 may reveal the administrator ID and password. See: https://vulners.com/exploitdb/EDB-ID:23027 + /inc/config.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1253 + /inc/dbase.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1253 + /cgi.cgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /webcgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /mpcgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /cgi-bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /cgi-sys/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /cgibin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /scripts/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /cgi-home/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /cgi-perl/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /cgi-bin-sdb/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /cgi.cgi/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /ows-bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /htbin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgibin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgis/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-win/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-exe/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-home/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-perl/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /scgi-bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-bin-sdb/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi.cgi/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /webcgi/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-914/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-915/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /bin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /ows-bin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-sys/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-win/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-exe/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-home/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-perl/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-bin-sdb/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi-mod/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /cgi.cgi/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-915/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /ows-bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-sys/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-local/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /htbin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgibin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-win/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /fcgi-bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-exe/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /scgi-bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-mod/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi.cgi/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /webcgi/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /bin/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /cgi/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /cgi-bin/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /ows-bin/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /cgi-local/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /cgibin/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /scripts/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /cgi-win/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /fcgi-bin/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /cgi-exe/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /cgi-home/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /cgi-perl/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /cgi-bin-sdb/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /cgi-914/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgi-915/guestbook.pl: May allow attackers to execute commands as the web daemon. + /bin/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgi/guestbook.pl: May allow attackers to execute commands as the web daemon. + /mpcgi/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgi-bin/guestbook.pl: May allow attackers to execute commands as the web daemon. + /htbin/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgis/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgi-win/guestbook.pl: May allow attackers to execute commands as the web daemon. + /fcgi-bin/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgi-home/guestbook.pl: May allow attackers to execute commands as the web daemon. + /scgi-bin/guestbook.pl: May allow attackers to execute commands as the web daemon. + /geeklog/users.php: Geeklog prior to 1.3.8-1sr2 contains a SQL injection vulnerability that lets a remote attacker reset admin password. See: https://vulners.com/osvdb/OSVDB:2703 + /guestbook/admin.php: Guestbook admin page available without authentication. + /cgi-914/gH.cgi: Web backdoor by gH. + /cgi-915/gH.cgi: Web backdoor by gH. + /bin/gH.cgi: Web backdoor by gH. + /mpcgi/gH.cgi: Web backdoor by gH. + /cgi-bin/gH.cgi: Web backdoor by gH. + /ows-bin/gH.cgi: Web backdoor by gH. + /cgi-sys/gH.cgi: Web backdoor by gH. + /cgi-local/gH.cgi: Web backdoor by gH. + /fcgi-bin/gH.cgi: Web backdoor by gH. + /cgi-exe/gH.cgi: Web backdoor by gH. + /cgi-perl/gH.cgi: Web backdoor by gH. + /cgi-bin-sdb/gH.cgi: Web backdoor by gH. + /cgi-915/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /bin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-bin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-local/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgibin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgis/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-win/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-exe/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-perl/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-914/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-915/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /mpcgi/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgibin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /scripts/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-win/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-exe/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-perl/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /scgi-bin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-bin-sdb/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi-mod/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /cgi.cgi/AT-admin.cgi: Admin interface. + /cgi-914/AT-admin.cgi: Admin interface. + /bin/AT-admin.cgi: Admin interface. + /mpcgi/AT-admin.cgi: Admin interface. + /cgi-bin/AT-admin.cgi: Admin interface. + /cgi-local/AT-admin.cgi: Admin interface. + /cgi-win/AT-admin.cgi: Admin interface. + /fcgi-bin/AT-admin.cgi: Admin interface. + /cgi-exe/AT-admin.cgi: Admin interface. + /scgi-bin/AT-admin.cgi: Admin interface. + /webcgi/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-914/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-915/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /ows-bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /htbin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgibin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /scripts/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /fcgi-bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /webcgi/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-914/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-915/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /mpcgi/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /ows-bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-sys/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /htbin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-win/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /fcgi-bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-exe/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-home/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-perl/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-bin-sdb/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-mod/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /cgi-914/banner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-bin/banner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-sys/banner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-local/banner.cgi: This CGI may allow attackers to read any file on the system. + /htbin/banner.cgi: This CGI may allow attackers to read any file on the system. + /cgibin/banner.cgi: This CGI may allow attackers to read any file on the system. + /cgis/banner.cgi: This CGI may allow attackers to read any file on the system. + /fcgi-bin/banner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-bin-sdb/banner.cgi: This CGI may allow attackers to read any file on the system. + /webcgi/bannereditor.cgi: This CGI may allow attackers to read any file on the system. + /cgi-914/bannereditor.cgi: This CGI may allow attackers to read any file on the system. + /mpcgi/bannereditor.cgi: This CGI may allow attackers to read any file on the system. + /cgi-bin/bannereditor.cgi: This CGI may allow attackers to read any file on the system. + /ows-bin/bannereditor.cgi: This CGI may allow attackers to read any file on the system. + /cgi-local/bannereditor.cgi: This CGI may allow attackers to read any file on the system. + /cgibin/bannereditor.cgi: This CGI may allow attackers to read any file on the system. + /cgi.cgi/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /ows-bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-local/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /htbin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-win/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /fcgi-bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-exe/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-bin-sdb/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /webcgi/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /bin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /cgi/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /mpcgi/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /cgi-sys/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /cgi-local/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /htbin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /cgis/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /scripts/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /cgi-win/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /cgi-exe/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /scgi-bin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /cgi-mod/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /cgi.cgi/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /webcgi/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgi-914/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgi-915/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgi-bin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgi-sys/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgibin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgi-win/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgi-perl/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgi-mod/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /tsweb/: Microsoft TSAC found. See: https://web.archive.org/web/20040910030506/http://www.dslwebserver.com/main/fr_index.html?/main/sbs-Terminal-Services-Advanced-Client-Configuration.html + /cgi-914/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload. + /bin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload. + /cgi/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload. + /htbin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload. + /cgibin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload. + /scripts/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload. + /cgi-win/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload. + /cgi-exe/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload. + /cgi-perl/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload. + /scgi-bin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload. + /scripts/iisadmin/bdir.htr: This default script shows host info, may allow file browsing and buffer a overrun in the Chunked Encoding data transfer mechanism, request /scripts/iisadmin/bdir.htr??c:\<dir>. See: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/MS02-028 + /cgi.cgi/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /webcgi/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /cgi-915/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /cgi-bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /ows-bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /htbin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /cgibin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /cgis/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /cgi-win/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /fcgi-bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /cgi-exe/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /scgi-bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /iisadmin/: Access to /iisadmin should be restricted to localhost or allowed hosts only. + /w-agora/: w-agora pre 4.1.4 may allow a remote user to execute arbitrary PHP scripts via URL includes in include/*.php and user/*.php files. Default account is 'admin' but password set during install. + /officescan/cgi/cgiChkMasterPwd.exe: Trend Micro Officescan allows you to skip the login page and access some CGI programs directly. See: https://web.archive.org/web/20030607054822/http://support.microsoft.com/support/exchange/content/whitepapers/owaguide.doc + /cgi.cgi/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs. See: http://www.securityfocus.com/bid/4684 + /cgi-bin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs. See: http://www.securityfocus.com/bid/4684 + /ows-bin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs. See: http://www.securityfocus.com/bid/4684 + /cgi-sys/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs. See: http://www.securityfocus.com/bid/4684 + /cgi-local/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs. See: http://www.securityfocus.com/bid/4684 + /htbin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs. See: http://www.securityfocus.com/bid/4684 + /cgi-exe/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs. See: http://www.securityfocus.com/bid/4684 + /cgi-home/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs. See: http://www.securityfocus.com/bid/4684 + /cgi-perl/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs. See: http://www.securityfocus.com/bid/4684 + /scgi-bin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs. See: http://www.securityfocus.com/bid/4684 + /cgi.cgi/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + /webcgi/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + /mpcgi/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + /ows-bin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + /cgi-sys/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + /htbin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + /cgi-win/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + /fcgi-bin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + /cgi-exe/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + /cgi-perl/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + /cgi-bin-sdb/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + /cgi-914/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0098 + /cgi-915/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0098 + /mpcgi/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0098 + /ows-bin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0098 + /cgi-local/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0098 + /cgis/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0098 + /scripts/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0098 + /cgi-home/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0098 + /scgi-bin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0098 + /cgi.cgi/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /webcgi/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /bin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /mpcgi/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-bin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-sys/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgis/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-exe/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-home/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-perl/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-bin-sdb/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-mod/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi.cgi/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-914/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-915/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /bin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-sys/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /htbin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgibin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgis/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /fcgi-bin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-exe/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-perl/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /mpcgi/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-sys/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /htbin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgis/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /scripts/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-win/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /fcgi-bin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-exe/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-home/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /scgi-bin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi-bin-sdb/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow. + /cgi.cgi/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-914/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-915/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /bin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /mpcgi/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-bin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /ows-bin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-sys/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-local/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgibin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgis/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /scripts/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-win/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-exe/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-home/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-mod/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /servlet/com.unify.servletexec.UploadServlet: This servlet allows attackers to upload files to the server. + /cgi-914/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /bin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /cgi/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /mpcgi/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /cgi-bin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /cgi-sys/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /cgi-local/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /cgibin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /cgis/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /scripts/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /cgi-exe/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /cgi-home/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /cgi-mod/uploader.exe: This CGI allows attackers to upload files to the server and then execute them. + /wa.exe: An ASP page that allows attackers to upload files to server. + /webcgi/fpsrvadm.exe: Potentially vulnerable CGI program. + /cgi-915/fpsrvadm.exe: Potentially vulnerable CGI program. + /bin/fpsrvadm.exe: Potentially vulnerable CGI program. + /ows-bin/fpsrvadm.exe: Potentially vulnerable CGI program. + /cgi-sys/fpsrvadm.exe: Potentially vulnerable CGI program. + /cgi-local/fpsrvadm.exe: Potentially vulnerable CGI program. + /htbin/fpsrvadm.exe: Potentially vulnerable CGI program. + /scripts/fpsrvadm.exe: Potentially vulnerable CGI program. + /fcgi-bin/fpsrvadm.exe: Potentially vulnerable CGI program. + /cgi-exe/fpsrvadm.exe: Potentially vulnerable CGI program. + /cgi-home/fpsrvadm.exe: Potentially vulnerable CGI program. + /cgi-perl/fpsrvadm.exe: Potentially vulnerable CGI program. + /cgi-bin-sdb/fpsrvadm.exe: Potentially vulnerable CGI program. + /forum/admin/wwforum.mdb: Web Wiz Forums password database found. See: https://seclists.org/bugtraq/2003/Apr/238 + /guestbook/admin/o12guest.mdb: Ocean12 ASP Guestbook Manager allows download of SQL database which contains admin password. See: https://www.exploit-db.com/exploits/22484 + /MIDICART/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1432 + /mpcsoftweb_guestbook/database/mpcsoftweb_guestdata.mdb: MPCSoftWeb Guest Book passwords retrieved. See: https://www.exploit-db.com/exploits/22513 + /shoppingdirectory/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1432 + /database/db2000.mdb: Max Web Portal database is available remotely. It should be moved from the default location to a directory outside the web root. See: https://www.medae.co/en/max/web-app + /cgi.cgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /mpcgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgi-bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /ows-bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgibin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgis/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /scripts/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgi-perl/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgi-mod/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /admin/config.php: PHP Config file may contain database IDs and passwords. + /administrator/config.php: PHP Config file may contain database IDs and passwords. + /simplebbs/users/users.php: Simple BBS 1.0.6 allows user information and passwords to be viewed remotely. See: https://www.webhostingtalk.nl/bugtraq-mailing-lijst/23898-simplebbs-1-0-6-default-permissions-vuln.html + /typo3conf/: This may contain sensitive TYPO3 files. + /cms/typo3conf/: This may contain sensitive TYPO3 files. + /site/typo3conf/: This may contain sensitive TYPO3 files. + /typo/typo3conf/: This may contain sensitive TYPO3 files. + /typo3/typo3conf/: This may contain sensitive TYPO3 files. + /typo3conf/database.sql: TYPO3 SQL file found. + /site/typo3conf/database.sql: TYPO3 SQL file found. + /typo3/typo3conf/database.sql: TYPO3 SQL file found. + /typo3conf/localconf.php: TYPO3 config file found. + /site/typo3conf/localconf.php: TYPO3 config file found. + /typo/typo3conf/localconf.php: TYPO3 config file found. + /typo3/typo3conf/localconf.php: TYPO3 config file found. + /webcart/orders/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /cgi.cgi/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /cgi-914/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /cgi-915/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /bin/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /mpcgi/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /cgi-bin/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /cgi-sys/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /htbin/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /cgibin/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /cgis/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /cgi-win/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /cgi-home/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /scgi-bin/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /cgi-mod/MsmMask.exe: MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1528 + /tvcs/getservers.exe?action=selects1: Following steps 2-4 of this page may reveal a zip file that contains passwords and system details. + /jamdb/: JamDB pre 0.9.2 mp3.php and image.php can allow user to read arbitrary file out of docroot. + /cgi.cgi/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /webcgi/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-914/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-915/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /mpcgi/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-bin/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /ows-bin/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-sys/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-local/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-win/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-home/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /cgi-perl/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /scgi-bin/addbanner.cgi: This CGI may allow attackers to read any file on the system. + /cgi.cgi/aglimpse.cgi: This CGI may allow attackers to execute remote commands. + /webcgi/aglimpse.cgi: This CGI may allow attackers to execute remote commands. + /cgi-914/aglimpse.cgi: This CGI may allow attackers to execute remote commands. + /cgi-915/aglimpse.cgi: This CGI may allow attackers to execute remote commands. + /cgi-bin/aglimpse.cgi: This CGI may allow attackers to execute remote commands. + /cgi-sys/aglimpse.cgi: This CGI may allow attackers to execute remote commands. + /cgi-local/aglimpse.cgi: This CGI may allow attackers to execute remote commands. + /htbin/aglimpse.cgi: This CGI may allow attackers to execute remote commands. + /scripts/aglimpse.cgi: This CGI may allow attackers to execute remote commands. + /scgi-bin/aglimpse.cgi: This CGI may allow attackers to execute remote commands. + /cgi-bin-sdb/aglimpse.cgi: This CGI may allow attackers to execute remote commands. + /cgi.cgi/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /webcgi/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-915/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /bin/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-local/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgibin/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgis/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /scripts/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /fcgi-bin/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-exe/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-home/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-perl/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /scgi-bin/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-bin-sdb/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi.cgi/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /webcgi/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-915/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /bin/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /mpcgi/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-sys/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-local/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgis/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /scripts/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-win/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /fcgi-bin/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /scgi-bin/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /cgi-mod/hello.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /webcgi/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgi/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /mpcgi/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgi-bin/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgi-sys/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /htbin/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgis/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgi-win/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /fcgi-bin/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /scgi-bin/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgi-bin-sdb/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgi-mod/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /securecontrolpanel/: Web Server Control Panel. + /_cti_pvt/: FrontPage directory found. + /smg_Smxcfg30.exe?vcc=3560121183d3: This may be a Trend Micro Officescan 'backdoor'. + /nsn/..%5Cutil/attrib.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/chkvol.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/dir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/glist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/md.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/rd.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/set.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/slist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/userlist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cwebdemo/env.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cwebdemo/fdir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /cgi.cgi/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-local/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /htbin/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgibin/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgis/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /scripts/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /fcgi-bin/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-exe/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-home/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /scgi-bin/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-bin-sdb/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi.cgi/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /webcgi/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-915/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-bin/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-home/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /scgi-bin/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-bin-sdb/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /LOGIN.PWD: MIPCD password file with unencrypted passwords. MIPDCD should not have the web interface enabled. + /webcgi/nph-error.pl: Gives more information in error messages. + /cgi-915/nph-error.pl: Gives more information in error messages. + /mpcgi/nph-error.pl: Gives more information in error messages. + /cgi-bin/nph-error.pl: Gives more information in error messages. + /ows-bin/nph-error.pl: Gives more information in error messages. + /cgi-local/nph-error.pl: Gives more information in error messages. + /cgis/nph-error.pl: Gives more information in error messages. + /scripts/nph-error.pl: Gives more information in error messages. + /cgi-exe/nph-error.pl: Gives more information in error messages. + /scgi-bin/nph-error.pl: Gives more information in error messages. + /cgi-bin-sdb/nph-error.pl: Gives more information in error messages. + /cgi.cgi/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /cgi-914/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /cgi-915/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /cgi/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /mpcgi/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /cgi-local/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /htbin/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /cgi-win/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /fcgi-bin/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /cgi-home/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /cgi-perl/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /scgi-bin/cgitest.exe: This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header. + /cgi.cgi/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /mpcgi/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /cgi-sys/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /htbin/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /cgibin/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /cgis/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /fcgi-bin/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /cgi-exe/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /cgi-perl/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /scgi-bin/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + /cgi-915/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /mpcgi/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /ows-bin/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-sys/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /htbin/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgibin/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /scripts/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-bin-sdb/Pbcgi.exe?bcgiu4: Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi.cgi/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /webcgi/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /mpcgi/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /ows-bin/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-sys/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /scripts/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-win/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-exe/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-perl/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /scgi-bin/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-bin-sdb/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-mod/testcgi.exe: Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /cgi-win/cgitest.exe: This CGI may allow the server to be crashed remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128 + /webcgi/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgi-914/snorkerz.bat: Arguments passed to DOS CGI without checking. + /bin/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgi/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgi-bin/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgi-local/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgibin/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgis/snorkerz.bat: Arguments passed to DOS CGI without checking. + /scripts/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgi-exe/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgi-home/snorkerz.bat: Arguments passed to DOS CGI without checking. + /cgi-perl/snorkerz.bat: Arguments passed to DOS CGI without checking. + /webcgi/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-914/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /bin/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /mpcgi/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-bin/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /ows-bin/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-sys/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-local/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgibin/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /scripts/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-win/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /fcgi-bin/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-exe/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-perl/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /................../config.sys: PWS allows files to be read by prepending multiple '.' characters. At worst, IIS, not PWS, should be used. + Scan terminated: 0 error(s) and 726 item(s) reported on remote host + End Time: 2024-06-22 13:55:18 (GMT-4) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested