+ OSVDB-3092: /default.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /dirassist.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /doladmin.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /dols_help.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /domadmin.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /domcfg.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /event.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /events.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /events5.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /group.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /groups.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /help5_admin.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /help5_client.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /help5_designer.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /homepage.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /iNotes/Forms5.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /iNotes/Forms5.nsf/$DefaultNav: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /jotter.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /kbccv11.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /kbnv11.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /kbssvv11.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /lcon.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /ldap.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /leiadm.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /leilog.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /leivlt.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /log4a.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /lsxlc.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /l_domlog.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mab.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mail/adminisist.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mail1.box: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mail10.box: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mail2.box: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mail3.box: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mail4.box: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mail5.box: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mail6.box: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mail7.box: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mail8.box: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mail9.box: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mailw46.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /msdwda.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mtatbls.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mtdata/mtstore.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /mtstore.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /nntp/nd000000.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /nntp/nd000001.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /nntp/nd000002.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /nntp/nd000003.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /nntp/nd000004.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /nntppost.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /notes.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /ntsync4.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /ntsync45.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /perweb.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /private.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /public.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /qpadmin.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /quickplace/quickplace/main.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /quickstart/qstart50.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /quickstart/wwsample.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /readme.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /reports.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /sample/faqw46: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /sample/framew46: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /sample/pagesw46: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /sample/siregw46: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /sample/site1w4646: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /sample/site2w4646: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /sample/site3w4646: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /schema50.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /secret.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /setupweb.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smbcfg.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smconf.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smency.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smmsg.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smquar.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smsolar.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smtime.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smtp.box: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smtp.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smtpibwq.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smtpobwq.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smtptbls.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /smvlog.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /software.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /srvnam.htm: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /statmail.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /stauths.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /stautht.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /stconf.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /stconfig.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /stdnaset.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /stdomino.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /stlog.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /streg.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /stsrc.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /test.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /today.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /userreg.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /users.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /vpuserinfo.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /web.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /webuser.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /welcome.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3092: /wksinst.nsf: This database can be read without authentication, which may reveal sensitive information. + OSVDB-3093: /finance.xls: Finance spreadsheet? + OSVDB-3093: /finances.xls: Finance spreadsheet? + OSVDB-3093: /abonnement.asp: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /acartpath/signin.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /add_acl: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admbrowse.php?down=1&cur=%2Fetc%2F&dest=passwd&rid=1&S=[someid]: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/auth.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/cfg/configscreen.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/cfg/configsite.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/cfg/configsql.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/cfg/configtache.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/cms/htmltags.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/credit_card_info.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/exec.php3: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/modules/cache.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/objects.inc.php4: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/script.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/settings.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/templates/header.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin/upload.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /admin_t/include/aff_liste_langue.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /adv/gm001-mc/: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /aff_news.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /approval/ts_app.htm: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /archive.asp: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /archive_forum.asp: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ashnews.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /auth.inc.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /b2-tools/gm-2-b2.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /bandwidth/index.cgi: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /basilix.php3: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /bigsam_guestbook.php?displayBegin=9999...9999: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /bin/common/user_update_passwd.pl: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /biztalktracking/RawCustomSearchField.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /biztalktracking/rawdocdata.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /board/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /board/philboard_admin.asp+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /bugtest+/+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /caupo/admin/admin_workspace.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ccbill/whereami.cgi: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /chat_dir/register.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /checkout_payment.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /communique.asp: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /community/forumdisplay.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /community/index.php?analized=anything: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /community/member.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /compte.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /config/html/cnf_gi.htm: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /convert-date.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /cp/rac/nsManager.cgi: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /csPassword.cgi?command=remove%20: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /cutenews/comments.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /cutenews/search.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /cutenews/shownews.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /Data/settings.xml+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /database/metacart.mdb+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /db.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /dbabble: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /dcp/advertiser.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /defines.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /dltclnt.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /doc/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /docs/NED: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /dotproject/modules/files/index_table.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /dotproject/modules/projects/addedit.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /dotproject/modules/projects/view.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /dotproject/modules/projects/vw_files.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /dotproject/modules/tasks/addedit.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /dotproject/modules/tasks/viewgantt.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /do_map: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /do_subscribe: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /email.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /emml_email_func.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /emumail.cgi?type=.%00: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /entete.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /enteteacceuil.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /etc/shadow+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /eventcal2.php.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ez2000/ezadmin.cgi: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ez2000/ezboard.cgi: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ez2000/ezman.cgi: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /faqman/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /filemanager/index.php3: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /filemgmt/brokenfile.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /filemgmt/singlefile.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /filemgmt/viewcat.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /filemgmt/visit.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /foro/YaBB.pl: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /forum/mainfile.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /forum/member.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /forum/newreply.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /forum/newthread.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /forum/viewtopic.php: phpBB found. + OSVDB-3093: /forum_arc.asp?n=268: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /forum_professionnel.asp?n=100: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /functions.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-10447: /get_od_toc.pl?Profile=: WebTrends get_od_toc.pl may be vulnerable to a path disclosure error if this file is reloaded multiple times. + OSVDB-3093: /globals.php3: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /globals.pl: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-6656: /Gozila.cgi: Linksys BEF Series routers are vulnerable to multiple DoS attacks in Gozila.cgi. + OSVDB-3093: /homebet/homebet.dll?form=menu&option=menu-signin: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /idealbb/error.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /iisprotect/admin/SiteAdmin.ASP?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /include/customize.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /include/help.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /includes/footer.php3: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /includes/header.php3: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /index.php?base=test%20: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /index.php?IDAdmin=test: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /index.php?pymembs=admin: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /index.php?SqlQuery=test%20: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /index.php?tampon=test%20: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /index.php?topic=<script>alert(document.cookie)</script>%20: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /infos/contact/index.asp: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /infos/faq/index.asp: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /infos/gen/index.asp: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /infos/services/index.asp: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /instaboard/index.cfm: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /intranet/browse.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /invitefriends.php3: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ipchat.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ixmail_netattach.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /jsptest.jsp+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /kernel/class/delete.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /kernel/classes/ezrole.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ldap.search.php3?ldap_serv=nonsense%20: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /livredor/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /login.php3?reason=chpass2%20: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /mail/include.html: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /mail/settings.html: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /mail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /mambo/banners.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /manage/login.asp+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /mantis/summary_graph_functions.php?g_jpgraph_path=http%3A%2F%2Fattackershost%2Flistings.txt%3F: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /members/ID.pm: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /members/ID.xbb: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /mod.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /modif/delete.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /modif/ident.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /modules/Downloads/voteinclude.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /modules/Forums/attachment.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /modules/Search/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /modules/WebChat/in.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /modules/WebChat/out.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /modules/WebChat/quit.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /modules/WebChat/users.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /modules/Your_Account/navbar.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /moregroupware/modules/webmail2/inc/: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /msadc/Samples/SELECTOR/showcode.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /myguestBk/add1.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /myguestBk/admin/delEnt.asp?id=NEWSNUMBER|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /myguestBk/admin/index.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /netget?sid=Safety&msg=2002&file=Safety: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /newtopic.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /nphp/nphpd.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /OpenTopic: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /options.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /oscommerce/default.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /parse_xml.cgi: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /php/gaestebuch/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /php/php4ts.dll: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /pks/lookup: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /pm/lib.inc.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /poppassd.php3+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /produccart/pdacmin/login.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /productcart/database/EIPC.mdb: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /productcart/pc/Custva.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ProductCart/pc/msg.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /product_info.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /prometheus-all/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /proplus/admin/login.php+-d+\"action=insert\"+-d+\"username=test\"+-d+\"password=test\": This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /protected/: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /protected/secret.html+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /protectedpage.php?uid='%20OR%20''='&pwd='%20OR%20''=': This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /protection.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /pt_config.inc: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /pvote/add.php?question=AmIgAy&o1=yes&o2=yeah&o3=well..yeah&o4=bad%20: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /pvote/del.php?pollorder=1%20: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /quikmail/nph-emumail.cgi?type=../%00: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /room/save_item.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /screen.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /scripts/tradecli.dll: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /scripts/tradecli.dll?template=nonexistfile?template=..\..\..\..\..\winnt\system32\cmd.exe?/c+dir: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /security/web_access.html: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /sendphoto.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /servers/link.cgi: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /shop/php_files/site.config.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /shop/search.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /shop/show.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /Site/biztalkhttpreceive.dll: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /site_searcher.cgi: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /spelling.php3+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /squirrelmail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /staticpages/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /status.php3: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /supporter/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /supporter/tupdate.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /sw000.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /syslog.htm?%20: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /technote/print.cgi: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /texis/websearch/phine: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /tinymsg.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /topic/entete.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /topsitesdir/edit.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ttforum/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /tutos/file/file_new.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /tutos/file/file_select.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /typo3/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /uifc/MultFileUploadHandler.php+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /url.jsp: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /useraction.php3: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /utils/sprc.asp+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /vars.inc+: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /VBZooM/add-subject.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /wbboard/profile.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /wbboard/reply.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /webcalendar/login.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /webcalendar/view_m.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /webmail/lib/emailreader_execute_on_each_page.inc.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /webmail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /web_app/WEB-INF/webapp.properties: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /XMBforum/buddy.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /XMBforum/member.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /x_stat_admin.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /yabbse/Reminder.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /yabbse/Sources/Packages.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /zentrack/index.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /_head.php: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ows-bin/oaskill.exe?abcde.exe: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /ows-bin/oasnetconf.exe?-l%20-s%20BlahBlah: This might be interesting... has been seen in web logs from an unknown scanner. + OSVDB-3093: /database/: Databases? Really?? + OSVDB-3093: /.wwwacl: Contains authorization information + OSVDB-3093: /.www_acl: Contains authorization information + OSVDB-3093: /.htpasswd: Contains authorization information + OSVDB-3093: /.access: Contains authorization information + OSVDB-3093: /.addressbook: PINE addressbook, may store sensitive e-mail address contact information and notes + OSVDB-3093: /.bashrc: User home dir was found with a shell rc file. This may reveal file and path information. + OSVDB-3093: /.bash_history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web. + OSVDB-3093: /.forward: User home dir was found with a mail forward file. May reveal where the user's mail is being forwarded to. + OSVDB-3093: /.history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web. + OSVDB-3093: /.htaccess: Contains authorization information + OSVDB-3093: /.lynx_cookies: User home dir found with LYNX cookie file. May reveal cookies received from arbitrary web sites. + OSVDB-3093: /.mysql_history: Database SQL? + OSVDB-3093: /.passwd: Contains authorization information + OSVDB-3093: /.pinerc: User home dir found with a PINE rc file. May reveal system information, directories and more. + OSVDB-3093: /.plan: User home dir with a .plan, a now mostly outdated file for delivering information via the finger protocol + OSVDB-3093: /.proclog: User home dir with a Procmail log file. May reveal user mail traffic, directories and more. + OSVDB-3093: /.procmailrc: User home dir with a Procmail rc file. May reveal sub directories, mail contacts and more. + OSVDB-3093: /.profile: User home dir with a shell profile was found. May reveal directory information and system configuration. + OSVDB-3093: /.rhosts: A user's home directory may be set to the web root, a .rhosts file was retrieved. This should not be accessible via the web. + OSVDB-3093: /.sh_history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web. + OSVDB-3093: /.ssh: A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web. + OSVDB-3093: /.ssh/authorized_keys: A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web. + OSVDB-3093: /.ssh/known_hosts: A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web. + OSVDB-3233: /_vti_bin/shtml.exe/_vti_rpc: FrontPage may be installed. + OSVDB-3233: /jservdocs/: Default Apache JServ docs should be removed. + OSVDB-3233: /tomcat-docs/index.html: Default Apache Tomcat documentation found. + OSVDB-3233: /akopia/: Akopia is installed. + OSVDB-3233: /ojspdemos/basic/hellouser/hellouser.jsp: Oracle 9i default jsp page found, may be vulnerable to XSS in any field. + OSVDB-3233: /ojspdemos/basic/simple/usebean.jsp: Oracle 9i default jsp page found, may be vulnerable to XSS in any field. + OSVDB-3233: /ojspdemos/basic/simple/welcomeuser.jsp: Oracle 9i default jsp page found, may be vulnerable to XSS in any field. + OSVDB-3233: /php/index.php: Monkey Http Daemon default php file found. + OSVDB-3233: /servlet/Counter: JRun default servlet found. All default code should be removed from servers. + OSVDB-3233: /servlet/DateServlet: JRun default servlet found. All default code should be removed from servers. + OSVDB-3233: /servlet/FingerServlet: JRun default servlet found. All default code should be removed from servers. + OSVDB-3233: /servlet/HelloWorldServlet: JRun default servlet found. All default code should be removed from servers. + OSVDB-3233: /servlet/SessionServlet: JRun or Netware WebSphere default servlet found. All default code should be removed from servers. + OSVDB-3233: /servlet/SimpleServlet: JRun default servlet found (possibly Websphere). All default code should be removed from servers. + OSVDB-3233: /servlet/SnoopServlet: JRun, Netware Java Servlet Gateway, or WebSphere default servlet found. All default code should be removed from servers. + OSVDB-3233: /admcgi/contents.htm: Default FrontPage CGI found. + OSVDB-3233: /admcgi/scripts/Fpadmcgi.exe: Default FrontPage CGI found. + OSVDB-3233: /admisapi/fpadmin.htm: Default FrontPage file found. + OSVDB-3233: /bin/admin.pl: Default FrontPage CGI found. + OSVDB-3233: /bin/cfgwiz.exe: Default FrontPage CGI found. + OSVDB-3233: /bin/CGImail.exe: Default FrontPage CGI found. + OSVDB-3233: /bin/contents.htm: Default FrontPage CGI found. + OSVDB-3233: /bin/fpadmin.htm: Default FrontPage CGI found. + OSVDB-3233: /bin/fpremadm.exe: Default FrontPage CGI found. + OSVDB-3233: /bin/fpsrvadm.exe: Default FrontPage CGI found. + OSVDB-3233: /cgi-bin/admin.pl: Default FrontPage CGI found. + OSVDB-3233: /cgi-bin/cfgwiz.exe: Default FrontPage CGI found. + OSVDB-3233: /cgi-bin/CGImail.exe: Default FrontPage CGI found. + OSVDB-3233: /cgi-bin/contents.htm: Default FrontPage CGI found. + OSVDB-3233: /cgi-bin/fpadmin.htm: Default FrontPage CGI found. + OSVDB-3233: /cgi-bin/fpremadm.exe: Default FrontPage CGI found. + OSVDB-3233: /cgi-bin/fpsrvadm.exe: Default FrontPage CGI found. + OSVDB-3233: /scripts/admin.pl: Default FrontPage CGI found. + OSVDB-3233: /scripts/cfgwiz.exe: Default FrontPage CGI found. + OSVDB-3233: /scripts/CGImail.exe: Default FrontPage CGI found. + OSVDB-3233: /scripts/contents.htm: Default FrontPage CGI found. + OSVDB-3233: /scripts/fpadmin.htm: Default FrontPage CGI found. + OSVDB-3233: /scripts/fpcount.exe: Default FrontPage CGI found. + OSVDB-3233: /scripts/fpremadm.exe: Default FrontPage CGI found. + OSVDB-3233: /scripts/fpsrvadm.exe: Default FrontPage CGI found. + OSVDB-3233: /_private/: FrontPage directory found. + OSVDB-3233: /_private/orders.htm: Default FrontPage file found. + OSVDB-3233: /_private/orders.txt: Default FrontPage file found. + OSVDB-3233: /_private/register.htm: Default FrontPage file found. + OSVDB-3233: /_private/register.txt: Default FrontPage file found. + OSVDB-3233: /_private/registrations.txt: Default FrontPage file found. + OSVDB-3233: /_private/_vti_cnf/: FrontPage directory found. + OSVDB-3233: /_vti_bin/: FrontPage directory found. + OSVDB-3233: /_vti_bin/admin.pl: Default FrontPage CGI found. + OSVDB-3233: /_vti_bin/cfgwiz.exe: Default FrontPage CGI found. + OSVDB-3233: /_vti_bin/CGImail.exe: Default FrontPage CGI found. + OSVDB-3233: /_vti_bin/contents.htm: Default FrontPage CGI found. + OSVDB-3233: /_vti_bin/fpadmin.htm: Default FrontPage CGI found. + OSVDB-3233: /_vti_bin/fpremadm.exe: Default FrontPage CGI found. + OSVDB-3233: /_vti_bin/fpsrvadm.exe: Default FrontPage CGI found. + OSVDB-3233: /_vti_bin/_vti_cnf/: FrontPage directory found. + OSVDB-3233: /_vti_cnf/_vti_cnf/: FrontPage directory found. + OSVDB-3233: /_vti_log/_vti_cnf/: FrontPage directory found. + OSVDB-3233: /_vti_pvt/administrators.pwd: Default FrontPage file found, may be a password file. + OSVDB-3233: /_vti_pvt/authors.pwd: Default FrontPage file found, may be a password file. + OSVDB-3233: /_vti_pvt/service.pwd: Default FrontPage file found, may be a password file. + OSVDB-3233: /_vti_pvt/users.pwd: Default FrontPage file found, may be a password file. + OSVDB-3233: /help/contents.htm: Default Netscape manual found. All default pages should be removed. + OSVDB-3233: /help/home.html: Default Netscape manual found. All default pages should be removed. + OSVDB-3233: /manual/ag/esperfrm.htm: Default Netscape manual found. All default pages should be removed. + OSVDB-3233: /nethome/: Netscape Enterprise Server default doc/manual directory. Reveals server path at bottom of page. + OSVDB-3233: /com/novell/gwmonitor/help/en/default.htm: Netware gateway monitor access documentation found. All default documentation should be removed from web servers. + OSVDB-3233: /com/novell/webaccess/help/en/default.htm: Netware web access documentation found. All default documentation should be removed from web servers. + OSVDB-3233: /com/novell/webpublisher/help/en/default.htm: Netware web publisher documentation found. All default documentation should be removed from web servers. + OSVDB-3233: /servlet/AdminServlet: Netware Web Search Server (adminservlet) found. All default code should be removed from web servers. + OSVDB-3233: /servlet/gwmonitor: Netware Gateway monitor found. All default code should be removed from web servers. + OSVDB-3233: /servlet/PrintServlet: Novell Netware default servlet found. All default code should be removed from the system. + OSVDB-3233: /servlet/SearchServlet: Novell Netware default servlet found. All default code should be removed from the system. + OSVDB-3233: /servlet/ServletManager: Netware Java Servlet Gateway found. Default user id is servlet, default password is manager. All default code should be removed from Internet servers. + OSVDB-3233: /servlet/sq1cdsn: Novell Netware default servlet found. All default code should be removed from the system. + OSVDB-3233: /servlet/sqlcdsn: Netware SQL connector found. All default code should be removed from web servers. + OSVDB-3233: /servlet/webacc: Netware Enterprise and/or GroupWise web access found. All default code should be removed from Internet servers. + OSVDB-3233: /servlet/webpub: Netware Web Publisher found. All default code should be removed from web servers. + OSVDB-3233: /WebSphereSamples: Netware Webshere sample applications found. All default code should be removed from web servers. + OSVDB-3233: /cgi-bin/cgi-test.exe: Default CGI found + OSVDB-3233: /doc/domguide.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/dspug.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/help4.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/helpadmin.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/helplt4.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/internet.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/javapg.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/lccon.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/migrate.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/npn_admn.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/npn_rn.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/readmec.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/readmes.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/smhelp.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /doc/srvinst.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /domguide.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /dspug.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/domguide.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/dspug.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/help4.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/helpadmin.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/helplt4.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/internet.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/javapg.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/lccon.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/migrate.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/npn_admn.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/npn_rn.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/readmec.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/readmes.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/smhelp.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help/srvinst.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /help4.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /helpadmin.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /helplt4.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /internet.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /javapg.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /lccon.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /migrate.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /npn_admn.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /npn_rn.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /readmec.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /readmes.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /smhelp.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /srvinst.nsf: This documentation database can be read without authentication. All default files should be removed. + OSVDB-3233: /index.html.ca: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.cz.iso8859-2: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.de: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.dk: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.ee: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.el: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.en: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.es: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.et: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.fr: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.he.iso8859-8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.hr.iso8859-2: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.it: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.ja.iso2022-jp: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.kr.iso2022-kr: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.ltz.utf8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.lu.utf8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.nl: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.nn: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.no: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.po.iso8859-2: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.pt: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.pt-br: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.ru.cp-1251: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.ru.cp866: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.ru.iso-ru: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.ru.koi8-r: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.ru.utf8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.se: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.tw: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.tw.Big5: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /index.html.var: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. + OSVDB-3233: /iissamples/sdk/asp/docs/codebrw2.asp: This is a default IIS script/file which should be removed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0739. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. + OSVDB-3233: /iissamples/sdk/asp/docs/codebrws.asp: This is a default IIS script/file which should be removed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0739. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. + OSVDB-3233: /iissamples/sdk/asp/docs/Winmsdp.exe: This is a default IIS script/file which should be removed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0738. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. + OSVDB-3233: /a/: May be Kebi Web Mail administration menu. + OSVDB-3233: /basilix/: BasiliX webmail application. Default mysql database name is 'BASILIX' with password 'bsxpass' + OSVDB-3233: /interchange/: Interchange chat is installed. Look for a high-numbered port like 20xx to find it running. + OSVDB-3268: /icons/: Directory indexing is enabled: /icons + OSVDB-3268: /manual/images/: Directory indexing is enabled: /manual/images + OSVDB-3268: /docs/: Directory indexing is enabled: /docs + OSVDB-3282: /uploader.php: This script may allow arbitrary files to be uploaded to the remote server. + OSVDB-3284: /iissamples/sdk/asp/docs/Winmsdp.exe?Source=/IISSAMPLES/%c0%ae%c0%ae/default.asp: IIS may be vulnerable to source code viewing via the example Winmsdp.exe file. Remove all default files from the web root. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0738. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. + OSVDB-3286: /conspass.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1081 + OSVDB-3286: /consport.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1081 + OSVDB-3286: /general.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1081 + OSVDB-3286: /srvstatus.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1081 + OSVDB-3396: /mlog.html: Remote file read vulnerability 1999-0068 + OSVDB-3396: /mlog.phtml: Remote file read vulnerability 1999-0068 + OSVDB-3396: /php/mlog.html: Remote file read vulnerability 1999-0346 + OSVDB-3396: /php/mlog.phtml: Remote file read vulnerability 1999-0346 + OSVDB-3411: /soapConfig.xml: Oracle 9iAS configuration file found - see bugrtraq #4290. + OSVDB-3423: /XSQLConfig.xml: Oracle 9iAS configuration file found - see bugrtraq #4290. + OSVDB-3489: /surf/scwebusers: SurfControl SuperScout Web Reports Server user and password file is available. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0705. + OSVDB-3501: /_private/form_results.htm: This file may contain information submitted by other web users via forms. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1052. + OSVDB-3501: /_private/form_results.html: This file may contain information submitted by other web users via forms. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1052. + OSVDB-3501: /_private/form_results.txt: This file may contain information submitted by other web users via forms. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1052. + OSVDB-3512: /scripts/tools/getdrvrs.exe: MS Jet database engine can be used to make DSNs, useful with an ODBC exploit and the RDS exploit (with msadcs.dll) which mail allow command execution. RFP9901 (http://www.wiretrip.net/rfp/p/doc.asp/i2/d3.htm). + OSVDB-3591: /project/index.php?m=projects&user_cookie=1: dotProject 0.2.1.5 may allow admin login bypass by adding the user_cookie=1 to the URL. + OSVDB-379: /site/eg/source.asp: This asp (installed with Apache::ASP) allows attackers to upload files to the server. Upgrade to 1.95 or higher. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2000-0628. + OSVDB-4: /iissamples/exair/search/advsearch.asp: Scripts within the Exair package on IIS 4 can be used for a DoS against the server. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0449. BID-193. + OSVDB-4013: /isqlplus: Oracle iSQL*Plus is installed. This may be vulnerable to a buffer overflow in the user id field. http://www.ngssoftware.com/advisories/ora-isqlplus.txt + OSVDB-4161: /data/member_log.txt: Teekai's forum full 1.2 member's log can be retrieved remotely. + OSVDB-4161: /data/userlog/log.txt: Teekai's Tracking Online 1.0 log can be retrieved remotely. + OSVDB-4161: /userlog.php: Teekai's Tracking Online 1.0 log can be retrieved remotely. + OSVDB-4171: /ASP/cart/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web. + OSVDB-4171: /database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web. + OSVDB-4171: /mcartfree/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web. + OSVDB-4171: /metacart/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web. + OSVDB-4171: /shop/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web. + OSVDB-4171: /shoponline/fpdb/shop.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web. + OSVDB-4171: /shopping/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web. + OSVDB-4237: /ban.bak: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected. + OSVDB-4237: /ban.dat: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected. + OSVDB-4237: /ban.log: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected. + OSVDB-4237: /banmat.pwd: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected. + OSVDB-4238: /admin/adminproc.asp: Xpede administration page may be available. The /admin directory should be protected. + OSVDB-4239: /admin/datasource.asp: Xpede page reveals SQL account name. The /admin directory should be protected. + OSVDB-4240: /utils/sprc.asp: Xpede page may allow SQL injection. + OSVDB-4314: /texis.exe/?-dump: Texis installation may reveal sensitive information. + OSVDB-4314: /texis.exe/?-version: Texis installation may reveal sensitive information. + OSVDB-4360: /acart2_0/acart2_0.mdb: Alan Ward A-Cart 2.0 allows remote user to read customer database file which may contain usernames, passwords, credit cards and more. + OSVDB-4361: /acart2_0/admin/category.asp: Alan Ward A-Cart 2.0 is vulnerable to an XSS attack which may cause the administrator to delete database information. + OSVDB-474: /Sites/Knowledge/Membership/Inspired/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. + OSVDB-474: /Sites/Knowledge/Membership/Inspiredtutorial/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. + OSVDB-474: /Sites/Samples/Knowledge/Membership/Inspired/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. + OSVDB-474: /Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. + OSVDB-474: /Sites/Samples/Knowledge/Push/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. + OSVDB-474: /Sites/Samples/Knowledge/Search/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. + OSVDB-474: /SiteServer/Publishing/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. + OSVDB-17671: /siteserver/publishing/viewcode.asp?source=/default.asp: May be able to view source code using Site Server vulnerability. + OSVDB-4908: /securelogin/1,2345,A,00.html: Vignette Story Server v4.1, 6, may disclose sensitive information via a buffer overflow. + OSVDB-5092: /config.inc: DotBr 0.1 configuration file includes usernames and passwords. + OSVDB-5095: /sysuser/docmgr/ieedit.stm?url=../: Sambar default file may allow directory listings. + OSVDB-5096: /sysuser/docmgr/iecreate.stm?template=../: Sambar default file may allow directory listings. + OSVDB-539: /catinfo: May be vulnerable to a buffer overflow. Request '/catinfo?' and add on 2048 of garbage to test. + OSVDB-5407: /soap/servlet/soaprouter: Oracle 9iAS SOAP components allow anonymous users to deploy applications by default. + OSVDB-6659: /rk4MzSSRx5l0mN6ccf5NszHRH8cgzT3AMVGnaeEJJaut32JaKrG82VC2orodLsEKcUdamJbaZhSxgdxkF6ff4kVT3EVsRwLQ3FjmNpEsNZDneD7iYlIHXTg4ecKJrUCAt4srhIfOFsXd6xH1KUyLm6YzPfKkMdtcs9LVU59pDIU3hxzKK1wBRZmaJiH5f6ij7OVzuacI3ivF4pdryqSpc1PU0Cu6mcyDEFACED