Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- + File/dir '/catalogo1/' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + File/dir '/catalogo/' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + File/dir '/ediciones/20000929/policiales8.html' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + File/dir '/ediciones/20001001/policiales2.html' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + File/dir '/ediciones/20000924/policiales2.html' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + File/dir '/edis/20101110/policiales15.htm' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + File/dir '/edis/20101111/policiales18.htm' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + File/dir '/edis/20101119/policiales21.htm' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + File/dir '/edis/20080714/20080714232937.htm' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + File/dir '/e-propiedades/' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + File/dir '/edis/20101103/policiales12.htm' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + File/dir '/edis/20130614/Un-profesor-denuncia-decano-Ingenieria-acoso-laboral-laciudad8.htm' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + "robots.txt" contains 34 entries which should be manually viewed.
- + Multiple index files found: index.jhtml, index.shtml
- + OSVDB-5737: WebLogic may reveal its internal IP or hostname in the Location header. The value is "http://www.eldia.com.".
- + Uncommon header 'x-cascade' found, with contents: pass
- + DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details.
- + /kboard/: KBoard Forum 0.3.0 and prior have a security problem in forum_edit_post.php, forum_post.php and forum_reply.php
- + /lists/admin/: PHPList pre 2.6.4 contains a number of vulnerabilities including remote administrative access, harvesting user info and more. Default login to admin interface is admin/phplist
- + /ssdefs/: Siteseed pre 1.4.2 has 'major' security problems.
- + /sshome/: Siteseed pre 1.4.2 has 'major' security problems.
- + /tiki/: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin
- + OSVDB-396: /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted.
- + OSVDB-637: /~root/: Allowed to browse root's home directory.
- + /cgi-bin/wrap: comes with IRIX 6.2; allows to view directories
- + /guestbook/guestbookdat: PHP-Gastebuch 1.60 Beta reveals sensitive information about its configuration.
- + /guestbook/pwd: PHP-Gastebuch 1.60 Beta reveals the md5 hash of the admin password.
- + /help/: Help directory should not be accessible
- + /getaccess: This may be an indication that the server is running getAccess for SSO
- + /tsweb/: Microsoft TSAC found. http://www.dslwebserver.com/main/fr_index.html?/main/sbs-Terminal-Services-Advanced-Client-Configuration.html
- + /vgn/performance/TMT: Vignette CMS admin/maintenance script available.
- + /vgn/performance/TMT/Report: Vignette CMS admin/maintenance script available.
- + /vgn/performance/TMT/Report/XML: Vignette CMS admin/maintenance script available.
- + /vgn/performance/TMT/reset: Vignette CMS admin/maintenance script available.
- + /vgn/ppstats: Vignette CMS admin/maintenance script available.
- + /vgn/previewer: Vignette CMS admin/maintenance script available.
- + /vgn/record/previewer: Vignette CMS admin/maintenance script available.
- + /vgn/stylepreviewer: Vignette CMS admin/maintenance script available.
- + /vgn/vr/Deleting: Vignette CMS admin/maintenance script available.
- + /vgn/vr/Editing: Vignette CMS admin/maintenance script available.
- + /vgn/vr/Saving: Vignette CMS admin/maintenance script available.
- + /vgn/vr/Select: Vignette CMS admin/maintenance script available.
- + /blah_badfile.shtml: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.
- + OSVDB-4910: /vgn/style: Vignette server may reveal system information through this file.
- + /basilix/mbox-list.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'message list' function/page
- + /basilix/message-read.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'read message' function/page
- + /IlohaMail/blank.html: IlohaMail 0.8.10 contains a XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
- + /bb-dnbd/faxsurvey: This may allow arbitrary command execution.
- + /scripts/tools/dsnform: Allows creation of ODBC Data Source
- + /prd.i/pgen/: Has MS Merchant Server 1.0
- + /scripts/httpodbc.dll: Possible IIS backdoor found.
- + /SiteServer/admin/: Site Server components admin. Default account may be 'LDAP_Anonymous', pass is 'LdapPassword_1'. see http://www.wiretrip.net/rfp/p/doc.asp/i1/d69.htm
- + /siteseed/: Siteseed pre 1.4.2 has 'major' security problems.
- + /iisadmin/: Access to /iisadmin should be restricted to localhost or allowed hosts only.
- + /PDG_Cart/oder.log: Shopping cart software log
- + /ows/restricted%2eshow: OWS may allow restricted files to be viewed by replacing a character with its encoded equivalent.
- + /WEB-INF./web.xml: Multiple implementations of j2ee servlet containers allow files to be retrieved from WEB-INF by appending a '.' to the directory name. Products include Sybase EA Service, Oracle Containers, Orion, JRun, HPAS, Pramati and others. See http://www.westpoint.l
- + /w-agora/: w-agora pre 4.1.4 may allow a remote user to execute arbitrary PHP scripts via URL includes in include/*.php and user/*.php files. Default account is 'admin' but password set during install.
- + /pbserver/pbserver.dll: This may contain a buffer overflow. http://www.microsoft.com/technet/security/bulletin/http://www.microsoft.com/technet/security/bulletin/ms00-094.asp.asp
- + /servlet/com.unify.servletexec.UploadServlet: This servlet allows attackers to upload files to the server.
- + /scripts/cpshost.dll: Posting acceptor possibly allows you to upload files
- + /basilix/compose-attach.php3: BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads
- + /server/: If port 8000, Macromedia JRun 4 build 61650 remote administration interface is vulnerable to several XSS attacks.
- + /vgn/ac/data: Vignette CMS admin/maintenance script available.
- + /vgn/ac/delete: Vignette CMS admin/maintenance script available.
- + /vgn/ac/edit: Vignette CMS admin/maintenance script available.
- + /vgn/ac/esave: Vignette CMS admin/maintenance script available.
- + /vgn/ac/fsave: Vignette CMS admin/maintenance script available.
- + /vgn/ac/index: Vignette CMS admin/maintenance script available.
- + /vgn/asp/MetaDataUpdate: Vignette CMS admin/maintenance script available.
- + /vgn/asp/previewer: Vignette CMS admin/maintenance script available.
- + /vgn/asp/status: Vignette CMS admin/maintenance script available.
- + /vgn/asp/style: Vignette CMS admin/maintenance script available.
- + /vgn/errors: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/controller: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/errorpage: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/initialize: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/jspstatus: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/jspstatus56: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/metadataupdate: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/previewer: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/style: Vignette CMS admin/maintenance script available.
- + /vgn/legacy/edit: Vignette CMS admin/maintenance script available.
- + /vgn/login: Vignette server may allow user enumeration based on the login attempts to this file.
- + /fpdb/shop.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
- + OSVDB-15971: /MIDICART/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
- + /news/news.mdb: Web Wiz Site News release v3.06 admin password database is available and unencrypted.
- + OSVDB-15971: /shoppingdirectory/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
- + OSVDB-4398: /database/db2000.mdb: Max Web Portal database is available remotely. It should be moved from the default location to a directory outside the web root.
- + OSVDB-6467: /pw/storemgr.pw: Encrypted ID/Pass for Mercantec's SoftCart, http://www.mercantec.com/, see http://www.mindsec.com/advisories/post2.txt for more information.
- + /servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.
- + /typo3conf/: This may contain sensitive Typo3 files.
- + /typo3conf/database.sql: Typo3 SQL file found.
- + OSVDB-53386: /vchat/msg.txt: VChat allows user information to be retrieved.
- + OSVDB-4907: /vgn/license: Vignette server license file found.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement