Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ######################################################################################################################################
- Hostname notes.io ISP Netdirekt A.S. (AS43391)
- Continent Europe Flag
- TR
- Country Turkey Country Code TR (TUR)
- Region Unknown Local time 25 Apr 2018 01:25 +03
- City Unknown Latitude 41.021
- IP Address 77.223.131.30 Longitude 28.995
- ######################################################################################################################################
- HostIP:77.223.131.30
- HostName:notes.io
- Gathered Inet-whois information for 77.223.131.30
- --------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 77.223.131.0 - 77.223.131.255
- netname: NETDIREKT-1
- descr: Netdirekt A.S.
- country: TR
- admin-c: NTD35-RIPE
- tech-c: NTD35-RIPE
- status: ASSIGNED PA
- mnt-by: MNT-NETDIREKT
- created: 2009-08-26T11:46:22Z
- last-modified: 2011-11-23T08:46:29Z
- source: RIPE
- person: Netdirekt Technical Team
- address: Aydinlar Cad. No: 44 Isikkent Bornova Izmir
- phone: +90 850 200 88 99
- fax-no: +90 850 200 88 98
- nic-hdl: NTD35-RIPE
- mnt-by: MNT-NETDIREKT
- created: 2009-07-15T19:34:33Z
- last-modified: 2017-10-30T22:06:06Z
- source: RIPE
- % Information related to '77.223.128.0/20AS43391'
- route: 77.223.128.0/20
- descr: Netdirekt
- origin: AS43391
- mnt-by: MNT-NETDIREKT
- created: 2009-07-03T14:58:25Z
- last-modified: 2009-07-15T19:44:11Z
- source: RIPE
- % This query was served by the RIPE Database Query Service version 1.91.2 (WAGYU)
- Gathered Inic-whois information for notes.io
- --------------------------------------------------------------------------------------------------------------------------------------
- Domain Name: NOTES.IO
- Registry Domain ID: D503300000040582279-LRMS
- Registrar WHOIS Server: whois.rrpproxy.net
- Registrar URL: http://www.key-systems.net
- Updated Date: 2017-08-12T11:36:08Z
- Creation Date: 2010-08-13T21:49:24Z
- Registry Expiry Date: 2018-08-13T21:49:24Z
- Registrar Registration Expiration Date:
- Registrar: Key-Systems GmbH
- Registrar IANA ID: 269
- Registrar Abuse Contact Email: abuse@key-systems.net
- Registrar Abuse Contact Phone: +49.68949396850
- Reseller:
- Domain Status: ok https://icann.org/epp#ok
- Registrant Name: Domain Registrar
- Registrant Organization: METROMEDYA Digital Ad Agency
- Name Server: NS2.METROMEDYA.COM
- Name Server: NS1.METROMEDYA.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of WHOIS database: 2018-04-24T22:38:31Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- ######################################################################################################################################
- [i] Scanning Site: http://notes.io
- B A S I C I N F O
- ======================================================================================================================================
- [+] Site Title: Online Notes Services | Fast . Easy . Short | Notes.io
- [+] IP address: 77.223.131.30
- [+] Web Server: Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow: /api/
- Disallow: /temp/
- Disallow: /short.php
- Disallow: /favicon.ico
- -----------[end of contents]-------------
- W H O I S L O O K U P
- =======================================================================================================================================
- Domain Name: NOTES.IO
- Registry Domain ID: D503300000040582279-LRMS
- Registrar WHOIS Server: whois.rrpproxy.net
- Registrar URL: http://www.key-systems.net
- Updated Date: 2017-08-12T11:36:08Z
- Creation Date: 2010-08-13T21:49:24Z
- Registry Expiry Date: 2018-08-13T21:49:24Z
- Registrar Registration Expiration Date:
- Registrar: Key-Systems GmbH
- Registrar IANA ID: 269
- Registrar Abuse Contact Email: abuse@key-systems.net
- Registrar Abuse Contact Phone: +49.68949396850
- Reseller:
- Domain Status: ok https://icann.org/epp#ok
- Registrant Name: Domain Registrar
- Registrant Organization: METROMEDYA Digital Ad Agency
- Name Server: NS2.METROMEDYA.COM
- Name Server: NS1.METROMEDYA.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of WHOIS database: 2018-04-24T22:38:36Z <<<
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 77.223.131.30
- [i] Country: TR
- [i] State: N/A
- [i] City: N/A
- [i] Latitude: 41.021400
- [i] Longitude: 28.994801
- H T T P H E A D E R S
- ======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Date: Tue, 24 Apr 2018 22:39:39 GMT
- [i] Server: Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
- [i] X-Powered-By: PHP/5.4.7
- [i] Set-Cookie: PHPSESSID=irri28djcvpu8c2tgjlu5g9n51; path=/
- [i] Expires: Thu, 19 Nov 1981 08:52:00 GMT
- [i] Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- [i] Pragma: no-cache
- [i] Content-Length: 7877
- [i] Connection: close
- [i] Content-Type: text/html
- D N S L O O K U P
- =====================================================================================================================================
- ;; Truncated, retrying in TCP mode.
- notes.io. 3600 IN A 77.223.131.30
- notes.io. 3600 IN NS ns1.metromedya.com.
- notes.io. 3600 IN NS ns2.metromedya.com.
- notes.io. 3600 IN SOA ns1.metromedya.com. hostmaster.metromedya.com. 20100852 900 600 86400 3600
- notes.io. 3600 IN MX 30 aspmx5.googlemail.com.
- notes.io. 3600 IN MX 10 aspmx.l.google.com.
- notes.io. 3600 IN MX 20 alt1.aspmx.l.google.com.
- notes.io. 3600 IN MX 20 alt2.aspmx.l.google.com.
- notes.io. 3600 IN MX 30 aspmx2.googlemail.com.
- notes.io. 3600 IN MX 30 aspmx3.googlemail.com.
- notes.io. 3600 IN MX 30 aspmx4.googlemail.com.
- S U B N E T C A L C U L A T I O N
- ======================================================================================================================================
- Address = 77.223.131.30
- Network = 77.223.131.30 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 77.223.131.30 - 77.223.131.30 }
- N M A P P O R T S C A N
- ======================================================================================================================================
- Starting Nmap 7.01 ( https://nmap.org ) at 2018-04-24 22:39 UTC
- Nmap scan report for notes.io (77.223.131.30)
- Host is up (0.14s latency).
- rDNS record for 77.223.131.30: 77-223-131-30.ron.com.tr
- PORT STATE SERVICE VERSION
- 21/tcp closed ftp
- 22/tcp closed ssh
- 23/tcp closed telnet
- 25/tcp closed smtp
- 80/tcp open http Apache httpd 2.2.23 ((FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2)
- 110/tcp closed pop3
- 143/tcp closed imap
- 443/tcp closed https
- 445/tcp closed microsoft-ds
- 3389/tcp closed ms-wbt-server
- Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 7.17 seconds
- #######################################################################################################################################
- [!] IP Address : 77.223.131.30
- [+] Operating System : FreeBSD
- [!] notes.io doesn't seem to use a CMS
- [+] Honeypot Probabilty: 0%
- --------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for notes.io
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/notes.io
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE VERSION
- 21/tcp closed ftp
- 22/tcp closed ssh
- 23/tcp closed telnet
- 25/tcp closed smtp
- 80/tcp open http Apache httpd 2.2.23 ((FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2)
- 110/tcp closed pop3
- 143/tcp closed imap
- 443/tcp closed https
- 445/tcp closed microsoft-ds
- 3389/tcp closed ms-wbt-server
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- ns2.metromedya.com. (77.223.131.357) AS43391 Netdirekt A.S. Turkey
- ns1.metromedya.com. (77.223.131.347) AS43391 Netdirekt A.S. Turkey
- [+] MX Records
- 30 (209.85.202.26) AS15169 Google Inc. United States
- [+] MX Records
- 30 (108.177.126.26) AS15169 Google Inc. United States
- [+] MX Records
- 10 (173.194.204.26) AS15169 Google Inc. United States
- [+] MX Records
- 20 (64.233.186.27) AS15169 Google Inc. United States
- [+] MX Records
- 30 (64.233.184.26) AS15169 Google Inc. United States
- [+] MX Records
- 30 (64.233.186.26) AS15169 Google Inc. United States
- [+] MX Records
- 20 (209.85.202.26) AS15169 Google Inc. United States
- [+] Host Records (A)
- notes.ioHTTP: (77-223-131-30.ron.com.tr) (77.223.131.307) AS43391 Netdirekt A.S. Turkey
- [+] TXT Records
- [+] DNS Map: https://dnsdumpster.com/static/map/notes.io.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- No emails found
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- 77.223.131.30:www.notes.io
- [+] Virtual hosts:
- --------------------------------------------------------------------------------------------------------------------------------------
- 77.223.131.30 www.metromedya.com
- 77.223.131.30 notes.io
- 77.223.131.30 www.md5generator
- 77.223.131.30 sleeper
- 77.223.131.30 sorgulamayap.com
- 77.223.131.30 www.md5generator.org
- 77.223.131.30 sleeperapp.com
- 77.223.131.30 appforinstagram.com
- 77.223.131.30 www.ugurethemaydin.com
- 77.223.131.30 hadjs.com
- 77.223.131.30 zezeron.net
- 77.223.131.30 www.basgetir.com
- 77.223.131.30 mobiluygulamagelistirme.com
- 77.223.131.30 ikampanya.com
- [~] Crawling the target for fuzzable URLs
- #######################################################################################################################################
- Original* notes.io 77.223.131.30 NS:ns1.metromedya.com MX:alt1.aspmx.l.google.com
- Addition notesa.io 198.105.244.19
- Addition notesb.io 198.105.244.19
- Addition notesc.io 198.105.244.19
- Addition notesd.io 198.105.244.19
- Addition notese.io 198.105.244.19
- Addition notesf.io 198.105.244.19
- Addition notesg.io 198.105.244.19
- Addition notesh.io 198.105.244.19
- Addition notesi.io 198.105.244.19
- Addition notesj.io 198.105.244.19
- Addition notesk.io 198.105.244.19
- Addition notesl.io 198.105.244.19
- Addition notesm.io 198.105.244.19
- Addition notesn.io 198.105.244.19
- Addition noteso.io 198.105.244.19
- Addition notesp.io 198.105.244.19
- Addition notesq.io 198.105.244.19
- Addition notesr.io 198.105.244.19
- Addition notess.io 198.105.244.19
- Addition notest.io 198.105.244.19
- Addition notesu.io 198.105.244.19
- Addition notesv.io 198.105.244.19
- Addition notesw.io 198.105.244.19
- Addition notesx.io 198.105.244.19
- Addition notesy.io 198.105.244.19
- Addition notesz.io 198.105.244.19
- Bitsquatting ootes.io 188.166.11.67 NS:ns1.hostnet.nl MX:ALT1.ASPMX.L.GOOGLE.COM
- Bitsquatting lotes.io 198.105.244.19
- Bitsquatting jotes.io 198.105.244.19
- Bitsquatting fotes.io 198.105.244.19
- Bitsquatting nntes.io 198.105.244.19
- Bitsquatting nmtes.io 198.105.244.19
- Bitsquatting nktes.io 198.105.244.19
- Bitsquatting ngtes.io 198.105.244.19
- Bitsquatting noues.io 198.105.244.19
- Bitsquatting noves.io 198.105.244.19
- Bitsquatting nopes.io 198.105.244.19
- Bitsquatting nodes.io 178.62.14.238 NS:ns1.digitalocean.com
- Bitsquatting no4es.io 198.105.244.19
- Bitsquatting notds.io 198.105.244.19
- Bitsquatting notgs.io 198.105.244.19
- Bitsquatting notas.io 184.168.221.42 NS:ns57.domaincontrol.com MX:mailstore1.secureserver.net
- Bitsquatting notms.io 198.105.244.19
- Bitsquatting notus.io 217.70.184.38 NS:ns-20-a.gandi.net MX:fb.mail.gandi.net
- Bitsquatting noter.io 47.100.5.69 NS:dns1.registrar-servers.com MX:mx.ym.163.com
- Bitsquatting noteq.io 198.105.244.19
- Bitsquatting notew.io 198.105.244.19
- Bitsquatting notec.io 198.105.244.19
- Bitsquatting note3.io 198.105.244.19
- Homoglyph noteⴝ.io 198.105.244.19
- Homoglyph notês.io 198.105.244.19
- Homoglyph noteś.io 198.105.244.19
- Homoglyph nơtes.io 198.105.244.19
- Homoglyph notεs.io 198.105.244.19
- Homoglyph noteʂ.io 198.105.244.19
- Homoglyph nοtes.io 198.105.244.19
- Homoglyph rotes.io 198.105.244.19
- Homoglyph nọtes.io 198.105.244.19
- Homoglyph notěs.io 198.105.244.19
- Homoglyph nȯtes.io 198.105.244.19
- Homoglyph notės.io 198.105.244.19
- Homoglyph nօtes.io 198.105.244.19
- Homoglyph notęs.io 198.105.244.19
- Homoglyph notēs.io 198.105.244.19
- Homoglyph notҽs.io 198.105.244.19
- Homoglyph noţes.io 198.105.244.19
- Homoglyph n0tes.io 198.105.244.19
- Homoglyph notєs.io 198.105.244.19
- Homoglyph nοtes.io 198.105.244.19
- Homoglyph motes.io 45.56.72.235 2600:3c00::f03c:91ff:fe15:e4fa NS:ns1.linode.com MX:mail.motes.io
- Homoglyph nоtes.io 198.105.244.19
- Homoglyph nӧtes.io 198.105.244.19
- Homoglyph noteᏚ.io 198.105.244.19
- Homoglyph nỏtes.io -
- Homoglyph noteѕ.io 198.105.244.19
- Homoglyph notẹs.io 198.105.244.19
- Homoglyph noтes.io 198.105.244.19
- Homoglyph notеs.io 198.105.244.19
- Homoglyph notës.io 198.105.244.19
- Homoglyph nötes.io 198.105.244.19
- Homoglyph noτes.io 198.105.244.19
- Homoglyph notĕs.io 198.105.244.19
- Homoglyph notés.io 198.105.244.19
- Homoglyph nótes.io 198.105.244.19
- Homoglyph ńotes.io 198.105.244.19
- Homoglyph nоtes.io 198.105.244.19
- Hyphenation n-otes.io 198.105.244.19
- Hyphenation no-tes.io 198.105.244.19
- Hyphenation not-es.io 198.105.244.19
- Hyphenation note-s.io 198.105.244.19
- Insertion noltes.io 198.105.244.19
- Insertion notwes.io 198.105.244.19
- Insertion note4s.io 198.105.244.19
- Insertion notres.io 198.105.244.19
- Insertion nogtes.io 198.105.244.19
- Insertion notzes.io 198.105.244.19
- Insertion noteds.io 198.105.244.19
- Insertion noytes.io 198.105.244.19
- Insertion niotes.io 198.105.244.19
- Insertion no0tes.io 198.105.244.19
- Insertion npotes.io 198.105.244.19
- Insertion note3s.io 198.105.244.19
- Insertion noztes.io 198.105.244.19
- Insertion notses.io 198.105.244.19
- Insertion notfes.io 198.105.244.19
- Insertion n9otes.io 198.105.244.19
- Insertion notges.io 198.105.244.19
- Insertion not6es.io 198.105.244.19
- Insertion notezs.io 198.105.244.19
- Insertion nkotes.io 198.105.244.19
- Insertion noftes.io 198.105.244.19
- Insertion nlotes.io 198.105.244.19
- Insertion noktes.io 198.105.244.19
- Insertion no5tes.io 198.105.244.19
- Insertion notdes.io 198.105.244.19
- Insertion no9tes.io 198.105.244.19
- Insertion notyes.io 198.105.244.19
- Insertion nortes.io 198.105.244.19
- Insertion not4es.io 198.105.244.19
- Insertion not5es.io 198.105.244.19
- Insertion noptes.io 198.105.244.19
- Insertion noites.io 198.105.244.19
- Insertion notews.io 198.105.244.19
- Insertion n0otes.io 198.105.244.19
- Insertion noters.io 198.105.244.19
- Insertion not3es.io 198.105.244.19
- Insertion no6tes.io 198.105.244.19
- Omission note.io 67.199.248.12 NS:ns10.dnsmadeeasy.com
- Omission noes.io 50.63.202.37 NS:ns53.domaincontrol.com
- Omission ntes.io 50.63.202.47 NS:ns73.domaincontrol.com
- Omission otes.io 198.105.244.19
- Omission nots.io 95.85.57.64 NS:ns.nots.io MX:mail.nots.io
- Repetition nottes.io 198.105.244.19
- Repetition nnotes.io 198.105.244.19
- Repetition notees.io 198.105.244.19
- Repetition nootes.io 198.105.244.19
- Replacement noges.io 198.105.244.19
- Replacement noyes.io 192.30.252.153 NS:ns39.domaincontrol.com MX:noyes-io.mail.protection.outlook.com
- Replacement notws.io 198.105.244.19
- Replacement notey.io 198.105.244.19
- Replacement nofes.io 198.105.244.19
- Replacement notss.io 198.105.244.19
- Replacement notzs.io 198.105.244.19
- Replacement not4s.io 198.105.244.19
- Replacement no6es.io 198.105.244.19
- Replacement nores.io 198.105.244.19
- Replacement notex.io -
- Replacement no5es.io 198.105.244.19
- Replacement botes.io 198.105.244.19
- Replacement n9tes.io 198.105.244.19
- Replacement notea.io 198.105.244.19
- Replacement nltes.io 198.105.244.19
- Replacement hotes.io 198.105.244.19
- Replacement notrs.io 198.105.244.19
- Replacement nites.io 198.105.244.19
- Replacement not3s.io 198.105.244.19
- Replacement nptes.io 198.105.244.19
- Replacement nozes.io 198.105.244.19
- Replacement notee.io 198.105.244.19
- Replacement noted.io 52.58.78.16 NS:ns1.undeveloped.com
- Transposition ontes.io 198.105.244.19
- Transposition ntoes.io 198.105.244.19
- Transposition noets.io 198.105.244.19
- Transposition notse.io 198.105.244.19
- Vowel-swap notos.io 184.168.221.35 NS:ns13.domaincontrol.com MX:alt1.aspmx.l.google.com
- Vowel-swap nutes.io 198.105.244.19
- Vowel-swap nates.io 198.105.244.19
- Vowel-swap netes.io 198.105.244.19
- Vowel-swap notis.io 104.27.186.252 2400:cb00:2048:1::681b:bafc NS:kurt.ns.cloudflare.com MX:alt1.aspmx.l.google.com
- Various notesio.io 198.105.244.19
- Various notes-io.com -
- ######################################################################################################################################
- [*] Processing domain notes.io
- [+] Getting nameservers
- 77.223.131.35 - ns2.metromedya.com
- 77.223.131.34 - ns1.metromedya.com
- [-] Zone transfer failed
- [+] MX records found, added to target list
- 30 aspmx4.googlemail.com.
- 30 aspmx2.googlemail.com.
- 10 aspmx.l.google.com.
- 20 alt2.aspmx.l.google.com.
- 30 aspmx5.googlemail.com.
- 30 aspmx3.googlemail.com.
- 20 alt1.aspmx.l.google.com.
- [*] Scanning notes.io for A records
- 77.223.131.30 - notes.io
- 77.223.131.30 - alpha.notes.io
- 77.223.131.30 - beta.notes.io
- 77.223.131.30 - blog.notes.io
- 198.105.244.19 - homer.notes.io
- 198.105.254.19 - homer.notes.io
- 198.105.244.19 - home.notes.io
- 198.105.254.19 - home.notes.io
- 172.217.2.19 - mail.notes.io
- 198.105.244.19 - my.notes.io
- 198.105.254.19 - my.notes.io
- 198.105.244.19 - mysql.notes.io
- 198.105.254.19 - mysql.notes.io
- 198.105.244.19 - mysql2.notes.io
- 198.105.254.19 - mysql2.notes.io
- 198.105.244.19 - web03.notes.io
- 198.105.254.19 - web03.notes.io
- 198.105.244.19 - web1.notes.io
- 198.105.244.19 - web02.notes.io
- 198.105.244.19 - web.notes.io
- 198.105.244.19 - web01.notes.io
- 198.105.254.19 - web01.notes.io
- 198.105.254.19 - web02.notes.io
- 198.105.254.19 - web.notes.io
- 198.105.254.19 - web1.notes.io
- 198.105.244.19 - web0.notes.io
- 198.105.254.19 - web0.notes.io
- 198.105.244.19 - web2.notes.io
- 198.105.254.19 - web2.notes.io
- 198.105.244.19 - web4.notes.io
- 198.105.254.19 - web4.notes.io
- 198.105.244.19 - webconf.notes.io
- 198.105.244.19 - web3.notes.io
- 198.105.244.19 - webadmin.notes.io
- 198.105.254.19 - web3.notes.io
- 198.105.254.19 - webadmin.notes.io
- 198.105.254.19 - webconf.notes.io
- 198.105.244.19 - web5.notes.io
- 198.105.254.19 - web5.notes.io
- 198.105.244.19 - webcam.notes.io
- 198.105.254.19 - webcam.notes.io
- 198.105.244.19 - webct.notes.io
- 198.105.254.19 - webct.notes.io
- 198.105.244.19 - webdb.notes.io
- 198.105.254.19 - webdb.notes.io
- 198.105.244.19 - webmail2.notes.io
- 198.105.254.19 - webmail2.notes.io
- 198.105.244.19 - webdisk.notes.io
- 198.105.244.19 - webmaster.notes.io
- 198.105.254.19 - webdisk.notes.io
- 198.105.254.19 - webmaster.notes.io
- 198.105.244.19 - weblog.notes.io
- 198.105.254.19 - weblog.notes.io
- 198.105.244.19 - webmin.notes.io
- 198.105.244.19 - webmail.notes.io
- 198.105.254.19 - webmin.notes.io
- 198.105.254.19 - webmail.notes.io
- 198.105.244.19 - webservices.notes.io
- 198.105.254.19 - webservices.notes.io
- 198.105.244.19 - webstats.notes.io
- 198.105.254.19 - webstats.notes.io
- 198.105.244.19 - webstore.notes.io
- 198.105.254.19 - webstore.notes.io
- 198.105.244.19 - ww.notes.io
- 198.105.244.19 - ww0.notes.io
- 198.105.254.19 - ww.notes.io
- 198.105.254.19 - ww0.notes.io
- 198.105.244.19 - ww01.notes.io
- 198.105.254.19 - ww01.notes.io
- 198.105.244.19 - ww03.notes.io
- 198.105.254.19 - ww03.notes.io
- 198.105.244.19 - ww02.notes.io
- 198.105.254.19 - ww02.notes.io
- 198.105.244.19 - ww2.notes.io
- 198.105.244.19 - ww1.notes.io
- 198.105.254.19 - ww2.notes.io
- 198.105.254.19 - ww1.notes.io
- 77.223.131.30 - www.notes.io
- 198.105.244.19 - www-test.notes.io
- 198.105.254.19 - www-test.notes.io
- 198.105.244.19 - www01.notes.io
- 198.105.254.19 - www01.notes.io
- 198.105.244.19 - ww3.notes.io
- 198.105.254.19 - ww3.notes.io
- 198.105.244.19 - www0.notes.io
- 198.105.254.19 - www0.notes.io
- 198.105.244.19 - www02.notes.io
- 198.105.254.19 - www02.notes.io
- 198.105.244.19 - www2.notes.io
- 198.105.254.19 - www2.notes.io
- 198.105.244.19 - www03.notes.io
- 198.105.254.19 - www03.notes.io
- 198.105.244.19 - www1.notes.io
- 198.105.254.19 - www1.notes.io
- 198.105.244.19 - www6.notes.io
- 198.105.254.19 - www6.notes.io
- 198.105.244.19 - www7.notes.io
- 198.105.254.19 - www7.notes.io
- 198.105.244.19 - www5.notes.io
- 198.105.254.19 - www5.notes.io
- 198.105.244.19 - www4.notes.io
- 198.105.254.19 - www4.notes.io
- 198.105.244.19 - www3.notes.io
- 198.105.254.19 - www3.notes.io
- 198.105.244.19 - wwwm.notes.io
- 198.105.254.19 - wwwm.notes.io
- 198.105.244.19 - wwwold.notes.io
- 198.105.244.19 - wwww.notes.io
- 198.105.254.19 - wwwold.notes.io
- 198.105.254.19 - wwww.notes.io
- ################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 77.223.131.30 301 alias alpha.notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
- 77.223.131.30 301 host notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
- 77.223.131.30 301 alias beta.notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
- 77.223.131.30 301 host notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
- 77.223.131.30 301 host blog.notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
- 198.105.244.19 301 host home.notes.io nginx
- 198.105.254.19 301 host home.notes.io nginx
- 198.105.244.19 301 host homebase.notes.io nginx
- 198.105.254.19 301 host homebase.notes.io nginx
- 198.105.244.19 301 host homer.notes.io nginx
- 198.105.254.19 301 host homer.notes.io nginx
- 198.105.244.19 301 host http.notes.io nginx
- 198.105.254.19 301 host http.notes.io nginx
- 198.105.244.19 301 host https.notes.io nginx
- 198.105.254.19 301 host https.notes.io nginx
- 172.217.2.19 302 alias mail.notes.io ghs
- 172.217.2.19 302 host ghs.google.com ghs
- 198.105.244.19 301 host my.notes.io nginx
- 198.105.254.19 301 host my.notes.io nginx
- 198.105.244.19 301 host mysql.notes.io nginx
- 198.105.254.19 301 host mysql.notes.io nginx
- 198.105.244.19 301 host mysql0.notes.io nginx
- 198.105.254.19 301 host mysql0.notes.io nginx
- 198.105.244.19 301 host mysql01.notes.io nginx
- 198.105.254.19 301 host mysql01.notes.io nginx
- 198.105.244.19 301 host mysql1.notes.io nginx
- 198.105.254.19 301 host mysql1.notes.io nginx
- 198.105.244.19 301 host web.notes.io nginx
- 198.105.254.19 301 host web.notes.io nginx
- 198.105.244.19 301 host webaccess.notes.io nginx
- 198.105.254.19 301 host webaccess.notes.io nginx
- 198.105.244.19 301 host webadmin.notes.io nginx
- 198.105.254.19 301 host webadmin.notes.io nginx
- 198.105.244.19 301 host webalizer.notes.io nginx
- 198.105.254.19 301 host webalizer.notes.io nginx
- 198.105.244.19 301 host webboard.notes.io nginx
- 198.105.254.19 301 host webboard.notes.io nginx
- 198.105.244.19 301 host webcache.notes.io nginx
- 198.105.254.19 301 host webcache.notes.io nginx
- 198.105.244.19 301 host webcam.notes.io nginx
- 198.105.254.19 301 host webcam.notes.io nginx
- 198.105.244.19 301 host webcast.notes.io nginx
- 198.105.254.19 301 host webcast.notes.io nginx
- 198.105.244.19 301 host webdev.notes.io nginx
- 198.105.254.19 301 host webdev.notes.io nginx
- 198.105.244.19 301 host webdocs.notes.io nginx
- 198.105.254.19 301 host webdocs.notes.io nginx
- 198.105.244.19 301 host webfarm.notes.io nginx
- 198.105.254.19 301 host webfarm.notes.io nginx
- 198.105.244.19 301 host webhelp.notes.io nginx
- 198.105.254.19 301 host webhelp.notes.io nginx
- 198.105.244.19 301 host weblib.notes.io nginx
- 198.105.254.19 301 host weblib.notes.io nginx
- 198.105.244.19 301 host weblogic.notes.io nginx
- 198.105.254.19 301 host weblogic.notes.io nginx
- 198.105.244.19 301 host webmail.notes.io nginx
- 198.105.254.19 301 host webmail.notes.io nginx
- 198.105.244.19 301 host webmaster.notes.io nginx
- 198.105.254.19 301 host webmaster.notes.io nginx
- 198.105.244.19 301 host webproxy.notes.io nginx
- 198.105.254.19 301 host webproxy.notes.io nginx
- 198.105.244.19 301 host webring.notes.io nginx
- 198.105.254.19 301 host webring.notes.io nginx
- 198.105.244.19 301 host webs.notes.io nginx
- 198.105.254.19 301 host webs.notes.io nginx
- 198.105.244.19 301 host webserv.notes.io nginx
- 198.105.254.19 301 host webserv.notes.io nginx
- 198.105.244.19 301 host webserver.notes.io nginx
- 198.105.254.19 301 host webserver.notes.io nginx
- 198.105.244.19 301 host webservices.notes.io nginx
- 198.105.254.19 301 host webservices.notes.io nginx
- 198.105.244.19 301 host website.notes.io nginx
- 198.105.254.19 301 host website.notes.io nginx
- 198.105.244.19 301 host websites.notes.io nginx
- 198.105.254.19 301 host websites.notes.io nginx
- 198.105.244.19 301 host websphere.notes.io nginx
- 198.105.254.19 301 host websphere.notes.io nginx
- 198.105.244.19 301 host websrv.notes.io nginx
- 198.105.254.19 301 host websrv.notes.io nginx
- 198.105.244.19 301 host websrvr.notes.io nginx
- 198.105.254.19 301 host websrvr.notes.io nginx
- 198.105.244.19 301 host webstats.notes.io nginx
- 198.105.254.19 301 host webstats.notes.io nginx
- 198.105.244.19 301 host webstore.notes.io nginx
- 198.105.254.19 301 host webstore.notes.io nginx
- 198.105.244.19 301 host websvr.notes.io nginx
- 198.105.254.19 301 host websvr.notes.io nginx
- 198.105.244.19 301 host webtrends.notes.io nginx
- 198.105.254.19 301 host webtrends.notes.io nginx
- 198.105.244.19 301 host ww.notes.io nginx
- 198.105.254.19 301 host ww.notes.io nginx
- 198.105.244.19 301 host ww1.notes.io nginx
- 198.105.254.19 301 host ww1.notes.io nginx
- 198.105.244.19 301 host ww42.notes.io nginx
- 198.105.254.19 301 host ww42.notes.io nginx
- 77.223.131.30 301 alias www.notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
- 77.223.131.30 301 host notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
- 198.105.244.19 301 host www-.notes.io nginx
- 198.105.254.19 301 host www-.notes.io nginx
- 198.105.244.19 301 host www-01.notes.io nginx
- 198.105.254.19 301 host www-01.notes.io nginx
- 198.105.244.19 301 host www-02.notes.io nginx
- 198.105.254.19 301 host www-02.notes.io nginx
- 198.105.244.19 301 host www-1.notes.io nginx
- 198.105.254.19 301 host www-1.notes.io nginx
- 198.105.244.19 301 host www-2.notes.io nginx
- 198.105.254.19 301 host www-2.notes.io nginx
- 198.105.244.19 301 host www-int.notes.io nginx
- 198.105.254.19 301 host www-int.notes.io nginx
- 198.105.244.19 301 host www0.notes.io nginx
- 198.105.254.19 301 host www0.notes.io nginx
- 198.105.244.19 301 host www01.notes.io nginx
- 198.105.254.19 301 host www01.notes.io nginx
- 198.105.244.19 301 host www02.notes.io nginx
- 198.105.254.19 301 host www02.notes.io nginx
- 198.105.244.19 301 host www1.notes.io nginx
- 198.105.254.19 301 host www1.notes.io nginx
- 198.105.244.19 301 host www2.notes.io nginx
- 198.105.254.19 301 host www2.notes.io nginx
- 198.105.244.19 301 host www3.notes.io nginx
- 198.105.254.19 301 host www3.notes.io nginx
- 198.105.244.19 301 host www_.notes.io nginx
- 198.105.254.19 301 host www_.notes.io nginx
- 198.105.244.19 301 host wwwchat.notes.io nginx
- 198.105.254.19 301 host wwwchat.notes.io nginx
- 198.105.244.19 301 host wwwdev.notes.io nginx
- 198.105.254.19 301 host wwwdev.notes.io nginx
- 198.105.244.19 301 host wwwmail.notes.io nginx
- 198.105.254.19 301 host wwwmail.notes.io nginx
- #######################################################################################################################################
- --------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 77.223.131.30
- + Target Hostname: notes.io
- + Target Port: 80
- + Start Time: 2018-04-24 19:42:40 (GMT-4)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
- + Cookie PHPSESSID created without the httponly flag
- + Retrieved x-powered-by header: PHP/5.4.7
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + lines
- + Server leaks inodes via ETags, header found with file /robots.txt, inode: 2418041, size: 90, mtime: Tue Dec 12 16:01:41 2017
- + OSVDB-3268: /api/: Directory indexing found.
- + Entry '/api/' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + OSVDB-3268: /temp/: Directory indexing found.
- + Entry '/temp/' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + Entry '/short.php' in robots.txt returned a non-forbidden or redirect HTTP code (301)
- + Entry '/favicon.ico' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + "robots.txt" contains 4 entries which should be manually viewed.
- + Multiple index files found: /default.asp, /index.cfm, /index.html, /default.aspx, /index.htm, /index.aspx, /index.do, /index.pl, /index.shtml, /index.xml, /index.php3, /index.cgi, /default.htm, /index.asp, /index.jhtml, /index.php
- + PHP/5.4.7 appears to be outdated (current is at least 5.6.9). PHP 5.5.25 and 5.4.41 are also current.
- + OpenSSL/0.9.8y appears to be outdated (current is at least 1.0.1j). OpenSSL 1.0.0o and 0.9.8zc are also current.
- + mod_ssl/2.2.23 appears to be outdated (current is at least 2.8.31) (may depend on server version)
- + Apache/2.2.23 appears to be outdated (current is at least Apache/2.4.12). Apache 2.0.65 (final release) and 2.2.29 are also current.
- + mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0082, OSVDB-756.
- + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
- + OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
- + OSVDB-3268: /scripts/: Directory indexing found.
- + /cgi.cgi/cart32.exe: request cart32.exe/cart32clientlist
- + /webcgi/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi-914/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi-915/cart32.exe: request cart32.exe/cart32clientlist
- + /bin/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi/cart32.exe: request cart32.exe/cart32clientlist
- + /mpcgi/cart32.exe: request cart32.exe/cart32clientlist
- + /ows-bin/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi-sys/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi-local/cart32.exe: request cart32.exe/cart32clientlist
- + /htbin/cart32.exe: request cart32.exe/cart32clientlist
- + /cgibin/cart32.exe: request cart32.exe/cart32clientlist
- + /cgis/cart32.exe: request cart32.exe/cart32clientlist
- + /scripts/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi-win/cart32.exe: request cart32.exe/cart32clientlist
- + /fcgi-bin/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi-exe/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi-home/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi-perl/cart32.exe: request cart32.exe/cart32clientlist
- + /scgi-bin/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi-bin-sdb/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi-mod/cart32.exe: request cart32.exe/cart32clientlist
- + /cgi.cgi/classified.cgi: Check Phrack 55 for info by RFP
- + /webcgi/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi-914/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi-915/classified.cgi: Check Phrack 55 for info by RFP
- + /bin/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi/classified.cgi: Check Phrack 55 for info by RFP
- + /mpcgi/classified.cgi: Check Phrack 55 for info by RFP
- + /ows-bin/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi-sys/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi-local/classified.cgi: Check Phrack 55 for info by RFP
- + /htbin/classified.cgi: Check Phrack 55 for info by RFP
- + /cgibin/classified.cgi: Check Phrack 55 for info by RFP
- + /cgis/classified.cgi: Check Phrack 55 for info by RFP
- + /scripts/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi-win/classified.cgi: Check Phrack 55 for info by RFP
- + /fcgi-bin/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi-exe/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi-home/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi-perl/classified.cgi: Check Phrack 55 for info by RFP
- + /scgi-bin/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi-bin-sdb/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi-mod/classified.cgi: Check Phrack 55 for info by RFP
- + /cgi.cgi/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /webcgi/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi-914/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi-915/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /bin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /mpcgi/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /ows-bin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi-sys/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi-local/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /htbin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgibin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgis/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /scripts/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi-win/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /fcgi-bin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi-exe/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi-home/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi-perl/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /scgi-bin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi-bin-sdb/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi-mod/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
- + /cgi.cgi/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /webcgi/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-914/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-915/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /bin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /mpcgi/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /ows-bin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-sys/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-local/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /htbin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgibin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgis/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /scripts/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-win/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /fcgi-bin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-exe/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-home/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-perl/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /scgi-bin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-bin-sdb/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-mod/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi.cgi/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /webcgi/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-914/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-915/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /bin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /mpcgi/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /ows-bin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-sys/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-local/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /htbin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgibin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgis/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /scripts/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-win/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /fcgi-bin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-exe/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-home/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-perl/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /scgi-bin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-bin-sdb/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi-mod/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
- + /cgi.cgi/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /webcgi/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-914/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-915/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /bin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /mpcgi/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /ows-bin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-sys/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-local/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /htbin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgibin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgis/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /scripts/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-win/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /fcgi-bin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-exe/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-home/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-perl/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /scgi-bin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-bin-sdb/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-mod/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi.cgi/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /webcgi/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-914/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-915/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /bin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /mpcgi/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /ows-bin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-sys/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-local/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /htbin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgibin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgis/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /scripts/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-win/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /fcgi-bin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-exe/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-home/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-perl/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /scgi-bin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-bin-sdb/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi-mod/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
- + /cgi.cgi/lwgate: Check Phrack 55 for info by RFP
- + /webcgi/lwgate: Check Phrack 55 for info by RFP
- + /cgi-914/lwgate: Check Phrack 55 for info by RFP
- + /cgi-915/lwgate: Check Phrack 55 for info by RFP
- + /bin/lwgate: Check Phrack 55 for info by RFP
- + /cgi/lwgate: Check Phrack 55 for info by RFP
- + /mpcgi/lwgate: Check Phrack 55 for info by RFP
- + /ows-bin/lwgate: Check Phrack 55 for info by RFP
- + /cgi-sys/lwgate: Check Phrack 55 for info by RFP
- + /cgi-local/lwgate: Check Phrack 55 for info by RFP
- + /htbin/lwgate: Check Phrack 55 for info by RFP
- + /cgibin/lwgate: Check Phrack 55 for info by RFP
- + /cgis/lwgate: Check Phrack 55 for info by RFP
- + /scripts/lwgate: Check Phrack 55 for info by RFP
- + /cgi-win/lwgate: Check Phrack 55 for info by RFP
- + /fcgi-bin/lwgate: Check Phrack 55 for info by RFP
- + /cgi-exe/lwgate: Check Phrack 55 for info by RFP
- + /cgi-home/lwgate: Check Phrack 55 for info by RFP
- + /cgi-perl/lwgate: Check Phrack 55 for info by RFP
- + /scgi-bin/lwgate: Check Phrack 55 for info by RFP
- + /cgi-bin-sdb/lwgate: Check Phrack 55 for info by RFP
- + /cgi-mod/lwgate: Check Phrack 55 for info by RFP
- + /cgi.cgi/LWGate: Check Phrack 55 for info by RFP
- + /webcgi/LWGate: Check Phrack 55 for info by RFP
- + /cgi-914/LWGate: Check Phrack 55 for info by RFP
- + /cgi-915/LWGate: Check Phrack 55 for info by RFP
- + /bin/LWGate: Check Phrack 55 for info by RFP
- + /cgi/LWGate: Check Phrack 55 for info by RFP
- + /mpcgi/LWGate: Check Phrack 55 for info by RFP
- + /ows-bin/LWGate: Check Phrack 55 for info by RFP
- + /cgi-sys/LWGate: Check Phrack 55 for info by RFP
- + /cgi-local/LWGate: Check Phrack 55 for info by RFP
- + /htbin/LWGate: Check Phrack 55 for info by RFP
- + /cgibin/LWGate: Check Phrack 55 for info by RFP
- + /cgis/LWGate: Check Phrack 55 for info by RFP
- + /scripts/LWGate: Check Phrack 55 for info by RFP
- + /cgi-win/LWGate: Check Phrack 55 for info by RFP
- + /fcgi-bin/LWGate: Check Phrack 55 for info by RFP
- + /cgi-exe/LWGate: Check Phrack 55 for info by RFP
- + /cgi-home/LWGate: Check Phrack 55 for info by RFP
- + /cgi-perl/LWGate: Check Phrack 55 for info by RFP
- + /scgi-bin/LWGate: Check Phrack 55 for info by RFP
- + /cgi-bin-sdb/LWGate: Check Phrack 55 for info by RFP
- + /cgi-mod/LWGate: Check Phrack 55 for info by RFP
- + /cgi.cgi/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /webcgi/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgi-914/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgi-915/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgi/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /mpcgi/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /ows-bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgi-sys/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgi-local/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /htbin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgibin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgis/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /scripts/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgi-win/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /fcgi-bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgi-exe/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgi-home/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgi-perl/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /scgi-bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgi-bin-sdb/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /cgi-mod/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
- + /kboard/: KBoard Forum 0.3.0 and prior have a security problem in forum_edit_post.php, forum_post.php and forum_reply.php
- + /lists/admin/: PHPList pre 2.6.4 contains a number of vulnerabilities including remote administrative access, harvesting user info and more. Default login to admin interface is admin/phplist
- + /splashAdmin.php: Cobalt Qube 3 admin is running. This may have multiple security problems as described by www.scan-associates.net. These could not be tested remotely.
- + /ssdefs/: Siteseed pre 1.4.2 has 'major' security problems.
- + /sshome/: Siteseed pre 1.4.2 has 'major' security problems.
- + /tiki/: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin
- + /tiki/tiki-install.php: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin
- + /scripts/samples/details.idc: See RFP 9901; www.wiretrip.net
- + OSVDB-396: /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted.
- + /cgi.cgi/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /webcgi/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi-914/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi-915/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /mpcgi/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /ows-bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi-sys/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi-local/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /htbin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgibin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgis/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /scripts/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi-win/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /fcgi-bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi-exe/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi-home/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi-perl/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /scgi-bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi-bin-sdb/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi-mod/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
- + /cgi.cgi/finger: finger other users, may be other commands?
- + /webcgi/finger: finger other users, may be other commands?
- + /cgi-914/finger: finger other users, may be other commands?
- + /cgi-915/finger: finger other users, may be other commands?
- + /bin/finger: finger other users, may be other commands?
- + /cgi/finger: finger other users, may be other commands?
- + /mpcgi/finger: finger other users, may be other commands?
- + /ows-bin/finger: finger other users, may be other commands?
- + /cgi-sys/finger: finger other users, may be other commands?
- + /cgi-local/finger: finger other users, may be other commands?
- + /htbin/finger: finger other users, may be other commands?
- + /cgibin/finger: finger other users, may be other commands?
- + /cgis/finger: finger other users, may be other commands?
- + /scripts/finger: finger other users, may be other commands?
- + /cgi-win/finger: finger other users, may be other commands?
- + /fcgi-bin/finger: finger other users, may be other commands?
- + /cgi-exe/finger: finger other users, may be other commands?
- + /cgi-home/finger: finger other users, may be other commands?
- + /cgi-perl/finger: finger other users, may be other commands?
- + /scgi-bin/finger: finger other users, may be other commands?
- + /cgi-bin-sdb/finger: finger other users, may be other commands?
- + /cgi-mod/finger: finger other users, may be other commands?
- + /cgi.cgi/finger.pl: finger other users, may be other commands?
- + /webcgi/finger.pl: finger other users, may be other commands?
- + /cgi-914/finger.pl: finger other users, may be other commands?
- + /cgi-915/finger.pl: finger other users, may be other commands?
- + /bin/finger.pl: finger other users, may be other commands?
- + /cgi/finger.pl: finger other users, may be other commands?
- + /mpcgi/finger.pl: finger other users, may be other commands?
- + /ows-bin/finger.pl: finger other users, may be other commands?
- + /cgi-sys/finger.pl: finger other users, may be other commands?
- + /cgi-local/finger.pl: finger other users, may be other commands?
- + /htbin/finger.pl: finger other users, may be other commands?
- + /cgibin/finger.pl: finger other users, may be other commands?
- + /cgis/finger.pl: finger other users, may be other commands?
- + /scripts/finger.pl: finger other users, may be other commands?
- + /cgi-win/finger.pl: finger other users, may be other commands?
- + /fcgi-bin/finger.pl: finger other users, may be other commands?
- + /cgi-exe/finger.pl: finger other users, may be other commands?
- + /cgi-home/finger.pl: finger other users, may be other commands?
- + /cgi-perl/finger.pl: finger other users, may be other commands?
- + /scgi-bin/finger.pl: finger other users, may be other commands?
- + /cgi-bin-sdb/finger.pl: finger other users, may be other commands?
- + /cgi-mod/finger.pl: finger other users, may be other commands?
- + /cgi.cgi/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /webcgi/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi-914/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi-915/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /bin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /mpcgi/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /ows-bin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi-sys/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi-local/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /htbin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgibin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgis/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /scripts/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi-win/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /fcgi-bin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi-exe/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi-home/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi-perl/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /scgi-bin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi-bin-sdb/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi-mod/get32.exe: This can allow attackers to execute arbitrary commands remotely.
- + /cgi.cgi/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /webcgi/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-914/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-915/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /bin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /mpcgi/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /ows-bin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-sys/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-local/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /htbin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgibin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgis/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /scripts/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-win/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /fcgi-bin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-exe/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-home/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-perl/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /scgi-bin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-bin-sdb/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-mod/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi.cgi/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /webcgi/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi-914/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi-915/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /bin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /mpcgi/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /ows-bin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi-sys/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi-local/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /htbin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgibin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgis/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /scripts/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi-win/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /fcgi-bin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi-exe/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi-home/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi-perl/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /scgi-bin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi-bin-sdb/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi-mod/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
- + /cgi.cgi/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /webcgi/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi-914/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi-915/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /mpcgi/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /ows-bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi-sys/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi-local/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /htbin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgibin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgis/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /scripts/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi-win/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /fcgi-bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi-exe/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi-home/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi-perl/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /scgi-bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi-bin-sdb/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi-mod/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
- + /cgi.cgi/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /webcgi/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgi-914/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgi-915/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /bin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgi/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /mpcgi/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /ows-bin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgi-sys/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgi-local/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /htbin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgibin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgis/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /scripts/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgi-win/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /fcgi-bin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgi-exe/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgi-home/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgi-perl/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /scgi-bin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgi-bin-sdb/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + /cgi-mod/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
- + OSVDB-637: /~root/: Allowed to browse root's home directory.
- + /forums//admin/config.php: PHP Config file may contain database IDs and passwords.
- + /forums//adm/config.php: PHP Config file may contain database IDs and passwords.
- + /forums//administrator/config.php: PHP Config file may contain database IDs and passwords.
- + /forums/config.php: PHP Config file may contain database IDs and passwords.
- + /guestbook/guestbookdat: PHP-Gastebuch 1.60 Beta reveals sensitive information about its configuration.
- + /guestbook/pwd: PHP-Gastebuch 1.60 Beta reveals the md5 hash of the admin password.
- + /help/: Help directory should not be accessible
- + OSVDB-2411: /hola/admin/cms/htmltags.php?datei=./sec/data.php: hola-cms-1.2.9-10 may reveal the administrator ID and password.
- + OSVDB-8103: /global.inc: PHP-Survey's include file should not be available via the web. Configure the web server to ignore .inc files or change this to global.inc.php
- + OSVDB-59620: /inc/common.load.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
- + OSVDB-59619: /inc/config.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
- + OSVDB-59618: /inc/dbase.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
- + /cgi.cgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /webcgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi-914/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi-915/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /mpcgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /ows-bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi-sys/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi-local/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /htbin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgibin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgis/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /scripts/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi-win/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /fcgi-bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi-exe/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi-home/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi-perl/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /scgi-bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi-bin-sdb/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi-mod/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
- + /cgi.cgi/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /webcgi/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-914/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-915/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /mpcgi/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /ows-bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-sys/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-local/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /htbin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgibin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgis/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /scripts/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-win/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /fcgi-bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-exe/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-home/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-perl/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /scgi-bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-bin-sdb/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-mod/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi.cgi/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /webcgi/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-914/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-915/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /bin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /mpcgi/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /ows-bin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-sys/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-local/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /htbin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgibin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgis/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /scripts/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-win/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /fcgi-bin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-exe/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-home/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-perl/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /scgi-bin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-bin-sdb/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi-mod/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
- + /cgi.cgi/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /webcgi/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi-914/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi-915/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /mpcgi/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /ows-bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi-sys/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi-local/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /htbin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgibin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgis/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /scripts/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi-win/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /fcgi-bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi-exe/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi-home/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi-perl/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /scgi-bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi-bin-sdb/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi-mod/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
- + /cgi.cgi/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /webcgi/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi-914/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi-915/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /bin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /mpcgi/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /ows-bin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi-sys/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi-local/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /htbin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgibin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgis/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /scripts/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi-win/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /fcgi-bin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi-exe/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi-home/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi-perl/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /scgi-bin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi-bin-sdb/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi-mod/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi.cgi/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /webcgi/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi-914/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi-915/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /bin/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /mpcgi/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /ows-bin/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi-sys/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi-local/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /htbin/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgibin/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgis/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /scripts/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi-win/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /fcgi-bin/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi-exe/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi-home/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi-perl/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /scgi-bin/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi-bin-sdb/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi-mod/guestbook.pl: May allow attackers to execute commands as the web daemon.
- + /cgi.cgi/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /webcgi/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgi-914/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgi-915/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /bin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgi/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /mpcgi/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /ows-bin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgi-sys/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgi-local/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /htbin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgibin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgis/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /scripts/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgi-win/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /fcgi-bin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgi-exe/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgi-home/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgi-perl/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /scgi-bin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgi-bin-sdb/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + /cgi-mod/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
- + OSVDB-2703: /geeklog/users.php: Geeklog prior to 1.3.8-1sr2 contains a SQL injection vulnerability that lets a remote attacker reset admin password.
- + OSVDB-8204: /gb/index.php?login=true: gBook may allow admin login by setting the value 'login' equal to 'true'.
- + /guestbook/admin.php: Guestbook admin page available without authentication.
- + /cgi.cgi/gH.cgi: Web backdoor by gH
- + /webcgi/gH.cgi: Web backdoor by gH
- + /cgi-914/gH.cgi: Web backdoor by gH
- + /cgi-915/gH.cgi: Web backdoor by gH
- + /bin/gH.cgi: Web backdoor by gH
- + /cgi/gH.cgi: Web backdoor by gH
- + /mpcgi/gH.cgi: Web backdoor by gH
- + /ows-bin/gH.cgi: Web backdoor by gH
- + /cgi-sys/gH.cgi: Web backdoor by gH
- + /cgi-local/gH.cgi: Web backdoor by gH
- + /htbin/gH.cgi: Web backdoor by gH
- + /cgibin/gH.cgi: Web backdoor by gH
- + /cgis/gH.cgi: Web backdoor by gH
- + /scripts/gH.cgi: Web backdoor by gH
- + /cgi-win/gH.cgi: Web backdoor by gH
- + /fcgi-bin/gH.cgi: Web backdoor by gH
- + /cgi-exe/gH.cgi: Web backdoor by gH
- + /cgi-home/gH.cgi: Web backdoor by gH
- + /cgi-perl/gH.cgi: Web backdoor by gH
- + /scgi-bin/gH.cgi: Web backdoor by gH
- + /cgi-bin-sdb/gH.cgi: Web backdoor by gH
- + /cgi-mod/gH.cgi: Web backdoor by gH
- + /cgi.cgi/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /webcgi/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-914/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-915/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /bin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /mpcgi/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /ows-bin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-sys/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-local/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /htbin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgibin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgis/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /scripts/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-win/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /fcgi-bin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-exe/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-home/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-perl/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /scgi-bin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-bin-sdb/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-mod/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /getaccess: This may be an indication that the server is running getAccess for SSO
- + /cgi.cgi/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /webcgi/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-914/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-915/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /bin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /mpcgi/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /ows-bin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-sys/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-local/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /htbin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgibin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgis/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /scripts/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-win/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /fcgi-bin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-exe/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-home/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-perl/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /scgi-bin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-bin-sdb/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi-mod/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
- + /cgi.cgi/AT-admin.cgi: Admin interface...
- + /webcgi/AT-admin.cgi: Admin interface...
- + /cgi-914/AT-admin.cgi: Admin interface...
- + /cgi-915/AT-admin.cgi: Admin interface...
- + /bin/AT-admin.cgi: Admin interface...
- + /cgi/AT-admin.cgi: Admin interface...
- + /mpcgi/AT-admin.cgi: Admin interface...
- + /ows-bin/AT-admin.cgi: Admin interface...
- + /cgi-sys/AT-admin.cgi: Admin interface...
- + /cgi-local/AT-admin.cgi: Admin interface...
- + /htbin/AT-admin.cgi: Admin interface...
- + /cgibin/AT-admin.cgi: Admin interface...
- + /cgis/AT-admin.cgi: Admin interface...
- + /scripts/AT-admin.cgi: Admin interface...
- + /cgi-win/AT-admin.cgi: Admin interface...
- + /fcgi-bin/AT-admin.cgi: Admin interface...
- + /cgi-exe/AT-admin.cgi: Admin interface...
- + /cgi-home/AT-admin.cgi: Admin interface...
- + /cgi-perl/AT-admin.cgi: Admin interface...
- + /scgi-bin/AT-admin.cgi: Admin interface...
- + /cgi-bin-sdb/AT-admin.cgi: Admin interface...
- + /cgi-mod/AT-admin.cgi: Admin interface...
- + OSVDB-17111: /cgi.cgi/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /webcgi/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgi-914/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgi-915/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /bin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgi/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /mpcgi/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /ows-bin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgi-sys/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgi-local/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /htbin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgibin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgis/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /scripts/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgi-win/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /fcgi-bin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgi-exe/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgi-home/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgi-perl/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /scgi-bin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgi-bin-sdb/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + OSVDB-17111: /cgi-mod/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
- + /cgi.cgi/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /webcgi/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-914/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-915/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /mpcgi/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /ows-bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-sys/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-local/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /htbin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgibin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgis/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /scripts/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-win/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /fcgi-bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-exe/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-home/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-perl/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /scgi-bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-bin-sdb/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-mod/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi.cgi/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /webcgi/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-914/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-915/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /mpcgi/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /ows-bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-sys/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-local/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /htbin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgibin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgis/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /scripts/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-win/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /fcgi-bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-exe/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-home/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-perl/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /scgi-bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-bin-sdb/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cgi-mod/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
- + /cfdocs/expeval/openfile.cfm: Can use to expose the system/server path.
- + /cgi.cgi/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /webcgi/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-914/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-915/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /bin/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /mpcgi/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /ows-bin/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-sys/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-local/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /htbin/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgibin/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgis/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /scripts/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-win/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /fcgi-bin/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-exe/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-home/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-perl/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /scgi-bin/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-bin-sdb/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-mod/banner.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi.cgi/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /webcgi/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-914/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-915/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /bin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /mpcgi/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /ows-bin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-sys/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-local/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /htbin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgibin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgis/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /scripts/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-win/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /fcgi-bin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-exe/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-home/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-perl/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /scgi-bin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-bin-sdb/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi-mod/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
- + /cgi.cgi/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /webcgi/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi-914/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi-915/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /mpcgi/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /ows-bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi-sys/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi-local/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /htbin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgibin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgis/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /scripts/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi-win/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /fcgi-bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi-exe/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi-home/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi-perl/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /scgi-bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi-bin-sdb/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi-mod/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
- + /cgi.cgi/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /webcgi/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi-914/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi-915/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /bin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /mpcgi/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /ows-bin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi-sys/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi-local/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /htbin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgibin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgis/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /scripts/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi-win/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /fcgi-bin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi-exe/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi-home/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi-perl/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /scgi-bin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi-bin-sdb/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi-mod/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
- + /cgi.cgi/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /webcgi/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgi-914/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgi-915/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /bin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgi/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /mpcgi/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /ows-bin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgi-sys/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgi-local/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /htbin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgibin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgis/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /scripts/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgi-win/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /fcgi-bin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgi-exe/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgi-home/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgi-perl/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /scgi-bin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgi-bin-sdb/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /cgi-mod/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
- + /tsweb/: Microsoft TSAC found. http://www.dslwebserver.com/main/fr_index.html?/main/sbs-Terminal-Services-Advanced-Client-Configuration.html
- + /cgi.cgi/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /webcgi/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgi-914/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgi-915/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /bin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgi/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /mpcgi/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /ows-bin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgi-sys/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgi-local/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /htbin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgibin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgis/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /scripts/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgi-win/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /fcgi-bin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgi-exe/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgi-home/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgi-perl/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /scgi-bin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgi-bin-sdb/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /cgi-mod/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
- + /vgn/performance/TMT: Vignette CMS admin/maintenance script available.
- + /vgn/performance/TMT/Report: Vignette CMS admin/maintenance script available.
- + /vgn/performance/TMT/Report/XML: Vignette CMS admin/maintenance script available.
- + /vgn/performance/TMT/reset: Vignette CMS admin/maintenance script available.
- + /vgn/ppstats: Vignette CMS admin/maintenance script available.
- + /vgn/previewer: Vignette CMS admin/maintenance script available.
- + /vgn/record/previewer: Vignette CMS admin/maintenance script available.
- + /vgn/stylepreviewer: Vignette CMS admin/maintenance script available.
- + /vgn/vr/Deleting: Vignette CMS admin/maintenance script available.
- + /vgn/vr/Editing: Vignette CMS admin/maintenance script available.
- + /vgn/vr/Saving: Vignette CMS admin/maintenance script available.
- + /vgn/vr/Select: Vignette CMS admin/maintenance script available.
- + /scripts/iisadmin/bdir.htr: This default script shows host info, may allow file browsing and buffer a overrun in the Chunked Encoding data transfer mechanism, request /scripts/iisadmin/bdir.htr??c:\<dirs> . http://www.microsoft.com/technet/security/bulletin/MS02-028.asp. http://www.cert.org/advisories/CA-2002-09.html.
- + /scripts/iisadmin/ism.dll: Allows you to mount a brute force attack on passwords
- + /scripts/tools/ctss.idc: This CGI allows remote users to view and modify SQL DB contents, server paths, docroot and more.
- + /bigconf.cgi: BigIP Configuration CGI
- + /blah_badfile.shtml: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.
- + OSVDB-4910: /vgn/style: Vignette server may reveal system information through this file.
- + OSVDB-17653: /SiteServer/Admin/commerce/foundation/domain.asp: Displays known domains of which that server is involved.
- + OSVDB-17654: /SiteServer/Admin/commerce/foundation/driver.asp: Displays a list of installed ODBC drivers.
- + OSVDB-17655: /SiteServer/Admin/commerce/foundation/DSN.asp: Displays all DSNs configured for selected ODBC drivers.
- + OSVDB-17652: /SiteServer/admin/findvserver.asp: Gives a list of installed Site Server components.
- + /SiteServer/Admin/knowledge/dsmgr/default.asp: Used to view current search catalog configurations
- + OSVDB-1909: /cgi.cgi/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /webcgi/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgi-914/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgi-915/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /bin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgi/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /mpcgi/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /ows-bin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgi-sys/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgi-local/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /htbin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgibin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgis/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /scripts/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgi-win/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /fcgi-bin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgi-exe/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgi-home/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgi-perl/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /scgi-bin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgi-bin-sdb/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-1909: /cgi-mod/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
- + OSVDB-2878: /cgi.cgi/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /webcgi/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgi-914/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgi-915/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgi/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /mpcgi/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /ows-bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgi-sys/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgi-local/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /htbin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgibin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgis/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /scripts/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgi-win/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /fcgi-bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgi-exe/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgi-home/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgi-perl/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /scgi-bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgi-bin-sdb/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + OSVDB-2878: /cgi-mod/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
- + /basilix/mbox-list.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'message list' function/page
- + /basilix/message-read.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'read message' function/page
- + /clusterframe.jsp: Macromedia JRun 4 build 61650 remote administration interface is vulnerable to several XSS attacks.
- + /IlohaMail/blank.html: IlohaMail 0.8.10 contains a XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
- + /bb-dnbd/faxsurvey: This may allow arbitrary command execution.
- + /cartcart.cgi: If this is Dansie Shopping Cart 3.0.8 or earlier, it contains a backdoor to allow attackers to execute arbitrary commands.
- + OSVDB-6591: /scripts/Carello/Carello.dll: Carello 1.3 may allow commands to be executed on the server by replacing hidden form elements. This could not be tested by Nikto.
- + /scripts/tools/dsnform.exe: Allows creation of ODBC Data Source
- + /scripts/tools/dsnform: Allows creation of ODBC Data Source
- + OSVDB-17656: /SiteServer/Admin/knowledge/dsmgr/users/GroupManager.asp: Used to create, modify, and potentially delete LDAP users and groups.
- + OSVDB-17657: /SiteServer/Admin/knowledge/dsmgr/users/UserManager.asp: Used to create, modify, and potentially delete LDAP users and groups.
- + /prd.i/pgen/: Has MS Merchant Server 1.0
- + /readme.eml: Remote server may be infected with the Nimda virus.
- + /scripts/httpodbc.dll: Possible IIS backdoor found.
- + /scripts/proxy/w3proxy.dll: MSProxy v1.0 installed
- + /SiteServer/admin/: Site Server components admin. Default account may be 'LDAP_Anonymous', pass is 'LdapPassword_1'. see http://www.wiretrip.net/rfp/p/doc.asp/i1/d69.htm
- + /siteseed/: Siteseed pre 1.4.2 has 'major' security problems.
- + /pccsmysqladm/incs/dbconnect.inc: This file should not be accessible, as it contains database connectivity information. Upgrade to version 1.2.5 or higher.
- + /iisadmin/: Access to /iisadmin should be restricted to localhost or allowed hosts only.
- + /PDG_Cart/oder.log: Shopping cart software log
- + /ows/restricted%2eshow: OWS may allow restricted files to be viewed by replacing a character with its encoded equivalent.
- + /WEB-INF./web.xml: Multiple implementations of j2ee servlet containers allow files to be retrieved from WEB-INF by appending a '.' to the directory name. Products include Sybase EA Service, Oracle Containers, Orion, JRun, HPAS, Pramati and others. See http://www.westpoint.l
- + /view_source.jsp: Resin 2.1.2 view_source.jsp allows any file on the system to be viewed by using \..\ directory traversal. This script may be vulnerable.
- + /w-agora/: w-agora pre 4.1.4 may allow a remote user to execute arbitrary PHP scripts via URL includes in include/*.php and user/*.php files. Default account is 'admin' but password set during install.
- + OSVDB-42680: /vider.php3: MySimpleNews may allow deleting of news items without authentication.
- + OSVDB-6181: /officescan/cgi/cgiChkMasterPwd.exe: Trend Micro Officescan allows you to skip the login page and access some CGI programs directly.
- + /cgi.cgi/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /webcgi/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi-914/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi-915/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /bin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /mpcgi/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /ows-bin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi-sys/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi-local/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /htbin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgibin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgis/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /scripts/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi-win/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /fcgi-bin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi-exe/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi-home/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi-perl/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /scgi-bin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi-bin-sdb/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi-mod/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
- + /cgi.cgi/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /webcgi/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgi-914/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgi-915/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /bin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgi/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /mpcgi/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /ows-bin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgi-sys/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgi-local/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /htbin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgibin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgis/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /scripts/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgi-win/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /fcgi-bin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgi-exe/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgi-home/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgi-perl/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /scgi-bin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgi-bin-sdb/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + /cgi-mod/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
- + OSVDB-2017: /cgi.cgi/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /webcgi/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgi-914/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgi-915/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /bin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgi/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /mpcgi/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /ows-bin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgi-sys/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgi-local/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /htbin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgibin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgis/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /scripts/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgi-win/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /fcgi-bin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgi-exe/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgi-home/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgi-perl/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /scgi-bin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgi-bin-sdb/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + OSVDB-2017: /cgi-mod/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
- + /cgi.cgi/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /webcgi/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-914/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-915/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /bin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /mpcgi/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /ows-bin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-sys/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-local/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /htbin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgibin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgis/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /scripts/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-win/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /fcgi-bin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-exe/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-home/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-perl/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /scgi-bin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-bin-sdb/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-mod/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi.cgi/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /webcgi/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-914/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-915/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /bin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /mpcgi/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /ows-bin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-sys/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-local/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /htbin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgibin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgis/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /scripts/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-win/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /fcgi-bin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-exe/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-home/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-perl/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /scgi-bin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-bin-sdb/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-mod/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi.cgi/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /webcgi/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-914/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-915/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /bin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /mpcgi/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /ows-bin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-sys/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-local/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /htbin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgibin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgis/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /scripts/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-win/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /fcgi-bin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-exe/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-home/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-perl/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /scgi-bin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-bin-sdb/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + /cgi-mod/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
- + OSVDB-11740: /cgi.cgi/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /webcgi/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgi-914/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgi-915/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /bin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgi/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /mpcgi/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /ows-bin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgi-sys/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgi-local/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /htbin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgibin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgis/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /scripts/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgi-win/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /fcgi-bin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgi-exe/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgi-home/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgi-perl/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /scgi-bin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgi-bin-sdb/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11740: /cgi-mod/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi.cgi/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /webcgi/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi-914/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi-915/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /bin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /mpcgi/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /ows-bin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi-sys/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi-local/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /htbin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgibin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgis/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /scripts/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi-win/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /fcgi-bin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi-exe/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi-home/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi-perl/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /scgi-bin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi-bin-sdb/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + OSVDB-11741: /cgi-mod/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
- + /cgi.cgi/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /webcgi/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgi-914/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgi-915/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /bin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgi/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /mpcgi/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /ows-bin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgi-sys/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgi-local/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /htbin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgibin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgis/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /scripts/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgi-win/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /fcgi-bin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgi-exe/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgi-perl/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /scgi-bin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgi-bin-sdb/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgi-mod/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
- + /cgi.cgi/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /webcgi/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgi-914/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgi-915/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /bin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgi/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /mpcgi/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /ows-bin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgi-sys/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgi-local/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /htbin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgibin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgis/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /scripts/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgi-win/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /fcgi-bin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgi-exe/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgi-home/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgi-perl/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /scgi-bin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgi-bin-sdb/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /cgi-mod/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
- + /pbserver/pbserver.dll: This may contain a buffer overflow. http://www.microsoft.com/technet/security/bulletin/http://www.microsoft.com/technet/security/bulletin/ms00-094.asp.asp
- + /administrator/gallery/uploadimage.php: Mambo PHP Portal/Server 4.0.12 BETA and below may allow upload of any file type simply putting '.jpg' before the real file extension.
- + /pafiledb/includes/team/file.php: paFileDB 3.1 and below may allow file upload without authentication.
- + /phpEventCalendar/file_upload.php: phpEventCalendar 1.1 and prior are vulnerable to file upload bug.
- + /servlet/com.unify.servletexec.UploadServlet: This servlet allows attackers to upload files to the server.
- + /cgi.cgi/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /webcgi/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgi-914/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgi-915/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /bin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgi/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /mpcgi/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /ows-bin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgi-sys/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgi-local/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /htbin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgibin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgis/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /scripts/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgi-win/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /fcgi-bin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgi-exe/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgi-home/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgi-perl/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /scgi-bin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgi-bin-sdb/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /cgi-mod/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
- + /scripts/cpshost.dll: Posting acceptor possibly allows you to upload files
- + /upload.asp: An ASP page that allows attackers to upload files to server
- + /uploadn.asp: An ASP page that allows attackers to upload files to server
- + /uploadx.asp: An ASP page that allows attackers to upload files to server
- + /wa.exe: An ASP page that allows attackers to upload files to server
- + /basilix/compose-attach.php3: BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads
- + /server/: Possibly Macromedia JRun or CRX WebDAV upload
- + /cgi.cgi/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /webcgi/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgi-914/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgi-915/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /bin/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgi/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /mpcgi/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /ows-bin/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgi-sys/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgi-local/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /htbin/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgibin/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgis/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /scripts/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgi-win/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /fcgi-bin/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgi-exe/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgi-home/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgi-perl/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /scgi-bin/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgi-bin-sdb/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /cgi-mod/fpsrvadm.exe: Potentially vulnerable CGI program.
- + /vgn/ac/data: Vignette CMS admin/maintenance script available.
- + /vgn/ac/delete: Vignette CMS admin/maintenance script available.
- + /vgn/ac/edit: Vignette CMS admin/maintenance script available.
- + /vgn/ac/esave: Vignette CMS admin/maintenance script available.
- + /vgn/ac/fsave: Vignette CMS admin/maintenance script available.
- + /vgn/ac/index: Vignette CMS admin/maintenance script available.
- + /vgn/asp/MetaDataUpdate: Vignette CMS admin/maintenance script available.
- + /vgn/asp/previewer: Vignette CMS admin/maintenance script available.
- + /vgn/asp/status: Vignette CMS admin/maintenance script available.
- + /vgn/asp/style: Vignette CMS admin/maintenance script available.
- + /vgn/errors: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/controller: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/errorpage: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/initialize: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/jspstatus: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/jspstatus56: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/metadataupdate: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/previewer: Vignette CMS admin/maintenance script available.
- + /vgn/jsp/style: Vignette CMS admin/maintenance script available.
- + /vgn/legacy/edit: Vignette CMS admin/maintenance script available.
- + /vgn/login: Vignette server may allow user enumeration based on the login attempts to this file.
- + /cgi.cgi/.cobalt: May allow remote admin of CGI scripts.
- + /webcgi/.cobalt: May allow remote admin of CGI scripts.
- + /cgi-914/.cobalt: May allow remote admin of CGI scripts.
- + /cgi-915/.cobalt: May allow remote admin of CGI scripts.
- + /bin/.cobalt: May allow remote admin of CGI scripts.
- + /cgi/.cobalt: May allow remote admin of CGI scripts.
- + /mpcgi/.cobalt: May allow remote admin of CGI scripts.
- + /ows-bin/.cobalt: May allow remote admin of CGI scripts.
- + /cgi-sys/.cobalt: May allow remote admin of CGI scripts.
- + /cgi-local/.cobalt: May allow remote admin of CGI scripts.
- + /htbin/.cobalt: May allow remote admin of CGI scripts.
- + /cgibin/.cobalt: May allow remote admin of CGI scripts.
- + /cgis/.cobalt: May allow remote admin of CGI scripts.
- + /scripts/.cobalt: May allow remote admin of CGI scripts.
- + /cgi-win/.cobalt: May allow remote admin of CGI scripts.
- + /fcgi-bin/.cobalt: May allow remote admin of CGI scripts.
- + /cgi-exe/.cobalt: May allow remote admin of CGI scripts.
- + /cgi-home/.cobalt: May allow remote admin of CGI scripts.
- + /cgi-perl/.cobalt: May allow remote admin of CGI scripts.
- + /scgi-bin/.cobalt: May allow remote admin of CGI scripts.
- + /cgi-bin-sdb/.cobalt: May allow remote admin of CGI scripts.
- + /cgi-mod/.cobalt: May allow remote admin of CGI scripts.
- + OSVDB-35707: /forum/admin/wwforum.mdb: Web Wiz Forums password database found.
- + /fpdb/shop.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
- + OSVDB-52975: /guestbook/admin/o12guest.mdb: Ocean12 ASP Guestbook Manager allows download of SQL database which contains admin password.
- + OSVDB-15971: /midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
- + OSVDB-15971: /MIDICART/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
- + OSVDB-41850: /mpcsoftweb_guestbook/database/mpcsoftweb_guestdata.mdb: MPCSoftWeb Guest Book passwords retrieved.
- + /news/news.mdb: Web Wiz Site News release v3.06 admin password database is available and unencrypted.
- + OSVDB-53413: /shopping300.mdb: VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.
- + OSVDB-53413: /shopping400.mdb: VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.
- + OSVDB-15971: /shoppingdirectory/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
- + OSVDB-4398: /database/db2000.mdb: Max Web Portal database is available remotely. It should be moved from the default location to a directory outside the web root.
- + OSVDB-319: /cgi.cgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /webcgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgi-914/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgi-915/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /mpcgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /ows-bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgi-sys/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgi-local/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /htbin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgibin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgis/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /scripts/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgi-win/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /fcgi-bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgi-exe/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgi-home/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgi-perl/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /scgi-bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgi-bin-sdb/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + OSVDB-319: /cgi-mod/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
- + /admin/config.php: PHP Config file may contain database IDs and passwords.
- + /adm/config.php: PHP Config file may contain database IDs and passwords.
- + /administrator/config.php: PHP Config file may contain database IDs and passwords.
- + /cgi.cgi/.access: Contains authorization information
- + /webcgi/.access: Contains authorization information
- + /cgi-914/.access: Contains authorization information
- + /cgi-915/.access: Contains authorization information
- + /bin/.access: Contains authorization information
- + /cgi/.access: Contains authorization information
- + /mpcgi/.access: Contains authorization information
- + /ows-bin/.access: Contains authorization information
- + /cgi-sys/.access: Contains authorization information
- + /cgi-local/.access: Contains authorization information
- + /htbin/.access: Contains authorization information
- + /cgibin/.access: Contains authorization information
- + /cgis/.access: Contains authorization information
- + /scripts/.access: Contains authorization information
- + /cgi-win/.access: Contains authorization information
- + /fcgi-bin/.access: Contains authorization information
- + /cgi-exe/.access: Contains authorization information
- + /cgi-home/.access: Contains authorization information
- + /cgi-perl/.access: Contains authorization information
- + /scgi-bin/.access: Contains authorization information
- + /cgi-bin-sdb/.access: Contains authorization information
- + /cgi-mod/.access: Contains authorization information
- + OSVDB-11093: /cgi.cgi/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /webcgi/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi-914/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi-915/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /bin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /mpcgi/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi-bin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /ows-bin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi-sys/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi-local/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /htbin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgibin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgis/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /scripts/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi-win/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /fcgi-bin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi-exe/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi-home/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi-perl/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /scgi-bin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi-bin-sdb/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + OSVDB-11093: /cgi-mod/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
- + ERROR: Error limit (20) reached for host, giving up. Last error: error reading HTTP response
- + Scan terminated: 11 error(s) and 1379 item(s) reported on remote host
- + End Time: 2018-04-24 20:24:24 (GMT-4) (2504 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- Scan date: 24-4-2018 19:42:39
- =======================================================================================================================================
- | Domain: http://notes.io/
- | Server: Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
- | IP: 77.223.131.30
- =======================================================================================================================================
- |
- | Directory check:
- | Skipped because http://notes.io/uniscan466/ did not return the code 404
- =======================================================================================================================================
- |
- | File check:
- | Skipped because http://notes.io/uniscan202/ did not return the code 404
- =======================================================================================================================================
- |
- | Check robots.txt:
- | [+] User-agent: *
- | [+] Disallow: /api/
- | [+] Disallow: /temp/
- | [+] Disallow: /short.php
- | [+] Disallow: /favicon.ico
- |
- | Check sitemap.xml:
- =======================================================================================================================================
- |
- | Crawler Started:
- | Plugin name: E-mail Detection v.1.1 Loaded.
- | Plugin name: phpinfo() Disclosure v.1 Loaded.
- | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
- | Plugin name: FCKeditor upload test v.1 Loaded.
- | Plugin name: Upload Form Detect v.1.1 Loaded.
- | Plugin name: External Host Detect v.1.2 Loaded.
- | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
- | Plugin name: Code Disclosure v.1.1 Loaded.
- | [+] Crawling finished, 37 URL's found!
- |
- | E-mails:
- | [+] E-mail Found: hello@notes.io
- |
- | PHPinfo() Disclosure:
- |
- | Timthumb:
- |
- | FCKeditor File Upload:
- |
- | File Upload Forms:
- | [+] Upload Form Found: http://notes.io//api/apiTest.php
- |
- | External hosts:
- | [+] External Host Found: http://www.iosprogramlama.com
- |
- | Web Backdoors:
- |
- | Source Code Disclosure:
- |
- | Ignored Files:
- #######################################################################################################################################
- Server: 10.211.254.254
- Address: 10.211.254.254#53
- Non-authoritative answer:
- Name: notes.io
- Address: 77.223.131.30
- notes.io has address 77.223.131.30
- notes.io mail is handled by 10 aspmx.l.google.com.
- notes.io mail is handled by 20 alt2.aspmx.l.google.com.
- notes.io mail is handled by 30 aspmx3.googlemail.com.
- notes.io mail is handled by 30 aspmx2.googlemail.com.
- notes.io mail is handled by 30 aspmx5.googlemail.com.
- notes.io mail is handled by 30 aspmx4.googlemail.com.
- notes.io mail is handled by 20 alt1.aspmx.l.google.com.
- #######################################################################################################################################
- [-] fingerprint:snmp: need UDP port 161 open
- Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
- [+] Target is notes.io
- [+] Loading modules.
- [+] Following modules are loaded:
- [x] [1] ping:icmp_ping - ICMP echo discovery module
- [x] [2] ping:tcp_ping - TCP-based ping discovery module
- [x] [3] ping:udp_ping - UDP-based ping discovery module
- [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
- [x] [5] infogather:portscan - TCP and UDP PortScanner
- [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
- [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
- [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
- [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
- [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
- [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
- [x] [12] fingerprint:smb - SMB fingerprinting module
- [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
- [+] 13 modules registered
- [+] Initializing scan engine
- [+] Running scan engine
- [-] ping:tcp_ping module: no closed/open TCP ports known on 77.223.131.30. Module test failed
- [-] ping:udp_ping module: no closed/open UDP ports known on 77.223.131.30. Module test failed
- [-] No distance calculation. 77.223.131.30 appears to be dead or no ports known
- [+] Host: 77.223.131.30 is up (Guess probability: 50%)
- [+] Target: 77.223.131.30 is alive. Round-Trip Time: 0.49569 sec
- [+] Selected safe Round-Trip Time value is: 0.99138 sec
- [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
- [-] fingerprint:smb need either TCP port 139 or 445 to run
- [+] Primary guess:
- [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
- [+] Other guesses:
- [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
- [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
- [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
- [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
- [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
- [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
- [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
- [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
- [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
- [+] Cleaning up scan engine
- [+] Modules deinitialized
- [+] Execution completed.
- #######################################################################################################################################
- Domain Name: NOTES.IO
- Registry Domain ID: D503300000040582279-LRMS
- Registrar WHOIS Server: whois.rrpproxy.net
- Registrar URL: http://www.key-systems.net
- Updated Date: 2017-08-12T11:36:08Z
- Creation Date: 2010-08-13T21:49:24Z
- Registry Expiry Date: 2018-08-13T21:49:24Z
- Registrar Registration Expiration Date:
- Registrar: Key-Systems GmbH
- Registrar IANA ID: 269
- Registrar Abuse Contact Email: abuse@key-systems.net
- Registrar Abuse Contact Phone: +49.68949396850
- Reseller:
- Domain Status: ok https://icann.org/epp#ok
- Registrant Name: Domain Registrar
- Registrant Organization: METROMEDYA Digital Ad Agency
- Name Server: NS2.METROMEDYA.COM
- Name Server: NS1.METROMEDYA.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of WHOIS database: 2018-04-24T23:40:54Z <<<
- #######################################################################################################################################
- ; <<>> DiG 9.11.3-1-Debian <<>> -x notes.io
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14720
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;io.notes.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2018013358 1800 900 604800 3600
- ;; Query time: 265 msec
- ;; SERVER: 10.211.254.254#53(10.211.254.254)
- ;; WHEN: Tue Apr 24 19:41:55 EDT 2018
- ;; MSG SIZE rcvd: 118
- Smartmatch is experimental at /usr/bin/dnsenum line 698.
- Smartmatch is experimental at /usr/bin/dnsenum line 698.
- AXFR record query failed: REFUSED
- AXFR record query failed: REFUSED
- dnsenum VERSION:1.2.4
- ----- notes.io -----
- Host's addresses:
- __________________
- notes.io. 3593 IN A 77.223.131.30
- Name Servers:
- ______________
- ns1.metromedya.com. 3591 IN A 77.223.131.34
- ns2.metromedya.com. 3591 IN A 77.223.131.35
- Mail (MX) Servers:
- ___________________
- aspmx.l.google.com. 293 IN A 108.177.112.26
- alt2.ASPMX.l.google.com. 124 IN A 74.125.141.27
- aspmx3.googlemail.com. 293 IN A 74.125.141.27
- aspmx2.googlemail.com. 293 IN A 108.177.122.27
- aspmx5.googlemail.com. 293 IN A 209.85.202.27
- aspmx4.googlemail.com. 293 IN A 64.233.186.27
- alt1.ASPMX.l.google.com. 122 IN A 209.85.144.27
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for notes.io on ns2.metromedya.com ...
- Trying Zone Transfer for notes.io on ns1.metromedya.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [-] Enumerating subdomains now for notes.io
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- Virustotal: blog.notes.io
- Virustotal: www.notes.io
- [-] Saving results to file: /usr/share/sniper/loot/notes.io/domains/domains-notes.io.txt
- [-] Total Unique Subdomains Found: 2
- www.notes.io
- blog.notes.io
- Identifying nameservers for notes.io... Done
- Using nameservers:
- - 77.223.131.35
- - 77.223.131.34
- Checking for wildcard DNS... Done
- Running collector: HackerTarget... Done (1 host)
- Running collector: Shodan... Skipped
- -> Key 'shodan' has not been set
- Running collector: Wayback Machine... Done (2 hosts)
- Running collector: Riddler... Skipped
- -> Key 'riddler_username' has not been set
- Running collector: Certificate Search... Done (0 hosts)
- Running collector: PTRArchive... Done (0 hosts)
- Running collector: Censys... Skipped
- -> Key 'censys_secret' has not been set
- Running collector: Google Transparency Report... Done (0 hosts)
- Running collector: PassiveTotal... Skipped
- -> Key 'passivetotal_key' has not been set
- Running collector: VirusTotal... Skipped
- -> Key 'virustotal' has not been set
- Running collector: Netcraft... Done (0 hosts)
- Running collector: Threat Crowd... Done (0 hosts)
- Running collector: Dictionary... Done (26 hosts)
- Running collector: PublicWWW... Done (0 hosts)
- Running collector: DNSDB... Done (5 hosts)
- Resolving 32 unique hosts...
- 77.223.131.30 .notes.io
- 77.223.131.30 notes.io
- 77.223.131.30 www.notes.io
- Found subnets:
- - 77.223.131.0-255 : 3 hosts
- Wrote 3 hosts to:
- - file:///root/aquatone/notes.io/hosts.txt
- - file:///root/aquatone/notes.io/hosts.json
- __
- ____ _____ ___ ______ _/ /_____ ____ ___
- / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
- / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
- \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
- /_/ takeover v0.5.0 - by @michenriksen
- Loaded 3 hosts from /root/aquatone/notes.io/hosts.json
- Loaded 25 domain takeover detectors
- Identifying nameservers for notes.io... Done
- Using nameservers:
- - 77.223.131.34
- - 77.223.131.35
- Checking hosts for domain takeover vulnerabilities...
- Finished checking hosts:
- - Vulnerable : 0
- - Not Vulnerable : 3
- Wrote 0 potential subdomain takeovers to:
- - file:///root/aquatone/notes.io/takeovers.json
- __
- ____ _____ ___ ______ _/ /_____ ____ ___
- / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
- / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
- \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
- /_/ scan v0.5.0 - by @michenriksen
- Loaded 3 hosts from /root/aquatone/notes.io/hosts.json
- Probing 2 ports...
- 443/tcp 77.223.131.30 .notes.io, notes.io, www.notes.io
- 80/tcp 77.223.131.30 .notes.io, notes.io, www.notes.io
- Wrote open ports to file:///root/aquatone/notes.io/open_ports.txt
- Wrote URLs to file:///root/aquatone/notes.io/urls.txt
- __
- ____ _____ ___ ______ _/ /_____ ____ ___
- / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
- / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
- \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
- /_/ gather v0.5.0 - by @michenriksen
- Processing 6 pages...
- Failed: https://77.223.131.30/ (notes.io) - navigation error ERR_CONNECTION_CLOSED
- Failed: https://77.223.131.30/ (.notes.io) - navigation error ERR_CONNECTION_CLOSED
- Failed: https://77.223.131.30/ (www.notes.io) - navigation error ERR_CONNECTION_CLOSED
- Failed: http://77.223.131.30/ (.notes.io) - navigation error ERR_TOO_MANY_REDIRECTS
- Failed: http://77.223.131.30/ (www.notes.io) - navigation error ERR_TOO_MANY_REDIRECTS
- Processed: http://77.223.131.30/ (notes.io) - 200 OK
- Finished processing pages:
- - Successful : 1
- - Failed : 5
- Generating report...done
- Report pages generated:
- - file:///root/aquatone/notes.io/report/report_page_0.html
- ######################################################################################################################################
- INFO[0000] Starting to process permutations....
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
- INFO[0000] FORBIDDEN http://test-notes.s3.amazonaws.com (http://notes.io)
- INFO[0000] FORBIDDEN http://notes-ops.s3.amazonaws.com (http://notes.io)
- INFO[0000] FORBIDDEN http://notes_production.s3.amazonaws.com (http://notes.io)
- INFO[0001] FORBIDDEN http://notes-logs.s3.amazonaws.com (http://notes.io)
- INFO[0001] FORBIDDEN http://notes-backup.s3.amazonaws.com (http://notes.io)
- INFO[0001] FORBIDDEN http://notes-staging.s3.amazonaws.com (http://notes.io)
- INFO[0002] FORBIDDEN http://notes.s3.amazonaws.com (http://notes.io)
- INFO[0002] FORBIDDEN http://dev-notes.s3.amazonaws.com (http://notes.io)
- INFO[0003] FORBIDDEN http://s3-notes.s3.amazonaws.com (http://notes.io)
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://uploads-notes.s3.us-east-2.amazonaws.com/: dial tcp 52.219.88.120:80: getsockopt: connection refused
- INFO[0003] FORBIDDEN http://aws-notes.s3.amazonaws.com (http://notes.io)
- INFO[0003] FORBIDDEN http://notes-aws.s3.amazonaws.com (http://notes.io)
- INFO[0003] FORBIDDEN http://notes-uploads.s3.amazonaws.com (http://notes.io)
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
- INFO[0004] FORBIDDEN http://share-notes.s3.amazonaws.com (http://notes.io)
- INFO[0004] FORBIDDEN http://es-notes.s3.amazonaws.com (http://notes.io)
- INFO[0004] FORBIDDEN http://app-notes.s3.amazonaws.com (http://notes.io)
- INFO[0005] FORBIDDEN http://project-notes.s3.amazonaws.com (http://notes.io)
- INFO[0005] FORBIDDEN http://notes2.s3.amazonaws.com (http://notes.io)
- INFO[0005] FORBIDDEN http://notes-test.s3.amazonaws.com (http://notes.io)
- INFO[0005] FORBIDDEN http://notes-production.s3.amazonaws.com (http://notes.io)
- INFO[0005] FORBIDDEN http://notes-app.s3.amazonaws.com (http://notes.io)
- INFO[0006] FORBIDDEN http://notes-storage.s3.amazonaws.com (http://notes.io)
- INFO[0006] FORBIDDEN http://bucket-notes.s3.amazonaws.com (http://notes.io)
- INFO[0006] FORBIDDEN http://uploads-notes.s3.amazonaws.com (http://notes.io)
- INFO[0006] FORBIDDEN http://devnotes.s3.amazonaws.com (http://notes.io)
- INFO[0007] FORBIDDEN http://notes-bucket.s3.amazonaws.com (http://notes.io)
- #######################################################################################################################################
- Total hosts: 5
- [-] Resolving hostnames IPs...
- .notes.io : empty
- blog.notes.io : 77.223.131.30
- www.notes.io : 77.223.131.30
- #######################################################################################################################################
- PING notes.io (77.223.131.30) 56(84) bytes of data.
- 64 bytes from 77-223-131-30.ron.com.tr (77.223.131.30): icmp_seq=1 ttl=249 time=455 ms
- --- notes.io ping statistics ---
- 1 packets transmitted, 1 received, 0% packet loss, time 0ms
- rtt min/avg/max/mdev = 455.247/455.247/455.247/0.000 ms
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-04-24 19:47 EDT
- Warning: 77.223.131.30 giving up on port because retransmission cap hit (2).
- Nmap scan report for notes.io (77.223.131.30)
- Host is up (0.34s latency).
- rDNS record for 77.223.131.30: 77-223-131-30.ron.com.tr
- Not shown: 240 closed ports, 6 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 1/tcp open tcpmux
- 7/tcp open echo
- 13/tcp open daytime
- 19/tcp open chargen
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp open telnet
- 42/tcp open nameserver
- 53/tcp open domain
- 79/tcp open finger
- 80/tcp open http
- 85/tcp open mit-ml-dev
- 88/tcp open kerberos-sec
- 110/tcp open pop3
- 111/tcp open rpcbind
- 113/tcp open ident
- 143/tcp open imap
- 161/tcp open snmp
- 179/tcp open bgp
- 222/tcp open rsh-spx
- 389/tcp open ldap
- 402/tcp open genie
- 407/tcp open timbuktu
- 443/tcp open https
- 446/tcp open ddm-rdb
- 512/tcp open exec
- 524/tcp open ncp
- 554/tcp open rtsp
- 587/tcp open submission
- 689/tcp open nmap
- 705/tcp open agentx
- 771/tcp open rtip
- 783/tcp open spamassassin
- 831/tcp open netconf-beep
- 912/tcp open apex-mesh
- 993/tcp open imaps
- 995/tcp open pop3s
- 1030/tcp open iad1
- 1035/tcp open multidropper
- 1099/tcp open rmiregistry
- 1100/tcp open mctp
- 1128/tcp open saphostctrl
- 1129/tcp open saphostctrls
- 1158/tcp open lsnr
- 1199/tcp open dmidi
- 1220/tcp open quicktime
- 1241/tcp open nessus
- 1300/tcp open h323hostcallsc
- 1311/tcp open rxmon
- 1352/tcp open lotusnotes
- 1433/tcp open ms-sql-s
- 1435/tcp open ibm-cics
- 1471/tcp open csdmbase
- 1494/tcp open citrix-ica
- 1530/tcp open rap-service
- 1533/tcp open virtual-places
- 1581/tcp open mil-2045-47001
- 1604/tcp open icabrowser
- 1720/tcp open h323q931
- 1723/tcp open pptp
- 1755/tcp open wms
- 2001/tcp open dc
- 2067/tcp open dlswpn
- 2100/tcp open amiganetfs
- 2199/tcp open onehome-help
- 2207/tcp open hpssd
- 2222/tcp open EtherNetIP-1
- 2323/tcp open 3d-nfsd
- 2638/tcp open sybase
- 2809/tcp open corbaloc
- 2947/tcp open gpsd
- 2967/tcp open symantec-av
- 3000/tcp open ppp
- 3037/tcp open hp-san-mgmt
- 3128/tcp open squid-http
- 3200/tcp open tick-port
- 3273/tcp open sxmp
- 3299/tcp open saprouter
- 3306/tcp open mysql
- 3310/tcp open dyna-access
- 3333/tcp open dec-notes
- 3389/tcp open ms-wbt-server
- 3460/tcp open edm-manager
- 3628/tcp open ept-machine
- 3780/tcp open nnp
- 3790/tcp open quickbooksrds
- 3817/tcp open tapeware
- 3900/tcp open udt_os
- 4322/tcp open trim-event
- 4433/tcp open vop
- 4444/tcp open krb524
- 4445/tcp open upnotifyp
- 4679/tcp open mgesupervision
- 5000/tcp open upnp
- 5009/tcp open airport-admin
- 5227/tcp open perfd
- 5250/tcp open soagateway
- 5351/tcp open nat-pmp
- 5432/tcp open postgresql
- 5498/tcp open unknown
- 5520/tcp open sdlog
- 5521/tcp open unknown
- 5560/tcp open isqlplus
- 5580/tcp open tmosms0
- 5631/tcp open pcanywheredata
- 5632/tcp open pcanywherestat
- 5814/tcp open spt-automation
- 5900/tcp open vnc
- 5905/tcp open unknown
- 5909/tcp open unknown
- 5910/tcp open cm
- 5920/tcp open unknown
- 5985/tcp open wsman
- 5986/tcp open wsmans
- 6000/tcp open X11
- 6060/tcp open x11
- 6080/tcp open gue
- 6101/tcp open backupexec
- 6106/tcp open isdninfo
- 6161/tcp open patrol-ism
- 6503/tcp open boks_clntd
- 6661/tcp open unknown
- 6667/tcp open irc
- 6789/tcp open ibm-db2-admin
- 6905/tcp open unknown
- 7000/tcp open afs3-fileserver
- 7021/tcp open dpserveadmin
- 7071/tcp open iwg1
- 7080/tcp open empowerid
- 7181/tcp open janus-disc
- 7272/tcp open watchme-7272
- 7426/tcp open pmdmgr
- 7547/tcp open cwmp
- 7579/tcp open unknown
- 7770/tcp open unknown
- 7787/tcp open popup-reminders
- 7801/tcp open ssp-client
- 7890/tcp open unknown
- 7902/tcp open tnos-dp
- 8008/tcp open http
- 8014/tcp open unknown
- 8023/tcp open unknown
- 8030/tcp open unknown
- 8051/tcp open rocrail
- 8080/tcp open http-proxy
- 8090/tcp open opsmessaging
- 8091/tcp open jamlink
- 8101/tcp open ldoms-migr
- 8161/tcp open patrol-snmp
- 8180/tcp open unknown
- 8205/tcp open lm-instmgr
- 8300/tcp open tmi
- 8400/tcp open cvd
- 8445/tcp open copy
- 8642/tcp open unknown
- 8888/tcp open sun-answerbook
- 8899/tcp open ospf-lite
- 9001/tcp open tor-orport
- 9002/tcp open dynamid
- 9005/tcp open golem
- 9010/tcp open sdr
- 9050/tcp open tor-socks
- 9080/tcp open glrpc
- 9090/tcp open zeus-admin
- 9256/tcp open unknown
- 9300/tcp open vrace
- 9390/tcp open otp
- 9391/tcp open unknown
- 9495/tcp open unknown
- 9500/tcp open ismserver
- 9810/tcp open unknown
- 9811/tcp open unknown
- 9815/tcp open unknown
- 9855/tcp open unknown
- 9910/tcp open unknown
- 9991/tcp open issa
- 10000/tcp open snet-sensor-mgmt
- 10001/tcp open scp-config
- 10443/tcp open unknown
- 10628/tcp open unknown
- 11000/tcp open irisa
- 11099/tcp open unknown
- 11211/tcp open memcache
- 11234/tcp open unknown
- 11333/tcp open unknown
- 12000/tcp open cce4x
- 12174/tcp open unknown
- 13013/tcp open unknown
- 13500/tcp open unknown
- 13838/tcp open unknown
- 14330/tcp open unknown
- 15001/tcp open unknown
- 16102/tcp open unknown
- 17185/tcp open soundsvirtual
- 17200/tcp open unknown
- 18980/tcp open unknown
- 19300/tcp open unknown
- 20000/tcp open dnp
- 20010/tcp open unknown
- 20031/tcp open unknown
- 20101/tcp open unknown
- 23423/tcp open unknown
- 23472/tcp open unknown
- 23791/tcp open unknown
- 25025/tcp open unknown
- 28784/tcp open unknown
- 32764/tcp open unknown
- 32913/tcp open unknown
- 33000/tcp open unknown
- 34205/tcp open unknown
- 37718/tcp open unknown
- 38292/tcp open landesk-cba
- 41025/tcp open unknown
- 41080/tcp open unknown
- 41523/tcp open unknown
- 41524/tcp open unknown
- 45230/tcp open unknown
- 46824/tcp open unknown
- 47002/tcp open unknown
- 48899/tcp open unknown
- 50001/tcp open unknown
- 50002/tcp open iiimsf
- 50003/tcp open unknown
- 50013/tcp open unknown
- 50502/tcp open unknown
- 50503/tcp open unknown
- 52302/tcp open unknown
- 52869/tcp open unknown
- 53413/tcp open unknown
- 62078/tcp open iphone-sync
- ######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-04-24 19:47 EDT
- Nmap scan report for notes.io (77.223.131.30)
- Host is up (0.47s latency).
- rDNS record for 77.223.131.30: 77-223-131-30.ron.com.tr
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open ntp
- 137/udp open|filtered netbios-ns
- 138/udp open|filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- #######################################################################################################################################
- Anonymous #thecreed JTSEC #OPpedohunt full Recon #2
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement