Advertisement
Guest User

Anonymous #thecreed JTSEC #OPpedohunt full Recon #2

a guest
Apr 24th, 2018
2,254
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 208.49 KB | None | 0 0
  1. ######################################################################################################################################
  2. Hostname notes.io ISP Netdirekt A.S. (AS43391)
  3. Continent Europe Flag
  4. TR
  5. Country Turkey Country Code TR (TUR)
  6. Region Unknown Local time 25 Apr 2018 01:25 +03
  7. City Unknown Latitude 41.021
  8. IP Address 77.223.131.30 Longitude 28.995
  9. ######################################################################################################################################
  10. HostIP:77.223.131.30
  11. HostName:notes.io
  12.  
  13. Gathered Inet-whois information for 77.223.131.30
  14. --------------------------------------------------------------------------------------------------------------------------------------
  15.  
  16.  
  17. inetnum: 77.223.131.0 - 77.223.131.255
  18. netname: NETDIREKT-1
  19. descr: Netdirekt A.S.
  20. country: TR
  21. admin-c: NTD35-RIPE
  22. tech-c: NTD35-RIPE
  23. status: ASSIGNED PA
  24. mnt-by: MNT-NETDIREKT
  25. created: 2009-08-26T11:46:22Z
  26. last-modified: 2011-11-23T08:46:29Z
  27. source: RIPE
  28.  
  29. person: Netdirekt Technical Team
  30. address: Aydinlar Cad. No: 44 Isikkent Bornova Izmir
  31. phone: +90 850 200 88 99
  32. fax-no: +90 850 200 88 98
  33. nic-hdl: NTD35-RIPE
  34. mnt-by: MNT-NETDIREKT
  35. created: 2009-07-15T19:34:33Z
  36. last-modified: 2017-10-30T22:06:06Z
  37. source: RIPE
  38.  
  39. % Information related to '77.223.128.0/20AS43391'
  40.  
  41. route: 77.223.128.0/20
  42. descr: Netdirekt
  43. origin: AS43391
  44. mnt-by: MNT-NETDIREKT
  45. created: 2009-07-03T14:58:25Z
  46. last-modified: 2009-07-15T19:44:11Z
  47. source: RIPE
  48.  
  49. % This query was served by the RIPE Database Query Service version 1.91.2 (WAGYU)
  50.  
  51.  
  52.  
  53. Gathered Inic-whois information for notes.io
  54. --------------------------------------------------------------------------------------------------------------------------------------
  55. Domain Name: NOTES.IO
  56. Registry Domain ID: D503300000040582279-LRMS
  57. Registrar WHOIS Server: whois.rrpproxy.net
  58. Registrar URL: http://www.key-systems.net
  59. Updated Date: 2017-08-12T11:36:08Z
  60. Creation Date: 2010-08-13T21:49:24Z
  61. Registry Expiry Date: 2018-08-13T21:49:24Z
  62. Registrar Registration Expiration Date:
  63. Registrar: Key-Systems GmbH
  64. Registrar IANA ID: 269
  65. Registrar Abuse Contact Email: abuse@key-systems.net
  66. Registrar Abuse Contact Phone: +49.68949396850
  67. Reseller:
  68. Domain Status: ok https://icann.org/epp#ok
  69. Registrant Name: Domain Registrar
  70. Registrant Organization: METROMEDYA Digital Ad Agency
  71. Name Server: NS2.METROMEDYA.COM
  72. Name Server: NS1.METROMEDYA.COM
  73. DNSSEC: unsigned
  74. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  75. >>> Last update of WHOIS database: 2018-04-24T22:38:31Z <<<
  76.  
  77. For more information on Whois status codes, please visit https://icann.org/epp
  78.  
  79. ######################################################################################################################################
  80. [i] Scanning Site: http://notes.io
  81.  
  82.  
  83.  
  84. B A S I C I N F O
  85. ======================================================================================================================================
  86.  
  87.  
  88. [+] Site Title: Online Notes Services | Fast . Easy . Short | Notes.io
  89. [+] IP address: 77.223.131.30
  90. [+] Web Server: Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
  91. [+] CMS: Could Not Detect
  92. [+] Cloudflare: Not Detected
  93. [+] Robots File: Found
  94.  
  95. -------------[ contents ]----------------
  96. User-agent: *
  97. Disallow: /api/
  98. Disallow: /temp/
  99. Disallow: /short.php
  100. Disallow: /favicon.ico
  101. -----------[end of contents]-------------
  102.  
  103.  
  104.  
  105. W H O I S L O O K U P
  106. =======================================================================================================================================
  107.  
  108. Domain Name: NOTES.IO
  109. Registry Domain ID: D503300000040582279-LRMS
  110. Registrar WHOIS Server: whois.rrpproxy.net
  111. Registrar URL: http://www.key-systems.net
  112. Updated Date: 2017-08-12T11:36:08Z
  113. Creation Date: 2010-08-13T21:49:24Z
  114. Registry Expiry Date: 2018-08-13T21:49:24Z
  115. Registrar Registration Expiration Date:
  116. Registrar: Key-Systems GmbH
  117. Registrar IANA ID: 269
  118. Registrar Abuse Contact Email: abuse@key-systems.net
  119. Registrar Abuse Contact Phone: +49.68949396850
  120. Reseller:
  121. Domain Status: ok https://icann.org/epp#ok
  122. Registrant Name: Domain Registrar
  123. Registrant Organization: METROMEDYA Digital Ad Agency
  124. Name Server: NS2.METROMEDYA.COM
  125. Name Server: NS1.METROMEDYA.COM
  126. DNSSEC: unsigned
  127. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  128. >>> Last update of WHOIS database: 2018-04-24T22:38:36Z <<<
  129.  
  130.  
  131.  
  132.  
  133.  
  134. G E O I P L O O K U P
  135. =======================================================================================================================================
  136.  
  137. [i] IP Address: 77.223.131.30
  138. [i] Country: TR
  139. [i] State: N/A
  140. [i] City: N/A
  141. [i] Latitude: 41.021400
  142. [i] Longitude: 28.994801
  143.  
  144.  
  145.  
  146.  
  147. H T T P H E A D E R S
  148. ======================================================================================================================================
  149.  
  150.  
  151. [i] HTTP/1.1 200 OK
  152. [i] Date: Tue, 24 Apr 2018 22:39:39 GMT
  153. [i] Server: Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
  154. [i] X-Powered-By: PHP/5.4.7
  155. [i] Set-Cookie: PHPSESSID=irri28djcvpu8c2tgjlu5g9n51; path=/
  156. [i] Expires: Thu, 19 Nov 1981 08:52:00 GMT
  157. [i] Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
  158. [i] Pragma: no-cache
  159. [i] Content-Length: 7877
  160. [i] Connection: close
  161. [i] Content-Type: text/html
  162.  
  163.  
  164.  
  165.  
  166. D N S L O O K U P
  167. =====================================================================================================================================
  168.  
  169. ;; Truncated, retrying in TCP mode.
  170. notes.io. 3600 IN A 77.223.131.30
  171. notes.io. 3600 IN NS ns1.metromedya.com.
  172. notes.io. 3600 IN NS ns2.metromedya.com.
  173. notes.io. 3600 IN SOA ns1.metromedya.com. hostmaster.metromedya.com. 20100852 900 600 86400 3600
  174. notes.io. 3600 IN MX 30 aspmx5.googlemail.com.
  175. notes.io. 3600 IN MX 10 aspmx.l.google.com.
  176. notes.io. 3600 IN MX 20 alt1.aspmx.l.google.com.
  177. notes.io. 3600 IN MX 20 alt2.aspmx.l.google.com.
  178. notes.io. 3600 IN MX 30 aspmx2.googlemail.com.
  179. notes.io. 3600 IN MX 30 aspmx3.googlemail.com.
  180. notes.io. 3600 IN MX 30 aspmx4.googlemail.com.
  181.  
  182.  
  183.  
  184.  
  185. S U B N E T C A L C U L A T I O N
  186. ======================================================================================================================================
  187.  
  188. Address = 77.223.131.30
  189. Network = 77.223.131.30 / 32
  190. Netmask = 255.255.255.255
  191. Broadcast = not needed on Point-to-Point links
  192. Wildcard Mask = 0.0.0.0
  193. Hosts Bits = 0
  194. Max. Hosts = 1 (2^0 - 0)
  195. Host Range = { 77.223.131.30 - 77.223.131.30 }
  196.  
  197.  
  198.  
  199. N M A P P O R T S C A N
  200. ======================================================================================================================================
  201.  
  202.  
  203. Starting Nmap 7.01 ( https://nmap.org ) at 2018-04-24 22:39 UTC
  204. Nmap scan report for notes.io (77.223.131.30)
  205. Host is up (0.14s latency).
  206. rDNS record for 77.223.131.30: 77-223-131-30.ron.com.tr
  207. PORT STATE SERVICE VERSION
  208. 21/tcp closed ftp
  209. 22/tcp closed ssh
  210. 23/tcp closed telnet
  211. 25/tcp closed smtp
  212. 80/tcp open http Apache httpd 2.2.23 ((FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2)
  213. 110/tcp closed pop3
  214. 143/tcp closed imap
  215. 443/tcp closed https
  216. 445/tcp closed microsoft-ds
  217. 3389/tcp closed ms-wbt-server
  218.  
  219. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  220. Nmap done: 1 IP address (1 host up) scanned in 7.17 seconds
  221. #######################################################################################################################################
  222. [!] IP Address : 77.223.131.30
  223. [+] Operating System : FreeBSD
  224. [!] notes.io doesn't seem to use a CMS
  225. [+] Honeypot Probabilty: 0%
  226. --------------------------------------------------------------------------------------------------------------------------------------
  227. [~] Trying to gather whois information for notes.io
  228. [+] Whois information found
  229. [-] Unable to build response, visit https://who.is/whois/notes.io
  230. ---------------------------------------------------------------------------------------------------------------------------------------
  231. PORT STATE SERVICE VERSION
  232. 21/tcp closed ftp
  233. 22/tcp closed ssh
  234. 23/tcp closed telnet
  235. 25/tcp closed smtp
  236. 80/tcp open http Apache httpd 2.2.23 ((FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2)
  237. 110/tcp closed pop3
  238. 143/tcp closed imap
  239. 443/tcp closed https
  240. 445/tcp closed microsoft-ds
  241. 3389/tcp closed ms-wbt-server
  242. ---------------------------------------------------------------------------------------------------------------------------------------
  243.  
  244. [+] DNS Records
  245. ns2.metromedya.com. (77.223.131.357) AS43391 Netdirekt A.S. Turkey
  246. ns1.metromedya.com. (77.223.131.347) AS43391 Netdirekt A.S. Turkey
  247.  
  248. [+] MX Records
  249. 30 (209.85.202.26) AS15169 Google Inc. United States
  250.  
  251. [+] MX Records
  252. 30 (108.177.126.26) AS15169 Google Inc. United States
  253.  
  254. [+] MX Records
  255. 10 (173.194.204.26) AS15169 Google Inc. United States
  256.  
  257. [+] MX Records
  258. 20 (64.233.186.27) AS15169 Google Inc. United States
  259.  
  260. [+] MX Records
  261. 30 (64.233.184.26) AS15169 Google Inc. United States
  262.  
  263. [+] MX Records
  264. 30 (64.233.186.26) AS15169 Google Inc. United States
  265.  
  266. [+] MX Records
  267. 20 (209.85.202.26) AS15169 Google Inc. United States
  268.  
  269. [+] Host Records (A)
  270. notes.ioHTTP: (77-223-131-30.ron.com.tr) (77.223.131.307) AS43391 Netdirekt A.S. Turkey
  271.  
  272. [+] TXT Records
  273.  
  274. [+] DNS Map: https://dnsdumpster.com/static/map/notes.io.png
  275.  
  276. [>] Initiating 3 intel modules
  277. [>] Loading Alpha module (1/3)
  278. [>] Beta module deployed (2/3)
  279. [>] Gamma module initiated (3/3)
  280. No emails found
  281.  
  282. [+] Hosts found in search engines:
  283. ---------------------------------------------------------------------------------------------------------------------------------------
  284. [-] Resolving hostnames IPs...
  285. 77.223.131.30:www.notes.io
  286. [+] Virtual hosts:
  287. --------------------------------------------------------------------------------------------------------------------------------------
  288. 77.223.131.30 www.metromedya.com
  289. 77.223.131.30 notes.io
  290. 77.223.131.30 www.md5generator
  291. 77.223.131.30 sleeper
  292. 77.223.131.30 sorgulamayap.com
  293. 77.223.131.30 www.md5generator.org
  294. 77.223.131.30 sleeperapp.com
  295. 77.223.131.30 appforinstagram.com
  296. 77.223.131.30 www.ugurethemaydin.com
  297. 77.223.131.30 hadjs.com
  298. 77.223.131.30 zezeron.net
  299. 77.223.131.30 www.basgetir.com
  300. 77.223.131.30 mobiluygulamagelistirme.com
  301. 77.223.131.30 ikampanya.com
  302. [~] Crawling the target for fuzzable URLs
  303. #######################################################################################################################################
  304. Original* notes.io 77.223.131.30 NS:ns1.metromedya.com MX:alt1.aspmx.l.google.com
  305. Addition notesa.io 198.105.244.19
  306. Addition notesb.io 198.105.244.19
  307. Addition notesc.io 198.105.244.19
  308. Addition notesd.io 198.105.244.19
  309. Addition notese.io 198.105.244.19
  310. Addition notesf.io 198.105.244.19
  311. Addition notesg.io 198.105.244.19
  312. Addition notesh.io 198.105.244.19
  313. Addition notesi.io 198.105.244.19
  314. Addition notesj.io 198.105.244.19
  315. Addition notesk.io 198.105.244.19
  316. Addition notesl.io 198.105.244.19
  317. Addition notesm.io 198.105.244.19
  318. Addition notesn.io 198.105.244.19
  319. Addition noteso.io 198.105.244.19
  320. Addition notesp.io 198.105.244.19
  321. Addition notesq.io 198.105.244.19
  322. Addition notesr.io 198.105.244.19
  323. Addition notess.io 198.105.244.19
  324. Addition notest.io 198.105.244.19
  325. Addition notesu.io 198.105.244.19
  326. Addition notesv.io 198.105.244.19
  327. Addition notesw.io 198.105.244.19
  328. Addition notesx.io 198.105.244.19
  329. Addition notesy.io 198.105.244.19
  330. Addition notesz.io 198.105.244.19
  331. Bitsquatting ootes.io 188.166.11.67 NS:ns1.hostnet.nl MX:ALT1.ASPMX.L.GOOGLE.COM
  332. Bitsquatting lotes.io 198.105.244.19
  333. Bitsquatting jotes.io 198.105.244.19
  334. Bitsquatting fotes.io 198.105.244.19
  335. Bitsquatting nntes.io 198.105.244.19
  336. Bitsquatting nmtes.io 198.105.244.19
  337. Bitsquatting nktes.io 198.105.244.19
  338. Bitsquatting ngtes.io 198.105.244.19
  339. Bitsquatting noues.io 198.105.244.19
  340. Bitsquatting noves.io 198.105.244.19
  341. Bitsquatting nopes.io 198.105.244.19
  342. Bitsquatting nodes.io 178.62.14.238 NS:ns1.digitalocean.com
  343. Bitsquatting no4es.io 198.105.244.19
  344. Bitsquatting notds.io 198.105.244.19
  345. Bitsquatting notgs.io 198.105.244.19
  346. Bitsquatting notas.io 184.168.221.42 NS:ns57.domaincontrol.com MX:mailstore1.secureserver.net
  347. Bitsquatting notms.io 198.105.244.19
  348. Bitsquatting notus.io 217.70.184.38 NS:ns-20-a.gandi.net MX:fb.mail.gandi.net
  349. Bitsquatting noter.io 47.100.5.69 NS:dns1.registrar-servers.com MX:mx.ym.163.com
  350. Bitsquatting noteq.io 198.105.244.19
  351. Bitsquatting notew.io 198.105.244.19
  352. Bitsquatting notec.io 198.105.244.19
  353. Bitsquatting note3.io 198.105.244.19
  354. Homoglyph noteⴝ.io 198.105.244.19
  355. Homoglyph notês.io 198.105.244.19
  356. Homoglyph noteś.io 198.105.244.19
  357. Homoglyph nơtes.io 198.105.244.19
  358. Homoglyph notεs.io 198.105.244.19
  359. Homoglyph noteʂ.io 198.105.244.19
  360. Homoglyph nοtes.io 198.105.244.19
  361. Homoglyph rotes.io 198.105.244.19
  362. Homoglyph nọtes.io 198.105.244.19
  363. Homoglyph notěs.io 198.105.244.19
  364. Homoglyph nȯtes.io 198.105.244.19
  365. Homoglyph notės.io 198.105.244.19
  366. Homoglyph nօtes.io 198.105.244.19
  367. Homoglyph notęs.io 198.105.244.19
  368. Homoglyph notēs.io 198.105.244.19
  369. Homoglyph notҽs.io 198.105.244.19
  370. Homoglyph noţes.io 198.105.244.19
  371. Homoglyph n0tes.io 198.105.244.19
  372. Homoglyph notєs.io 198.105.244.19
  373. Homoglyph nοtes.io 198.105.244.19
  374. Homoglyph motes.io 45.56.72.235 2600:3c00::f03c:91ff:fe15:e4fa NS:ns1.linode.com MX:mail.motes.io
  375. Homoglyph nоtes.io 198.105.244.19
  376. Homoglyph nӧtes.io 198.105.244.19
  377. Homoglyph noteᏚ.io 198.105.244.19
  378. Homoglyph nỏtes.io -
  379. Homoglyph noteѕ.io 198.105.244.19
  380. Homoglyph notẹs.io 198.105.244.19
  381. Homoglyph noтes.io 198.105.244.19
  382. Homoglyph notеs.io 198.105.244.19
  383. Homoglyph notës.io 198.105.244.19
  384. Homoglyph nötes.io 198.105.244.19
  385. Homoglyph noτes.io 198.105.244.19
  386. Homoglyph notĕs.io 198.105.244.19
  387. Homoglyph notés.io 198.105.244.19
  388. Homoglyph nótes.io 198.105.244.19
  389. Homoglyph ńotes.io 198.105.244.19
  390. Homoglyph nоtes.io 198.105.244.19
  391. Hyphenation n-otes.io 198.105.244.19
  392. Hyphenation no-tes.io 198.105.244.19
  393. Hyphenation not-es.io 198.105.244.19
  394. Hyphenation note-s.io 198.105.244.19
  395. Insertion noltes.io 198.105.244.19
  396. Insertion notwes.io 198.105.244.19
  397. Insertion note4s.io 198.105.244.19
  398. Insertion notres.io 198.105.244.19
  399. Insertion nogtes.io 198.105.244.19
  400. Insertion notzes.io 198.105.244.19
  401. Insertion noteds.io 198.105.244.19
  402. Insertion noytes.io 198.105.244.19
  403. Insertion niotes.io 198.105.244.19
  404. Insertion no0tes.io 198.105.244.19
  405. Insertion npotes.io 198.105.244.19
  406. Insertion note3s.io 198.105.244.19
  407. Insertion noztes.io 198.105.244.19
  408. Insertion notses.io 198.105.244.19
  409. Insertion notfes.io 198.105.244.19
  410. Insertion n9otes.io 198.105.244.19
  411. Insertion notges.io 198.105.244.19
  412. Insertion not6es.io 198.105.244.19
  413. Insertion notezs.io 198.105.244.19
  414. Insertion nkotes.io 198.105.244.19
  415. Insertion noftes.io 198.105.244.19
  416. Insertion nlotes.io 198.105.244.19
  417. Insertion noktes.io 198.105.244.19
  418. Insertion no5tes.io 198.105.244.19
  419. Insertion notdes.io 198.105.244.19
  420. Insertion no9tes.io 198.105.244.19
  421. Insertion notyes.io 198.105.244.19
  422. Insertion nortes.io 198.105.244.19
  423. Insertion not4es.io 198.105.244.19
  424. Insertion not5es.io 198.105.244.19
  425. Insertion noptes.io 198.105.244.19
  426. Insertion noites.io 198.105.244.19
  427. Insertion notews.io 198.105.244.19
  428. Insertion n0otes.io 198.105.244.19
  429. Insertion noters.io 198.105.244.19
  430. Insertion not3es.io 198.105.244.19
  431. Insertion no6tes.io 198.105.244.19
  432. Omission note.io 67.199.248.12 NS:ns10.dnsmadeeasy.com
  433. Omission noes.io 50.63.202.37 NS:ns53.domaincontrol.com
  434. Omission ntes.io 50.63.202.47 NS:ns73.domaincontrol.com
  435. Omission otes.io 198.105.244.19
  436. Omission nots.io 95.85.57.64 NS:ns.nots.io MX:mail.nots.io
  437. Repetition nottes.io 198.105.244.19
  438. Repetition nnotes.io 198.105.244.19
  439. Repetition notees.io 198.105.244.19
  440. Repetition nootes.io 198.105.244.19
  441. Replacement noges.io 198.105.244.19
  442. Replacement noyes.io 192.30.252.153 NS:ns39.domaincontrol.com MX:noyes-io.mail.protection.outlook.com
  443. Replacement notws.io 198.105.244.19
  444. Replacement notey.io 198.105.244.19
  445. Replacement nofes.io 198.105.244.19
  446. Replacement notss.io 198.105.244.19
  447. Replacement notzs.io 198.105.244.19
  448. Replacement not4s.io 198.105.244.19
  449. Replacement no6es.io 198.105.244.19
  450. Replacement nores.io 198.105.244.19
  451. Replacement notex.io -
  452. Replacement no5es.io 198.105.244.19
  453. Replacement botes.io 198.105.244.19
  454. Replacement n9tes.io 198.105.244.19
  455. Replacement notea.io 198.105.244.19
  456. Replacement nltes.io 198.105.244.19
  457. Replacement hotes.io 198.105.244.19
  458. Replacement notrs.io 198.105.244.19
  459. Replacement nites.io 198.105.244.19
  460. Replacement not3s.io 198.105.244.19
  461. Replacement nptes.io 198.105.244.19
  462. Replacement nozes.io 198.105.244.19
  463. Replacement notee.io 198.105.244.19
  464. Replacement noted.io 52.58.78.16 NS:ns1.undeveloped.com
  465. Transposition ontes.io 198.105.244.19
  466. Transposition ntoes.io 198.105.244.19
  467. Transposition noets.io 198.105.244.19
  468. Transposition notse.io 198.105.244.19
  469. Vowel-swap notos.io 184.168.221.35 NS:ns13.domaincontrol.com MX:alt1.aspmx.l.google.com
  470. Vowel-swap nutes.io 198.105.244.19
  471. Vowel-swap nates.io 198.105.244.19
  472. Vowel-swap netes.io 198.105.244.19
  473. Vowel-swap notis.io 104.27.186.252 2400:cb00:2048:1::681b:bafc NS:kurt.ns.cloudflare.com MX:alt1.aspmx.l.google.com
  474. Various notesio.io 198.105.244.19
  475. Various notes-io.com -
  476. ######################################################################################################################################
  477. [*] Processing domain notes.io
  478. [+] Getting nameservers
  479. 77.223.131.35 - ns2.metromedya.com
  480. 77.223.131.34 - ns1.metromedya.com
  481. [-] Zone transfer failed
  482.  
  483. [+] MX records found, added to target list
  484. 30 aspmx4.googlemail.com.
  485. 30 aspmx2.googlemail.com.
  486. 10 aspmx.l.google.com.
  487. 20 alt2.aspmx.l.google.com.
  488. 30 aspmx5.googlemail.com.
  489. 30 aspmx3.googlemail.com.
  490. 20 alt1.aspmx.l.google.com.
  491.  
  492. [*] Scanning notes.io for A records
  493. 77.223.131.30 - notes.io
  494. 77.223.131.30 - alpha.notes.io
  495. 77.223.131.30 - beta.notes.io
  496. 77.223.131.30 - blog.notes.io
  497. 198.105.244.19 - homer.notes.io
  498. 198.105.254.19 - homer.notes.io
  499. 198.105.244.19 - home.notes.io
  500. 198.105.254.19 - home.notes.io
  501. 172.217.2.19 - mail.notes.io
  502. 198.105.244.19 - my.notes.io
  503. 198.105.254.19 - my.notes.io
  504. 198.105.244.19 - mysql.notes.io
  505. 198.105.254.19 - mysql.notes.io
  506. 198.105.244.19 - mysql2.notes.io
  507. 198.105.254.19 - mysql2.notes.io
  508. 198.105.244.19 - web03.notes.io
  509. 198.105.254.19 - web03.notes.io
  510. 198.105.244.19 - web1.notes.io
  511. 198.105.244.19 - web02.notes.io
  512. 198.105.244.19 - web.notes.io
  513. 198.105.244.19 - web01.notes.io
  514. 198.105.254.19 - web01.notes.io
  515. 198.105.254.19 - web02.notes.io
  516. 198.105.254.19 - web.notes.io
  517. 198.105.254.19 - web1.notes.io
  518. 198.105.244.19 - web0.notes.io
  519. 198.105.254.19 - web0.notes.io
  520. 198.105.244.19 - web2.notes.io
  521. 198.105.254.19 - web2.notes.io
  522. 198.105.244.19 - web4.notes.io
  523. 198.105.254.19 - web4.notes.io
  524. 198.105.244.19 - webconf.notes.io
  525. 198.105.244.19 - web3.notes.io
  526. 198.105.244.19 - webadmin.notes.io
  527. 198.105.254.19 - web3.notes.io
  528. 198.105.254.19 - webadmin.notes.io
  529. 198.105.254.19 - webconf.notes.io
  530. 198.105.244.19 - web5.notes.io
  531. 198.105.254.19 - web5.notes.io
  532. 198.105.244.19 - webcam.notes.io
  533. 198.105.254.19 - webcam.notes.io
  534. 198.105.244.19 - webct.notes.io
  535. 198.105.254.19 - webct.notes.io
  536. 198.105.244.19 - webdb.notes.io
  537. 198.105.254.19 - webdb.notes.io
  538. 198.105.244.19 - webmail2.notes.io
  539. 198.105.254.19 - webmail2.notes.io
  540. 198.105.244.19 - webdisk.notes.io
  541. 198.105.244.19 - webmaster.notes.io
  542. 198.105.254.19 - webdisk.notes.io
  543. 198.105.254.19 - webmaster.notes.io
  544. 198.105.244.19 - weblog.notes.io
  545. 198.105.254.19 - weblog.notes.io
  546. 198.105.244.19 - webmin.notes.io
  547. 198.105.244.19 - webmail.notes.io
  548. 198.105.254.19 - webmin.notes.io
  549. 198.105.254.19 - webmail.notes.io
  550. 198.105.244.19 - webservices.notes.io
  551. 198.105.254.19 - webservices.notes.io
  552. 198.105.244.19 - webstats.notes.io
  553. 198.105.254.19 - webstats.notes.io
  554. 198.105.244.19 - webstore.notes.io
  555. 198.105.254.19 - webstore.notes.io
  556. 198.105.244.19 - ww.notes.io
  557. 198.105.244.19 - ww0.notes.io
  558. 198.105.254.19 - ww.notes.io
  559. 198.105.254.19 - ww0.notes.io
  560. 198.105.244.19 - ww01.notes.io
  561. 198.105.254.19 - ww01.notes.io
  562. 198.105.244.19 - ww03.notes.io
  563. 198.105.254.19 - ww03.notes.io
  564. 198.105.244.19 - ww02.notes.io
  565. 198.105.254.19 - ww02.notes.io
  566. 198.105.244.19 - ww2.notes.io
  567. 198.105.244.19 - ww1.notes.io
  568. 198.105.254.19 - ww2.notes.io
  569. 198.105.254.19 - ww1.notes.io
  570. 77.223.131.30 - www.notes.io
  571. 198.105.244.19 - www-test.notes.io
  572. 198.105.254.19 - www-test.notes.io
  573. 198.105.244.19 - www01.notes.io
  574. 198.105.254.19 - www01.notes.io
  575. 198.105.244.19 - ww3.notes.io
  576. 198.105.254.19 - ww3.notes.io
  577. 198.105.244.19 - www0.notes.io
  578. 198.105.254.19 - www0.notes.io
  579. 198.105.244.19 - www02.notes.io
  580. 198.105.254.19 - www02.notes.io
  581. 198.105.244.19 - www2.notes.io
  582. 198.105.254.19 - www2.notes.io
  583. 198.105.244.19 - www03.notes.io
  584. 198.105.254.19 - www03.notes.io
  585. 198.105.244.19 - www1.notes.io
  586. 198.105.254.19 - www1.notes.io
  587. 198.105.244.19 - www6.notes.io
  588. 198.105.254.19 - www6.notes.io
  589. 198.105.244.19 - www7.notes.io
  590. 198.105.254.19 - www7.notes.io
  591. 198.105.244.19 - www5.notes.io
  592. 198.105.254.19 - www5.notes.io
  593. 198.105.244.19 - www4.notes.io
  594. 198.105.254.19 - www4.notes.io
  595. 198.105.244.19 - www3.notes.io
  596. 198.105.254.19 - www3.notes.io
  597. 198.105.244.19 - wwwm.notes.io
  598. 198.105.254.19 - wwwm.notes.io
  599. 198.105.244.19 - wwwold.notes.io
  600. 198.105.244.19 - wwww.notes.io
  601. 198.105.254.19 - wwwold.notes.io
  602. 198.105.254.19 - wwww.notes.io
  603. ################################################################################################################
  604.  
  605. Ip Address Status Type Domain Name Server
  606. ---------- ------ ---- ----------- ------
  607. 77.223.131.30 301 alias alpha.notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
  608. 77.223.131.30 301 host notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
  609. 77.223.131.30 301 alias beta.notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
  610. 77.223.131.30 301 host notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
  611. 77.223.131.30 301 host blog.notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
  612. 198.105.244.19 301 host home.notes.io nginx
  613. 198.105.254.19 301 host home.notes.io nginx
  614. 198.105.244.19 301 host homebase.notes.io nginx
  615. 198.105.254.19 301 host homebase.notes.io nginx
  616. 198.105.244.19 301 host homer.notes.io nginx
  617. 198.105.254.19 301 host homer.notes.io nginx
  618. 198.105.244.19 301 host http.notes.io nginx
  619. 198.105.254.19 301 host http.notes.io nginx
  620. 198.105.244.19 301 host https.notes.io nginx
  621. 198.105.254.19 301 host https.notes.io nginx
  622. 172.217.2.19 302 alias mail.notes.io ghs
  623. 172.217.2.19 302 host ghs.google.com ghs
  624. 198.105.244.19 301 host my.notes.io nginx
  625. 198.105.254.19 301 host my.notes.io nginx
  626. 198.105.244.19 301 host mysql.notes.io nginx
  627. 198.105.254.19 301 host mysql.notes.io nginx
  628. 198.105.244.19 301 host mysql0.notes.io nginx
  629. 198.105.254.19 301 host mysql0.notes.io nginx
  630. 198.105.244.19 301 host mysql01.notes.io nginx
  631. 198.105.254.19 301 host mysql01.notes.io nginx
  632. 198.105.244.19 301 host mysql1.notes.io nginx
  633. 198.105.254.19 301 host mysql1.notes.io nginx
  634. 198.105.244.19 301 host web.notes.io nginx
  635. 198.105.254.19 301 host web.notes.io nginx
  636. 198.105.244.19 301 host webaccess.notes.io nginx
  637. 198.105.254.19 301 host webaccess.notes.io nginx
  638. 198.105.244.19 301 host webadmin.notes.io nginx
  639. 198.105.254.19 301 host webadmin.notes.io nginx
  640. 198.105.244.19 301 host webalizer.notes.io nginx
  641. 198.105.254.19 301 host webalizer.notes.io nginx
  642. 198.105.244.19 301 host webboard.notes.io nginx
  643. 198.105.254.19 301 host webboard.notes.io nginx
  644. 198.105.244.19 301 host webcache.notes.io nginx
  645. 198.105.254.19 301 host webcache.notes.io nginx
  646. 198.105.244.19 301 host webcam.notes.io nginx
  647. 198.105.254.19 301 host webcam.notes.io nginx
  648. 198.105.244.19 301 host webcast.notes.io nginx
  649. 198.105.254.19 301 host webcast.notes.io nginx
  650. 198.105.244.19 301 host webdev.notes.io nginx
  651. 198.105.254.19 301 host webdev.notes.io nginx
  652. 198.105.244.19 301 host webdocs.notes.io nginx
  653. 198.105.254.19 301 host webdocs.notes.io nginx
  654. 198.105.244.19 301 host webfarm.notes.io nginx
  655. 198.105.254.19 301 host webfarm.notes.io nginx
  656. 198.105.244.19 301 host webhelp.notes.io nginx
  657. 198.105.254.19 301 host webhelp.notes.io nginx
  658. 198.105.244.19 301 host weblib.notes.io nginx
  659. 198.105.254.19 301 host weblib.notes.io nginx
  660. 198.105.244.19 301 host weblogic.notes.io nginx
  661. 198.105.254.19 301 host weblogic.notes.io nginx
  662. 198.105.244.19 301 host webmail.notes.io nginx
  663. 198.105.254.19 301 host webmail.notes.io nginx
  664. 198.105.244.19 301 host webmaster.notes.io nginx
  665. 198.105.254.19 301 host webmaster.notes.io nginx
  666. 198.105.244.19 301 host webproxy.notes.io nginx
  667. 198.105.254.19 301 host webproxy.notes.io nginx
  668. 198.105.244.19 301 host webring.notes.io nginx
  669. 198.105.254.19 301 host webring.notes.io nginx
  670. 198.105.244.19 301 host webs.notes.io nginx
  671. 198.105.254.19 301 host webs.notes.io nginx
  672. 198.105.244.19 301 host webserv.notes.io nginx
  673. 198.105.254.19 301 host webserv.notes.io nginx
  674. 198.105.244.19 301 host webserver.notes.io nginx
  675. 198.105.254.19 301 host webserver.notes.io nginx
  676. 198.105.244.19 301 host webservices.notes.io nginx
  677. 198.105.254.19 301 host webservices.notes.io nginx
  678. 198.105.244.19 301 host website.notes.io nginx
  679. 198.105.254.19 301 host website.notes.io nginx
  680. 198.105.244.19 301 host websites.notes.io nginx
  681. 198.105.254.19 301 host websites.notes.io nginx
  682. 198.105.244.19 301 host websphere.notes.io nginx
  683. 198.105.254.19 301 host websphere.notes.io nginx
  684. 198.105.244.19 301 host websrv.notes.io nginx
  685. 198.105.254.19 301 host websrv.notes.io nginx
  686. 198.105.244.19 301 host websrvr.notes.io nginx
  687. 198.105.254.19 301 host websrvr.notes.io nginx
  688. 198.105.244.19 301 host webstats.notes.io nginx
  689. 198.105.254.19 301 host webstats.notes.io nginx
  690. 198.105.244.19 301 host webstore.notes.io nginx
  691. 198.105.254.19 301 host webstore.notes.io nginx
  692. 198.105.244.19 301 host websvr.notes.io nginx
  693. 198.105.254.19 301 host websvr.notes.io nginx
  694. 198.105.244.19 301 host webtrends.notes.io nginx
  695. 198.105.254.19 301 host webtrends.notes.io nginx
  696. 198.105.244.19 301 host ww.notes.io nginx
  697. 198.105.254.19 301 host ww.notes.io nginx
  698. 198.105.244.19 301 host ww1.notes.io nginx
  699. 198.105.254.19 301 host ww1.notes.io nginx
  700. 198.105.244.19 301 host ww42.notes.io nginx
  701. 198.105.254.19 301 host ww42.notes.io nginx
  702. 77.223.131.30 301 alias www.notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
  703. 77.223.131.30 301 host notes.io Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
  704. 198.105.244.19 301 host www-.notes.io nginx
  705. 198.105.254.19 301 host www-.notes.io nginx
  706. 198.105.244.19 301 host www-01.notes.io nginx
  707. 198.105.254.19 301 host www-01.notes.io nginx
  708. 198.105.244.19 301 host www-02.notes.io nginx
  709. 198.105.254.19 301 host www-02.notes.io nginx
  710. 198.105.244.19 301 host www-1.notes.io nginx
  711. 198.105.254.19 301 host www-1.notes.io nginx
  712. 198.105.244.19 301 host www-2.notes.io nginx
  713. 198.105.254.19 301 host www-2.notes.io nginx
  714. 198.105.244.19 301 host www-int.notes.io nginx
  715. 198.105.254.19 301 host www-int.notes.io nginx
  716. 198.105.244.19 301 host www0.notes.io nginx
  717. 198.105.254.19 301 host www0.notes.io nginx
  718. 198.105.244.19 301 host www01.notes.io nginx
  719. 198.105.254.19 301 host www01.notes.io nginx
  720. 198.105.244.19 301 host www02.notes.io nginx
  721. 198.105.254.19 301 host www02.notes.io nginx
  722. 198.105.244.19 301 host www1.notes.io nginx
  723. 198.105.254.19 301 host www1.notes.io nginx
  724. 198.105.244.19 301 host www2.notes.io nginx
  725. 198.105.254.19 301 host www2.notes.io nginx
  726. 198.105.244.19 301 host www3.notes.io nginx
  727. 198.105.254.19 301 host www3.notes.io nginx
  728. 198.105.244.19 301 host www_.notes.io nginx
  729. 198.105.254.19 301 host www_.notes.io nginx
  730. 198.105.244.19 301 host wwwchat.notes.io nginx
  731. 198.105.254.19 301 host wwwchat.notes.io nginx
  732. 198.105.244.19 301 host wwwdev.notes.io nginx
  733. 198.105.254.19 301 host wwwdev.notes.io nginx
  734. 198.105.244.19 301 host wwwmail.notes.io nginx
  735. 198.105.254.19 301 host wwwmail.notes.io nginx
  736. #######################################################################################################################################
  737. --------------------------------------------------------------------------------------------------------------------------------------
  738. + Target IP: 77.223.131.30
  739. + Target Hostname: notes.io
  740. + Target Port: 80
  741. + Start Time: 2018-04-24 19:42:40 (GMT-4)
  742. ---------------------------------------------------------------------------------------------------------------------------------------
  743. + Server: Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
  744. + Cookie PHPSESSID created without the httponly flag
  745. + Retrieved x-powered-by header: PHP/5.4.7
  746. + The anti-clickjacking X-Frame-Options header is not present.
  747. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  748. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  749. + lines
  750. + Server leaks inodes via ETags, header found with file /robots.txt, inode: 2418041, size: 90, mtime: Tue Dec 12 16:01:41 2017
  751. + OSVDB-3268: /api/: Directory indexing found.
  752. + Entry '/api/' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  753. + OSVDB-3268: /temp/: Directory indexing found.
  754. + Entry '/temp/' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  755. + Entry '/short.php' in robots.txt returned a non-forbidden or redirect HTTP code (301)
  756. + Entry '/favicon.ico' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  757. + "robots.txt" contains 4 entries which should be manually viewed.
  758. + Multiple index files found: /default.asp, /index.cfm, /index.html, /default.aspx, /index.htm, /index.aspx, /index.do, /index.pl, /index.shtml, /index.xml, /index.php3, /index.cgi, /default.htm, /index.asp, /index.jhtml, /index.php
  759. + PHP/5.4.7 appears to be outdated (current is at least 5.6.9). PHP 5.5.25 and 5.4.41 are also current.
  760. + OpenSSL/0.9.8y appears to be outdated (current is at least 1.0.1j). OpenSSL 1.0.0o and 0.9.8zc are also current.
  761. + mod_ssl/2.2.23 appears to be outdated (current is at least 2.8.31) (may depend on server version)
  762. + Apache/2.2.23 appears to be outdated (current is at least Apache/2.4.12). Apache 2.0.65 (final release) and 2.2.29 are also current.
  763. + mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0082, OSVDB-756.
  764. + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
  765. + OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
  766. + OSVDB-3268: /scripts/: Directory indexing found.
  767. + /cgi.cgi/cart32.exe: request cart32.exe/cart32clientlist
  768. + /webcgi/cart32.exe: request cart32.exe/cart32clientlist
  769. + /cgi-914/cart32.exe: request cart32.exe/cart32clientlist
  770. + /cgi-915/cart32.exe: request cart32.exe/cart32clientlist
  771. + /bin/cart32.exe: request cart32.exe/cart32clientlist
  772. + /cgi/cart32.exe: request cart32.exe/cart32clientlist
  773. + /mpcgi/cart32.exe: request cart32.exe/cart32clientlist
  774. + /ows-bin/cart32.exe: request cart32.exe/cart32clientlist
  775. + /cgi-sys/cart32.exe: request cart32.exe/cart32clientlist
  776. + /cgi-local/cart32.exe: request cart32.exe/cart32clientlist
  777. + /htbin/cart32.exe: request cart32.exe/cart32clientlist
  778. + /cgibin/cart32.exe: request cart32.exe/cart32clientlist
  779. + /cgis/cart32.exe: request cart32.exe/cart32clientlist
  780. + /scripts/cart32.exe: request cart32.exe/cart32clientlist
  781. + /cgi-win/cart32.exe: request cart32.exe/cart32clientlist
  782. + /fcgi-bin/cart32.exe: request cart32.exe/cart32clientlist
  783. + /cgi-exe/cart32.exe: request cart32.exe/cart32clientlist
  784. + /cgi-home/cart32.exe: request cart32.exe/cart32clientlist
  785. + /cgi-perl/cart32.exe: request cart32.exe/cart32clientlist
  786. + /scgi-bin/cart32.exe: request cart32.exe/cart32clientlist
  787. + /cgi-bin-sdb/cart32.exe: request cart32.exe/cart32clientlist
  788. + /cgi-mod/cart32.exe: request cart32.exe/cart32clientlist
  789. + /cgi.cgi/classified.cgi: Check Phrack 55 for info by RFP
  790. + /webcgi/classified.cgi: Check Phrack 55 for info by RFP
  791. + /cgi-914/classified.cgi: Check Phrack 55 for info by RFP
  792. + /cgi-915/classified.cgi: Check Phrack 55 for info by RFP
  793. + /bin/classified.cgi: Check Phrack 55 for info by RFP
  794. + /cgi/classified.cgi: Check Phrack 55 for info by RFP
  795. + /mpcgi/classified.cgi: Check Phrack 55 for info by RFP
  796. + /ows-bin/classified.cgi: Check Phrack 55 for info by RFP
  797. + /cgi-sys/classified.cgi: Check Phrack 55 for info by RFP
  798. + /cgi-local/classified.cgi: Check Phrack 55 for info by RFP
  799. + /htbin/classified.cgi: Check Phrack 55 for info by RFP
  800. + /cgibin/classified.cgi: Check Phrack 55 for info by RFP
  801. + /cgis/classified.cgi: Check Phrack 55 for info by RFP
  802. + /scripts/classified.cgi: Check Phrack 55 for info by RFP
  803. + /cgi-win/classified.cgi: Check Phrack 55 for info by RFP
  804. + /fcgi-bin/classified.cgi: Check Phrack 55 for info by RFP
  805. + /cgi-exe/classified.cgi: Check Phrack 55 for info by RFP
  806. + /cgi-home/classified.cgi: Check Phrack 55 for info by RFP
  807. + /cgi-perl/classified.cgi: Check Phrack 55 for info by RFP
  808. + /scgi-bin/classified.cgi: Check Phrack 55 for info by RFP
  809. + /cgi-bin-sdb/classified.cgi: Check Phrack 55 for info by RFP
  810. + /cgi-mod/classified.cgi: Check Phrack 55 for info by RFP
  811. + /cgi.cgi/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  812. + /webcgi/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  813. + /cgi-914/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  814. + /cgi-915/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  815. + /bin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  816. + /cgi/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  817. + /mpcgi/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  818. + /ows-bin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  819. + /cgi-sys/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  820. + /cgi-local/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  821. + /htbin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  822. + /cgibin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  823. + /cgis/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  824. + /scripts/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  825. + /cgi-win/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  826. + /fcgi-bin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  827. + /cgi-exe/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  828. + /cgi-home/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  829. + /cgi-perl/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  830. + /scgi-bin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  831. + /cgi-bin-sdb/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  832. + /cgi-mod/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
  833. + /cgi.cgi/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  834. + /webcgi/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  835. + /cgi-914/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  836. + /cgi-915/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  837. + /bin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  838. + /cgi/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  839. + /mpcgi/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  840. + /ows-bin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  841. + /cgi-sys/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  842. + /cgi-local/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  843. + /htbin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  844. + /cgibin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  845. + /cgis/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  846. + /scripts/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  847. + /cgi-win/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  848. + /fcgi-bin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  849. + /cgi-exe/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  850. + /cgi-home/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  851. + /cgi-perl/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  852. + /scgi-bin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  853. + /cgi-bin-sdb/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  854. + /cgi-mod/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
  855. + /cgi.cgi/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  856. + /webcgi/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  857. + /cgi-914/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  858. + /cgi-915/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  859. + /bin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  860. + /cgi/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  861. + /mpcgi/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  862. + /ows-bin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  863. + /cgi-sys/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  864. + /cgi-local/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  865. + /htbin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  866. + /cgibin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  867. + /cgis/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  868. + /scripts/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  869. + /cgi-win/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  870. + /fcgi-bin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  871. + /cgi-exe/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  872. + /cgi-home/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  873. + /cgi-perl/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  874. + /scgi-bin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  875. + /cgi-bin-sdb/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  876. + /cgi-mod/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
  877. + /cgi.cgi/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  878. + /webcgi/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  879. + /cgi-914/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  880. + /cgi-915/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  881. + /bin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  882. + /cgi/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  883. + /mpcgi/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  884. + /ows-bin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  885. + /cgi-sys/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  886. + /cgi-local/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  887. + /htbin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  888. + /cgibin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  889. + /cgis/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  890. + /scripts/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  891. + /cgi-win/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  892. + /fcgi-bin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  893. + /cgi-exe/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  894. + /cgi-home/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  895. + /cgi-perl/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  896. + /scgi-bin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  897. + /cgi-bin-sdb/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  898. + /cgi-mod/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  899. + /cgi.cgi/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  900. + /webcgi/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  901. + /cgi-914/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  902. + /cgi-915/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  903. + /bin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  904. + /cgi/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  905. + /mpcgi/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  906. + /ows-bin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  907. + /cgi-sys/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  908. + /cgi-local/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  909. + /htbin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  910. + /cgibin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  911. + /cgis/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  912. + /scripts/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  913. + /cgi-win/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  914. + /fcgi-bin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  915. + /cgi-exe/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  916. + /cgi-home/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  917. + /cgi-perl/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  918. + /scgi-bin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  919. + /cgi-bin-sdb/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  920. + /cgi-mod/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
  921. + /cgi.cgi/lwgate: Check Phrack 55 for info by RFP
  922. + /webcgi/lwgate: Check Phrack 55 for info by RFP
  923. + /cgi-914/lwgate: Check Phrack 55 for info by RFP
  924. + /cgi-915/lwgate: Check Phrack 55 for info by RFP
  925. + /bin/lwgate: Check Phrack 55 for info by RFP
  926. + /cgi/lwgate: Check Phrack 55 for info by RFP
  927. + /mpcgi/lwgate: Check Phrack 55 for info by RFP
  928. + /ows-bin/lwgate: Check Phrack 55 for info by RFP
  929. + /cgi-sys/lwgate: Check Phrack 55 for info by RFP
  930. + /cgi-local/lwgate: Check Phrack 55 for info by RFP
  931. + /htbin/lwgate: Check Phrack 55 for info by RFP
  932. + /cgibin/lwgate: Check Phrack 55 for info by RFP
  933. + /cgis/lwgate: Check Phrack 55 for info by RFP
  934. + /scripts/lwgate: Check Phrack 55 for info by RFP
  935. + /cgi-win/lwgate: Check Phrack 55 for info by RFP
  936. + /fcgi-bin/lwgate: Check Phrack 55 for info by RFP
  937. + /cgi-exe/lwgate: Check Phrack 55 for info by RFP
  938. + /cgi-home/lwgate: Check Phrack 55 for info by RFP
  939. + /cgi-perl/lwgate: Check Phrack 55 for info by RFP
  940. + /scgi-bin/lwgate: Check Phrack 55 for info by RFP
  941. + /cgi-bin-sdb/lwgate: Check Phrack 55 for info by RFP
  942. + /cgi-mod/lwgate: Check Phrack 55 for info by RFP
  943. + /cgi.cgi/LWGate: Check Phrack 55 for info by RFP
  944. + /webcgi/LWGate: Check Phrack 55 for info by RFP
  945. + /cgi-914/LWGate: Check Phrack 55 for info by RFP
  946. + /cgi-915/LWGate: Check Phrack 55 for info by RFP
  947. + /bin/LWGate: Check Phrack 55 for info by RFP
  948. + /cgi/LWGate: Check Phrack 55 for info by RFP
  949. + /mpcgi/LWGate: Check Phrack 55 for info by RFP
  950. + /ows-bin/LWGate: Check Phrack 55 for info by RFP
  951. + /cgi-sys/LWGate: Check Phrack 55 for info by RFP
  952. + /cgi-local/LWGate: Check Phrack 55 for info by RFP
  953. + /htbin/LWGate: Check Phrack 55 for info by RFP
  954. + /cgibin/LWGate: Check Phrack 55 for info by RFP
  955. + /cgis/LWGate: Check Phrack 55 for info by RFP
  956. + /scripts/LWGate: Check Phrack 55 for info by RFP
  957. + /cgi-win/LWGate: Check Phrack 55 for info by RFP
  958. + /fcgi-bin/LWGate: Check Phrack 55 for info by RFP
  959. + /cgi-exe/LWGate: Check Phrack 55 for info by RFP
  960. + /cgi-home/LWGate: Check Phrack 55 for info by RFP
  961. + /cgi-perl/LWGate: Check Phrack 55 for info by RFP
  962. + /scgi-bin/LWGate: Check Phrack 55 for info by RFP
  963. + /cgi-bin-sdb/LWGate: Check Phrack 55 for info by RFP
  964. + /cgi-mod/LWGate: Check Phrack 55 for info by RFP
  965. + /cgi.cgi/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  966. + /webcgi/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  967. + /cgi-914/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  968. + /cgi-915/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  969. + /bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  970. + /cgi/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  971. + /mpcgi/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  972. + /ows-bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  973. + /cgi-sys/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  974. + /cgi-local/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  975. + /htbin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  976. + /cgibin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  977. + /cgis/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  978. + /scripts/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  979. + /cgi-win/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  980. + /fcgi-bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  981. + /cgi-exe/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  982. + /cgi-home/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  983. + /cgi-perl/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  984. + /scgi-bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  985. + /cgi-bin-sdb/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  986. + /cgi-mod/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
  987. + /kboard/: KBoard Forum 0.3.0 and prior have a security problem in forum_edit_post.php, forum_post.php and forum_reply.php
  988. + /lists/admin/: PHPList pre 2.6.4 contains a number of vulnerabilities including remote administrative access, harvesting user info and more. Default login to admin interface is admin/phplist
  989. + /splashAdmin.php: Cobalt Qube 3 admin is running. This may have multiple security problems as described by www.scan-associates.net. These could not be tested remotely.
  990. + /ssdefs/: Siteseed pre 1.4.2 has 'major' security problems.
  991. + /sshome/: Siteseed pre 1.4.2 has 'major' security problems.
  992. + /tiki/: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin
  993. + /tiki/tiki-install.php: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin
  994. + /scripts/samples/details.idc: See RFP 9901; www.wiretrip.net
  995. + OSVDB-396: /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted.
  996. + /cgi.cgi/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  997. + /webcgi/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  998. + /cgi-914/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  999. + /cgi-915/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1000. + /bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1001. + /cgi/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1002. + /mpcgi/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1003. + /ows-bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1004. + /cgi-sys/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1005. + /cgi-local/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1006. + /htbin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1007. + /cgibin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1008. + /cgis/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1009. + /scripts/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1010. + /cgi-win/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1011. + /fcgi-bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1012. + /cgi-exe/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1013. + /cgi-home/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1014. + /cgi-perl/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1015. + /scgi-bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1016. + /cgi-bin-sdb/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1017. + /cgi-mod/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
  1018. + /cgi.cgi/finger: finger other users, may be other commands?
  1019. + /webcgi/finger: finger other users, may be other commands?
  1020. + /cgi-914/finger: finger other users, may be other commands?
  1021. + /cgi-915/finger: finger other users, may be other commands?
  1022. + /bin/finger: finger other users, may be other commands?
  1023. + /cgi/finger: finger other users, may be other commands?
  1024. + /mpcgi/finger: finger other users, may be other commands?
  1025. + /ows-bin/finger: finger other users, may be other commands?
  1026. + /cgi-sys/finger: finger other users, may be other commands?
  1027. + /cgi-local/finger: finger other users, may be other commands?
  1028. + /htbin/finger: finger other users, may be other commands?
  1029. + /cgibin/finger: finger other users, may be other commands?
  1030. + /cgis/finger: finger other users, may be other commands?
  1031. + /scripts/finger: finger other users, may be other commands?
  1032. + /cgi-win/finger: finger other users, may be other commands?
  1033. + /fcgi-bin/finger: finger other users, may be other commands?
  1034. + /cgi-exe/finger: finger other users, may be other commands?
  1035. + /cgi-home/finger: finger other users, may be other commands?
  1036. + /cgi-perl/finger: finger other users, may be other commands?
  1037. + /scgi-bin/finger: finger other users, may be other commands?
  1038. + /cgi-bin-sdb/finger: finger other users, may be other commands?
  1039. + /cgi-mod/finger: finger other users, may be other commands?
  1040. + /cgi.cgi/finger.pl: finger other users, may be other commands?
  1041. + /webcgi/finger.pl: finger other users, may be other commands?
  1042. + /cgi-914/finger.pl: finger other users, may be other commands?
  1043. + /cgi-915/finger.pl: finger other users, may be other commands?
  1044. + /bin/finger.pl: finger other users, may be other commands?
  1045. + /cgi/finger.pl: finger other users, may be other commands?
  1046. + /mpcgi/finger.pl: finger other users, may be other commands?
  1047. + /ows-bin/finger.pl: finger other users, may be other commands?
  1048. + /cgi-sys/finger.pl: finger other users, may be other commands?
  1049. + /cgi-local/finger.pl: finger other users, may be other commands?
  1050. + /htbin/finger.pl: finger other users, may be other commands?
  1051. + /cgibin/finger.pl: finger other users, may be other commands?
  1052. + /cgis/finger.pl: finger other users, may be other commands?
  1053. + /scripts/finger.pl: finger other users, may be other commands?
  1054. + /cgi-win/finger.pl: finger other users, may be other commands?
  1055. + /fcgi-bin/finger.pl: finger other users, may be other commands?
  1056. + /cgi-exe/finger.pl: finger other users, may be other commands?
  1057. + /cgi-home/finger.pl: finger other users, may be other commands?
  1058. + /cgi-perl/finger.pl: finger other users, may be other commands?
  1059. + /scgi-bin/finger.pl: finger other users, may be other commands?
  1060. + /cgi-bin-sdb/finger.pl: finger other users, may be other commands?
  1061. + /cgi-mod/finger.pl: finger other users, may be other commands?
  1062. + /cgi.cgi/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1063. + /webcgi/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1064. + /cgi-914/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1065. + /cgi-915/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1066. + /bin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1067. + /cgi/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1068. + /mpcgi/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1069. + /ows-bin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1070. + /cgi-sys/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1071. + /cgi-local/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1072. + /htbin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1073. + /cgibin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1074. + /cgis/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1075. + /scripts/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1076. + /cgi-win/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1077. + /fcgi-bin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1078. + /cgi-exe/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1079. + /cgi-home/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1080. + /cgi-perl/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1081. + /scgi-bin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1082. + /cgi-bin-sdb/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1083. + /cgi-mod/get32.exe: This can allow attackers to execute arbitrary commands remotely.
  1084. + /cgi.cgi/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1085. + /webcgi/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1086. + /cgi-914/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1087. + /cgi-915/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1088. + /bin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1089. + /cgi/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1090. + /mpcgi/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1091. + /ows-bin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1092. + /cgi-sys/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1093. + /cgi-local/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1094. + /htbin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1095. + /cgibin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1096. + /cgis/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1097. + /scripts/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1098. + /cgi-win/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1099. + /fcgi-bin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1100. + /cgi-exe/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1101. + /cgi-home/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1102. + /cgi-perl/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1103. + /scgi-bin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1104. + /cgi-bin-sdb/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1105. + /cgi-mod/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1106. + /cgi.cgi/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1107. + /webcgi/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1108. + /cgi-914/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1109. + /cgi-915/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1110. + /bin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1111. + /cgi/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1112. + /mpcgi/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1113. + /ows-bin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1114. + /cgi-sys/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1115. + /cgi-local/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1116. + /htbin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1117. + /cgibin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1118. + /cgis/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1119. + /scripts/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1120. + /cgi-win/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1121. + /fcgi-bin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1122. + /cgi-exe/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1123. + /cgi-home/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1124. + /cgi-perl/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1125. + /scgi-bin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1126. + /cgi-bin-sdb/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1127. + /cgi-mod/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
  1128. + /cgi.cgi/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1129. + /webcgi/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1130. + /cgi-914/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1131. + /cgi-915/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1132. + /bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1133. + /cgi/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1134. + /mpcgi/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1135. + /ows-bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1136. + /cgi-sys/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1137. + /cgi-local/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1138. + /htbin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1139. + /cgibin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1140. + /cgis/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1141. + /scripts/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1142. + /cgi-win/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1143. + /fcgi-bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1144. + /cgi-exe/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1145. + /cgi-home/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1146. + /cgi-perl/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1147. + /scgi-bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1148. + /cgi-bin-sdb/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1149. + /cgi-mod/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
  1150. + /cgi.cgi/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1151. + /webcgi/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1152. + /cgi-914/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1153. + /cgi-915/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1154. + /bin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1155. + /cgi/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1156. + /mpcgi/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1157. + /ows-bin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1158. + /cgi-sys/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1159. + /cgi-local/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1160. + /htbin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1161. + /cgibin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1162. + /cgis/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1163. + /scripts/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1164. + /cgi-win/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1165. + /fcgi-bin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1166. + /cgi-exe/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1167. + /cgi-home/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1168. + /cgi-perl/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1169. + /scgi-bin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1170. + /cgi-bin-sdb/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1171. + /cgi-mod/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
  1172. + OSVDB-637: /~root/: Allowed to browse root's home directory.
  1173. + /forums//admin/config.php: PHP Config file may contain database IDs and passwords.
  1174. + /forums//adm/config.php: PHP Config file may contain database IDs and passwords.
  1175. + /forums//administrator/config.php: PHP Config file may contain database IDs and passwords.
  1176. + /forums/config.php: PHP Config file may contain database IDs and passwords.
  1177. + /guestbook/guestbookdat: PHP-Gastebuch 1.60 Beta reveals sensitive information about its configuration.
  1178. + /guestbook/pwd: PHP-Gastebuch 1.60 Beta reveals the md5 hash of the admin password.
  1179. + /help/: Help directory should not be accessible
  1180. + OSVDB-2411: /hola/admin/cms/htmltags.php?datei=./sec/data.php: hola-cms-1.2.9-10 may reveal the administrator ID and password.
  1181. + OSVDB-8103: /global.inc: PHP-Survey's include file should not be available via the web. Configure the web server to ignore .inc files or change this to global.inc.php
  1182. + OSVDB-59620: /inc/common.load.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
  1183. + OSVDB-59619: /inc/config.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
  1184. + OSVDB-59618: /inc/dbase.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
  1185. + /cgi.cgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1186. + /webcgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1187. + /cgi-914/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1188. + /cgi-915/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1189. + /bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1190. + /cgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1191. + /mpcgi/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1192. + /ows-bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1193. + /cgi-sys/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1194. + /cgi-local/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1195. + /htbin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1196. + /cgibin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1197. + /cgis/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1198. + /scripts/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1199. + /cgi-win/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1200. + /fcgi-bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1201. + /cgi-exe/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1202. + /cgi-home/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1203. + /cgi-perl/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1204. + /scgi-bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1205. + /cgi-bin-sdb/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1206. + /cgi-mod/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
  1207. + /cgi.cgi/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1208. + /webcgi/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1209. + /cgi-914/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1210. + /cgi-915/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1211. + /bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1212. + /cgi/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1213. + /mpcgi/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1214. + /ows-bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1215. + /cgi-sys/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1216. + /cgi-local/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1217. + /htbin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1218. + /cgibin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1219. + /cgis/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1220. + /scripts/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1221. + /cgi-win/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1222. + /fcgi-bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1223. + /cgi-exe/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1224. + /cgi-home/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1225. + /cgi-perl/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1226. + /scgi-bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1227. + /cgi-bin-sdb/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1228. + /cgi-mod/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1229. + /cgi.cgi/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1230. + /webcgi/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1231. + /cgi-914/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1232. + /cgi-915/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1233. + /bin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1234. + /cgi/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1235. + /mpcgi/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1236. + /ows-bin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1237. + /cgi-sys/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1238. + /cgi-local/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1239. + /htbin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1240. + /cgibin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1241. + /cgis/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1242. + /scripts/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1243. + /cgi-win/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1244. + /fcgi-bin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1245. + /cgi-exe/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1246. + /cgi-home/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1247. + /cgi-perl/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1248. + /scgi-bin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1249. + /cgi-bin-sdb/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1250. + /cgi-mod/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more
  1251. + /cgi.cgi/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1252. + /webcgi/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1253. + /cgi-914/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1254. + /cgi-915/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1255. + /bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1256. + /cgi/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1257. + /mpcgi/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1258. + /ows-bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1259. + /cgi-sys/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1260. + /cgi-local/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1261. + /htbin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1262. + /cgibin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1263. + /cgis/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1264. + /scripts/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1265. + /cgi-win/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1266. + /fcgi-bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1267. + /cgi-exe/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1268. + /cgi-home/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1269. + /cgi-perl/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1270. + /scgi-bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1271. + /cgi-bin-sdb/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1272. + /cgi-mod/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands.
  1273. + /cgi.cgi/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1274. + /webcgi/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1275. + /cgi-914/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1276. + /cgi-915/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1277. + /bin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1278. + /cgi/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1279. + /mpcgi/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1280. + /ows-bin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1281. + /cgi-sys/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1282. + /cgi-local/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1283. + /htbin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1284. + /cgibin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1285. + /cgis/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1286. + /scripts/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1287. + /cgi-win/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1288. + /fcgi-bin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1289. + /cgi-exe/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1290. + /cgi-home/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1291. + /cgi-perl/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1292. + /scgi-bin/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1293. + /cgi-bin-sdb/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1294. + /cgi-mod/guestbook.cgi: May allow attackers to execute commands as the web daemon.
  1295. + /cgi.cgi/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1296. + /webcgi/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1297. + /cgi-914/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1298. + /cgi-915/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1299. + /bin/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1300. + /cgi/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1301. + /mpcgi/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1302. + /ows-bin/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1303. + /cgi-sys/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1304. + /cgi-local/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1305. + /htbin/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1306. + /cgibin/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1307. + /cgis/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1308. + /scripts/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1309. + /cgi-win/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1310. + /fcgi-bin/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1311. + /cgi-exe/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1312. + /cgi-home/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1313. + /cgi-perl/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1314. + /scgi-bin/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1315. + /cgi-bin-sdb/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1316. + /cgi-mod/guestbook.pl: May allow attackers to execute commands as the web daemon.
  1317. + /cgi.cgi/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1318. + /webcgi/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1319. + /cgi-914/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1320. + /cgi-915/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1321. + /bin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1322. + /cgi/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1323. + /mpcgi/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1324. + /ows-bin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1325. + /cgi-sys/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1326. + /cgi-local/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1327. + /htbin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1328. + /cgibin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1329. + /cgis/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1330. + /scripts/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1331. + /cgi-win/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1332. + /fcgi-bin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1333. + /cgi-exe/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1334. + /cgi-home/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1335. + /cgi-perl/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1336. + /scgi-bin/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1337. + /cgi-bin-sdb/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1338. + /cgi-mod/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.
  1339. + OSVDB-2703: /geeklog/users.php: Geeklog prior to 1.3.8-1sr2 contains a SQL injection vulnerability that lets a remote attacker reset admin password.
  1340. + OSVDB-8204: /gb/index.php?login=true: gBook may allow admin login by setting the value 'login' equal to 'true'.
  1341. + /guestbook/admin.php: Guestbook admin page available without authentication.
  1342. + /cgi.cgi/gH.cgi: Web backdoor by gH
  1343. + /webcgi/gH.cgi: Web backdoor by gH
  1344. + /cgi-914/gH.cgi: Web backdoor by gH
  1345. + /cgi-915/gH.cgi: Web backdoor by gH
  1346. + /bin/gH.cgi: Web backdoor by gH
  1347. + /cgi/gH.cgi: Web backdoor by gH
  1348. + /mpcgi/gH.cgi: Web backdoor by gH
  1349. + /ows-bin/gH.cgi: Web backdoor by gH
  1350. + /cgi-sys/gH.cgi: Web backdoor by gH
  1351. + /cgi-local/gH.cgi: Web backdoor by gH
  1352. + /htbin/gH.cgi: Web backdoor by gH
  1353. + /cgibin/gH.cgi: Web backdoor by gH
  1354. + /cgis/gH.cgi: Web backdoor by gH
  1355. + /scripts/gH.cgi: Web backdoor by gH
  1356. + /cgi-win/gH.cgi: Web backdoor by gH
  1357. + /fcgi-bin/gH.cgi: Web backdoor by gH
  1358. + /cgi-exe/gH.cgi: Web backdoor by gH
  1359. + /cgi-home/gH.cgi: Web backdoor by gH
  1360. + /cgi-perl/gH.cgi: Web backdoor by gH
  1361. + /scgi-bin/gH.cgi: Web backdoor by gH
  1362. + /cgi-bin-sdb/gH.cgi: Web backdoor by gH
  1363. + /cgi-mod/gH.cgi: Web backdoor by gH
  1364. + /cgi.cgi/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1365. + /webcgi/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1366. + /cgi-914/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1367. + /cgi-915/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1368. + /bin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1369. + /cgi/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1370. + /mpcgi/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1371. + /ows-bin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1372. + /cgi-sys/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1373. + /cgi-local/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1374. + /htbin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1375. + /cgibin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1376. + /cgis/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1377. + /scripts/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1378. + /cgi-win/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1379. + /fcgi-bin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1380. + /cgi-exe/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1381. + /cgi-home/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1382. + /cgi-perl/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1383. + /scgi-bin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1384. + /cgi-bin-sdb/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1385. + /cgi-mod/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1386. + /getaccess: This may be an indication that the server is running getAccess for SSO
  1387. + /cgi.cgi/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1388. + /webcgi/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1389. + /cgi-914/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1390. + /cgi-915/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1391. + /bin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1392. + /cgi/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1393. + /mpcgi/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1394. + /ows-bin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1395. + /cgi-sys/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1396. + /cgi-local/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1397. + /htbin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1398. + /cgibin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1399. + /cgis/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1400. + /scripts/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1401. + /cgi-win/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1402. + /fcgi-bin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1403. + /cgi-exe/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1404. + /cgi-home/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1405. + /cgi-perl/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1406. + /scgi-bin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1407. + /cgi-bin-sdb/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1408. + /cgi-mod/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
  1409. + /cgi.cgi/AT-admin.cgi: Admin interface...
  1410. + /webcgi/AT-admin.cgi: Admin interface...
  1411. + /cgi-914/AT-admin.cgi: Admin interface...
  1412. + /cgi-915/AT-admin.cgi: Admin interface...
  1413. + /bin/AT-admin.cgi: Admin interface...
  1414. + /cgi/AT-admin.cgi: Admin interface...
  1415. + /mpcgi/AT-admin.cgi: Admin interface...
  1416. + /ows-bin/AT-admin.cgi: Admin interface...
  1417. + /cgi-sys/AT-admin.cgi: Admin interface...
  1418. + /cgi-local/AT-admin.cgi: Admin interface...
  1419. + /htbin/AT-admin.cgi: Admin interface...
  1420. + /cgibin/AT-admin.cgi: Admin interface...
  1421. + /cgis/AT-admin.cgi: Admin interface...
  1422. + /scripts/AT-admin.cgi: Admin interface...
  1423. + /cgi-win/AT-admin.cgi: Admin interface...
  1424. + /fcgi-bin/AT-admin.cgi: Admin interface...
  1425. + /cgi-exe/AT-admin.cgi: Admin interface...
  1426. + /cgi-home/AT-admin.cgi: Admin interface...
  1427. + /cgi-perl/AT-admin.cgi: Admin interface...
  1428. + /scgi-bin/AT-admin.cgi: Admin interface...
  1429. + /cgi-bin-sdb/AT-admin.cgi: Admin interface...
  1430. + /cgi-mod/AT-admin.cgi: Admin interface...
  1431. + OSVDB-17111: /cgi.cgi/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1432. + OSVDB-17111: /webcgi/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1433. + OSVDB-17111: /cgi-914/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1434. + OSVDB-17111: /cgi-915/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1435. + OSVDB-17111: /bin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1436. + OSVDB-17111: /cgi/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1437. + OSVDB-17111: /mpcgi/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1438. + OSVDB-17111: /ows-bin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1439. + OSVDB-17111: /cgi-sys/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1440. + OSVDB-17111: /cgi-local/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1441. + OSVDB-17111: /htbin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1442. + OSVDB-17111: /cgibin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1443. + OSVDB-17111: /cgis/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1444. + OSVDB-17111: /scripts/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1445. + OSVDB-17111: /cgi-win/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1446. + OSVDB-17111: /fcgi-bin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1447. + OSVDB-17111: /cgi-exe/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1448. + OSVDB-17111: /cgi-home/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1449. + OSVDB-17111: /cgi-perl/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1450. + OSVDB-17111: /scgi-bin/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1451. + OSVDB-17111: /cgi-bin-sdb/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1452. + OSVDB-17111: /cgi-mod/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
  1453. + /cgi.cgi/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1454. + /webcgi/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1455. + /cgi-914/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1456. + /cgi-915/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1457. + /bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1458. + /cgi/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1459. + /mpcgi/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1460. + /ows-bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1461. + /cgi-sys/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1462. + /cgi-local/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1463. + /htbin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1464. + /cgibin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1465. + /cgis/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1466. + /scripts/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1467. + /cgi-win/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1468. + /fcgi-bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1469. + /cgi-exe/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1470. + /cgi-home/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1471. + /cgi-perl/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1472. + /scgi-bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1473. + /cgi-bin-sdb/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1474. + /cgi-mod/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1475. + /cgi.cgi/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1476. + /webcgi/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1477. + /cgi-914/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1478. + /cgi-915/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1479. + /bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1480. + /cgi/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1481. + /mpcgi/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1482. + /ows-bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1483. + /cgi-sys/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1484. + /cgi-local/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1485. + /htbin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1486. + /cgibin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1487. + /cgis/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1488. + /scripts/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1489. + /cgi-win/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1490. + /fcgi-bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1491. + /cgi-exe/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1492. + /cgi-home/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1493. + /cgi-perl/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1494. + /scgi-bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1495. + /cgi-bin-sdb/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1496. + /cgi-mod/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.
  1497. + /cfdocs/expeval/openfile.cfm: Can use to expose the system/server path.
  1498. + /cgi.cgi/banner.cgi: This CGI may allow attackers to read any file on the system.
  1499. + /webcgi/banner.cgi: This CGI may allow attackers to read any file on the system.
  1500. + /cgi-914/banner.cgi: This CGI may allow attackers to read any file on the system.
  1501. + /cgi-915/banner.cgi: This CGI may allow attackers to read any file on the system.
  1502. + /bin/banner.cgi: This CGI may allow attackers to read any file on the system.
  1503. + /cgi/banner.cgi: This CGI may allow attackers to read any file on the system.
  1504. + /mpcgi/banner.cgi: This CGI may allow attackers to read any file on the system.
  1505. + /ows-bin/banner.cgi: This CGI may allow attackers to read any file on the system.
  1506. + /cgi-sys/banner.cgi: This CGI may allow attackers to read any file on the system.
  1507. + /cgi-local/banner.cgi: This CGI may allow attackers to read any file on the system.
  1508. + /htbin/banner.cgi: This CGI may allow attackers to read any file on the system.
  1509. + /cgibin/banner.cgi: This CGI may allow attackers to read any file on the system.
  1510. + /cgis/banner.cgi: This CGI may allow attackers to read any file on the system.
  1511. + /scripts/banner.cgi: This CGI may allow attackers to read any file on the system.
  1512. + /cgi-win/banner.cgi: This CGI may allow attackers to read any file on the system.
  1513. + /fcgi-bin/banner.cgi: This CGI may allow attackers to read any file on the system.
  1514. + /cgi-exe/banner.cgi: This CGI may allow attackers to read any file on the system.
  1515. + /cgi-home/banner.cgi: This CGI may allow attackers to read any file on the system.
  1516. + /cgi-perl/banner.cgi: This CGI may allow attackers to read any file on the system.
  1517. + /scgi-bin/banner.cgi: This CGI may allow attackers to read any file on the system.
  1518. + /cgi-bin-sdb/banner.cgi: This CGI may allow attackers to read any file on the system.
  1519. + /cgi-mod/banner.cgi: This CGI may allow attackers to read any file on the system.
  1520. + /cgi.cgi/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1521. + /webcgi/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1522. + /cgi-914/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1523. + /cgi-915/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1524. + /bin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1525. + /cgi/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1526. + /mpcgi/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1527. + /ows-bin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1528. + /cgi-sys/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1529. + /cgi-local/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1530. + /htbin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1531. + /cgibin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1532. + /cgis/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1533. + /scripts/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1534. + /cgi-win/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1535. + /fcgi-bin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1536. + /cgi-exe/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1537. + /cgi-home/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1538. + /cgi-perl/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1539. + /scgi-bin/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1540. + /cgi-bin-sdb/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1541. + /cgi-mod/bannereditor.cgi: This CGI may allow attackers to read any file on the system.
  1542. + /cgi.cgi/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1543. + /webcgi/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1544. + /cgi-914/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1545. + /cgi-915/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1546. + /bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1547. + /cgi/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1548. + /mpcgi/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1549. + /ows-bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1550. + /cgi-sys/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1551. + /cgi-local/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1552. + /htbin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1553. + /cgibin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1554. + /cgis/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1555. + /scripts/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1556. + /cgi-win/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1557. + /fcgi-bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1558. + /cgi-exe/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1559. + /cgi-home/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1560. + /cgi-perl/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1561. + /scgi-bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1562. + /cgi-bin-sdb/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1563. + /cgi-mod/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
  1564. + /cgi.cgi/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1565. + /webcgi/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1566. + /cgi-914/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1567. + /cgi-915/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1568. + /bin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1569. + /cgi/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1570. + /mpcgi/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1571. + /ows-bin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1572. + /cgi-sys/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1573. + /cgi-local/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1574. + /htbin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1575. + /cgibin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1576. + /cgis/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1577. + /scripts/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1578. + /cgi-win/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1579. + /fcgi-bin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1580. + /cgi-exe/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1581. + /cgi-home/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1582. + /cgi-perl/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1583. + /scgi-bin/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1584. + /cgi-bin-sdb/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1585. + /cgi-mod/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
  1586. + /cgi.cgi/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1587. + /webcgi/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1588. + /cgi-914/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1589. + /cgi-915/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1590. + /bin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1591. + /cgi/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1592. + /mpcgi/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1593. + /ows-bin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1594. + /cgi-sys/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1595. + /cgi-local/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1596. + /htbin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1597. + /cgibin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1598. + /cgis/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1599. + /scripts/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1600. + /cgi-win/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1601. + /fcgi-bin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1602. + /cgi-exe/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1603. + /cgi-home/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1604. + /cgi-perl/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1605. + /scgi-bin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1606. + /cgi-bin-sdb/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1607. + /cgi-mod/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more.
  1608. + /tsweb/: Microsoft TSAC found. http://www.dslwebserver.com/main/fr_index.html?/main/sbs-Terminal-Services-Advanced-Client-Configuration.html
  1609. + /cgi.cgi/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1610. + /webcgi/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1611. + /cgi-914/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1612. + /cgi-915/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1613. + /bin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1614. + /cgi/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1615. + /mpcgi/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1616. + /ows-bin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1617. + /cgi-sys/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1618. + /cgi-local/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1619. + /htbin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1620. + /cgibin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1621. + /cgis/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1622. + /scripts/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1623. + /cgi-win/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1624. + /fcgi-bin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1625. + /cgi-exe/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1626. + /cgi-home/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1627. + /cgi-perl/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1628. + /scgi-bin/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1629. + /cgi-bin-sdb/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1630. + /cgi-mod/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
  1631. + /vgn/performance/TMT: Vignette CMS admin/maintenance script available.
  1632. + /vgn/performance/TMT/Report: Vignette CMS admin/maintenance script available.
  1633. + /vgn/performance/TMT/Report/XML: Vignette CMS admin/maintenance script available.
  1634. + /vgn/performance/TMT/reset: Vignette CMS admin/maintenance script available.
  1635. + /vgn/ppstats: Vignette CMS admin/maintenance script available.
  1636. + /vgn/previewer: Vignette CMS admin/maintenance script available.
  1637. + /vgn/record/previewer: Vignette CMS admin/maintenance script available.
  1638. + /vgn/stylepreviewer: Vignette CMS admin/maintenance script available.
  1639. + /vgn/vr/Deleting: Vignette CMS admin/maintenance script available.
  1640. + /vgn/vr/Editing: Vignette CMS admin/maintenance script available.
  1641. + /vgn/vr/Saving: Vignette CMS admin/maintenance script available.
  1642. + /vgn/vr/Select: Vignette CMS admin/maintenance script available.
  1643. + /scripts/iisadmin/bdir.htr: This default script shows host info, may allow file browsing and buffer a overrun in the Chunked Encoding data transfer mechanism, request /scripts/iisadmin/bdir.htr??c:\<dirs> . http://www.microsoft.com/technet/security/bulletin/MS02-028.asp. http://www.cert.org/advisories/CA-2002-09.html.
  1644. + /scripts/iisadmin/ism.dll: Allows you to mount a brute force attack on passwords
  1645. + /scripts/tools/ctss.idc: This CGI allows remote users to view and modify SQL DB contents, server paths, docroot and more.
  1646. + /bigconf.cgi: BigIP Configuration CGI
  1647. + /blah_badfile.shtml: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.
  1648. + OSVDB-4910: /vgn/style: Vignette server may reveal system information through this file.
  1649. + OSVDB-17653: /SiteServer/Admin/commerce/foundation/domain.asp: Displays known domains of which that server is involved.
  1650. + OSVDB-17654: /SiteServer/Admin/commerce/foundation/driver.asp: Displays a list of installed ODBC drivers.
  1651. + OSVDB-17655: /SiteServer/Admin/commerce/foundation/DSN.asp: Displays all DSNs configured for selected ODBC drivers.
  1652. + OSVDB-17652: /SiteServer/admin/findvserver.asp: Gives a list of installed Site Server components.
  1653. + /SiteServer/Admin/knowledge/dsmgr/default.asp: Used to view current search catalog configurations
  1654. + OSVDB-1909: /cgi.cgi/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1655. + OSVDB-1909: /webcgi/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1656. + OSVDB-1909: /cgi-914/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1657. + OSVDB-1909: /cgi-915/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1658. + OSVDB-1909: /bin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1659. + OSVDB-1909: /cgi/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1660. + OSVDB-1909: /mpcgi/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1661. + OSVDB-1909: /ows-bin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1662. + OSVDB-1909: /cgi-sys/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1663. + OSVDB-1909: /cgi-local/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1664. + OSVDB-1909: /htbin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1665. + OSVDB-1909: /cgibin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1666. + OSVDB-1909: /cgis/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1667. + OSVDB-1909: /scripts/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1668. + OSVDB-1909: /cgi-win/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1669. + OSVDB-1909: /fcgi-bin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1670. + OSVDB-1909: /cgi-exe/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1671. + OSVDB-1909: /cgi-home/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1672. + OSVDB-1909: /cgi-perl/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1673. + OSVDB-1909: /scgi-bin/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1674. + OSVDB-1909: /cgi-bin-sdb/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1675. + OSVDB-1909: /cgi-mod/cgiwrap/%3Cfont%20color=red%3E: cgiwrap allows HTML and possibly XSS injection. See http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html for details.
  1676. + OSVDB-2878: /cgi.cgi/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1677. + OSVDB-2878: /webcgi/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1678. + OSVDB-2878: /cgi-914/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1679. + OSVDB-2878: /cgi-915/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1680. + OSVDB-2878: /bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1681. + OSVDB-2878: /cgi/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1682. + OSVDB-2878: /mpcgi/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1683. + OSVDB-2878: /ows-bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1684. + OSVDB-2878: /cgi-sys/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1685. + OSVDB-2878: /cgi-local/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1686. + OSVDB-2878: /htbin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1687. + OSVDB-2878: /cgibin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1688. + OSVDB-2878: /cgis/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1689. + OSVDB-2878: /scripts/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1690. + OSVDB-2878: /cgi-win/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1691. + OSVDB-2878: /fcgi-bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1692. + OSVDB-2878: /cgi-exe/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1693. + OSVDB-2878: /cgi-home/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1694. + OSVDB-2878: /cgi-perl/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1695. + OSVDB-2878: /scgi-bin/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1696. + OSVDB-2878: /cgi-bin-sdb/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1697. + OSVDB-2878: /cgi-mod/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability
  1698. + /basilix/mbox-list.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'message list' function/page
  1699. + /basilix/message-read.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'read message' function/page
  1700. + /clusterframe.jsp: Macromedia JRun 4 build 61650 remote administration interface is vulnerable to several XSS attacks.
  1701. + /IlohaMail/blank.html: IlohaMail 0.8.10 contains a XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
  1702. + /bb-dnbd/faxsurvey: This may allow arbitrary command execution.
  1703. + /cartcart.cgi: If this is Dansie Shopping Cart 3.0.8 or earlier, it contains a backdoor to allow attackers to execute arbitrary commands.
  1704. + OSVDB-6591: /scripts/Carello/Carello.dll: Carello 1.3 may allow commands to be executed on the server by replacing hidden form elements. This could not be tested by Nikto.
  1705. + /scripts/tools/dsnform.exe: Allows creation of ODBC Data Source
  1706. + /scripts/tools/dsnform: Allows creation of ODBC Data Source
  1707. + OSVDB-17656: /SiteServer/Admin/knowledge/dsmgr/users/GroupManager.asp: Used to create, modify, and potentially delete LDAP users and groups.
  1708. + OSVDB-17657: /SiteServer/Admin/knowledge/dsmgr/users/UserManager.asp: Used to create, modify, and potentially delete LDAP users and groups.
  1709. + /prd.i/pgen/: Has MS Merchant Server 1.0
  1710. + /readme.eml: Remote server may be infected with the Nimda virus.
  1711. + /scripts/httpodbc.dll: Possible IIS backdoor found.
  1712. + /scripts/proxy/w3proxy.dll: MSProxy v1.0 installed
  1713. + /SiteServer/admin/: Site Server components admin. Default account may be 'LDAP_Anonymous', pass is 'LdapPassword_1'. see http://www.wiretrip.net/rfp/p/doc.asp/i1/d69.htm
  1714. + /siteseed/: Siteseed pre 1.4.2 has 'major' security problems.
  1715. + /pccsmysqladm/incs/dbconnect.inc: This file should not be accessible, as it contains database connectivity information. Upgrade to version 1.2.5 or higher.
  1716. + /iisadmin/: Access to /iisadmin should be restricted to localhost or allowed hosts only.
  1717. + /PDG_Cart/oder.log: Shopping cart software log
  1718. + /ows/restricted%2eshow: OWS may allow restricted files to be viewed by replacing a character with its encoded equivalent.
  1719. + /WEB-INF./web.xml: Multiple implementations of j2ee servlet containers allow files to be retrieved from WEB-INF by appending a '.' to the directory name. Products include Sybase EA Service, Oracle Containers, Orion, JRun, HPAS, Pramati and others. See http://www.westpoint.l
  1720. + /view_source.jsp: Resin 2.1.2 view_source.jsp allows any file on the system to be viewed by using \..\ directory traversal. This script may be vulnerable.
  1721. + /w-agora/: w-agora pre 4.1.4 may allow a remote user to execute arbitrary PHP scripts via URL includes in include/*.php and user/*.php files. Default account is 'admin' but password set during install.
  1722. + OSVDB-42680: /vider.php3: MySimpleNews may allow deleting of news items without authentication.
  1723. + OSVDB-6181: /officescan/cgi/cgiChkMasterPwd.exe: Trend Micro Officescan allows you to skip the login page and access some CGI programs directly.
  1724. + /cgi.cgi/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1725. + /webcgi/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1726. + /cgi-914/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1727. + /cgi-915/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1728. + /bin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1729. + /cgi/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1730. + /mpcgi/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1731. + /ows-bin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1732. + /cgi-sys/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1733. + /cgi-local/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1734. + /htbin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1735. + /cgibin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1736. + /cgis/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1737. + /scripts/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1738. + /cgi-win/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1739. + /fcgi-bin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1740. + /cgi-exe/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1741. + /cgi-home/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1742. + /cgi-perl/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1743. + /scgi-bin/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1744. + /cgi-bin-sdb/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1745. + /cgi-mod/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow http://www.securityfocus.com/bid/4684. Prior to 2.1.3 contained unspecified security bugs
  1746. + /cgi.cgi/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1747. + /webcgi/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1748. + /cgi-914/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1749. + /cgi-915/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1750. + /bin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1751. + /cgi/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1752. + /mpcgi/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1753. + /ows-bin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1754. + /cgi-sys/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1755. + /cgi-local/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1756. + /htbin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1757. + /cgibin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1758. + /cgis/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1759. + /scripts/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1760. + /cgi-win/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1761. + /fcgi-bin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1762. + /cgi-exe/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1763. + /cgi-home/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1764. + /cgi-perl/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1765. + /scgi-bin/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1766. + /cgi-bin-sdb/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1767. + /cgi-mod/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.
  1768. + OSVDB-2017: /cgi.cgi/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1769. + OSVDB-2017: /webcgi/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1770. + OSVDB-2017: /cgi-914/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1771. + OSVDB-2017: /cgi-915/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1772. + OSVDB-2017: /bin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1773. + OSVDB-2017: /cgi/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1774. + OSVDB-2017: /mpcgi/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1775. + OSVDB-2017: /ows-bin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1776. + OSVDB-2017: /cgi-sys/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1777. + OSVDB-2017: /cgi-local/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1778. + OSVDB-2017: /htbin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1779. + OSVDB-2017: /cgibin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1780. + OSVDB-2017: /cgis/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1781. + OSVDB-2017: /scripts/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1782. + OSVDB-2017: /cgi-win/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1783. + OSVDB-2017: /fcgi-bin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1784. + OSVDB-2017: /cgi-exe/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1785. + OSVDB-2017: /cgi-home/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1786. + OSVDB-2017: /cgi-perl/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1787. + OSVDB-2017: /scgi-bin/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1788. + OSVDB-2017: /cgi-bin-sdb/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1789. + OSVDB-2017: /cgi-mod/boozt/admin/index.cgi?section=5&input=1: Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.
  1790. + /cgi.cgi/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1791. + /webcgi/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1792. + /cgi-914/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1793. + /cgi-915/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1794. + /bin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1795. + /cgi/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1796. + /mpcgi/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1797. + /ows-bin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1798. + /cgi-sys/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1799. + /cgi-local/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1800. + /htbin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1801. + /cgibin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1802. + /cgis/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1803. + /scripts/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1804. + /cgi-win/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1805. + /fcgi-bin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1806. + /cgi-exe/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1807. + /cgi-home/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1808. + /cgi-perl/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1809. + /scgi-bin/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1810. + /cgi-bin-sdb/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1811. + /cgi-mod/ezadmin.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1812. + /cgi.cgi/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1813. + /webcgi/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1814. + /cgi-914/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1815. + /cgi-915/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1816. + /bin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1817. + /cgi/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1818. + /mpcgi/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1819. + /ows-bin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1820. + /cgi-sys/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1821. + /cgi-local/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1822. + /htbin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1823. + /cgibin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1824. + /cgis/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1825. + /scripts/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1826. + /cgi-win/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1827. + /fcgi-bin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1828. + /cgi-exe/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1829. + /cgi-home/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1830. + /cgi-perl/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1831. + /scgi-bin/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1832. + /cgi-bin-sdb/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1833. + /cgi-mod/ezboard.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1834. + /cgi.cgi/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1835. + /webcgi/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1836. + /cgi-914/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1837. + /cgi-915/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1838. + /bin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1839. + /cgi/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1840. + /mpcgi/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1841. + /ows-bin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1842. + /cgi-sys/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1843. + /cgi-local/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1844. + /htbin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1845. + /cgibin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1846. + /cgis/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1847. + /scripts/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1848. + /cgi-win/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1849. + /fcgi-bin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1850. + /cgi-exe/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1851. + /cgi-home/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1852. + /cgi-perl/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1853. + /scgi-bin/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1854. + /cgi-bin-sdb/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1855. + /cgi-mod/ezman.cgi: Some versions of this CGI are vulnerable to a buffer overflow.
  1856. + OSVDB-11740: /cgi.cgi/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1857. + OSVDB-11740: /webcgi/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1858. + OSVDB-11740: /cgi-914/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1859. + OSVDB-11740: /cgi-915/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1860. + OSVDB-11740: /bin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1861. + OSVDB-11740: /cgi/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1862. + OSVDB-11740: /mpcgi/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1863. + OSVDB-11740: /ows-bin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1864. + OSVDB-11740: /cgi-sys/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1865. + OSVDB-11740: /cgi-local/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1866. + OSVDB-11740: /htbin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1867. + OSVDB-11740: /cgibin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1868. + OSVDB-11740: /cgis/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1869. + OSVDB-11740: /scripts/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1870. + OSVDB-11740: /cgi-win/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1871. + OSVDB-11740: /fcgi-bin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1872. + OSVDB-11740: /cgi-exe/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1873. + OSVDB-11740: /cgi-home/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1874. + OSVDB-11740: /cgi-perl/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1875. + OSVDB-11740: /scgi-bin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1876. + OSVDB-11740: /cgi-bin-sdb/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1877. + OSVDB-11740: /cgi-mod/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1878. + OSVDB-11741: /cgi.cgi/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1879. + OSVDB-11741: /webcgi/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1880. + OSVDB-11741: /cgi-914/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1881. + OSVDB-11741: /cgi-915/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1882. + OSVDB-11741: /bin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1883. + OSVDB-11741: /cgi/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1884. + OSVDB-11741: /mpcgi/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1885. + OSVDB-11741: /ows-bin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1886. + OSVDB-11741: /cgi-sys/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1887. + OSVDB-11741: /cgi-local/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1888. + OSVDB-11741: /htbin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1889. + OSVDB-11741: /cgibin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1890. + OSVDB-11741: /cgis/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1891. + OSVDB-11741: /scripts/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1892. + OSVDB-11741: /cgi-win/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1893. + OSVDB-11741: /fcgi-bin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1894. + OSVDB-11741: /cgi-exe/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1895. + OSVDB-11741: /cgi-home/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1896. + OSVDB-11741: /cgi-perl/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1897. + OSVDB-11741: /scgi-bin/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1898. + OSVDB-11741: /cgi-bin-sdb/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1899. + OSVDB-11741: /cgi-mod/foxweb.exe: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.
  1900. + /cgi.cgi/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1901. + /webcgi/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1902. + /cgi-914/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1903. + /cgi-915/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1904. + /bin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1905. + /cgi/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1906. + /mpcgi/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1907. + /ows-bin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1908. + /cgi-sys/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1909. + /cgi-local/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1910. + /htbin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1911. + /cgibin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1912. + /cgis/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1913. + /scripts/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1914. + /cgi-win/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1915. + /fcgi-bin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1916. + /cgi-exe/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1917. + /cgi-perl/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1918. + /scgi-bin/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1919. + /cgi-bin-sdb/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1920. + /cgi-mod/mgrqcgi: This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.
  1921. + /cgi.cgi/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1922. + /webcgi/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1923. + /cgi-914/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1924. + /cgi-915/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1925. + /bin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1926. + /cgi/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1927. + /mpcgi/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1928. + /ows-bin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1929. + /cgi-sys/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1930. + /cgi-local/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1931. + /htbin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1932. + /cgibin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1933. + /cgis/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1934. + /scripts/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1935. + /cgi-win/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1936. + /fcgi-bin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1937. + /cgi-exe/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1938. + /cgi-home/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1939. + /cgi-perl/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1940. + /scgi-bin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1941. + /cgi-bin-sdb/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1942. + /cgi-mod/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
  1943. + /pbserver/pbserver.dll: This may contain a buffer overflow. http://www.microsoft.com/technet/security/bulletin/http://www.microsoft.com/technet/security/bulletin/ms00-094.asp.asp
  1944. + /administrator/gallery/uploadimage.php: Mambo PHP Portal/Server 4.0.12 BETA and below may allow upload of any file type simply putting '.jpg' before the real file extension.
  1945. + /pafiledb/includes/team/file.php: paFileDB 3.1 and below may allow file upload without authentication.
  1946. + /phpEventCalendar/file_upload.php: phpEventCalendar 1.1 and prior are vulnerable to file upload bug.
  1947. + /servlet/com.unify.servletexec.UploadServlet: This servlet allows attackers to upload files to the server.
  1948. + /cgi.cgi/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1949. + /webcgi/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1950. + /cgi-914/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1951. + /cgi-915/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1952. + /bin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1953. + /cgi/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1954. + /mpcgi/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1955. + /ows-bin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1956. + /cgi-sys/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1957. + /cgi-local/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1958. + /htbin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1959. + /cgibin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1960. + /cgis/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1961. + /scripts/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1962. + /cgi-win/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1963. + /fcgi-bin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1964. + /cgi-exe/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1965. + /cgi-home/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1966. + /cgi-perl/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1967. + /scgi-bin/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1968. + /cgi-bin-sdb/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1969. + /cgi-mod/uploader.exe: This CGI allows attackers to upload files to the server and then execute them.
  1970. + /scripts/cpshost.dll: Posting acceptor possibly allows you to upload files
  1971. + /upload.asp: An ASP page that allows attackers to upload files to server
  1972. + /uploadn.asp: An ASP page that allows attackers to upload files to server
  1973. + /uploadx.asp: An ASP page that allows attackers to upload files to server
  1974. + /wa.exe: An ASP page that allows attackers to upload files to server
  1975. + /basilix/compose-attach.php3: BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads
  1976. + /server/: Possibly Macromedia JRun or CRX WebDAV upload
  1977. + /cgi.cgi/fpsrvadm.exe: Potentially vulnerable CGI program.
  1978. + /webcgi/fpsrvadm.exe: Potentially vulnerable CGI program.
  1979. + /cgi-914/fpsrvadm.exe: Potentially vulnerable CGI program.
  1980. + /cgi-915/fpsrvadm.exe: Potentially vulnerable CGI program.
  1981. + /bin/fpsrvadm.exe: Potentially vulnerable CGI program.
  1982. + /cgi/fpsrvadm.exe: Potentially vulnerable CGI program.
  1983. + /mpcgi/fpsrvadm.exe: Potentially vulnerable CGI program.
  1984. + /ows-bin/fpsrvadm.exe: Potentially vulnerable CGI program.
  1985. + /cgi-sys/fpsrvadm.exe: Potentially vulnerable CGI program.
  1986. + /cgi-local/fpsrvadm.exe: Potentially vulnerable CGI program.
  1987. + /htbin/fpsrvadm.exe: Potentially vulnerable CGI program.
  1988. + /cgibin/fpsrvadm.exe: Potentially vulnerable CGI program.
  1989. + /cgis/fpsrvadm.exe: Potentially vulnerable CGI program.
  1990. + /scripts/fpsrvadm.exe: Potentially vulnerable CGI program.
  1991. + /cgi-win/fpsrvadm.exe: Potentially vulnerable CGI program.
  1992. + /fcgi-bin/fpsrvadm.exe: Potentially vulnerable CGI program.
  1993. + /cgi-exe/fpsrvadm.exe: Potentially vulnerable CGI program.
  1994. + /cgi-home/fpsrvadm.exe: Potentially vulnerable CGI program.
  1995. + /cgi-perl/fpsrvadm.exe: Potentially vulnerable CGI program.
  1996. + /scgi-bin/fpsrvadm.exe: Potentially vulnerable CGI program.
  1997. + /cgi-bin-sdb/fpsrvadm.exe: Potentially vulnerable CGI program.
  1998. + /cgi-mod/fpsrvadm.exe: Potentially vulnerable CGI program.
  1999. + /vgn/ac/data: Vignette CMS admin/maintenance script available.
  2000. + /vgn/ac/delete: Vignette CMS admin/maintenance script available.
  2001. + /vgn/ac/edit: Vignette CMS admin/maintenance script available.
  2002. + /vgn/ac/esave: Vignette CMS admin/maintenance script available.
  2003. + /vgn/ac/fsave: Vignette CMS admin/maintenance script available.
  2004. + /vgn/ac/index: Vignette CMS admin/maintenance script available.
  2005. + /vgn/asp/MetaDataUpdate: Vignette CMS admin/maintenance script available.
  2006. + /vgn/asp/previewer: Vignette CMS admin/maintenance script available.
  2007. + /vgn/asp/status: Vignette CMS admin/maintenance script available.
  2008. + /vgn/asp/style: Vignette CMS admin/maintenance script available.
  2009. + /vgn/errors: Vignette CMS admin/maintenance script available.
  2010. + /vgn/jsp/controller: Vignette CMS admin/maintenance script available.
  2011. + /vgn/jsp/errorpage: Vignette CMS admin/maintenance script available.
  2012. + /vgn/jsp/initialize: Vignette CMS admin/maintenance script available.
  2013. + /vgn/jsp/jspstatus: Vignette CMS admin/maintenance script available.
  2014. + /vgn/jsp/jspstatus56: Vignette CMS admin/maintenance script available.
  2015. + /vgn/jsp/metadataupdate: Vignette CMS admin/maintenance script available.
  2016. + /vgn/jsp/previewer: Vignette CMS admin/maintenance script available.
  2017. + /vgn/jsp/style: Vignette CMS admin/maintenance script available.
  2018. + /vgn/legacy/edit: Vignette CMS admin/maintenance script available.
  2019. + /vgn/login: Vignette server may allow user enumeration based on the login attempts to this file.
  2020. + /cgi.cgi/.cobalt: May allow remote admin of CGI scripts.
  2021. + /webcgi/.cobalt: May allow remote admin of CGI scripts.
  2022. + /cgi-914/.cobalt: May allow remote admin of CGI scripts.
  2023. + /cgi-915/.cobalt: May allow remote admin of CGI scripts.
  2024. + /bin/.cobalt: May allow remote admin of CGI scripts.
  2025. + /cgi/.cobalt: May allow remote admin of CGI scripts.
  2026. + /mpcgi/.cobalt: May allow remote admin of CGI scripts.
  2027. + /ows-bin/.cobalt: May allow remote admin of CGI scripts.
  2028. + /cgi-sys/.cobalt: May allow remote admin of CGI scripts.
  2029. + /cgi-local/.cobalt: May allow remote admin of CGI scripts.
  2030. + /htbin/.cobalt: May allow remote admin of CGI scripts.
  2031. + /cgibin/.cobalt: May allow remote admin of CGI scripts.
  2032. + /cgis/.cobalt: May allow remote admin of CGI scripts.
  2033. + /scripts/.cobalt: May allow remote admin of CGI scripts.
  2034. + /cgi-win/.cobalt: May allow remote admin of CGI scripts.
  2035. + /fcgi-bin/.cobalt: May allow remote admin of CGI scripts.
  2036. + /cgi-exe/.cobalt: May allow remote admin of CGI scripts.
  2037. + /cgi-home/.cobalt: May allow remote admin of CGI scripts.
  2038. + /cgi-perl/.cobalt: May allow remote admin of CGI scripts.
  2039. + /scgi-bin/.cobalt: May allow remote admin of CGI scripts.
  2040. + /cgi-bin-sdb/.cobalt: May allow remote admin of CGI scripts.
  2041. + /cgi-mod/.cobalt: May allow remote admin of CGI scripts.
  2042. + OSVDB-35707: /forum/admin/wwforum.mdb: Web Wiz Forums password database found.
  2043. + /fpdb/shop.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
  2044. + OSVDB-52975: /guestbook/admin/o12guest.mdb: Ocean12 ASP Guestbook Manager allows download of SQL database which contains admin password.
  2045. + OSVDB-15971: /midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
  2046. + OSVDB-15971: /MIDICART/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
  2047. + OSVDB-41850: /mpcsoftweb_guestbook/database/mpcsoftweb_guestdata.mdb: MPCSoftWeb Guest Book passwords retrieved.
  2048. + /news/news.mdb: Web Wiz Site News release v3.06 admin password database is available and unencrypted.
  2049. + OSVDB-53413: /shopping300.mdb: VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.
  2050. + OSVDB-53413: /shopping400.mdb: VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.
  2051. + OSVDB-15971: /shoppingdirectory/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
  2052. + OSVDB-4398: /database/db2000.mdb: Max Web Portal database is available remotely. It should be moved from the default location to a directory outside the web root.
  2053. + OSVDB-319: /cgi.cgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2054. + OSVDB-319: /webcgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2055. + OSVDB-319: /cgi-914/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2056. + OSVDB-319: /cgi-915/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2057. + OSVDB-319: /bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2058. + OSVDB-319: /cgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2059. + OSVDB-319: /mpcgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2060. + OSVDB-319: /ows-bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2061. + OSVDB-319: /cgi-sys/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2062. + OSVDB-319: /cgi-local/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2063. + OSVDB-319: /htbin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2064. + OSVDB-319: /cgibin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2065. + OSVDB-319: /cgis/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2066. + OSVDB-319: /scripts/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2067. + OSVDB-319: /cgi-win/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2068. + OSVDB-319: /fcgi-bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2069. + OSVDB-319: /cgi-exe/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2070. + OSVDB-319: /cgi-home/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2071. + OSVDB-319: /cgi-perl/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2072. + OSVDB-319: /scgi-bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2073. + OSVDB-319: /cgi-bin-sdb/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2074. + OSVDB-319: /cgi-mod/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI.
  2075. + /admin/config.php: PHP Config file may contain database IDs and passwords.
  2076. + /adm/config.php: PHP Config file may contain database IDs and passwords.
  2077. + /administrator/config.php: PHP Config file may contain database IDs and passwords.
  2078. + /cgi.cgi/.access: Contains authorization information
  2079. + /webcgi/.access: Contains authorization information
  2080. + /cgi-914/.access: Contains authorization information
  2081. + /cgi-915/.access: Contains authorization information
  2082. + /bin/.access: Contains authorization information
  2083. + /cgi/.access: Contains authorization information
  2084. + /mpcgi/.access: Contains authorization information
  2085. + /ows-bin/.access: Contains authorization information
  2086. + /cgi-sys/.access: Contains authorization information
  2087. + /cgi-local/.access: Contains authorization information
  2088. + /htbin/.access: Contains authorization information
  2089. + /cgibin/.access: Contains authorization information
  2090. + /cgis/.access: Contains authorization information
  2091. + /scripts/.access: Contains authorization information
  2092. + /cgi-win/.access: Contains authorization information
  2093. + /fcgi-bin/.access: Contains authorization information
  2094. + /cgi-exe/.access: Contains authorization information
  2095. + /cgi-home/.access: Contains authorization information
  2096. + /cgi-perl/.access: Contains authorization information
  2097. + /scgi-bin/.access: Contains authorization information
  2098. + /cgi-bin-sdb/.access: Contains authorization information
  2099. + /cgi-mod/.access: Contains authorization information
  2100. + OSVDB-11093: /cgi.cgi/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2101. + OSVDB-11093: /webcgi/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2102. + OSVDB-11093: /cgi-914/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2103. + OSVDB-11093: /cgi-915/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2104. + OSVDB-11093: /bin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2105. + OSVDB-11093: /cgi/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2106. + OSVDB-11093: /mpcgi/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2107. + OSVDB-11093: /cgi-bin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2108. + OSVDB-11093: /ows-bin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2109. + OSVDB-11093: /cgi-sys/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2110. + OSVDB-11093: /cgi-local/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2111. + OSVDB-11093: /htbin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2112. + OSVDB-11093: /cgibin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2113. + OSVDB-11093: /cgis/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2114. + OSVDB-11093: /scripts/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2115. + OSVDB-11093: /cgi-win/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2116. + OSVDB-11093: /fcgi-bin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2117. + OSVDB-11093: /cgi-exe/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2118. + OSVDB-11093: /cgi-home/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2119. + OSVDB-11093: /cgi-perl/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2120. + OSVDB-11093: /scgi-bin/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2121. + OSVDB-11093: /cgi-bin-sdb/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2122. + OSVDB-11093: /cgi-mod/%2e%2e/abyss.conf: The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0 from http://www.aprelium.com/
  2123. + ERROR: Error limit (20) reached for host, giving up. Last error: error reading HTTP response
  2124. + Scan terminated: 11 error(s) and 1379 item(s) reported on remote host
  2125. + End Time: 2018-04-24 20:24:24 (GMT-4) (2504 seconds)
  2126. ---------------------------------------------------------------------------------------------------------------------------------------
  2127. #######################################################################################################################################
  2128. Scan date: 24-4-2018 19:42:39
  2129. =======================================================================================================================================
  2130. | Domain: http://notes.io/
  2131. | Server: Apache/2.2.23 (FreeBSD) PHP/5.4.7 mod_ssl/2.2.23 OpenSSL/0.9.8y DAV/2
  2132. | IP: 77.223.131.30
  2133. =======================================================================================================================================
  2134. |
  2135. | Directory check:
  2136. | Skipped because http://notes.io/uniscan466/ did not return the code 404
  2137. =======================================================================================================================================
  2138. |
  2139. | File check:
  2140. | Skipped because http://notes.io/uniscan202/ did not return the code 404
  2141. =======================================================================================================================================
  2142. |
  2143. | Check robots.txt:
  2144. | [+] User-agent: *
  2145. | [+] Disallow: /api/
  2146. | [+] Disallow: /temp/
  2147. | [+] Disallow: /short.php
  2148. | [+] Disallow: /favicon.ico
  2149. |
  2150. | Check sitemap.xml:
  2151. =======================================================================================================================================
  2152. |
  2153. | Crawler Started:
  2154. | Plugin name: E-mail Detection v.1.1 Loaded.
  2155. | Plugin name: phpinfo() Disclosure v.1 Loaded.
  2156. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  2157. | Plugin name: FCKeditor upload test v.1 Loaded.
  2158. | Plugin name: Upload Form Detect v.1.1 Loaded.
  2159. | Plugin name: External Host Detect v.1.2 Loaded.
  2160. | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
  2161. | Plugin name: Code Disclosure v.1.1 Loaded.
  2162. | [+] Crawling finished, 37 URL's found!
  2163. |
  2164. | E-mails:
  2165. | [+] E-mail Found: hello@notes.io
  2166. |
  2167. | PHPinfo() Disclosure:
  2168. |
  2169. | Timthumb:
  2170. |
  2171. | FCKeditor File Upload:
  2172. |
  2173. | File Upload Forms:
  2174. | [+] Upload Form Found: http://notes.io//api/apiTest.php
  2175. |
  2176. | External hosts:
  2177. | [+] External Host Found: http://www.iosprogramlama.com
  2178. |
  2179. | Web Backdoors:
  2180. |
  2181. | Source Code Disclosure:
  2182. |
  2183. | Ignored Files:
  2184. #######################################################################################################################################
  2185. Server: 10.211.254.254
  2186. Address: 10.211.254.254#53
  2187.  
  2188. Non-authoritative answer:
  2189. Name: notes.io
  2190. Address: 77.223.131.30
  2191.  
  2192. notes.io has address 77.223.131.30
  2193. notes.io mail is handled by 10 aspmx.l.google.com.
  2194. notes.io mail is handled by 20 alt2.aspmx.l.google.com.
  2195. notes.io mail is handled by 30 aspmx3.googlemail.com.
  2196. notes.io mail is handled by 30 aspmx2.googlemail.com.
  2197. notes.io mail is handled by 30 aspmx5.googlemail.com.
  2198. notes.io mail is handled by 30 aspmx4.googlemail.com.
  2199. notes.io mail is handled by 20 alt1.aspmx.l.google.com.
  2200. #######################################################################################################################################
  2201. [-] fingerprint:snmp: need UDP port 161 open
  2202.  
  2203. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  2204.  
  2205. [+] Target is notes.io
  2206. [+] Loading modules.
  2207. [+] Following modules are loaded:
  2208. [x] [1] ping:icmp_ping - ICMP echo discovery module
  2209. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  2210. [x] [3] ping:udp_ping - UDP-based ping discovery module
  2211. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  2212. [x] [5] infogather:portscan - TCP and UDP PortScanner
  2213. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  2214. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  2215. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  2216. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  2217. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  2218. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  2219. [x] [12] fingerprint:smb - SMB fingerprinting module
  2220. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  2221. [+] 13 modules registered
  2222. [+] Initializing scan engine
  2223. [+] Running scan engine
  2224. [-] ping:tcp_ping module: no closed/open TCP ports known on 77.223.131.30. Module test failed
  2225. [-] ping:udp_ping module: no closed/open UDP ports known on 77.223.131.30. Module test failed
  2226. [-] No distance calculation. 77.223.131.30 appears to be dead or no ports known
  2227. [+] Host: 77.223.131.30 is up (Guess probability: 50%)
  2228. [+] Target: 77.223.131.30 is alive. Round-Trip Time: 0.49569 sec
  2229. [+] Selected safe Round-Trip Time value is: 0.99138 sec
  2230. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  2231. [-] fingerprint:smb need either TCP port 139 or 445 to run
  2232. [+] Primary guess:
  2233. [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
  2234. [+] Other guesses:
  2235. [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
  2236. [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
  2237. [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
  2238. [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
  2239. [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
  2240. [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
  2241. [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
  2242. [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
  2243. [+] Host 77.223.131.30 Running OS: �[.�U (Guess probability: 82%)
  2244. [+] Cleaning up scan engine
  2245. [+] Modules deinitialized
  2246. [+] Execution completed.
  2247. #######################################################################################################################################
  2248. Domain Name: NOTES.IO
  2249. Registry Domain ID: D503300000040582279-LRMS
  2250. Registrar WHOIS Server: whois.rrpproxy.net
  2251. Registrar URL: http://www.key-systems.net
  2252. Updated Date: 2017-08-12T11:36:08Z
  2253. Creation Date: 2010-08-13T21:49:24Z
  2254. Registry Expiry Date: 2018-08-13T21:49:24Z
  2255. Registrar Registration Expiration Date:
  2256. Registrar: Key-Systems GmbH
  2257. Registrar IANA ID: 269
  2258. Registrar Abuse Contact Email: abuse@key-systems.net
  2259. Registrar Abuse Contact Phone: +49.68949396850
  2260. Reseller:
  2261. Domain Status: ok https://icann.org/epp#ok
  2262. Registrant Name: Domain Registrar
  2263. Registrant Organization: METROMEDYA Digital Ad Agency
  2264. Name Server: NS2.METROMEDYA.COM
  2265. Name Server: NS1.METROMEDYA.COM
  2266. DNSSEC: unsigned
  2267. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  2268. >>> Last update of WHOIS database: 2018-04-24T23:40:54Z <<<
  2269. #######################################################################################################################################
  2270. ; <<>> DiG 9.11.3-1-Debian <<>> -x notes.io
  2271. ;; global options: +cmd
  2272. ;; Got answer:
  2273. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14720
  2274. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  2275.  
  2276. ;; OPT PSEUDOSECTION:
  2277. ; EDNS: version: 0, flags:; udp: 4096
  2278. ;; QUESTION SECTION:
  2279. ;io.notes.in-addr.arpa. IN PTR
  2280.  
  2281. ;; AUTHORITY SECTION:
  2282. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2018013358 1800 900 604800 3600
  2283.  
  2284. ;; Query time: 265 msec
  2285. ;; SERVER: 10.211.254.254#53(10.211.254.254)
  2286. ;; WHEN: Tue Apr 24 19:41:55 EDT 2018
  2287. ;; MSG SIZE rcvd: 118
  2288.  
  2289. Smartmatch is experimental at /usr/bin/dnsenum line 698.
  2290. Smartmatch is experimental at /usr/bin/dnsenum line 698.
  2291. AXFR record query failed: REFUSED
  2292. AXFR record query failed: REFUSED
  2293. dnsenum VERSION:1.2.4
  2294.  
  2295. ----- notes.io -----
  2296.  
  2297.  
  2298. Host's addresses:
  2299. __________________
  2300.  
  2301. notes.io. 3593 IN A 77.223.131.30
  2302.  
  2303.  
  2304. Name Servers:
  2305. ______________
  2306.  
  2307. ns1.metromedya.com. 3591 IN A 77.223.131.34
  2308. ns2.metromedya.com. 3591 IN A 77.223.131.35
  2309.  
  2310.  
  2311. Mail (MX) Servers:
  2312. ___________________
  2313.  
  2314. aspmx.l.google.com. 293 IN A 108.177.112.26
  2315. alt2.ASPMX.l.google.com. 124 IN A 74.125.141.27
  2316. aspmx3.googlemail.com. 293 IN A 74.125.141.27
  2317. aspmx2.googlemail.com. 293 IN A 108.177.122.27
  2318. aspmx5.googlemail.com. 293 IN A 209.85.202.27
  2319. aspmx4.googlemail.com. 293 IN A 64.233.186.27
  2320. alt1.ASPMX.l.google.com. 122 IN A 209.85.144.27
  2321.  
  2322.  
  2323. Trying Zone Transfers and getting Bind Versions:
  2324. _________________________________________________
  2325.  
  2326.  
  2327. Trying Zone Transfer for notes.io on ns2.metromedya.com ...
  2328.  
  2329. Trying Zone Transfer for notes.io on ns1.metromedya.com ...
  2330.  
  2331. brute force file not specified, bay.
  2332. #######################################################################################################################################
  2333. ____ _ _ _ _ _____
  2334. / ___| _ _| |__ | (_)___| |_|___ / _ __
  2335. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  2336. ___) | |_| | |_) | | \__ \ |_ ___) | |
  2337. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  2338.  
  2339. # Coded By Ahmed Aboul-Ela - @aboul3la
  2340.  
  2341. [-] Enumerating subdomains now for notes.io
  2342. [-] verbosity is enabled, will show the subdomains results in realtime
  2343. [-] Searching now in Baidu..
  2344. [-] Searching now in Yahoo..
  2345. [-] Searching now in Google..
  2346. [-] Searching now in Bing..
  2347. [-] Searching now in Ask..
  2348. [-] Searching now in Netcraft..
  2349. [-] Searching now in DNSdumpster..
  2350. [-] Searching now in Virustotal..
  2351. [-] Searching now in ThreatCrowd..
  2352. [-] Searching now in SSL Certificates..
  2353. [-] Searching now in PassiveDNS..
  2354. Virustotal: blog.notes.io
  2355. Virustotal: www.notes.io
  2356. [-] Saving results to file: /usr/share/sniper/loot/notes.io/domains/domains-notes.io.txt
  2357. [-] Total Unique Subdomains Found: 2
  2358. www.notes.io
  2359. blog.notes.io
  2360.  
  2361.  
  2362.  
  2363. Identifying nameservers for notes.io... Done
  2364. Using nameservers:
  2365.  
  2366. - 77.223.131.35
  2367. - 77.223.131.34
  2368.  
  2369. Checking for wildcard DNS... Done
  2370.  
  2371. Running collector: HackerTarget... Done (1 host)
  2372. Running collector: Shodan... Skipped
  2373. -> Key 'shodan' has not been set
  2374. Running collector: Wayback Machine... Done (2 hosts)
  2375. Running collector: Riddler... Skipped
  2376. -> Key 'riddler_username' has not been set
  2377. Running collector: Certificate Search... Done (0 hosts)
  2378. Running collector: PTRArchive... Done (0 hosts)
  2379. Running collector: Censys... Skipped
  2380. -> Key 'censys_secret' has not been set
  2381. Running collector: Google Transparency Report... Done (0 hosts)
  2382. Running collector: PassiveTotal... Skipped
  2383. -> Key 'passivetotal_key' has not been set
  2384. Running collector: VirusTotal... Skipped
  2385. -> Key 'virustotal' has not been set
  2386. Running collector: Netcraft... Done (0 hosts)
  2387. Running collector: Threat Crowd... Done (0 hosts)
  2388. Running collector: Dictionary... Done (26 hosts)
  2389. Running collector: PublicWWW... Done (0 hosts)
  2390. Running collector: DNSDB... Done (5 hosts)
  2391.  
  2392. Resolving 32 unique hosts...
  2393. 77.223.131.30 .notes.io
  2394. 77.223.131.30 notes.io
  2395. 77.223.131.30 www.notes.io
  2396.  
  2397. Found subnets:
  2398.  
  2399. - 77.223.131.0-255 : 3 hosts
  2400.  
  2401. Wrote 3 hosts to:
  2402.  
  2403. - file:///root/aquatone/notes.io/hosts.txt
  2404. - file:///root/aquatone/notes.io/hosts.json
  2405. __
  2406. ____ _____ ___ ______ _/ /_____ ____ ___
  2407. / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
  2408. / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
  2409. \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
  2410. /_/ takeover v0.5.0 - by @michenriksen
  2411.  
  2412. Loaded 3 hosts from /root/aquatone/notes.io/hosts.json
  2413. Loaded 25 domain takeover detectors
  2414.  
  2415. Identifying nameservers for notes.io... Done
  2416. Using nameservers:
  2417.  
  2418. - 77.223.131.34
  2419. - 77.223.131.35
  2420.  
  2421. Checking hosts for domain takeover vulnerabilities...
  2422.  
  2423. Finished checking hosts:
  2424.  
  2425. - Vulnerable : 0
  2426. - Not Vulnerable : 3
  2427.  
  2428. Wrote 0 potential subdomain takeovers to:
  2429.  
  2430. - file:///root/aquatone/notes.io/takeovers.json
  2431.  
  2432. __
  2433. ____ _____ ___ ______ _/ /_____ ____ ___
  2434. / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
  2435. / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
  2436. \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
  2437. /_/ scan v0.5.0 - by @michenriksen
  2438.  
  2439. Loaded 3 hosts from /root/aquatone/notes.io/hosts.json
  2440.  
  2441. Probing 2 ports...
  2442. 443/tcp 77.223.131.30 .notes.io, notes.io, www.notes.io
  2443. 80/tcp 77.223.131.30 .notes.io, notes.io, www.notes.io
  2444.  
  2445. Wrote open ports to file:///root/aquatone/notes.io/open_ports.txt
  2446. Wrote URLs to file:///root/aquatone/notes.io/urls.txt
  2447. __
  2448. ____ _____ ___ ______ _/ /_____ ____ ___
  2449. / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
  2450. / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
  2451. \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
  2452. /_/ gather v0.5.0 - by @michenriksen
  2453.  
  2454. Processing 6 pages...
  2455. Failed: https://77.223.131.30/ (notes.io) - navigation error ERR_CONNECTION_CLOSED
  2456. Failed: https://77.223.131.30/ (.notes.io) - navigation error ERR_CONNECTION_CLOSED
  2457. Failed: https://77.223.131.30/ (www.notes.io) - navigation error ERR_CONNECTION_CLOSED
  2458. Failed: http://77.223.131.30/ (.notes.io) - navigation error ERR_TOO_MANY_REDIRECTS
  2459. Failed: http://77.223.131.30/ (www.notes.io) - navigation error ERR_TOO_MANY_REDIRECTS
  2460. Processed: http://77.223.131.30/ (notes.io) - 200 OK
  2461.  
  2462. Finished processing pages:
  2463.  
  2464. - Successful : 1
  2465. - Failed : 5
  2466.  
  2467. Generating report...done
  2468. Report pages generated:
  2469.  
  2470. - file:///root/aquatone/notes.io/report/report_page_0.html
  2471. ######################################################################################################################################
  2472. INFO[0000] Starting to process permutations....
  2473. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2474. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2475. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2476. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2477. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2478. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2479. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2480. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2481. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2482. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2483. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2484. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2485. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2486. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2487. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2488. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2489. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2490. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2491. ERRO[0000] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.81.64:80: getsockopt: connection refused
  2492. INFO[0000] FORBIDDEN http://test-notes.s3.amazonaws.com (http://notes.io)
  2493. INFO[0000] FORBIDDEN http://notes-ops.s3.amazonaws.com (http://notes.io)
  2494. INFO[0000] FORBIDDEN http://notes_production.s3.amazonaws.com (http://notes.io)
  2495. INFO[0001] FORBIDDEN http://notes-logs.s3.amazonaws.com (http://notes.io)
  2496. INFO[0001] FORBIDDEN http://notes-backup.s3.amazonaws.com (http://notes.io)
  2497. INFO[0001] FORBIDDEN http://notes-staging.s3.amazonaws.com (http://notes.io)
  2498. INFO[0002] FORBIDDEN http://notes.s3.amazonaws.com (http://notes.io)
  2499. INFO[0002] FORBIDDEN http://dev-notes.s3.amazonaws.com (http://notes.io)
  2500. INFO[0003] FORBIDDEN http://s3-notes.s3.amazonaws.com (http://notes.io)
  2501. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2502. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2503. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2504. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2505. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2506. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2507. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2508. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2509. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2510. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2511. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2512. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2513. ERRO[0003] Get http://uploads-notes.s3.us-east-2.amazonaws.com/: dial tcp 52.219.88.120:80: getsockopt: connection refused
  2514. INFO[0003] FORBIDDEN http://aws-notes.s3.amazonaws.com (http://notes.io)
  2515. INFO[0003] FORBIDDEN http://notes-aws.s3.amazonaws.com (http://notes.io)
  2516. INFO[0003] FORBIDDEN http://notes-uploads.s3.amazonaws.com (http://notes.io)
  2517. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2518. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2519. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2520. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2521. ERRO[0003] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.226.104:80: getsockopt: connection refused
  2522. INFO[0004] FORBIDDEN http://share-notes.s3.amazonaws.com (http://notes.io)
  2523. INFO[0004] FORBIDDEN http://es-notes.s3.amazonaws.com (http://notes.io)
  2524. INFO[0004] FORBIDDEN http://app-notes.s3.amazonaws.com (http://notes.io)
  2525. INFO[0005] FORBIDDEN http://project-notes.s3.amazonaws.com (http://notes.io)
  2526. INFO[0005] FORBIDDEN http://notes2.s3.amazonaws.com (http://notes.io)
  2527. INFO[0005] FORBIDDEN http://notes-test.s3.amazonaws.com (http://notes.io)
  2528. INFO[0005] FORBIDDEN http://notes-production.s3.amazonaws.com (http://notes.io)
  2529. INFO[0005] FORBIDDEN http://notes-app.s3.amazonaws.com (http://notes.io)
  2530. INFO[0006] FORBIDDEN http://notes-storage.s3.amazonaws.com (http://notes.io)
  2531. INFO[0006] FORBIDDEN http://bucket-notes.s3.amazonaws.com (http://notes.io)
  2532. INFO[0006] FORBIDDEN http://uploads-notes.s3.amazonaws.com (http://notes.io)
  2533. INFO[0006] FORBIDDEN http://devnotes.s3.amazonaws.com (http://notes.io)
  2534. INFO[0007] FORBIDDEN http://notes-bucket.s3.amazonaws.com (http://notes.io)
  2535.  
  2536. #######################################################################################################################################
  2537. Total hosts: 5
  2538.  
  2539. [-] Resolving hostnames IPs...
  2540.  
  2541. .notes.io : empty
  2542. blog.notes.io : 77.223.131.30
  2543. www.notes.io : 77.223.131.30
  2544. #######################################################################################################################################
  2545. PING notes.io (77.223.131.30) 56(84) bytes of data.
  2546. 64 bytes from 77-223-131-30.ron.com.tr (77.223.131.30): icmp_seq=1 ttl=249 time=455 ms
  2547.  
  2548. --- notes.io ping statistics ---
  2549. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  2550. rtt min/avg/max/mdev = 455.247/455.247/455.247/0.000 ms
  2551. #######################################################################################################################################
  2552. Starting Nmap 7.70 ( https://nmap.org ) at 2018-04-24 19:47 EDT
  2553. Warning: 77.223.131.30 giving up on port because retransmission cap hit (2).
  2554. Nmap scan report for notes.io (77.223.131.30)
  2555. Host is up (0.34s latency).
  2556. rDNS record for 77.223.131.30: 77-223-131-30.ron.com.tr
  2557. Not shown: 240 closed ports, 6 filtered ports
  2558. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  2559. PORT STATE SERVICE
  2560. 1/tcp open tcpmux
  2561. 7/tcp open echo
  2562. 13/tcp open daytime
  2563. 19/tcp open chargen
  2564. 21/tcp open ftp
  2565. 22/tcp open ssh
  2566. 23/tcp open telnet
  2567. 42/tcp open nameserver
  2568. 53/tcp open domain
  2569. 79/tcp open finger
  2570. 80/tcp open http
  2571. 85/tcp open mit-ml-dev
  2572. 88/tcp open kerberos-sec
  2573. 110/tcp open pop3
  2574. 111/tcp open rpcbind
  2575. 113/tcp open ident
  2576. 143/tcp open imap
  2577. 161/tcp open snmp
  2578. 179/tcp open bgp
  2579. 222/tcp open rsh-spx
  2580. 389/tcp open ldap
  2581. 402/tcp open genie
  2582. 407/tcp open timbuktu
  2583. 443/tcp open https
  2584. 446/tcp open ddm-rdb
  2585. 512/tcp open exec
  2586. 524/tcp open ncp
  2587. 554/tcp open rtsp
  2588. 587/tcp open submission
  2589. 689/tcp open nmap
  2590. 705/tcp open agentx
  2591. 771/tcp open rtip
  2592. 783/tcp open spamassassin
  2593. 831/tcp open netconf-beep
  2594. 912/tcp open apex-mesh
  2595. 993/tcp open imaps
  2596. 995/tcp open pop3s
  2597. 1030/tcp open iad1
  2598. 1035/tcp open multidropper
  2599. 1099/tcp open rmiregistry
  2600. 1100/tcp open mctp
  2601. 1128/tcp open saphostctrl
  2602. 1129/tcp open saphostctrls
  2603. 1158/tcp open lsnr
  2604. 1199/tcp open dmidi
  2605. 1220/tcp open quicktime
  2606. 1241/tcp open nessus
  2607. 1300/tcp open h323hostcallsc
  2608. 1311/tcp open rxmon
  2609. 1352/tcp open lotusnotes
  2610. 1433/tcp open ms-sql-s
  2611. 1435/tcp open ibm-cics
  2612. 1471/tcp open csdmbase
  2613. 1494/tcp open citrix-ica
  2614. 1530/tcp open rap-service
  2615. 1533/tcp open virtual-places
  2616. 1581/tcp open mil-2045-47001
  2617. 1604/tcp open icabrowser
  2618. 1720/tcp open h323q931
  2619. 1723/tcp open pptp
  2620. 1755/tcp open wms
  2621. 2001/tcp open dc
  2622. 2067/tcp open dlswpn
  2623. 2100/tcp open amiganetfs
  2624. 2199/tcp open onehome-help
  2625. 2207/tcp open hpssd
  2626. 2222/tcp open EtherNetIP-1
  2627. 2323/tcp open 3d-nfsd
  2628. 2638/tcp open sybase
  2629. 2809/tcp open corbaloc
  2630. 2947/tcp open gpsd
  2631. 2967/tcp open symantec-av
  2632. 3000/tcp open ppp
  2633. 3037/tcp open hp-san-mgmt
  2634. 3128/tcp open squid-http
  2635. 3200/tcp open tick-port
  2636. 3273/tcp open sxmp
  2637. 3299/tcp open saprouter
  2638. 3306/tcp open mysql
  2639. 3310/tcp open dyna-access
  2640. 3333/tcp open dec-notes
  2641. 3389/tcp open ms-wbt-server
  2642. 3460/tcp open edm-manager
  2643. 3628/tcp open ept-machine
  2644. 3780/tcp open nnp
  2645. 3790/tcp open quickbooksrds
  2646. 3817/tcp open tapeware
  2647. 3900/tcp open udt_os
  2648. 4322/tcp open trim-event
  2649. 4433/tcp open vop
  2650. 4444/tcp open krb524
  2651. 4445/tcp open upnotifyp
  2652. 4679/tcp open mgesupervision
  2653. 5000/tcp open upnp
  2654. 5009/tcp open airport-admin
  2655. 5227/tcp open perfd
  2656. 5250/tcp open soagateway
  2657. 5351/tcp open nat-pmp
  2658. 5432/tcp open postgresql
  2659. 5498/tcp open unknown
  2660. 5520/tcp open sdlog
  2661. 5521/tcp open unknown
  2662. 5560/tcp open isqlplus
  2663. 5580/tcp open tmosms0
  2664. 5631/tcp open pcanywheredata
  2665. 5632/tcp open pcanywherestat
  2666. 5814/tcp open spt-automation
  2667. 5900/tcp open vnc
  2668. 5905/tcp open unknown
  2669. 5909/tcp open unknown
  2670. 5910/tcp open cm
  2671. 5920/tcp open unknown
  2672. 5985/tcp open wsman
  2673. 5986/tcp open wsmans
  2674. 6000/tcp open X11
  2675. 6060/tcp open x11
  2676. 6080/tcp open gue
  2677. 6101/tcp open backupexec
  2678. 6106/tcp open isdninfo
  2679. 6161/tcp open patrol-ism
  2680. 6503/tcp open boks_clntd
  2681. 6661/tcp open unknown
  2682. 6667/tcp open irc
  2683. 6789/tcp open ibm-db2-admin
  2684. 6905/tcp open unknown
  2685. 7000/tcp open afs3-fileserver
  2686. 7021/tcp open dpserveadmin
  2687. 7071/tcp open iwg1
  2688. 7080/tcp open empowerid
  2689. 7181/tcp open janus-disc
  2690. 7272/tcp open watchme-7272
  2691. 7426/tcp open pmdmgr
  2692. 7547/tcp open cwmp
  2693. 7579/tcp open unknown
  2694. 7770/tcp open unknown
  2695. 7787/tcp open popup-reminders
  2696. 7801/tcp open ssp-client
  2697. 7890/tcp open unknown
  2698. 7902/tcp open tnos-dp
  2699. 8008/tcp open http
  2700. 8014/tcp open unknown
  2701. 8023/tcp open unknown
  2702. 8030/tcp open unknown
  2703. 8051/tcp open rocrail
  2704. 8080/tcp open http-proxy
  2705. 8090/tcp open opsmessaging
  2706. 8091/tcp open jamlink
  2707. 8101/tcp open ldoms-migr
  2708. 8161/tcp open patrol-snmp
  2709. 8180/tcp open unknown
  2710. 8205/tcp open lm-instmgr
  2711. 8300/tcp open tmi
  2712. 8400/tcp open cvd
  2713. 8445/tcp open copy
  2714. 8642/tcp open unknown
  2715. 8888/tcp open sun-answerbook
  2716. 8899/tcp open ospf-lite
  2717. 9001/tcp open tor-orport
  2718. 9002/tcp open dynamid
  2719. 9005/tcp open golem
  2720. 9010/tcp open sdr
  2721. 9050/tcp open tor-socks
  2722. 9080/tcp open glrpc
  2723. 9090/tcp open zeus-admin
  2724. 9256/tcp open unknown
  2725. 9300/tcp open vrace
  2726. 9390/tcp open otp
  2727. 9391/tcp open unknown
  2728. 9495/tcp open unknown
  2729. 9500/tcp open ismserver
  2730. 9810/tcp open unknown
  2731. 9811/tcp open unknown
  2732. 9815/tcp open unknown
  2733. 9855/tcp open unknown
  2734. 9910/tcp open unknown
  2735. 9991/tcp open issa
  2736. 10000/tcp open snet-sensor-mgmt
  2737. 10001/tcp open scp-config
  2738. 10443/tcp open unknown
  2739. 10628/tcp open unknown
  2740. 11000/tcp open irisa
  2741. 11099/tcp open unknown
  2742. 11211/tcp open memcache
  2743. 11234/tcp open unknown
  2744. 11333/tcp open unknown
  2745. 12000/tcp open cce4x
  2746. 12174/tcp open unknown
  2747. 13013/tcp open unknown
  2748. 13500/tcp open unknown
  2749. 13838/tcp open unknown
  2750. 14330/tcp open unknown
  2751. 15001/tcp open unknown
  2752. 16102/tcp open unknown
  2753. 17185/tcp open soundsvirtual
  2754. 17200/tcp open unknown
  2755. 18980/tcp open unknown
  2756. 19300/tcp open unknown
  2757. 20000/tcp open dnp
  2758. 20010/tcp open unknown
  2759. 20031/tcp open unknown
  2760. 20101/tcp open unknown
  2761. 23423/tcp open unknown
  2762. 23472/tcp open unknown
  2763. 23791/tcp open unknown
  2764. 25025/tcp open unknown
  2765. 28784/tcp open unknown
  2766. 32764/tcp open unknown
  2767. 32913/tcp open unknown
  2768. 33000/tcp open unknown
  2769. 34205/tcp open unknown
  2770. 37718/tcp open unknown
  2771. 38292/tcp open landesk-cba
  2772. 41025/tcp open unknown
  2773. 41080/tcp open unknown
  2774. 41523/tcp open unknown
  2775. 41524/tcp open unknown
  2776. 45230/tcp open unknown
  2777. 46824/tcp open unknown
  2778. 47002/tcp open unknown
  2779. 48899/tcp open unknown
  2780. 50001/tcp open unknown
  2781. 50002/tcp open iiimsf
  2782. 50003/tcp open unknown
  2783. 50013/tcp open unknown
  2784. 50502/tcp open unknown
  2785. 50503/tcp open unknown
  2786. 52302/tcp open unknown
  2787. 52869/tcp open unknown
  2788. 53413/tcp open unknown
  2789. 62078/tcp open iphone-sync
  2790. ######################################################################################################################################
  2791. Starting Nmap 7.70 ( https://nmap.org ) at 2018-04-24 19:47 EDT
  2792. Nmap scan report for notes.io (77.223.131.30)
  2793. Host is up (0.47s latency).
  2794. rDNS record for 77.223.131.30: 77-223-131-30.ron.com.tr
  2795.  
  2796. PORT STATE SERVICE
  2797. 53/udp open|filtered domain
  2798. 67/udp open|filtered dhcps
  2799. 68/udp open|filtered dhcpc
  2800. 69/udp open|filtered tftp
  2801. 88/udp open|filtered kerberos-sec
  2802. 123/udp open ntp
  2803. 137/udp open|filtered netbios-ns
  2804. 138/udp open|filtered netbios-dgm
  2805. 139/udp open|filtered netbios-ssn
  2806. 161/udp open|filtered snmp
  2807. 162/udp open|filtered snmptrap
  2808. 389/udp open|filtered ldap
  2809. 520/udp open|filtered route
  2810. #######################################################################################################################################
  2811. Anonymous #thecreed JTSEC #OPpedohunt full Recon #2
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement