Advertisement
Guest User

notebook-universe.de / SC / P80 /

a guest
Nov 23rd, 2017
1,168
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 52.33 KB | None | 0 0
  1. --------------------------------------------------------------------------
  2. + Target notebook-universe.de
  3. --------------------------------------------------------------------------
  4. + Target IP: 185.61.137.36
  5. + Target Hostname: 185.61.137.36
  6. + Target Port: 80
  7. + Start Time: 2017-11-24 00:11:39 (GMT1)
  8. ---------------------------------------------------------------------------
  9. + Server: nginx
  10. + Cookie rcksid created without the httponly flag
  11. + The anti-clickjacking X-Frame-Options header is not present.
  12. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  13. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  14. + No CGI Directories found (use '-C all' to force check all possible dirs)
  15. + lines
  16. + Multiple index files found: /index.asp, /index.jhtml, /index.htm, /index.php, /index.do, /index.html, /index.xml, /index.cgi, /index.aspx, /default.asp, /index.pl, /index.shtml, /default.aspx, /index.php3, /default.htm, /index.cfm
  17. + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
  18. + DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details.
  19. + /kboard/: KBoard Forum 0.3.0 and prior have a security problem in forum_edit_post.php, forum_post.php and forum_reply.php
  20. + /lists/admin/: PHPList pre 2.6.4 contains a number of vulnerabilities including remote administrative access, harvesting user info and more. Default login to admin interface is admin/phplist
  21. + /splashAdmin.php: Cobalt Qube 3 admin is running. This may have multiple security problems as described by www.scan-associates.net. These could not be tested remotely.
  22. + /ssdefs/: Siteseed pre 1.4.2 has 'major' security problems.
  23. + /sshome/: Siteseed pre 1.4.2 has 'major' security problems.
  24. + /tiki/: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin
  25. + /tiki/tiki-install.php: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin
  26. + /scripts/samples/details.idc: See RFP 9901; www.wiretrip.net
  27. + OSVDB-637: /~root/: Allowed to browse root's home directory.
  28. + /cgi-bin/wrap: comes with IRIX 6.2; allows to view directories
  29. + /forums//admin/config.php: PHP Config file may contain database IDs and passwords.
  30. + /forums//adm/config.php: PHP Config file may contain database IDs and passwords.
  31. + /forums//administrator/config.php: PHP Config file may contain database IDs and passwords.
  32. + /forums/config.php: PHP Config file may contain database IDs and passwords.
  33. + /guestbook/guestbookdat: PHP-Gastebuch 1.60 Beta reveals sensitive information about its configuration.
  34. + /guestbook/pwd: PHP-Gastebuch 1.60 Beta reveals the md5 hash of the admin password.
  35. + /help/: Help directory should not be accessible
  36. + OSVDB-2411: /hola/admin/cms/htmltags.php?datei=./sec/data.php: hola-cms-1.2.9-10 may reveal the administrator ID and password.
  37. + OSVDB-8103: /global.inc: PHP-Survey's include file should not be available via the web. Configure the web server to ignore .inc files or change this to global.inc.php
  38. + OSVDB-59620: /inc/common.load.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
  39. + OSVDB-59619: /inc/config.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
  40. + OSVDB-59618: /inc/dbase.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
  41. + OSVDB-2703: /geeklog/users.php: Geeklog prior to 1.3.8-1sr2 contains a SQL injection vulnerability that lets a remote attacker reset admin password.
  42. + OSVDB-8204: /gb/index.php?login=true: gBook may allow admin login by setting the value 'login' equal to 'true'.
  43. + /guestbook/admin.php: Guestbook admin page available without authentication.
  44. + /getaccess: This may be an indication that the server is running getAccess for SSO
  45. + /cfdocs/expeval/openfile.cfm: Can use to expose the system/server path.
  46. + /tsweb/: Microsoft TSAC found. http://www.dslwebserver.com/main/fr_index.html?/main/sbs-Terminal-Services-Advanced-Client-Configuration.html
  47. + /vgn/performance/TMT: Vignette CMS admin/maintenance script available.
  48. + /vgn/performance/TMT/Report: Vignette CMS admin/maintenance script available.
  49. + /vgn/performance/TMT/Report/XML: Vignette CMS admin/maintenance script available.
  50. + /vgn/performance/TMT/reset: Vignette CMS admin/maintenance script available.
  51. + /vgn/ppstats: Vignette CMS admin/maintenance script available.
  52. + /vgn/previewer: Vignette CMS admin/maintenance script available.
  53. + /vgn/record/previewer: Vignette CMS admin/maintenance script available.
  54. + /vgn/stylepreviewer: Vignette CMS admin/maintenance script available.
  55. + /vgn/vr/Deleting: Vignette CMS admin/maintenance script available.
  56. + /vgn/vr/Editing: Vignette CMS admin/maintenance script available.
  57. + /vgn/vr/Saving: Vignette CMS admin/maintenance script available.
  58. + /vgn/vr/Select: Vignette CMS admin/maintenance script available.
  59. + /scripts/iisadmin/bdir.htr: This default script shows host info, may allow file browsing and buffer a overrun in the Chunked Encoding data transfer mechanism, request /scripts/iisadmin/bdir.htr??c:\<dirs> . http://www.microsoft.com/technet/security/bulletin/MS02-028.asp. http://www.cert.org/advisories/CA-2002-09.html.
  60. + /scripts/tools/ctss.idc: This CGI allows remote users to view and modify SQL DB contents, server paths, docroot and more.
  61. + /bigconf.cgi: BigIP Configuration CGI
  62. + /blah_badfile.shtml: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.
  63. + OSVDB-4910: /vgn/style: Vignette server may reveal system information through this file.
  64. + OSVDB-17653: /SiteServer/Admin/commerce/foundation/domain.asp: Displays known domains of which that server is involved.
  65. + OSVDB-17654: /SiteServer/Admin/commerce/foundation/driver.asp: Displays a list of installed ODBC drivers.
  66. + OSVDB-17655: /SiteServer/Admin/commerce/foundation/DSN.asp: Displays all DSNs configured for selected ODBC drivers.
  67. + OSVDB-17652: /SiteServer/admin/findvserver.asp: Gives a list of installed Site Server components.
  68. + /SiteServer/Admin/knowledge/dsmgr/default.asp: Used to view current search catalog configurations
  69. + /basilix/mbox-list.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'message list' function/page
  70. + /basilix/message-read.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'read message' function/page
  71. + /IlohaMail/blank.html: IlohaMail 0.8.10 contains a XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
  72. + /bb-dnbd/faxsurvey: This may allow arbitrary command execution.
  73. + /cartcart.cgi: If this is Dansie Shopping Cart 3.0.8 or earlier, it contains a backdoor to allow attackers to execute arbitrary commands.
  74. + /scripts/tools/dsnform: Allows creation of ODBC Data Source
  75. + OSVDB-17656: /SiteServer/Admin/knowledge/dsmgr/users/GroupManager.asp: Used to create, modify, and potentially delete LDAP users and groups.
  76. + OSVDB-17657: /SiteServer/Admin/knowledge/dsmgr/users/UserManager.asp: Used to create, modify, and potentially delete LDAP users and groups.
  77. + /prd.i/pgen/: Has MS Merchant Server 1.0
  78. + /readme.eml: Remote server may be infected with the Nimda virus.
  79. + /SiteServer/admin/: Site Server components admin. Default account may be 'LDAP_Anonymous', pass is 'LdapPassword_1'. see http://www.wiretrip.net/rfp/p/doc.asp/i1/d69.htm
  80. + /siteseed/: Siteseed pre 1.4.2 has 'major' security problems.
  81. + /pccsmysqladm/incs/dbconnect.inc: This file should not be accessible, as it contains database connectivity information. Upgrade to version 1.2.5 or higher.
  82. + /iisadmin/: Access to /iisadmin should be restricted to localhost or allowed hosts only.
  83. + /PDG_Cart/oder.log: Shopping cart software log
  84. + /ows/restricted%2eshow: OWS may allow restricted files to be viewed by replacing a character with its encoded equivalent.
  85. + /WEB-INF./web.xml: Multiple implementations of j2ee servlet containers allow files to be retrieved from WEB-INF by appending a '.' to the directory name. Products include Sybase EA Service, Oracle Containers, Orion, JRun, HPAS, Pramati and others. See http://www.westpoint.l
  86. + /w-agora/: w-agora pre 4.1.4 may allow a remote user to execute arbitrary PHP scripts via URL includes in include/*.php and user/*.php files. Default account is 'admin' but password set during install.
  87. + OSVDB-42680: /vider.php3: MySimpleNews may allow deleting of news items without authentication.
  88. + /administrator/gallery/uploadimage.php: Mambo PHP Portal/Server 4.0.12 BETA and below may allow upload of any file type simply putting '.jpg' before the real file extension.
  89. + /pafiledb/includes/team/file.php: paFileDB 3.1 and below may allow file upload without authentication.
  90. + /phpEventCalendar/file_upload.php: phpEventCalendar 1.1 and prior are vulnerable to file upload bug.
  91. + /servlet/com.unify.servletexec.UploadServlet: This servlet allows attackers to upload files to the server.
  92. + /upload.asp: An ASP page that allows attackers to upload files to server
  93. + /uploadn.asp: An ASP page that allows attackers to upload files to server
  94. + /uploadx.asp: An ASP page that allows attackers to upload files to server
  95. + /basilix/compose-attach.php3: BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads
  96. + /server/: Possibly Macromedia JRun or CRX WebDAV upload
  97. + /vgn/ac/data: Vignette CMS admin/maintenance script available.
  98. + /vgn/ac/delete: Vignette CMS admin/maintenance script available.
  99. + /vgn/ac/edit: Vignette CMS admin/maintenance script available.
  100. + /vgn/ac/esave: Vignette CMS admin/maintenance script available.
  101. + /vgn/ac/fsave: Vignette CMS admin/maintenance script available.
  102. + /vgn/ac/index: Vignette CMS admin/maintenance script available.
  103. + /vgn/asp/MetaDataUpdate: Vignette CMS admin/maintenance script available.
  104. + /vgn/asp/previewer: Vignette CMS admin/maintenance script available.
  105. + /vgn/asp/status: Vignette CMS admin/maintenance script available.
  106. + /vgn/asp/style: Vignette CMS admin/maintenance script available.
  107. + /vgn/errors: Vignette CMS admin/maintenance script available.
  108. + /vgn/jsp/controller: Vignette CMS admin/maintenance script available.
  109. + /vgn/jsp/errorpage: Vignette CMS admin/maintenance script available.
  110. + /vgn/jsp/initialize: Vignette CMS admin/maintenance script available.
  111. + /vgn/jsp/jspstatus: Vignette CMS admin/maintenance script available.
  112. + /vgn/jsp/jspstatus56: Vignette CMS admin/maintenance script available.
  113. + /vgn/jsp/metadataupdate: Vignette CMS admin/maintenance script available.
  114. + /vgn/jsp/previewer: Vignette CMS admin/maintenance script available.
  115. + /vgn/jsp/style: Vignette CMS admin/maintenance script available.
  116. + /vgn/legacy/edit: Vignette CMS admin/maintenance script available.
  117. + /vgn/login: Vignette server may allow user enumeration based on the login attempts to this file.
  118. + OSVDB-35707: /forum/admin/wwforum.mdb: Web Wiz Forums password database found.
  119. + /fpdb/shop.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
  120. + OSVDB-52975: /guestbook/admin/o12guest.mdb: Ocean12 ASP Guestbook Manager allows download of SQL database which contains admin password.
  121. + OSVDB-15971: /midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
  122. + OSVDB-15971: /MIDICART/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
  123. + OSVDB-41850: /mpcsoftweb_guestbook/database/mpcsoftweb_guestdata.mdb: MPCSoftWeb Guest Book passwords retrieved.
  124. + /news/news.mdb: Web Wiz Site News release v3.06 admin password database is available and unencrypted.
  125. + OSVDB-53413: /shopping300.mdb: VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.
  126. + OSVDB-53413: /shopping400.mdb: VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.
  127. + OSVDB-15971: /shoppingdirectory/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
  128. + OSVDB-4398: /database/db2000.mdb: Max Web Portal database is available remotely. It should be moved from the default location to a directory outside the web root.
  129. + /admin/config.php: PHP Config file may contain database IDs and passwords.
  130. + /adm/config.php: PHP Config file may contain database IDs and passwords.
  131. + /administrator/config.php: PHP Config file may contain database IDs and passwords.
  132. + /contents.php?new_language=elvish&mode=select: Requesting a file with an invalid language selection from DC Portal may reveal the system path.
  133. + OSVDB-6467: /pw/storemgr.pw: Encrypted ID/Pass for Mercantec's SoftCart, http://www.mercantec.com/, see http://www.mindsec.com/advisories/post2.txt for more information.
  134. + /servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.
  135. + /shopa_sessionlist.asp: VP-ASP shopping cart test application is available from the web. This page may give the location of .mdb files which may also be available.
  136. + OSVDB-53303: /simplebbs/users/users.php: Simple BBS 1.0.6 allows user information and passwords to be viewed remotely.
  137. + /typo3conf/: This may contain sensitive TYPO3 files.
  138. + /cms/typo3conf/: This may contain sensitive TYPO3 files.
  139. + /site/typo3conf/: This may contain sensitive TYPO3 files.
  140. + /typo/typo3conf/: This may contain sensitive TYPO3 files.
  141. + /typo3/typo3conf/: This may contain sensitive TYPO3 files.
  142. + /typo3conf/database.sql: TYPO3 SQL file found.
  143. + /cms/typo3conf/database.sql: TYPO3 SQL file found.
  144. + /site/typo3conf/database.sql: TYPO3 SQL file found.
  145. + /typo/typo3conf/database.sql: TYPO3 SQL file found.
  146. + /typo3/typo3conf/database.sql: TYPO3 SQL file found.
  147. + /typo3conf/localconf.php: TYPO3 config file found.
  148. + /cms/typo3conf/localconf.php: TYPO3 config file found.
  149. + /site/typo3conf/localconf.php: TYPO3 config file found.
  150. + /typo/typo3conf/localconf.php: TYPO3 config file found.
  151. + /typo3/typo3conf/localconf.php: TYPO3 config file found.
  152. + OSVDB-4907: /vgn/license: Vignette server license file found.
  153. + /webcart/carts/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.
  154. + /webcart/config/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.
  155. + /webcart/orders/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.
  156. + /ws_ftp.ini: Can contain saved passwords for FTP sites
  157. + /WS_FTP.ini: Can contain saved passwords for FTP sites
  158. + /_mem_bin/auoconfig.asp: Displays the default AUO (LDAP) schema, including host and port.
  159. + OSVDB-17659: /SiteServer/Admin/knowledge/persmbr/vs.asp: Expose various LDAP service and backend configuration parameters
  160. + OSVDB-17661: /SiteServer/Admin/knowledge/persmbr/VsLsLpRd.asp: Expose various LDAP service and backend configuration parameters
  161. + OSVDB-17662: /SiteServer/Admin/knowledge/persmbr/VsPrAuoEd.asp: Expose various LDAP service and backend configuration parameters
  162. + OSVDB-17660: /SiteServer/Admin/knowledge/persmbr/VsTmPr.asp: Expose various LDAP service and backend configuration parameters
  163. + /whatever.htr: May reveal physical path. htr files may also be vulnerable to an off-by-one overflow that allows remote command execution (see http://www.microsoft.com/technet/security/bulletin/MS02-018.asp)
  164. + /nsn/fdir.bas:ShowVolume: You can use ShowVolume and ShowDirectory directly on the Novell server (NW5.1) to view the filesystem without having to log in
  165. + /nsn/fdir.bas: You can use fdir to ShowVolume and ShowDirectory.
  166. + /forum/admin/database/wwForum.mdb: Web Wiz Forums pre 7.5 is vulnerable to Cross-Site Scripting attacks. Default login/pass is Administrator/letmein
  167. + /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
  168. + /jamdb/: JamDB pre 0.9.2 mp3.php and image.php can allow user to read arbitrary file out of docroot.
  169. + OSVDB-1201: /cgi/cgiproc?: It may be possible to crash Nortel Contivity VxWorks by requesting '/cgi/cgiproc?$' (not attempted!). Upgrade to version 2.60 or later.
  170. + OSVDB-6196: /servlet/SchedulerTransfer: PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution. See http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21999
  171. + /servlet/sunexamples.BBoardServlet: This default servlet lets attackers execute arbitrary commands.
  172. + OSVDB-6196: /servlets/SchedulerTransfer: PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution. See http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21999
  173. + /perl/-e%20print%20Hello: The Perl interpreter on the Novell system may allow any command to be executed. See http://www.securityfocus.com/bid/5520. Installing Perl 5.6 might fix this issue.
  174. + /vgn/legacy/save: Vignette Legacy Tool may be unprotected. To access this resource, set a cookie called 'vgn_creds' with any value.
  175. + OSVDB-6466: /quikstore.cfg: Shopping cart config file, http://www.quikstore.com/, http://www.mindsec.com/advisories/post2.txt
  176. + /quikstore.cgi: A shopping cart.
  177. + /securecontrolpanel/: Web Server Control Panel
  178. + /siteminder: This may be an indication that the server is running Siteminder for SSO
  179. + /webmail/: Web based mail package installed.
  180. + /_cti_pvt/: FrontPage directory found.
  181. + /nsn/..%5Cutil/attrib.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  182. + /nsn/..%5Cutil/chkvol.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  183. + /nsn/..%5Cutil/copy.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  184. + /nsn/..%5Cutil/del.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  185. + /nsn/..%5Cutil/dir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  186. + /nsn/..%5Cutil/dsbrowse.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  187. + /nsn/..%5Cutil/glist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  188. + /nsn/..%5Cutil/lancard.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  189. + /nsn/..%5Cutil/md.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  190. + /nsn/..%5Cutil/rd.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  191. + /nsn/..%5Cutil/ren.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  192. + /nsn/..%5Cutil/send.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  193. + /nsn/..%5Cutil/set.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  194. + /nsn/..%5Cutil/slist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  195. + /nsn/..%5Cutil/type.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  196. + /nsn/..%5Cutil/userlist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  197. + /nsn/..%5Cweb/env.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  198. + /nsn/..%5Cweb/fdir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  199. + /nsn/..%5Cwebdemo/env.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  200. + /nsn/..%5Cwebdemo/fdir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
  201. + /upd/: WASD Server can allow directory listings by requesting /upd/directory/. Upgrade to a later version and secure according to the documents on the WASD web site.
  202. + /CVS/Entries: CVS Entries file may contain directory listing information.
  203. + OSVDB-8450: /3rdparty/phpMyAdmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
  204. + OSVDB-8450: /phpMyAdmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
  205. + OSVDB-8450: /3rdparty/phpmyadmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
  206. + OSVDB-8450: /phpmyadmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
  207. + OSVDB-8450: /pma/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
  208. + /catalog.nsf: A list of server databases can be retrieved, as well as a list of ACLs.
  209. + /cersvr.nsf: Server certificate data can be accessed remotely.
  210. + /domlog.nsf: The domain server logs can be accessed remotely.
  211. + /events4.nsf: The events log can be accessed remotely.
  212. + /log.nsf: The server log is remotely accessible.
  213. + /names.nsf: User names and groups can be accessed remotely (possibly password hashes as well)
  214. + OSVDB-31150: /LOGIN.PWD: MIPCD password file (passwords are not encrypted). MIPDCD should not have the web interface enabled.
  215. + OSVDB-31150: /USER/CONFIG.AP: MIPCD configuration information. MIPCD should not have the web interface enabled.
  216. + /admin-serv/config/admpw: This file contains the encrypted Netscape admin password. It should not be accessible via the web.
  217. + /cgi-bin/cgi_process: WASD reveals a lot of system information in this script. It should be removed.
  218. + /ht_root/wwwroot/-/local/httpd$map.conf: WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site.
  219. + /local/httpd$map.conf: WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site.
  220. + /tree: WASD Server reveals the entire web root structure and files via this URL. Upgrade to a later version and secure according to the documents on the WASD web site.
  221. + /852566C90012664F: This database can be read using the replica ID without authentication.
  222. + /hidden.nsf: This database can be read without authentication. Common database name.
  223. + /mail.box: The mail database can be read without authentication.
  224. + /setup.nsf: The server can be configured remotely, or current setup can be downloaded.
  225. + /statrep.nsf: Any reports generated by the admins can be retrieved.
  226. + /webadmin.nsf: The server admin database can be accessed remotely.
  227. + /examples/servlet/AUX: Apache Tomcat versions below 4.1 may be vulnerable to DoS by repeatedly requesting this file.
  228. + /Config1.htm: This may be a D-Link. Some devices have a DoS condition if an oversized POST request is sent. This DoS was not tested. See http://www.phenoelit.de/stuff/dp-300.txt for info.
  229. + /contents/extensions/asp/1: The IIS system may be vulnerable to a DOS, see http://www.microsoft.com/technet/security/bulletin/MS02-018.asp for details.
  230. + /.nsf/../winnt/win.ini: This win.ini file can be downloaded.
  231. + /................../config.sys: PWS allows files to be read by prepending multiple '.' characters. At worst, IIS, not PWS, should be used.
  232. + OSVDB-728: /admentor/adminadmin.asp: Version 2.11 of AdMentor is vulnerable to SQL injection during login, in the style of: ' or =
  233. + OSVDB-36894: /My_eGallery/public/displayCategory.php: My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection. displayCategory.php calls imageFunctions.php without checking URL/location arguments.
  234. + OSVDB-36894: /postnuke/My_eGallery/public/displayCategory.php: My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection. displayCategory.php calls imageFunctions.php without checking URL/location arguments.
  235. + OSVDB-36894: /postnuke/html/My_eGallery/public/displayCategory.php: My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection. displayCategory.php calls imageFunctions.php without checking URL/location arguments.
  236. + OSVDB-36894: /modules/My_eGallery/public/displayCategory.php: My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection. displayCategory.php calls imageFunctions.php without checking URL/location arguments.
  237. + OSVDB-36894: /phpBB/My_eGallery/public/displayCategory.php: My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection. displayCategory.php calls imageFunctions.php without checking URL/location arguments.
  238. + OSVDB-36894: /forum/My_eGallery/public/displayCategory.php: My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection. displayCategory.php calls imageFunctions.php without checking URL/location arguments.
  239. + OSVDB-10107: /author.asp: May be FactoSystem CMS, which could include SQL injection problems that could not be tested remotely.
  240. + OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  241. + OSVDB-2767: /openautoclassifieds/friendmail.php?listing=<script>alert(document.domain);</script>: OpenAutoClassifieds 1.0 is vulnerable to a XSS attack
  242. + /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  243. + /modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  244. + OSVDB-4598: /members.asp?SF=%22;}alert(223344);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  245. + OSVDB-4015: /jigsaw/: Jigsaw server may be installed. Versions lower than 2.2.1 are vulnerable to Cross Site Scripting (XSS) in the error page.
  246. + OSVDB-2754: /guestbook/?number=5&lng=%3Cscript%3Ealert(document.domain);%3C/script%3E: MPM Guestbook 1.2 and previous are vulnreable to XSS attacks.
  247. + OSVDB-2946: /forum_members.asp?find=%22;}alert(9823);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  248. + /anthill/login.php: Anthill bug tracking system may be installed. Versions lower than 0.1.6.1 allow XSS/HTML injection and may allow users to bypass login requirements. http://anthill.vmlinuz.ca/ and http://www.cert.org/advisories/CA-2000-02.html
  249. + /cfdocs/expeval/sendmail.cfm: Can be used to send email; go to the page and fill in the form
  250. + OSVDB-22: /cgi-bin/bigconf.cgi: BigIP Configuration CGI
  251. + /ammerum/: Ammerum pre 0.6-1 had several security issues.
  252. + /ariadne/: Ariadne pre 2.1.2 has several vulnerabilities. The default login/pass to the admin page is admin/muze.
  253. + /cbms/cbmsfoot.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  254. + /cbms/changepass.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  255. + /cbms/editclient.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  256. + /cbms/passgen.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  257. + /cbms/realinv.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  258. + /cbms/usersetup.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
  259. + OSVDB-59412: /db/users.dat: upb PB allows the user database to be retrieved remotely.
  260. + /Admin_files/order.log: Selena Sol's WebStore 1.0 exposes order information, http://www.extropia.com/, http://www.mindsec.com/advisories/post2.txt.
  261. + /admin/cplogfile.log: DevBB 1.0 final (http://www.mybboard.com) log file is readable remotely. Upgrade to the latest version.
  262. + /admin/system_footer.php: myphpnuke version 1.8.8_final_7 reveals detailed system information.
  263. + /cfdocs/snippets/fileexists.cfm: Can be used to verify the existance of files (on the same drive info as the web tree/file)
  264. + /cgi-bin/MachineInfo: Gives out information on the machine (IRIX), including hostname
  265. + OSVDB-53304: /chat/data/usr: SimpleChat! 1.3 allows retrieval of user information.
  266. + /config.php: PHP Config file may contain database IDs and passwords.
  267. + /config/: Configuration information may be available remotely.
  268. + /cplogfile.log: XMB Magic Lantern forum 1.6b final (http://www.xmbforum.com) log file is readable remotely. Upgrade to the latest version.
  269. + /examples/jsp/snp/anything.snp: Tomcat servlet gives lots of host information.
  270. + /cfdocs/snippets/evaluate.cfm: Can enter CF code to be evaluated, or create denial of service see www.allaire.com/security/ technical papers and advisories for info
  271. + /cfide/Administrator/startstop.html: Can start/stop the server
  272. + OSVDB-10598: /cd-cgi/sscd_suncourier.pl: Sunsolve CD script may allow users to execute arbitrary commands. The script was confirmed to exist, but the test was not done.
  273. + /cgi-bin/handler: Comes with IRIX 5.3 - 6.4; allows to run arbitrary commands
  274. + OSVDB-235: /cgi-bin/webdist.cgi: Comes with IRIX 5.0 - 6.3; allows to run arbitrary commands
  275. + OSVDB-55: /ews/ews/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. http://www.securityfocus.com/bid/2665.
  276. + OSVDB-5280: /instantwebmail/message.php: Instant Web Mail (http://understroem.kdc/instantwebmail/) is installed. Versions 0.59 and lower can allow remote users to embed POP3 commands in URLs contained in email.
  277. + OSVDB-29786: /admin.php?en_log_id=0&action=config: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
  278. + OSVDB-29786: /admin.php?en_log_id=0&action=users: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
  279. + /admin.php4?reg_login=1: Mon Album from http://www.3dsrc.com version 0.6.2d allows remote admin access. This should be protected.
  280. + OSVDB-3233: /admin/admin_phpinfo.php4: Mon Album from http://www.3dsrc.com version 0.6.2d allows remote admin access. This should be protected.
  281. + OSVDB-5034: /admin/login.php?action=insert&username=test&password=test: phpAuction may allow user admin accounts to be inserted without proper authentication. Attempt to log in with user 'test' password 'test' to verify.
  282. + OSVDB-5178: /dostuff.php?action=modify_user: Blahz-DNS allows unauthorized users to edit user information. Upgrade to version 0.25 or higher. http://blahzdns.sourceforge.net/
  283. + OSVDB-5088: /accounts/getuserdesc.asp: Hosting Controller 2002 administration page is available. This should be protected.
  284. + OSVDB-35876: /agentadmin.php: Immobilier agentadmin.php contains multiple SQL injection vulnerabilities.
  285. + /sqldump.sql: Database SQL?
  286. + /structure.sql: Database SQL?
  287. + /servlet/SessionManager: IBM WebSphere reconfigure servlet (user=servlet, password=manager). All default code should be removed from servers.
  288. + /level/42/exec/show%20conf: Retrieved Cisco configuration file.
  289. + /livehelp/: LiveHelp may reveal system information.
  290. + /LiveHelp/: LiveHelp may reveal system information.
  291. + OSVDB-59536: /logicworks.ini: web-erp 0.1.4 and earlier allow .ini files to be read remotely.
  292. + /logs/str_err.log: Bmedia error log, contains invalid login attempts which include the invalid usernames and passwords entered (could just be typos & be very close to the right entries).
  293. + OSVDB-6465: /mall_log_files/order.log: EZMall2000 exposes order information, http://www.ezmall2000.com/, see http://www.mindsec.com/advisories/post2.txt for details.
  294. + OSVDB-3204: /megabook/files/20/setup.db: Megabook guestbook configuration available remotely.
  295. + OSVDB-6161: /officescan/hotdownload/ofscan.ini: OfficeScan from Trend Micro allows anyone to read the ofscan.ini file, which may contain passwords.
  296. + /order/order_log_v12.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
  297. + /order/order_log.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
  298. + /orders/order_log_v12.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
  299. + /Orders/order_log_v12.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
  300. + /orders/order_log.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
  301. + /Orders/order_log.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
  302. + /pmlite.php: A Xoops CMS script was found. Version RC3 and below allows all users to view all messages (untested). See http://www.phpsecure.org/?zone=pComment&d=101 for details.
  303. + /session/admnlogin: SessionServlet Output, has session cookie info.
  304. + OSVDB-613: /SiteScope/htdocs/SiteScope.html: The SiteScope install may allow remote users to get sensitive information about the hosts being monitored.
  305. + /servlet/allaire.jrun.ssi.SSIFilter: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call, see MPSB01-12 http://www.macromedia.com/devnet/security/security_zone/mpsb01-12.html.
  306. + OSVDB-2881: /pp.php?action=login: Pieterpost 0.10.6 allows anyone to access the 'virtual' account which can be used to relay/send e-mail.
  307. + /isapi/count.pl?: AN HTTPd default script may allow writing over arbitrary files with a new content of '1', which could allow a trivial DoS. Append /../../../../../ctr.dll to replace this file's contents, for example.
  308. + /krysalis/: Krysalis pre 1.0.3 may allow remote users to read arbitrary files outside docroot
  309. + /logjam/showhits.php: Logjam may possibly allow remote command execution via showhits.php page.
  310. + /manual.php: Does not filter input before passing to shell command. Try 'ls -l' as the man page entry.
  311. + OSVDB-14329: /smssend.php: PhpSmssend may allow system calls if a ' is passed to it. http://zekiller.skytech.org/smssend.php
  312. + OSVDB-113: /ncl_items.html: This may allow attackers to reconfigure your Tektronix printer.
  313. + OSVDB-551: /ncl_items.shtml?SUBJECT=1: This may allow attackers to reconfigure your Tektronix printer.
  314. + /photo/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more.
  315. + /photodata/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more.
  316. + OSVDB-5374: /pub/english.cgi?op=rmail: BSCW self-registration may be enabled. This could allow untrusted users semi-trusted access to the software. 3.x version (and probably some 4.x) allow arbitrary commands to be executed remotely.
  317. + /pvote/ch_info.php?newpass=password&confirm=password%20: PVote administration page is available. Versions 1.5b and lower do not require authentication to reset the administration password.
  318. + OSVDB-3092: /SetSecurity.shm: Cisco System's My Access for Wireless. This resource should be password protected.
  319. + OSVDB-3126: /submit?setoption=q&option=allowed_ips&value=255.255.255.255: MLdonkey 2.x allows administrative interface access to be access from any IP. This is typically only found on port 4080.
  320. + OSVDB-2225: /thebox/admin.php?act=write&username=admin&password=admin&aduser=admin&adpass=admin: paBox 1.6 may allow remote users to set the admin password. If successful, the 'admin' password is now 'admin'.
  321. + OSVDB-3092: /shopadmin.asp: VP-ASP shopping cart admin may be available via the web. Default ID/PW are vpasp/vpasp and admin/admin.
  322. + OSVDB-3092: /_vti_txt/_vti_cnf/: FrontPage directory found.
  323. + OSVDB-3092: /_vti_txt/: FrontPage directory found.
  324. + OSVDB-3092: /_vti_pvt/deptodoc.btr: FrontPage file found. This may contain useful information.
  325. + OSVDB-3092: /_vti_pvt/doctodep.btr: FrontPage file found. This may contain useful information.
  326. + OSVDB-3092: /_vti_pvt/services.org: FrontPage file found. This may contain useful information.
  327. + OSVDB-473: /_vti_pvt/access.cnf: Contains HTTP server-specific access control information. Remove or ACL if FrontPage is not being used.
  328. + OSVDB-473: /_vti_pvt/service.cnf: Contains meta-information about the web server Remove or ACL if FrontPage is not being used.
  329. + OSVDB-473: /_vti_pvt/services.cnf: Contains the list of subwebs. Remove or ACL if FrontPage is not being used. May reveal server version if Admin has changed it.
  330. + OSVDB-473: /_vti_pvt/svacl.cnf: File used to store whether subwebs have unique permissions settings and any IP address restrictions. Can be used to discover information about subwebs, remove or ACL if FrontPage is not being used.
  331. + OSVDB-473: /_vti_pvt/writeto.cnf: Contains information about form handler result files. Remove or ACL if FrontPage is not being used.
  332. + OSVDB-473: /_vti_pvt/linkinfo.cnf: IIS file shows http links on and off site. Might show host trust relationships and other machines on network.
  333. + OSVDB-48: /doc/: The /doc/ directory is browsable. This may be /usr/doc.
  334. + OSVDB-48: /doc: The /doc directory is browsable. This may be /usr/doc.
  335. + OSVDB-250: /cgis/wwwboard/wwwboard.cgi: Versions 2.0 Alpha and below have multiple problems. See http://www.securityfocus.com/bid/1795 which could allow over-write of messages. Default ID 'WebAdmin' with pass 'WebBoard'.
  336. + OSVDB-250: /cgis/wwwboard/wwwboard.pl: Versions 2.0 Alpha and below have multiple problems. See http://www.securityfocus.com/bid/1795 which could allow over-write of messages. Default ID 'WebAdmin' with pass 'WebBoard'.
  337. + OSVDB-376: /manager/contextAdmin/contextAdmin.html: Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin.
  338. + OSVDB-376: /jk-manager/contextAdmin/contextAdmin.html: Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin.
  339. + OSVDB-376: /jk-status/contextAdmin/contextAdmin.html: Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin.
  340. + OSVDB-376: /admin/contextAdmin/contextAdmin.html: Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin.
  341. + OSVDB-376: /host-manager/contextAdmin/contextAdmin.html: Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin.
  342. + OSVDB-568: /blahb.ida: Reveals physical path. To fix: Preferences -> Home directory -> Application & check 'Check if file exists' for the ISAPI mappings. http://www.microsoft.com/technet/security/bulletin/MS01-033.asp.
  343. + OSVDB-568: /blahb.idq: Reveals physical path. To fix: Preferences -> Home directory -> Application & check 'Check if file exists' for the ISAPI mappings. http://www.microsoft.com/technet/security/bulletin/MS01-033.asp.
  344. + OSVDB-2117: /BACLIENT: IBM Tivoli default file found.
  345. + OSVDB-578: /level/16/exec/-///pwd: CISCO HTTP service allows remote execution of commands
  346. + OSVDB-578: /level/16/exec/-///show/configuration: CISCO HTTP service allows remote execution of commands
  347. + OSVDB-578: /level/16: CISCO HTTP service allows remote execution of commands
  348. + OSVDB-578: /level/16/exec/: CISCO HTTP service allows remote execution of commands
  349. + OSVDB-578: /level/16/exec//show/access-lists: CISCO HTTP service allows remote execution of commands
  350. + OSVDB-578: /level/16/level/16/exec//show/configuration: CISCO HTTP service allows remote execution of commands
  351. + OSVDB-578: /level/16/level/16/exec//show/interfaces: CISCO HTTP service allows remote execution of commands
  352. + OSVDB-578: /level/16/level/16/exec//show/interfaces/status: CISCO HTTP service allows remote execution of commands
  353. + OSVDB-578: /level/16/level/16/exec//show/version: CISCO HTTP service allows remote execution of commands
  354. + OSVDB-578: /level/16/level/16/exec//show/running-config/interface/FastEthernet: CISCO HTTP service allows remote execution of commands
  355. + OSVDB-578: /level/16/exec//show: CISCO HTTP service allows remote execution of commands
  356. + OSVDB-578: /level/17/exec//show: CISCO HTTP service allows remote execution of commands
  357. + OSVDB-578: /level/18/exec//show: CISCO HTTP service allows remote execution of commands
  358. + OSVDB-578: /level/19/exec//show: CISCO HTTP service allows remote execution of commands
  359. + OSVDB-578: /level/20/exec//show: CISCO HTTP service allows remote execution of commands
  360. + OSVDB-578: /level/21/exec//show: CISCO HTTP service allows remote execution of commands
  361. + OSVDB-578: /level/22/exec//show: CISCO HTTP service allows remote execution of commands
  362. + OSVDB-578: /level/23/exec//show: CISCO HTTP service allows remote execution of commands
  363. + OSVDB-578: /level/24/exec//show: CISCO HTTP service allows remote execution of commands
  364. + OSVDB-578: /level/25/exec//show: CISCO HTTP service allows remote execution of commands
  365. + OSVDB-578: /level/26/exec//show: CISCO HTTP service allows remote execution of commands
  366. + OSVDB-578: /level/27/exec//show: CISCO HTTP service allows remote execution of commands
  367. + OSVDB-578: /level/28/exec//show: CISCO HTTP service allows remote execution of commands
  368. + OSVDB-578: /level/29/exec//show: CISCO HTTP service allows remote execution of commands
  369. + OSVDB-578: /level/30/exec//show: CISCO HTTP service allows remote execution of commands
  370. + OSVDB-578: /level/31/exec//show: CISCO HTTP service allows remote execution of commands
  371. + OSVDB-578: /level/32/exec//show: CISCO HTTP service allows remote execution of commands
  372. + OSVDB-578: /level/33/exec//show: CISCO HTTP service allows remote execution of commands
  373. + OSVDB-578: /level/34/exec//show: CISCO HTTP service allows remote execution of commands
  374. + OSVDB-578: /level/35/exec//show: CISCO HTTP service allows remote execution of commands
  375. + OSVDB-578: /level/36/exec//show: CISCO HTTP service allows remote execution of commands
  376. + OSVDB-578: /level/37/exec//show: CISCO HTTP service allows remote execution of commands
  377. + OSVDB-578: /level/38/exec//show: CISCO HTTP service allows remote execution of commands
  378. + OSVDB-578: /level/39/exec//show: CISCO HTTP service allows remote execution of commands
  379. + OSVDB-578: /level/40/exec//show: CISCO HTTP service allows remote execution of commands
  380. + OSVDB-578: /level/41/exec//show: CISCO HTTP service allows remote execution of commands
  381. + OSVDB-578: /level/42/exec//show: CISCO HTTP service allows remote execution of commands
  382. + OSVDB-578: /level/43/exec//show: CISCO HTTP service allows remote execution of commands
  383. + OSVDB-578: /level/44/exec//show: CISCO HTTP service allows remote execution of commands
  384. + OSVDB-578: /level/45/exec//show: CISCO HTTP service allows remote execution of commands
  385. + OSVDB-578: /level/46/exec//show: CISCO HTTP service allows remote execution of commands
  386. + OSVDB-578: /level/47/exec//show: CISCO HTTP service allows remote execution of commands
  387. + OSVDB-578: /level/48/exec//show: CISCO HTTP service allows remote execution of commands
  388. + OSVDB-578: /level/49/exec//show: CISCO HTTP service allows remote execution of commands
  389. + OSVDB-578: /level/50/exec//show: CISCO HTTP service allows remote execution of commands
  390. + OSVDB-578: /level/51/exec//show: CISCO HTTP service allows remote execution of commands
  391. + OSVDB-578: /level/52/exec//show: CISCO HTTP service allows remote execution of commands
  392. + OSVDB-578: /level/53/exec//show: CISCO HTTP service allows remote execution of commands
  393. + OSVDB-578: /level/54/exec//show: CISCO HTTP service allows remote execution of commands
  394. + OSVDB-578: /level/55/exec//show: CISCO HTTP service allows remote execution of commands
  395. + OSVDB-578: /level/56/exec//show: CISCO HTTP service allows remote execution of commands
  396. + OSVDB-578: /level/57/exec//show: CISCO HTTP service allows remote execution of commands
  397. + OSVDB-578: /level/58/exec//show: CISCO HTTP service allows remote execution of commands
  398. + OSVDB-578: /level/59/exec//show: CISCO HTTP service allows remote execution of commands
  399. + OSVDB-578: /level/60/exec//show: CISCO HTTP service allows remote execution of commands
  400. + OSVDB-578: /level/61/exec//show: CISCO HTTP service allows remote execution of commands
  401. + OSVDB-578: /level/62/exec//show: CISCO HTTP service allows remote execution of commands
  402. + OSVDB-578: /level/63/exec//show: CISCO HTTP service allows remote execution of commands
  403. + OSVDB-578: /level/64/exec//show: CISCO HTTP service allows remote execution of commands
  404. + OSVDB-578: /level/65/exec//show: CISCO HTTP service allows remote execution of commands
  405. + OSVDB-578: /level/66/exec//show: CISCO HTTP service allows remote execution of commands
  406. + OSVDB-578: /level/67/exec//show: CISCO HTTP service allows remote execution of commands
  407. + OSVDB-578: /level/68/exec//show: CISCO HTTP service allows remote execution of commands
  408. + OSVDB-578: /level/69/exec//show: CISCO HTTP service allows remote execution of commands
  409. + OSVDB-578: /level/70/exec//show: CISCO HTTP service allows remote execution of commands
  410. + OSVDB-578: /level/71/exec//show: CISCO HTTP service allows remote execution of commands
  411. + OSVDB-578: /level/72/exec//show: CISCO HTTP service allows remote execution of commands
  412. + OSVDB-578: /level/73/exec//show: CISCO HTTP service allows remote execution of commands
  413. + OSVDB-578: /level/74/exec//show: CISCO HTTP service allows remote execution of commands
  414. + OSVDB-578: /level/75/exec//show: CISCO HTTP service allows remote execution of commands
  415. + OSVDB-578: /level/76/exec//show: CISCO HTTP service allows remote execution of commands
  416. + OSVDB-578: /level/77/exec//show: CISCO HTTP service allows remote execution of commands
  417. + OSVDB-578: /level/78/exec//show: CISCO HTTP service allows remote execution of commands
  418. + OSVDB-578: /level/79/exec//show: CISCO HTTP service allows remote execution of commands
  419. + OSVDB-578: /level/80/exec//show: CISCO HTTP service allows remote execution of commands
  420. + OSVDB-578: /level/81/exec//show: CISCO HTTP service allows remote execution of commands
  421. + OSVDB-578: /level/82/exec//show: CISCO HTTP service allows remote execution of commands
  422. + OSVDB-578: /level/83/exec//show: CISCO HTTP service allows remote execution of commands
  423. + OSVDB-578: /level/84/exec//show: CISCO HTTP service allows remote execution of commands
  424. + OSVDB-578: /level/85/exec//show: CISCO HTTP service allows remote execution of commands
  425. + OSVDB-578: /level/86/exec//show: CISCO HTTP service allows remote execution of commands
  426. + OSVDB-578: /level/87/exec//show: CISCO HTTP service allows remote execution of commands
  427. + OSVDB-578: /level/88/exec//show: CISCO HTTP service allows remote execution of commands
  428. + OSVDB-578: /level/89/exec//show: CISCO HTTP service allows remote execution of commands
  429. + OSVDB-578: /level/90/exec//show: CISCO HTTP service allows remote execution of commands
  430. + OSVDB-578: /level/91/exec//show: CISCO HTTP service allows remote execution of commands
  431. + OSVDB-578: /level/94/exec//show: CISCO HTTP service allows remote execution of commands
  432. + OSVDB-578: /level/95/exec//show: CISCO HTTP service allows remote execution of commands
  433. + OSVDB-578: /level/96/exec//show: CISCO HTTP service allows remote execution of commands
  434. + OSVDB-578: /level/97/exec//show: CISCO HTTP service allows remote execution of commands
  435. + OSVDB-578: /level/98/exec//show: CISCO HTTP service allows remote execution of commands
  436. + OSVDB-578: /level/99/exec//show: CISCO HTTP service allows remote execution of commands
  437. + OSVDB-18810: /users.lst: LocalWEB2000 users.lst passwords found
  438. + OSVDB-13405: /WS_FTP.LOG: WS_FTP.LOG file was found. It may contain sensitive information.
  439. + OSVDB-3715: /nsn/env.bas: Novell web server shows the server environment and is vulnerable to cross-site scripting
  440. + OSVDB-3722: /lcgi/lcgitest.nlm: Novell web server shows the server environment
  441. + OSVDB-13404: /com/: Novell web server allows directory listing
  442. + OSVDB-13402: /com/novell/: Novell web server allows directory listing
  443. + OSVDB-13403: /com/novell/webaccess: Novell web server allows directory listing
  444. + OSVDB-4804: //admin/admin.shtml: Axis network camera may allow admin bypass by using double-slashes before URLs.
  445. + OSVDB-4808: /axis-cgi/buffer/command.cgi: Axis WebCam 2400 may allow overwriting or creating files on the system. See http://www.websec.org/adv/axis2400.txt.html for details.
  446. + OSVDB-4806: /support/messages: Axis WebCam allows retrieval of messages file (/var/log/messages). See http://www.websec.org/adv/axis2400.txt.html
  447. + OSVDB-228: /upload.cgi+: The upload.cgi allows attackers to upload arbitrary files to the server.
  448. + OSVDB-561: /server-status: This reveals Apache information. Comment out appropriate line in the Apache conf file or restrict access to allowed sources.
  449. + OSVDB-1264: /publisher/: Netscape Enterprise Server with Web Publishing can allow attackers to edit web pages and/or list arbitrary directories via Java applet. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0237.
  450. + OSVDB-134: /cgi-bin/pfdisplay.cgi?../../../../../../etc/passwd: Comes with IRIX 6.2-6.4; allows to run arbitrary commands
  451. + OSVDB-2: /iissamples/exair/search/search.asp: Scripts within the Exair package on IIS 4 can be used for a DoS against the server. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0449. BID-193.
  452. + OSVDB-2695: /photo/: My Photo Gallery pre 3.6 contains multiple vulnerabilities including directory traversal, unspecified vulnerabilities and remote management interface access.
  453. + OSVDB-2695: /photodata/: My Photo Gallery pre 3.6 contains multiple vulnerabilities including directory traversal, unspecified vulnerabilities and remote management interface access.
  454. + Scan terminated: 14 error(s) and 443 item(s) reported on remote host
  455. + End Time: 2017-11-24 00:24:14 (GMT1) (755 seconds)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement