📄 scan_database.db
字号:
"apache","/index.html.it","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.ja.iso2022-jp","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.kr.iso2022-kr","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.ltz.utf8","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.lu.utf8","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.nl","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.nn","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.no","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.po.iso8859-2","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.pt","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.pt-br","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.ru.cp-1251","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.ru.cp866","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.ru.iso-ru","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.ru.koi8-r","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.ru.utf8","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.se","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.tw","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.tw.Big5","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/index.html.var","200","GET","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.""apache","/interscan/","Administration","GET","InterScan VirusWall administration is accessible without authentication.""apache","/jservdocs/","200","GET","Default Apache JServ docs should be removed.""apache","/lpt9","FileNotFoundException:","GET","Apache Tomcat 4.0.3 reveals the web root when requesting a non-existent DOS device. Upgrade to version 4.1.3beta or higher.""apache","/manual/images/","200","GET","Apache 2.0 directory indexing is enabled, it should only be enabled for specific directories (if required). Apache's manual should be removed and directory indexing disabled.""apache","/NetDetector/middle_help_intro.htm","NIKSUN-HELP","GET","The system appears to be a Niksun NetDetector (network monitoring). 蔜he help files should be available at /NetDetector/quick_help_index.html""apache","/oem_webstage/cgi-bin/oemapp_cgi","This script","GET","Oracle reveals the CGI source by prepending /oem_webstage to CGI urls.""apache","/oem_webstage/oem.conf","DocumentRoot","GET","Oracle reveals a portion of the Apache httpd.conf file.""apache","/php/php.exe?c:\boot.ini","boot loader","GET","The Apache config allows php.exe to be called directly."," ""apache","/pls/admin","ENVIRONMENT","GET","Oracle Apache+WebDB gives a lot of system information via the pls/admin script""apache","/server-info","200","GET","This gives a lot of Apache information. Comment out appropriate line in httpd.conf or restrict access to allowed hosts.""apache","/server-status","200","GET","This gives a lot of Apache information. Comment out appropriate line in httpd.conf or restrict access to allowed hosts.""apache","/servlet/MsgPage?action=test&msg=<script>alert('Vulnerable')</script>","<script>alert('Vulnerable')</script>","GET","NetDetector 3.0 and below are vulnerable to Cross Site Scripting (XSS). CA-2000-02.""apache","/servlet/org.apache.catalina.ContainerServlet/<script>alert('Vulnerable')</script>","<script>alert('Vulnerable')</script>","GET","Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes. CA-2000-02.""apache","/servlet/org.apache.catalina.Context/<script>alert('Vulnerable')</script>","<script>alert('Vulnerable')</script>","GET","Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes. CA-2000-02.""apache","/servlet/org.apache.catalina.Globals/<script>alert('Vulnerable')</script>","<script>alert('Vulnerable')</script>","GET","Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes. CA-2000-02.""apache","/servlet/org.apache.catalina.servlets.WebdavStatus/<script>alert('Vulnerable')</script>","<script>alert('Vulnerable')</script>","GET","Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes. CA-2000-02.""apache","/servlets/MsgPage?action=badlogin&msg=<script>alert('Vulnerable')</script>","<script>alert('Vulnerable')</script>","GET","The NetDetector install is vulnerable to Cross Site Scripting (XSS) in it's invalid login message. CA-2000-02.""apache","/site/eg/source.asp","200","GET","This asp (installed with Apache::ASP) allows attackers to upload files to the server. Upgrade to 1.95 or higher. CAN-2000-0628.""apache","/soap/servlet/soaprouter","200","GET","Oracle 9iAS SOAP components allow anonymous users to deploy applications by default.""apache","/soapConfig.xml","200","GET","Oracle 9iAS configuration file found - see bugrtraq #4290.""apache","/stronghold-info","200","GET","Redhat Stronghold from versions 2.3 up to 3.0 disclose sensitive information. This gives information on configuration. CAN-2001-0868.""apache","/stronghold-status","200","GET","Redhat Stronghold from versions 2.3 up to 3.0 disclose sensitive information. CAN-2001-0868.""apache","/test","test hierarchy","GET","Apache Tomcat default file found. All default files should be removed.""apache","/test/jsp/buffer1.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/buffer2.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/buffer3.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/buffer4.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/declaration/IntegerOverflow.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/extends1.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/extends2.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/Language.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/pageAutoFlush.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/pageDouble.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/pageExtends.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/pageImport2.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/pageInfo.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/pageInvalid.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/pageIsErrorPage.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/pageIsThreadSafe.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/jsp/pageSession.jsp","Internal Servlet","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/test/realPath.jsp","WEBROOT","GET","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.""apache","/tomcat-docs/index.html","200","GET","Default Apache Tomcat documentation found.""apache","/XSQLConfig.xml","200","GET","Oracle 9iAS configuration file found - see bugrtraq #4290.""apache","/~nobody/etc/passwd","root:","GET","Apache is misconfigured to view files by accessing ~nobody/filename. Change UserDir from './' to something else in httpd.conf.""apache","@CGIDIRS.htaccess","200","GET","Contains authorization information""apache","@CGIDIRStest-cgi.bat","200","GET","This is an Apache for Win default. If Apache is lower than 1.3.23, this can be exploited as in test-cgi.bat?|dir+c:+>..\htdocs\listing.txt, but may not allow data sent back to the browser.""cern","/.wwwacl","200","GET","Contains authorization information""cern","/.www_acl","200","GET","Contains authorization information""cern","@CGIDIRS.wwwacl","200","GET","Contains authorization information""cern","@CGIDIRS.www_acl","200","GET","Contains authorization information""cern","@CGIDIRSls"," neither '/","GET","The CERN server lets attackers view the host's path. Should be upgraded to Apache, as CERN is not maintained.""citrix","/applist.asp","200","GET","Citrix server may allow remote users to view applications installed without authenticating.""citrix","/boilerplate.asp?NFuse_Template=.../.../.../.../.../.../.../.../.../boot.ini&NFuse_CurrentFolder=/","boot loader","GET","Citrix CGI allows directory traversal.""compaq","/proxy/ssllogin?user=administrator&password=administrator",">administrator<","GET","Compaq Web-Based Management allows login with id/pass 'administrator'/'administrator'.""compaq","/proxy/ssllogin?user=administrator&password=operator",">operator<","GET","Compaq Web-Based Management allows login with id/pass 'operator'/'operator'.""compaq","/proxy/ssllogin?user=administrator&password=user",">user<","GET","Compaq Web-Based Management allows login with id/pass 'user'/'user'.""compaq","/Survey/Survey.Htm","System Components","GET","This Compaq device, without authentication, gives lots of system information.""compaq","/WEBAGENT/CQMGSERV/CF-SINFO.TPF","General Information","GET","This Compaq device, without authentication, gives lots of system information. Load all the pages at /WEBAGENT/FINDEX.TPL""compaq","http://127.0.0.1:2301/ HTTP/1.0","Compaq WBEM Device","GET","The Compaq WBEM interface can act as an HTTP proxy, which can allow firewall or web proxy bypass. http://www.compaq.com/products/servers/management/SSRT0758.html""dhost","/","DHost HTTP Server","GET","Novell NDS iMonitor was found. Default account may be 'sadmin' with no password.""dwhttpd","/ab2/@AdminAddadmin?uid=foo&password=bar&re_password=bar","200","GET","Sun Answerbook may allow users to be created without proper authentication first. Attempted to add user 'foo' with password 'bar'."
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -