代码搜索:cgi
找到约 10,000 项符合「cgi」的源代码
代码结果 10,000
www.eeworm.com/read/418779/10913863
txt 1607.txt
Rule:
--
Sid:
1607
--
Summary:
This event is generated when an attempt is made to access hsx.cgi on a web server. This may indicate an attempt to exploit a vulnerability in the Hyperseek 2000 search
www.eeworm.com/read/418779/10914995
txt 2387.txt
Rule:
--
Sid:
2387
--
Summary:
This event is generated when an attempt is made to view a URL with the string "view_broadcast.cgi" in the name.
--
Impact:
Denial of service.
--
Detailed Information
www.eeworm.com/read/418779/10916749
txt 806.txt
Rule:
--
Sid:
806
--
Summary:
This event is generated when an attempt is made to access a file outside the root directory of a webserver running YaBB.cgi.
--
Impact:
Information disclosure.
--
Det
www.eeworm.com/read/418779/10921211
txt 2322.txt
Rule:
--
Sid:
2322
--
Summary:
This event is generated when an attempt is made to access foxweb.dll, a
component of the FoxWeb CGI web application running on a server.
--
Impact:
Possible executio
www.eeworm.com/read/418779/10922090
txt 2205.txt
Rule:
--
Sid:
2205
--
Summary:
This event is generated when an attempt is made to access ezboard.cgi on an internal web server. This may indicate an attempt to exploit a buffer overflow vulnerabil
www.eeworm.com/read/418779/10923252
txt 2127.txt
Rule:
--
Sid:
2127
--
Summary:
This event is generated when an attempt is made to access ikonboard.cgi on a web server. This may indicate an attempt to exploit an arbitrary code execution vulnerabil
www.eeworm.com/read/418779/10924329
txt 2085.txt
Rule:
--
Sid:
2085
--
Summary:
This event is generated when an attempt is made to exploit a known vulnerability in parse_xml.cgi script on a webserver.
--
Impact:
Arbitrary code execution, informat
www.eeworm.com/read/469590/6932290
runfromshell
#!/usr/local/bin/bash
export REQUEST_METHOD=GET
export QUERY_STRING="fname=dave&lname=hollinger&ssn=1234"
./handleform.cgi