Greetings!
In the following list below, I did a scan on Petsex.com. I believe it has found MANY vulnerabilities, but that's for you to decide. The network is protected by cloudflare, so it seems it won't let me see a file I have been going to, but it really displays it. I also included the reverse IP check and Whois info.
Scan:
---------------------------------------------------------------------------
+ Target IP: 173.245.61.114
+ Target Hostname: cf-173-245-61-114.cloudflare.com
+ Target Port: 80
+ Start Time: 2012-09-25 17:30:11
---------------------------------------------------------------------------
+ Server: cloudflare-nginx
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ robots.txt retrieved but it does not contain any 'disallow' entries (which is odd).
+ /kboard/: KBoard Forum 0.3.0 and prior have a security problem in forum_edit_post.php, forum_post.php and forum_reply.php
+ /lists/admin/: PHPList pre 2.6.4 contains a number of vulnerabilities including remote administrative access, harvesting user info and more. Default login to admin interface is admin/phplist
+ /splashAdmin.php: Cobalt Qube 3 admin is running. This may have multiple security problems as described by www.scan-associates.net. These could not be tested remotely.
+ /ssdefs/: Siteseed pre 1.4.2 has 'major' security problems.
+ /sshome/: Siteseed pre 1.4.2 has 'major' security problems.
+ /tiki/: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin
+ /tiki/tiki-install.php: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin
+ /scripts/samples/details.idc: See RFP 9901; www.wiretrip.net
+ OSVDB-396: /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted.
+ OSVDB-637: /~root/: Allowed to browse root's home directory.
+ /cgi-bin/wrap: comes with IRIX 6.2; allows to view directories
+ /forums//admin/config.php: PHP Config file may contain database IDs and passwords.
+ /forums//adm/config.php: PHP Config file may contain database IDs and passwords.
+ /forums//administrator/config.php: PHP Config file may contain database IDs and passwords.
+ /forums/config.php: PHP Config file may contain database IDs and passwords.
+ /guestbook/guestbookdat: PHP-Gastebuch 1.60 Beta reveals sensitive information about its configuration.
+ /guestbook/pwd: PHP-Gastebuch 1.60 Beta reveals the md5 hash of the admin password.
+ /help/: Help directory should not be accessible
+ OSVDB-2411: /hola/admin/cms/htmltags.php?datei=./sec/data.php: hola-cms-1.2.9-10 may reveal the administrator ID and password.
+ OSVDB-8103: /global.inc: PHP-Survey's include file should not be available via the web. Configure the web server to ignore .inc files or change this to global.inc.php
+ OSVDB-59620: /inc/common.load.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
+ OSVDB-59619: /inc/config.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
+ OSVDB-59618: /inc/dbase.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
+ OSVDB-2703: /geeklog/users.php: Geeklog prior to 1.3.8-1sr2 contains a SQL injection vulnerability that lets a remote attacker reset admin password.
+ OSVDB-8204: /gb/index.php?login=true: gBook may allow admin login by setting the value 'login' equal to 'true'.
+ /guestbook/admin.php: Guestbook admin page available without authentication.
+ /getaccess: This may be an indication that the server is running getAccess for SSO
+ /cfdocs/expeval/openfile.cfm: Can use to expose the system/server path.
+ /tsweb/: Microsoft TSAC found. http://www.dslwebserver.com/main/fr_index.html?/main/sbs-Terminal-Services-Advanced-Client-Configuration.html
+ /vgn/performance/TMT: Vignette CMS admin/maintenance script available.
+ /vgn/performance/TMT/Report: Vignette CMS admin/maintenance script available.
+ /vgn/performance/TMT/Report/XML: Vignette CMS admin/maintenance script available.
+ /vgn/performance/TMT/reset: Vignette CMS admin/maintenance script available.
+ /vgn/ppstats: Vignette CMS admin/maintenance script available.
+ /vgn/previewer: Vignette CMS admin/maintenance script available.
+ /vgn/record/previewer: Vignette CMS admin/maintenance script available.
+ /vgn/stylepreviewer: Vignette CMS admin/maintenance script available.
+ /vgn/vr/Deleting: Vignette CMS admin/maintenance script available.
+ /vgn/vr/Editing: Vignette CMS admin/maintenance script available.
+ /vgn/vr/Saving: Vignette CMS admin/maintenance script available.
+ /vgn/vr/Select: Vignette CMS admin/maintenance script available.
+ /scripts/iisadmin/bdir.htr: This default script shows host info, may allow file browsing and buffer a overrun in the Chunked Encoding data transfer mechanism, request /scripts/iisadmin/bdir.htr??c:\<dirs> . http://www.microsoft.com/technet/security/bulletin/MS02-028.asp. http://www.cert.org/advisories/CA-2002-09.html.
+ /scripts/iisadmin/ism.dll: Allows you to mount a brute force attack on passwords
+ /scripts/tools/ctss.idc: This CGI allows remote users to view and modify SQL DB contents, server paths, docroot and more.
+ /bigconf.cgi: BigIP Configuration CGI
+ /blah_badfile.shtml: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.
+ OSVDB-4910: /vgn/style: Vignette server may reveal system information through this file.
+ OSVDB-17653: /SiteServer/Admin/commerce/foundation/domain.asp: Displays known domains of which that server is involved.
+ OSVDB-17654: /SiteServer/Admin/commerce/foundation/driver.asp: Displays a list of installed ODBC drivers.
+ OSVDB-17655: /SiteServer/Admin/commerce/foundation/DSN.asp: Displays all DSNs configured for selected ODBC drivers.
+ OSVDB-17652: /SiteServer/admin/findvserver.asp: Gives a list of installed Site Server components.
+ /SiteServer/Admin/knowledge/dsmgr/default.asp: Used to view current search catalog configurations
+ /basilix/mbox-list.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'message list' function/page
+ /basilix/message-read.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'read message' function/page
+ /clusterframe.jsp: Macromedia JRun 4 build 61650 remote administration interface is vulnerable to several XSS attacks.
+ /IlohaMail/blank.html: IlohaMail 0.8.10 contains a XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
+ /bb-dnbd/faxsurvey: This may allow arbitrary command execution.
+ /cartcart.cgi: If this is Dansie Shopping Cart 3.0.8 or earlier, it contains a backdoor to allow attackers to execute arbitrary commands.
+ OSVDB-6591: /scripts/Carello/Carello.dll: Carello 1.3 may allow commands to be executed on the server by replacing hidden form elements. This could not be tested by Nikto.
+ /scripts/tools/dsnform.exe: Allows creation of ODBC Data Source
+ /scripts/tools/dsnform: Allows creation of ODBC Data Source
+ OSVDB-17656: /SiteServer/Admin/knowledge/dsmgr/users/GroupManager.asp: Used to create, modify, and potentially delete LDAP users and groups.
+ OSVDB-17657: /SiteServer/Admin/knowledge/dsmgr/users/UserManager.asp: Used to create, modify, and potentially delete LDAP users and groups.
+ /prd.i/pgen/: Has MS Merchant Server 1.0
+ /readme.eml: Remote server may be infected with the Nimda virus.
+ /scripts/httpodbc.dll: Possible IIS backdoor found.
+ /scripts/proxy/w3proxy.dll: MSProxy v1.0 installed
+ /SiteServer/admin/: Site Server components admin. Default account may be 'LDAP_Anonymous', pass is 'LdapPassword_1'. see http://www.wiretrip.net/rfp/p/doc.asp/i1/d69.htm
+ /siteseed/: Siteseed pre 1.4.2 has 'major' security problems.
+ /pccsmysqladm/incs/dbconnect.inc: This file should not be accessible, as it contains database connectivity information. Upgrade to version 1.2.5 or higher.
+ /iisadmin/: Access to /iisadmin should be restricted to localhost or allowed hosts only.
+ /PDG_Cart/oder.log: Shopping cart software log
+ /ows/restricted%2eshow: OWS may allow restricted files to be viewed by replacing a character with its encoded equivalent.
+ /WEB-INF./web.xml: Multiple implementations of j2ee servlet containers allow files to be retrieved from WEB-INF by appending a '.' to the directory name. Products include Sybase EA Service, Oracle Containers, Orion, JRun, HPAS, Pramati and others. See http://www.westpoint.l
+ /view_source.jsp: Resin 2.1.2 view_source.jsp allows any file on the system to be viewed by using \..\ directory traversal. This script may be vulnerable.
+ /w-agora/: w-agora pre 4.1.4 may allow a remote user to execute arbitrary PHP scripts via URL includes in include/*.php and user/*.php files. Default account is 'admin' but password set during install.
+ OSVDB-42680: /vider.php3: MySimpleNews may allow deleting of news items without authentication.
+ OSVDB-6181: /officescan/cgi/cgiChkMasterPwd.exe: Trend Micro Officescan allows you to skip the login page and access some CGI programs directly.
+ /pbserver/pbserver.dll: This may contain a buffer overflow. http://www.microsoft.com/technet/security/bulletin/http://www.microsoft.com/technet/security/bulletin/ms00-094.asp.asp
+ /administrator/gallery/uploadimage.php: Mambo PHP Portal/Server 4.0.12 BETA and below may allow upload of any file type simply putting '.jpg' before the real file extension.
+ /pafiledb/includes/team/file.php: paFileDB 3.1 and below may allow file upload without authentication.
+ /phpEventCalendar/file_upload.php: phpEventCalendar 1.1 and prior are vulnerable to file upload bug.
+ /servlet/com.unify.servletexec.UploadServlet: This servlet allows attackers to upload files to the server.
+ /scripts/cpshost.dll: Posting acceptor possibly allows you to upload files
+ /upload.asp: An ASP page that allows attackers to upload files to server
+ /uploadn.asp: An ASP page that allows attackers to upload files to server
+ /uploadx.asp: An ASP page that allows attackers to upload files to server
+ /wa.exe: An ASP page that allows attackers to upload files to server
+ /basilix/compose-attach.php3: BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads
+ /server/: If port 8000, Macromedia JRun 4 build 61650 remote administration interface is vulnerable to several XSS attacks.
+ /vgn/ac/data: Vignette CMS admin/maintenance script available.
+ /vgn/ac/delete: Vignette CMS admin/maintenance script available.
+ /vgn/ac/edit: Vignette CMS admin/maintenance script available.
+ /vgn/ac/esave: Vignette CMS admin/maintenance script available.
+ /vgn/ac/fsave: Vignette CMS admin/maintenance script available.
+ /vgn/ac/index: Vignette CMS admin/maintenance script available.
+ /vgn/asp/MetaDataUpdate: Vignette CMS admin/maintenance script available.
+ /vgn/asp/previewer: Vignette CMS admin/maintenance script available.
+ /vgn/asp/status: Vignette CMS admin/maintenance script available.
+ /vgn/asp/style: Vignette CMS admin/maintenance script available.
+ /vgn/errors: Vignette CMS admin/maintenance script available.
+ /vgn/jsp/controller: Vignette CMS admin/maintenance script available.
+ /vgn/jsp/errorpage: Vignette CMS admin/maintenance script available.
+ /vgn/jsp/initialize: Vignette CMS admin/maintenance script available.
+ /vgn/jsp/jspstatus: Vignette CMS admin/maintenance script available.
+ /vgn/jsp/jspstatus56: Vignette CMS admin/maintenance script available.
+ /vgn/jsp/metadataupdate: Vignette CMS admin/maintenance script available.
+ /vgn/jsp/previewer: Vignette CMS admin/maintenance script available.
+ /vgn/jsp/style: Vignette CMS admin/maintenance script available.
+ /vgn/legacy/edit: Vignette CMS admin/maintenance script available.
+ /vgn/login: Vignette server may allow user enumeration based on the login attempts to this file.
+ OSVDB-35707: /forum/admin/wwforum.mdb: Web Wiz Forums password database found.
+ /fpdb/shop.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-52975: /guestbook/admin/o12guest.mdb: Ocean12 ASP Guestbook Manager allows download of SQL database which contains admin password.
+ OSVDB-15971: /midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
+ OSVDB-15971: /MIDICART/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
+ OSVDB-41850: /mpcsoftweb_guestbook/database/mpcsoftweb_guestdata.mdb: MPCSoftWeb Guest Book passwords retrieved.
+ /news/news.mdb: Web Wiz Site News release v3.06 admin password database is available and unencrypted.
+ OSVDB-53413: /shopping300.mdb: VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.
+ OSVDB-53413: /shopping400.mdb: VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.
+ OSVDB-15971: /shoppingdirectory/midicart.mdb: MIDICART database is available for browsing. This should not be allowed via the web server.
+ OSVDB-4398: /database/db2000.mdb: Max Web Portal database is available remotely. It should be moved from the default location to a directory outside the web root.
+ /admin/config.php: PHP Config file may contain database IDs and passwords.
+ /adm/config.php: PHP Config file may contain database IDs and passwords.
+ /administrator/config.php: PHP Config file may contain database IDs and passwords.
+ /contents.php?new_language=elvish&mode=select: Requesting a file with an invalid language selection from DC Portal may reveal the system path.
+ OSVDB-6467: /pw/storemgr.pw: Encrypted ID/Pass for Mercantec's SoftCart, http://www.mercantec.com/, see http://www.mindsec.com/advisories/post2.txt for more information.
+ /servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.
+ /shopa_sessionlist.asp: VP-ASP shopping cart test application is available from the web. This page may give the location of .mdb files which may also be available.
+ OSVDB-53303: /simplebbs/users/users.php: Simple BBS 1.0.6 allows user information and passwords to be viewed remotely.
+ /typo3conf/: This may contain sensitive Typo3 files.
+ /typo3conf/database.sql: Typo3 SQL file found.
+ /typo3conf/localconf.php: Typo3 config file found.
+ OSVDB-53386: /vchat/msg.txt: VChat allows user information to be retrieved.
+ OSVDB-4907: /vgn/license: Vignette server license file found.
+ /webcart-lite/config/import.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.
+ /webcart-lite/orders/import.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.
+ /webcart/carts/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.
+ /webcart/config/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.
+ /webcart/config/clients.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.
+ /webcart/orders/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.
+ /webcart/orders/import.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.
+ /ws_ftp.ini: Can contain saved passwords for FTP sites
+ /WS_FTP.ini: Can contain saved passwords for FTP sites
+ /_mem_bin/auoconfig.asp: Displays the default AUO (LDAP) schema, including host and port.
+ OSVDB-17659: /SiteServer/Admin/knowledge/persmbr/vs.asp: Expose various LDAP service and backend configuration parameters
+ OSVDB-17661: /SiteServer/Admin/knowledge/persmbr/VsLsLpRd.asp: Expose various LDAP service and backend configuration parameters
+ OSVDB-17662: /SiteServer/Admin/knowledge/persmbr/VsPrAuoEd.asp: Expose various LDAP service and backend configuration parameters
+ OSVDB-17660: /SiteServer/Admin/knowledge/persmbr/VsTmPr.asp: Expose various LDAP service and backend configuration parameters
+ /tvcs/getservers.exe?action=selects1: Following steps 2-4 of this page may reveal a zip file that contains passwords and system details.
+ /whatever.htr: May reveal physical path. htr files may also be vulnerable to an off-by-one overflow that allows remote command execution (see http://www.microsoft.com/technet/security/bulletin/MS02-018.asp)
+ /nsn/fdir.bas:ShowVolume: You can use ShowVolume and ShowDirectory directly on the Novell server (NW5.1) to view the filesystem without having to log in
+ /nsn/fdir.bas: You can use fdir to ShowVolume and ShowDirectory.
+ /forum/admin/database/wwForum.mdb: Web Wiz Forums pre 7.5 is vulnerable to Cross-Site Scripting attacks. Default login/pass is Administrator/letmein
+ /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
+ /jamdb/: JamDB pre 0.9.2 mp3.php and image.php can allow user to read arbitrary file out of docroot.
+ OSVDB-1201: /cgi/cgiproc?: It may be possible to crash Nortel Contivity VxWorks by requesting '/cgi/cgiproc?$' (not attempted!). Upgrade to version 2.60 or later.
+ OSVDB-6196: /servlet/SchedulerTransfer: PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution. See http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21999
+ /servlet/sunexamples.BBoardServlet: This default servlet lets attackers execute arbitrary commands.
+ OSVDB-6196: /servlets/SchedulerTransfer: PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution. See http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21999
+ /perl/-e%20print%20Hello: The Perl interpreter on the Novell system may allow any command to be executed. See http://www.securityfocus.com/bid/5520. Installing Perl 5.6 might fix this issue.
+ /vgn/legacy/save: Vignette Legacy Tool may be unprotected. To access this resource, set a cookie called 'vgn_creds' with any value.
+ /IDSWebApp/IDSjsp/Login.jsp: Tivoli Directory Server Web Administration.
+ OSVDB-6466: /quikstore.cfg: Shopping cart config file, http://www.quikstore.com/, http://www.mindsec.com/advisories/post2.txt
+ /quikstore.cgi: A shopping cart.
+ /securecontrolpanel/: Web Server Control Panel
+ /siteminder: This may be an indication that the server is running Siteminder for SSO
+ /webmail/: Web based mail package installed.
+ /_cti_pvt/: FrontPage directory found.
+ /smg_Smxcfg30.exe?vcc=3560121183d3: This may be a Trend Micro Officescan 'backdoor'.
+ /nsn/..%5Cutil/attrib.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/chkvol.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/copy.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/del.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/dir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/dsbrowse.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/glist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/lancard.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/md.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/rd.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/ren.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/send.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/set.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/slist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/type.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cutil/userlist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cweb/env.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cweb/fdir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cwebdemo/env.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /nsn/..%5Cwebdemo/fdir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server
+ /upd/: WASD Server can allow directory listings by requesting /upd/directory/. Upgrade to a later version and secure according to the documents on the WASD web site.
+ /CVS/Entries: CVS Entries file may contain directory listing information.
+ OSVDB-8450: /phpmyadmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ OSVDB-8450: /db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ OSVDB-8450: /3rdparty/phpMyAdmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ OSVDB-8450: /phpMyAdmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ OSVDB-8450: /3rdparty/phpmyadmin/db_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ OSVDB-8450: /phpmyadmindb_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ OSVDB-8450: /pmadb_details_importdocsql.php?submit_show=true&do=import&docpath=../: phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher. http://www.securityfocus.com/bid/7963.
+ /catalog.nsf: A list of server databases can be retrieved, as well as a list of ACLs.
+ /cersvr.nsf: Server certificate data can be accessed remotely.
+ /domlog.nsf: The domain server logs can be accessed remotely.
+ /events4.nsf: The events log can be accessed remotely.
+ /log.nsf: The server log is remotely accessible.
+ /names.nsf: User names and groups can be accessed remotely (possibly password hashes as well)
+ OSVDB-31150: /LOGIN.PWD: MIPCD password file (passwords are not encrypted). MIPDCD should not have the web interface enabled.
+ OSVDB-31150: /USER/CONFIG.AP: MIPCD configuration information. MIPCD should not have the web interface enabled.
+ /admin-serv/config/admpw: This file contains the encrypted Netscape admin password. It should not be accessible via the web.
+ /cgi-bin/cgi_process: WASD reveals a lot of system information in this script. It should be removed.
+ /ht_root/wwwroot/-/local/httpd$map.conf: WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site.
+ /local/httpd$map.conf: WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site.
+ /tree: WASD Server reveals the entire web root structure and files via this URL. Upgrade to a later version and secure according to the documents on the WASD web site.
+ /852566C90012664F: This database can be read using the replica ID without authentication.
+ /hidden.nsf: This database can be read without authentication. Common database name.
+ /mail.box: The mail database can be read without authentication.
+ /setup.nsf: The server can be configured remotely, or current setup can be downloaded.
+ /statrep.nsf: Any reports generated by the admins can be retrieved.
+ /webadmin.nsf: The server admin database can be accessed remotely.
+ /examples/servlet/AUX: Apache Tomcat versions below 4.1 may be vulnerable to DoS by repeatedly requesting this file.
+ /Config1.htm: This may be a D-Link. Some devices have a DoS condition if an oversized POST request is sent. This DoS was not tested. See http://www.phenoelit.de/stuff/dp-300.txt for info.
+ /contents/extensions/asp/1: The IIS system may be vulnerable to a DOS, see http://www.microsoft.com/technet/security/bulletin/MS02-018.asp for details.
+ /WebAdmin.dll?View=Logon: Some versions of WebAdmin are vulnerable to a remote DoS (not tested). See http://www.ngssoftware.com.
+ /cgi-win/cgitest.exe: This CGI may allow the server to be crashed remotely, see http://www.securityoffice.net/ for details. Remove this default CGI.
+ /cgi-shl/win-c-sample.exe: win-c-sample.exe has a buffer overflow
+ /.nsf/../winnt/win.ini: This win.ini file can be downloaded.
+ /................../config.sys: PWS allows files to be read by prepending multiple '.' characters. At worst, IIS, not PWS, should be used.
+ ///etc/hosts: The server install allows reading of any system file by adding an extra '/' to the URL.
+ /contents/extensions/asp/1: The IIS system may be vulnerable to a DOS, see http://www.microsoft.com/technet/security/bulletin/MS02-018.asp for details.
+ /WebAdmin.dll?View=Logon: Some versions of WebAdmin are vulnerable to a remote DoS (not tested). See http://www.ngssoftware.com.
+ /cgi-win/cgitest.exe: This CGI may allow the server to be crashed remotely, see http://www.securityoffice.net/ for details. Remove this default CGI.
+ /cgi-shl/win-c-sample.exe: win-c-sample.exe has a buffer overflow
+ /.nsf/../winnt/win.ini: This win.ini file can be downloaded.
+ /................../config.sys: PWS allows files to be read by prepending multiple '.' characters. At worst, IIS, not PWS, should be used.
+ ///etc/hosts: The server install allows reading of any system file by adding an extra '/' to the URL.
+ /nph-showlogs.pl?files=../../../../../../../../etc/&filter=.*&submit=Go&linecnt=500&refresh=0: nCUBE Server Manage 1.0 allows directory listings of any location on the remote system.
+ OSVDB-2829: /phpwebfilemgr/index.php?f=../../../../../../../../../etc: phpWebFileManager v2.0.0 and prior are vulnerable to a directory traversal bug.
+ /..\..\..\..\..\..\temp\temp.class: Cisco ACS 2.6.x and 3.0.1 (build 40) allows authenticated remote users to retrieve any file from the system. Upgrade to the latest version.
+ OSVDB-728: /admentor/adminadmin.asp: Version 2.11 of AdMentor is vulnerable to SQL injection during login, in the style of: ' or =
+ OSVDB-10107: /author.asp: May be FactoSystem CMS, which could include SQL injection problems that could not be tested remotely.
+ OSVDB-2767: /openautoclassifieds/friendmail.php?listing=<script>alert(document.domain);</script>: OpenAutoClassifieds 1.0 is vulnerable to a XSS attack
+ /modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
+ OSVDB-4015: /jigsaw/: Jigsaw server may be installed. Versions lower than 2.2.1 are vulnerable to Cross Site Scripting (XSS) in the error page.
+ OSVDB-2754: /guestbook/?number=5&lng=%3Cscript%3Ealert(document.domain);%3C/script%3E: MPM Guestbook 1.2 and previous are vulnreable to XSS attacks.
+ /anthill/login.php: Anthill bug tracking system may be installed. Versions lower than 0.1.6.1 allow XSS/HTML injection and may allow users to bypass login requirements. http://anthill.vmlinuz.ca/ and http://www.cert.org/advisories/CA-2000-02.html
+ /cfdocs/expeval/sendmail.cfm: Can be used to send email; go to the page and fill in the form
+ OSVDB-22: /cgi-bin/bigconf.cgi: BigIP Configuration CGI
+ /ammerum/: Ammerum pre 0.6-1 had several security issues.
+ /ariadne/: Ariadne pre 2.1.2 has several vulnerabilities. The default login/pass to the admin page is admin/muze.
+ /cbms/cbmsfoot.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /cbms/changepass.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /cbms/editclient.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /cbms/passgen.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /cbms/realinv.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /cbms/usersetup.php: CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/
+ /ext.dll?MfcIsapiCommand=LoadPage&page=admin.hts%20&a0=add&a1=root&a2=%5C: This check (A) sets up the next bad blue test (B) for possible exploit. See http://www.badblue.com/down.htm
+ OSVDB-59412: /db/users.dat: upb PB allows the user database to be retrieved remotely.
+ /Admin_files/order.log: Selena Sol's WebStore 1.0 exposes order information, http://www.extropia.com/, http://www.mindsec.com/advisories/post2.txt.
+ /admin/cplogfile.log: DevBB 1.0 final (http://www.mybboard.com) log file is readable remotely. Upgrade to the latest version.
+ /admin/system_footer.php: myphpnuke version 1.8.8_final_7 reveals detailed system information.
+ /cfdocs/snippets/fileexists.cfm: Can be used to verify the existance of files (on the same drive info as the web tree/file)
+ /cgi-bin/MachineInfo: Gives out information on the machine (IRIX), including hostname
+ OSVDB-59646: /chat/!nicks.txt: WF-Chat 1.0 Beta allows retrieval of user information.
+ OSVDB-59645: /chat/!pwds.txt: WF-Chat 1.0 Beta allows retrieval of user information.
+ OSVDB-53304: /chat/data/usr: SimpleChat! 1.3 allows retrieval of user information.
+ /config.php: PHP Config file may contain database IDs and passwords.
+ /config/: Configuration information may be available remotely.
+ /cplogfile.log: XMB Magic Lantern forum 1.6b final (http://www.xmbforum.com) log file is readable remotely. Upgrade to the latest version.
+ /examples/jsp/snp/anything.snp: Tomcat servlet gives lots of host information.
+ /cfdocs/snippets/evaluate.cfm: Can enter CF code to be evaluated, or create denial of service see www.allaire.com/security/ technical papers and advisories for info
+ /cfide/Administrator/startstop.html: Can start/stop the server
+ OSVDB-10598: /cd-cgi/sscd_suncourier.pl: Sunsolve CD script may allow users to execute arbitrary commands. The script was confirmed to exist, but the test was not done.
+ /cgi-bin/handler: Comes with IRIX 5.3 - 6.4; allows to run arbitrary commands
+ OSVDB-235: /cgi-bin/webdist.cgi: Comes with IRIX 5.0 - 6.3; allows to run arbitrary commands
+ OSVDB-55: /ews/ews/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. http://www.securityfocus.com/bid/2665.
+ OSVDB-5280: /instantwebmail/message.php: Instant Web Mail (http://understroem.kdc/instantwebmail/) is installed. Versions 0.59 and lower can allow remote users to embed POP3 commands in URLs contained in email.
+ OSVDB-29786: /admin.php?en_log_id=0&action=config: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
+ OSVDB-29786: /admin.php?en_log_id=0&action=users: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
+ /admin.php4?reg_login=1: Mon Album from http://www.3dsrc.com version 0.6.2d allows remote admin access. This should be protected.
+ OSVDB-3233: /admin/admin_phpinfo.php4: Mon Album from http://www.3dsrc.com version 0.6.2d allows remote admin access. This should be protected.
+ OSVDB-5034: /admin/login.php?action=insert&username=test&password=test: phpAuction may allow user admin accounts to be inserted without proper authentication. Attempt to log in with user 'test' password 'test' to verify.
+ OSVDB-5178: /dostuff.php?action=modify_user: Blahz-DNS allows unauthorized users to edit user information. Upgrade to version 0.25 or higher. http://blahzdns.sourceforge.net/
+ OSVDB-5088: /accounts/getuserdesc.asp: Hosting Controller 2002 administration page is available. This should be protected.
+ OSVDB-35876: /agentadmin.php: Immobilier agentadmin.php contains multiple SQL injection vulnerabilities.
+ /sqldump.sql: Database SQL?
+ /structure.sql: Database SQL?
+ /servlet/SessionManager: IBM WebSphere reconfigure servlet (user=servlet, password=manager). All default code should be removed from servers.
+ /ip.txt: This may be User Online from http://www.elpar.net version 2.0, which has a remotely accessible log file.
+ /level/42/exec/show%20conf: Retrieved Cisco configuration file.
+ /livehelp/: LiveHelp may reveal system information.
+ /LiveHelp/: LiveHelp may reveal system information.
+ OSVDB-59536: /logicworks.ini: web-erp 0.1.4 and earlier allow .ini files to be read remotely.
+ /logs/str_err.log: Bmedia error log, contains invalid login attempts which include the invalid usernames and passwords entered (could just be typos & be very close to the right entries).
+ OSVDB-6465: /mall_log_files/order.log: EZMall2000 exposes order information, http://www.ezmall2000.com/, see http://www.mindsec.com/advisories/post2.txt for details.
+ OSVDB-3204: /megabook/files/20/setup.db: Megabook guestbook configuration available remotely.
+ OSVDB-6161: /officescan/hotdownload/ofscan.ini: OfficeScan from Trend Micro allows anyone to read the ofscan.ini file, which may contain passwords.
+ /order/order_log_v12.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /order/order_log.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /orders/order_log_v12.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /Orders/order_log_v12.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /orders/order_log.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /Orders/order_log.dat: Web shopping system from http://www.io.com/~rga/scripts/cgiorder.html exposes order information, see http://www.mindsec.com/advisories/post2.txt
+ /pmlite.php: A Xoops CMS script was found. Version RC3 and below allows all users to view all messages (untested). See http://www.phpsecure.org/?zone=pComment&d=101 for details.
+ /session/admnlogin: SessionServlet Output, has session cookie info.
+ OSVDB-613: /SiteScope/htdocs/SiteScope.html: The SiteScope install may allow remote users to get sensitive information about the hosts being monitored.
+ /servlet/allaire.jrun.ssi.SSIFilter: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call, see MPSB01-12 http://www.macromedia.com/devnet/security/security_zone/mpsb01-12.html.
+ OSVDB-2881: /pp.php?action=login: Pieterpost 0.10.6 allows anyone to access the 'virtual' account which can be used to relay/send e-mail.
+ /isapi/count.pl?: AN HTTPd default script may allow writing over arbitrary files with a new content of '1', which could allow a trivial DoS. Append /../../../../../ctr.dll to replace this file's contents, for example.
+ /krysalis/: Krysalis pre 1.0.3 may allow remote users to read arbitrary files outside docroot
+ /logjam/showhits.php: Logjam may possibly allow remote command execution via showhits.php page.
+ /manual.php: Does not filter input before passing to shell command. Try 'ls -l' as the man page entry.
+ OSVDB-14329: /smssend.php: PhpSmssend may allow system calls if a ' is passed to it. http://zekiller.skytech.org/smssend.php
+ OSVDB-113: /ncl_items.html: This may allow attackers to reconfigure your Tektronix printer.
+ OSVDB-551: /ncl_items.shtml?SUBJECT=1: This may allow attackers to reconfigure your Tektronix printer.
+ /photo/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more.
+ /photodata/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more.
+ OSVDB-5374: /pub/english.cgi?op=rmail: BSCW self-registration may be enabled. This could allow untrusted users semi-trusted access to the software. 3.x version (and probably some 4.x) allow arbitrary commands to be executed remotely.
+ /pvote/ch_info.php?newpass=password&confirm=password%20: PVote administration page is available. Versions 1.5b and lower do not require authentication to reset the administration password.
+ OSVDB-240: /scripts/wsisa.dll/WService=anything?WSMadmin: Allows Webspeed to be remotely administered. Edit unbroker.properties and set AllowMsngrCmds to 0.
+ OSVDB-3092: /SetSecurity.shm: Cisco System's My Access for Wireless. This resource should be password protected.
+ OSVDB-3126: /submit?setoption=q&option=allowed_ips&value=255.255.255.255: MLdonkey 2.x allows administrative interface access to be access from any IP. This is typically only found on port 4080.
+ OSVDB-2225: /thebox/admin.php?act=write&username=admin&password=admin&aduser=admin&adpass=admin: paBox 1.6 may allow remote users to set the admin password. If successful, the 'admin' password is now 'admin'.
+ OSVDB-3092: /shopadmin.asp: VP-ASP shopping cart admin may be available via the web. Default ID/PW are vpasp/vpasp and admin/admin.
+ OSVDB-3299: /vbulletincalendar.php?calbirthdays=1&action=getday&day=2001-8-15&comma=%22;echo%20'';%20echo%20%60id%20%60;die();echo%22: Vbulletin allows remote command execution. See http://www.securiteam.com/securitynews/5IP0B203PI.html
+ OSVDB-3396: /mlog.html: Remote file read vulnerability 1999-0068
+ OSVDB-3396: /mlog.phtml: Remote file read vulnerability 1999-0068
+ OSVDB-3396: /php/mlog.html: Remote file read vulnerability 1999-0346
+ OSVDB-3396: /php/mlog.phtml: Remote file read vulnerability 1999-0346
+ OSVDB-3411: /soapConfig.xml: Oracle 9iAS configuration file found - see bugtraq #4290.
+ OSVDB-3423: /XSQLConfig.xml: Oracle 9iAS configuration file found - see bugtraq #4290.
+ OSVDB-3489: /surf/scwebusers: SurfControl SuperScout Web Reports Server user and password file is available. CVE-2002-0705.
+ OSVDB-3501: /_private/form_results.htm: This file may contain information submitted by other web users via forms. CVE-1999-1052.
+ OSVDB-3501: /_private/form_results.html: This file may contain information submitted by other web users via forms. CVE-1999-1052.
+ OSVDB-3501: /_private/form_results.txt: This file may contain information submitted by other web users via forms. CVE-1999-1052.
+ OSVDB-3512: /scripts/tools/getdrvrs.exe: MS Jet database engine can be used to make DSNs, useful with an ODBC exploit and the RDS exploit (with msadcs.dll) which mail allow command execution. RFP9901 (http://www.wiretrip.net/rfp/p/doc.asp/i2/d3.htm).
+ OSVDB-3591: /project/index.php?m=projects&user_cookie=1: dotProject 0.2.1.5 may allow admin login bypass by adding the user_cookie=1 to the URL.
+ OSVDB-379: /site/eg/source.asp: This ASP (installed with Apache::ASP) allows attackers to upload files to the server. Upgrade to 1.95 or higher. CVE-2000-0628.
+ OSVDB-4: /iissamples/exair/search/advsearch.asp: Scripts within the Exair package on IIS 4 can be used for a DoS against the server. CVE-1999-0449. BID-193.
+ OSVDB-4013: /isqlplus: Oracle iSQL*Plus is installed. This may be vulnerable to a buffer overflow in the user ID field. http://www.ngssoftware.com/advisories/ora-isqlplus.txt
+ OSVDB-4161: /data/member_log.txt: Teekai's forum full 1.2 member's log can be retrieved remotely.
+ OSVDB-4161: /data/userlog/log.txt: Teekai's Tracking Online 1.0 log can be retrieved remotely.
+ OSVDB-4161: /userlog.php: Teekai's Tracking Online 1.0 log can be retrieved remotely.
+ OSVDB-4171: /ASP/cart/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /mcartfree/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /metacart/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /shop/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /shoponline/fpdb/shop.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4171: /shopping/database/metacart.mdb: MetaCart2 is an ASP shopping cart. The database of customers is available via the web.
+ OSVDB-4237: /ban.bak: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
+ OSVDB-4237: /ban.dat: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
+ OSVDB-4237: /ban.log: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
+ OSVDB-4237: /banmat.pwd: Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.
+ OSVDB-4238: /admin/adminproc.asp: Xpede administration page may be available. The /admin directory should be protected.
+ OSVDB-4239: /admin/datasource.asp: Xpede page reveals SQL account name. The /admin directory should be protected.
+ OSVDB-4240: /utils/sprc.asp: Xpede page may allow SQL injection.
+ OSVDB-4314: /texis.exe/?-dump: Texis installation may reveal sensitive information.
+ OSVDB-4314: /texis.exe/?-version: Texis installation may reveal sensitive information.
+ OSVDB-4360: /acart2_0/acart2_0.mdb: Alan Ward A-Cart 2.0 allows remote user to read customer database file which may contain usernames, passwords, credit cards and more.
+ OSVDB-4361: /acart2_0/admin/category.asp: Alan Ward A-Cart 2.0 is vulnerable to an XSS attack which may cause the administrator to delete database information.
+ OSVDB-474: /Sites/Knowledge/Membership/Inspired/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /Sites/Knowledge/Membership/Inspiredtutorial/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /Sites/Samples/Knowledge/Membership/Inspired/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /Sites/Samples/Knowledge/Push/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /Sites/Samples/Knowledge/Search/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-474: /SiteServer/Publishing/ViewCode.asp: The default ViewCode.asp can allow an attacker to read any file on the machine. CVE-1999-0737. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-17671: /siteserver/publishing/viewcode.asp?source=/default.asp: May be able to view source code using Site Server vulnerability.
+ OSVDB-4908: /securelogin/1,2345,A,00.html: Vignette Story Server v4.1, 6, may disclose sensitive information via a buffer overflow.
+ OSVDB-5092: /config.inc: DotBr 0.1 configuration file includes usernames and passwords.
+ OSVDB-5095: /sysuser/docmgr/ieedit.stm?url=../: Sambar default file may allow directory listings.
+ OSVDB-5096: /sysuser/docmgr/iecreate.stm?template=../: Sambar default file may allow directory listings.
+ OSVDB-539: /catinfo: May be vulnerable to a buffer overflow. Request '/catinfo?' and add on 2048 of garbage to test.
+ OSVDB-5407: /soap/servlet/soaprouter: Oracle 9iAS SOAP components allow anonymous users to deploy applications by default.
+ OSVDB-5523: /MWS/HandleSearch.html?searchTarget=test&B1=Submit: MyWebServer 1.0.2 may be vulnerable to a buffer overflow (untested). Upgrade to a later version if 990b of searched data crashes the server.
+ OSVDB-562: /server-info: This gives a lot of Apache information. Comment out appropriate line in httpd.conf or restrict access to allowed hosts.
+ OSVDB-5709: /.nsconfig: Contains authorization information
+ OSVDB-596: /dc/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
+ OSVDB-596: /dc/orders/orders.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
+ OSVDB-596: /dcshop/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
+ OSVDB-596: /dcshop/orders/orders.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
+ OSVDB-6666: /cgi-bin/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools GoAhead WebServer hpnst.exe may be vulnerable to a DoS.
+ OSVDB-6670: /applist.asp: Citrix server may allow remote users to view applications installed without authenticating.
+ OSVDB-6671: /launch.asp?NFuse_Application=LookOut&NFuse_MIMEExtension=.ica: Citrix server may reveal sensitive information by accessing the 'advanced' tab on hte login screen.
+ OSVDB-6672: /_layouts/alllibs.htm: Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x. Bugtraq 03-11-19 post by
[email protected]
+ OSVDB-6672: /_layouts/settings.htm: Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x. Bugtraq 03-11-19 post by
[email protected]
+ OSVDB-6672: /_layouts/userinfo.htm: Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x. Bugtraq 03-11-19 post by
[email protected]
+ OSVDB-670: /stronghold-info: Redhat Stronghold from versions 2.3 up to 3.0 discloses sensitive information. This gives information on configuration. CVE-2001-0868.
+ OSVDB-670: /stronghold-status: Redhat Stronghold from versions 2.3 up to 3.0 discloses sensitive information. CVE-2001-0868.
+ OSVDB-7: /iissamples/exair/howitworks/Code.asp: Scripts within the Exair package on IIS 4 can be used for a DoS against the server. CVE-1999-0449. BID-193.
+ OSVDB-7: /iissamples/exair/howitworks/Codebrw1.asp: This is a default IIS script/file which should be removed, it may allow a DoS against the server. CVE-1999-0738. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp. CVE-1999-0449. BID-193.
+ OSVDB-707: /globals.jsa: Oracle globals.jsa file
+ OSVDB-721: /..%252f..%252f..%252f..%252f..%252f../windows/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%252f..%252f..%252f..%252f..%252f../winnt/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%252f..%252f..%252f..%252f..%252f../winnt/repair/sam._: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%255c..%255c..%255c..%255c..%255c../windows/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%255c..%255c..%255c..%255c..%255c../winnt/repair/sam: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-721: /..%255c..%255c..%255c..%255c..%255c../winnt/repair/sam._: BadBlue server is vulnerable to multiple remote exploits. See http://www.securiteam.com/exploits/5HP0M2A60G.html for more information.
+ OSVDB-724: /ans.pl?p=../../../../../usr/bin/id|&blah: Avenger's News System allows commands to be issued remotely. http://ans.gq.nu/ default admin string 'admin:aaLR8vE.jjhss:
[email protected]', password file location 'ans_data/ans.passwd'
+ OSVDB-724: /ans/ans.pl?p=../../../../../usr/bin/id|&blah: Avenger's News System allows commands to be issued remotely.
+ OSVDB-789: /iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/default.asp: IIS may be vulnerable to source code viewing via the example CodeBrws.asp file. Remove all default files from the web root. CVE-1999-0739. http://www.microsoft.com/technet/security/bulletin/MS99-013.asp.
+ OSVDB-9624: /pass_done.php: PY-Membres 4.2 may allow users to execute a query which generates a list of usernames and passwords.
+ OSVDB-9624: /admin/admin.php?adminpy=1: PY-Membres 4.2 may allow administrator access.
+ OSVDB-3092: /README: README file found.
+ OSVDB-3233: /j2ee/: j2ee directory found--possibly an Oracle app server directory.
+ OSVDB-3233: /WebCacheDemo.html: Oracle WebCache Demo
+ OSVDB-32333: /webcache/: Oracle WebCache Demo
+ OSVDB-3233: /webcache/webcache.xml: Oracle WebCache Demo
+ OSVDB-3233: /bmp/: SQLJ Demo Application
+ OSVDB-3233: /bmp/global-web-application.xml: SQLJ Demo Application
+ OSVDB-3233: /bmp/JSPClient.java: SQLJ Demo Application
+ OSVDB-3233: /bmp/mime.types: SQLJ Demo Application
+ OSVDB-3233: /bmp/README.txt: SQLJ Demo Application
+ OSVDB-3233: /bmp/sqljdemo.jsp: SQLJ Demo Application
+ OSVDB-3233: /bmp/setconn.jsp: SQLJ Demo Application
+ OSVDB-3233: /ptg_upgrade_pkg.log: Oracle log files.
+ OSVDB-3233: /OA_HTML/oam/weboam.log: Oracle log files.
+ OSVDB-3233: /webapp/admin/_pages/_bc4jadmin/: Oracle JSP files
+ OSVDB-3233: /_pages/_webapp/_admin/_showpooldetails.java: Oracle JSP files
+ OSVDB-3233: /_pages/_webapp/_admin/_showjavartdetails.java: Oracle JSP file
+ OSVDB-3233: /_pages/_demo/: Oracle JSP file
+ OSVDB-3233: /_pages/_webapp/_jsp/: Oracle JSP file.
+ OSVDB-3233: /_pages/_demo/_sql/: Oracle JSP file.
+ OSVDB-3233: //OA_HTML/_pages/: Oracle JSP file.
+ OSVDB-3233: /OA_HTML/webtools/doc/index.html: Cabo DHTML Components Help Page
+ OSVDB-18114: /reports/rwservlet?server=repserv+report=/tmp/hacker.rdf+destype=cache+desformat=PDF: Oracle Reports rwservlet report Variable Arbitrary Report Executable Execution
+ OSVDB-3233: /apex/: Oracle Application Express login screen.
+ OSVDB-3233: /OA_JAVA/: Oracle Applications Portal Page
+ OSVDB-3233: /OA_HTML/: Oracle Applications Portal Page
+ OSVDB-3233: /aplogon.html: Oracle Applications Portal Page
+ OSVDB-3233: /appdet.html: Oracle Applications Portal Pages
+ OSVDB-3233: /servlets/weboam/oam/oamLogin: Oracle Application Manager
+ OSVDB-3233: /OA_HTML/PTB/mwa_readme.htm: Oracle Mobile Applications Industrial Server administration and configuration inerface
+ OSVDB-3233: /reports/rwservlet: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/showenv: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/showmap: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/showjobs: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/getjobid7?server=myrep: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/getjobid4?server=myrep: Oracle Reports
+ OSVDB-3233: /reports/rwservlet/showmap?server=myserver: Oracle Reports
+ OSVDB-3093: /pls/portal/owa_util.cellsprint?p_theQuery=select: Direct access to Oracle packages could have an unkown impact.
+ OSVDB-3093: /pls/portal/owa_util.listprint?p_theQuery=select: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/owa_util.show_query_columns?ctable=sys.dba_users: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/owa_util.showsource?cname=owa_util: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/owa_util.cellsprint?p_theQuery=select+*+from+sys.dba_users: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/owa_util.signature: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/HTP.PRINT: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/CXTSYS.DRILOAD.VALIDATE_STMT: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/PORTAL_DEMO.ORG_CHART.SHOW: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/PORTAL.wwv_form.genpopuplist: Access to Oracle pages cold have an unknown impact.
+ OSVDB-3093: /pls/portal/PORTAL.wwv_ui_lovf.show: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/PORTAL.wwa_app_module.link: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/PORTAL.wwv_dynxml_generator.show: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/PORTAL.home: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/PORTAL.wwv_setting.render_css: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/PORTAL.wwv_main.render_warning_screen?p_oldurl=inTellectPRO&p_newurl=inTellectPRO: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/SELECT: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /pls/portal/null: Access to Oracle pages could have an unknown impact.
+ OSVDB-3093: /OA_MEDIA/: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/META-INF/: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/jsp/por/services/login.jsp: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/PTB/ICXINDEXBASECASE.htm: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/PTB/ECXOTAPing.htm: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/PTB/xml_sample1.htm: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/jsp/wf/WFReassign.jsp: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_JAVA/Oracle/: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_JAVA/servlet.zip: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_JAVA/oracle/forms/registry/Registry.dat: Oracle Applications portal pages found.
+ OSVDB-3093: /OA_HTML/oam/: Oracle Applications portal pages found.
+ OSVDB-3233: /OA_HTML/jsp/: Oracle Applications portal page found
+ OSVDB-3233: /OA_HTML/jsp/fnd/fndversion.jsp: Oracle Applications help page found.
+ OSVDB-3233: /OA_HTML/jsp/fnd/fndhelp.jsp?dbc=/u01/oracle/prodappl/fnd/11.5.0/secure/dbprod2_prod.dbc: Oracle Applications help page found.
+ OSVDB-3233: /OA_HTML/jsp/fnd/fndhelputil.jsp: Oracle Applications help page found.
+ OSVDB-3092: /install/install.php: Install file found.
+ OSVDB-3092: /cehttp/trace: Sterling Commerce Connect Direct trace log file may contain user ID information.
+ OSVDB-3092: /cehttp/property/: Sterling Commerce Connect Direct configuration files.
+ OSVDB-3233: /nps/iManager.html: Novell iManager found.
+ OSVDB-3233: /nps/version.jsp: Novell iManager version found.
+ OSVDB-3233: /nps/servlet/webacc?taskId=dev.Empty&merge=fw.About: Novell iManager version found.
+ OSVDB-3233: /doc/icodUserGuide.pdf: Instant Capacity on Demand (iCOD) UserÃs Guide.
+ OSVDB-3233: /doc/planning_SuperDome_configs.pdf: Planning HP SuperDome Configurations
+ OSVDB-3233: /doc/vxvm/pitc_ag.pdf: VERITAS FlashSnapTM Point-In-Time Copy Solutions documentation.
+ OSVDB-3233: /doc/Judy/Judy_tech_book.pdf: HP Judy documentation found.
+ OSVDB-3233: /doc/vxvm/vxvm_ag.pdf: Veritas Volume Manager documentation.
+ OSVDB-3233: /doc/vxvm/vxvm_hwnotes.pdf: Veritas Volume Manager documentation.
+ OSVDB-3233: /doc/vxvm/vxvm_ig.pdf: Veritas Volume Manager documentation.
+ OSVDB-3233: /doc/vxvm/vxvm_mig.pdf: Veritas Volume Manager documentation.
+ OSVDB-3233: /doc/vxvm/vxvm_tshoot.pdf: Veritas Volume Manager documentation.
+ OSVDB-3233: /doc/vxvm/vxvm_notes.pdf: Veritas Volume Manager documentation.
+ OSVDB-3233: /doc/vxvm/vxvm_ug.pdf: Veritas Volume Manager documentation.
+ OSVDB-3092: /staging/: This may be interesting...
+ OSVDB-3092: /_archive/: Archive found.
+ OSVDB-3092: /INSTALL.txt: Default file found.
+ OSVDB-3092: /UPGRADE.txt: Default file found.
+ OSVDB-3092: /install.php: install.php file found.
+ OSVDB-3092: /LICENSE.txt: License file found may identify site software.
+ OSVDB-3092: /upgrade.php: upgrade.php was found.
+ OSVDB-3092: /xmlrpc.php: xmlrpc.php was found.
+ OSVDB-3092: /CHANGELOG.txt: A changelog was found.
+ OSVDB-3092: /sitemap.gz: The sitemap.gz file, used for Google indexing, contains an xml representation of the web site's structure.
+ OSVDB-3092: /content/sitemap.gz: The sitemap.gz file, used for Google indexing, contains an xml representation of the web site\'s structure.
+ /webservices/IlaWebServices: Host has the Oracle iLearning environment installed.
+ /phone/: This may be interesting...
+ /aspnet_files/: .NET client side script files indicate .NET may be running. See http://msdn.microsoft.com/en-us/library/aa479045.aspx#aspplusvalid_clientside
+ OSVDB-3092: /Admin/: This might be interesting...
+ OSVDB-3092: /af/: This might be interesting... potential country code (Afghanistan)
+ OSVDB-3092: /ax/: This might be interesting... potential country code (Aland Islands)
+ OSVDB-3092: /al/: This might be interesting... potential country code (Albania)
+ OSVDB-3092: /dz/: This might be interesting... potential country code (Algeria)
+ OSVDB-3092: /as/: This might be interesting... potential country code (American Samoa)
+ OSVDB-3092: /ad/: This might be interesting... potential country code (Andorra)
+ OSVDB-3092: /ao/: This might be interesting... potential country code (Angola)
+ OSVDB-3092: /ai/: This might be interesting... potential country code (Anguilla)
+ OSVDB-3092: /aq/: This might be interesting... potential country code (Antarctica)
+ OSVDB-3092: /ag/: This might be interesting... potential country code (Antigua And Barbuda)
+ OSVDB-3092: /ar/: This might be interesting... potential country code (Argentina)
+ OSVDB-3092: /am/: This might be interesting... potential country code (Armenia)
+ OSVDB-3092: /aw/: This might be interesting... potential country code (Aruba)
+ OSVDB-3092: /au/: This might be interesting... potential country code (Australia)
+ OSVDB-3092: /at/: This might be interesting... potential country code (Austria)
+ OSVDB-3092: /az/: This might be interesting... potential country code (Azerbaijan)
+ OSVDB-3092: /bs/: This might be interesting... potential country code (Bahamas)
+ OSVDB-3092: /bh/: This might be interesting... potential country code (Bahrain)
+ OSVDB-3092: /bd/: This might be interesting... potential country code (Bangladesh)
+ OSVDB-3092: /bb/: This might be interesting... potential country code (Barbados)
+ OSVDB-3092: /by/: This might be interesting... potential country code (Belarus)
+ OSVDB-3092: /be/: This might be interesting... potential country code (Belgium)
+ OSVDB-3092: /bz/: This might be interesting... potential country code (Belize)
+ OSVDB-3092: /bj/: This might be interesting... potential country code (Benin)
+ OSVDB-3092: /bm/: This might be interesting... potential country code (Bermuda)
+ OSVDB-3092: /bt/: This might be interesting... potential country code (Bhutan)
+ OSVDB-3092: /bo/: This might be interesting... potential country code (Bolivia)
+ OSVDB-3092: /ba/: This might be interesting... potential country code (Bosnia And Herzegovina)
+ OSVDB-3092: /bw/: This might be interesting... potential country code (Botswana)
+ OSVDB-3092: /bv/: This might be interesting... potential country code (Bouvet Island)
+ OSVDB-3092: /br/: This might be interesting... potential country code (Brazil)
+ OSVDB-3092: /io/: This might be interesting... potential country code (British Indian Ocean Territory)
+ OSVDB-3092: /bn/: This might be interesting... potential country code (Brunei Darussalam)
+ OSVDB-3092: /bg/: This might be interesting... potential country code (Bulgaria)
+ OSVDB-3092: /bf/: This might be interesting... potential country code (Burkina Faso)
+ OSVDB-3092: /bi/: This might be interesting... potential country code (Burundi)
+ OSVDB-3092: /kh/: This might be interesting... potential country code (Cambodia)
+ OSVDB-3092: /cm/: This might be interesting... potential country code (Cameroon)
+ OSVDB-3092: /ca/: This might be interesting... potential country code (Canada)
+ OSVDB-3092: /cv/: This might be interesting... potential country code (Cape Verde)
+ OSVDB-3092: /ky/: This might be interesting... potential country code (Cayman Islands)
+ OSVDB-3092: /cf/: This might be interesting... potential country code (Central African Republic)
+ OSVDB-3092: /td/: This might be interesting... potential country code (Chad)
+ OSVDB-3092: /cl/: This might be interesting... potential country code (Chile)
+ OSVDB-3092: /cn/: This might be interesting... potential country code (China)
+ OSVDB-3092: /cx/: This might be interesting... potential country code (Christmas Island)
+ OSVDB-3092: /cc/: This might be interesting... potential country code (Cocos (keeling) Islands)
+ OSVDB-3092: /co/: This might be interesting... potential country code (Colombia)
+ OSVDB-3092: /km/: This might be interesting... potential country code (Comoros)
+ OSVDB-3092: /cg/: This might be interesting... potential country code (Congo)
+ OSVDB-3092: /cd/: This might be interesting... potential country code (The Democratic Republic Of The Congo)
+ OSVDB-3092: /ck/: This might be interesting... potential country code (Cook Islands)
+ OSVDB-3092: /cr/: This might be interesting... potential country code (Costa Rica)
+ OSVDB-3092: /ci/: This might be interesting... potential country code (CÔte D'ivoire)
+ OSVDB-3092: /hr/: This might be interesting... potential country code (Croatia)
+ OSVDB-3092: /cu/: This might be interesting... potential country code (Cuba)
+ OSVDB-3092: /cy/: This might be interesting... potential country code (Cyprus)
+ OSVDB-3092: /cz/: This might be interesting... potential country code (Czech Republic)
+ OSVDB-3092: /dk/: This might be interesting... potential country code (Denmark)
+ OSVDB-3092: /dj/: This might be interesting... potential country code (Djibouti)
+ OSVDB-3092: /dm/: This might be interesting... potential country code (Dominica)
+ OSVDB-3092: /do/: This might be interesting... potential country code (Dominican Republic)
+ OSVDB-3092: /ec/: This might be interesting... potential country code (Ecuador)
+ OSVDB-3092: /eg/: This might be interesting... potential country code (Egypt)
+ OSVDB-3092: /sv/: This might be interesting... potential country code (El Salvador)
+ OSVDB-3092: /gq/: This might be interesting... potential country code (Equatorial Guinea)
+ OSVDB-3092: /er/: This might be interesting... potential country code (Eritrea)
+ OSVDB-3092: /ee/: This might be interesting... potential country code (Estonia)
+ OSVDB-3092: /et/: This might be interesting... potential country code (Ethiopia)
+ OSVDB-3092: /fk/: This might be interesting... potential country code (Falkland Islands (malvinas))
+ OSVDB-3092: /fo/: This might be interesting... potential country code (Faroe Islands)
+ OSVDB-3092: /fj/: This might be interesting... potential country code (Fiji)
+ OSVDB-3092: /fi/: This might be interesting... potential country code (Finland)
+ OSVDB-3092: /fr/: This might be interesting... potential country code (France)
+ OSVDB-3092: /gf/: This might be interesting... potential country code (French Guiana)
+ OSVDB-3092: /pf/: This might be interesting... potential country code (French Polynesia)
+ OSVDB-3092: /tf/: This might be interesting... potential country code (French Southern Territories)
+ OSVDB-3092: /ga/: This might be interesting... potential country code (Gabon)
+ OSVDB-3092: /gm/: This might be interesting... potential country code (Gambia)
+ OSVDB-3092: /ge/: This might be interesting... potential country code (Georgia)
+ OSVDB-3092: /de/: This might be interesting... potential country code (Germany)
+ OSVDB-3092: /gh/: This might be interesting... potential country code (Ghana)
+ OSVDB-3092: /gi/: This might be interesting... potential country code (Gibraltar)
+ OSVDB-3092: /gr/: This might be interesting... potential country code (Greece)
+ OSVDB-3092: /gl/: This might be interesting... potential country code (Greenland)
+ OSVDB-3092: /gd/: This might be interesting... potential country code (Grenada)
+ OSVDB-3092: /gp/: This might be interesting... potential country code (Guadeloupe)
+ OSVDB-3092: /gu/: This might be interesting... potential country code (Guam)
+ OSVDB-3092: /gt/: This might be interesting... potential country code (Guatemala)
+ OSVDB-3092: /gg/: This might be interesting... potential country code (Guernsey)
+ OSVDB-3092: /gn/: This might be interesting... potential country code (Guinea)
+ OSVDB-3092: /gw/: This might be interesting... potential country code (Guinea-bissau)
+ OSVDB-3092: /gy/: This might be interesting... potential country code (Guyana)
+ OSVDB-3092: /ht/: This might be interesting... potential country code (Haiti)
+ OSVDB-3092: /hm/: This might be interesting... potential country code (Heard Island And Mcdonald Islands)
+ OSVDB-3092: /va/: This might be interesting... potential country code (Holy See (vatican City State))
+ OSVDB-3092: /hn/: This might be interesting... potential country code (Honduras)
+ OSVDB-3092: /hk/: This might be interesting... potential country code (Hong Kong)
+ OSVDB-3092: /hu/: This might be interesting... potential country code (Hungary)
+ OSVDB-3092: /is/: This might be interesting... potential country code (Iceland)
+ OSVDB-3092: /in/: This might be interesting... potential country code (India)
+ OSVDB-3092: /id/: This might be interesting... potential country code (Indonesia)
+ OSVDB-3092: /ir/: This might be interesting... potential country code (Islamic Republic Of Iran)
+ OSVDB-3092: /iq/: This might be interesting... potential country code (Iraq)
+ OSVDB-3092: /ie/: This might be interesting... potential country code (Ireland)
+ OSVDB-3092: /im/: This might be interesting... potential country code (Isle Of Man)
+ OSVDB-3092: /il/: This might be interesting... potential country code (Israel)
+ OSVDB-3092: /it/: This might be interesting... potential country code (Italy)
+ OSVDB-3092: /jm/: This might be interesting... potential country code (Jamaica)
+ OSVDB-3092: /jp/: This might be interesting... potential country code (Japan)
+ OSVDB-3092: /je/: This might be interesting... potential country code (Jersey)
+ OSVDB-3092: /jo/: This might be interesting... potential country code (Jordan)
+ OSVDB-3092: /kz/: This might be interesting... potential country code (Kazakhstan)
+ OSVDB-3092: /ke/: This might be interesting... potential country code (Kenya)
+ OSVDB-3092: /ki/: This might be interesting... potential country code (Kiribati)
+ OSVDB-3092: /kp/: This might be interesting... potential country code (Democratic People's Republic Of Korea)
+ OSVDB-3092: /kr/: This might be interesting... potential country code (Republic Of Korea)
+ OSVDB-3092: /kw/: This might be interesting... potential country code (Kuwait)
+ OSVDB-3092: /kg/: This might be interesting... potential country code (Kyrgyzstan)
+ OSVDB-3092: /la/: This might be interesting... potential country code (Lao People's Democratic Republic)
+ OSVDB-3092: /lv/: This might be interesting... potential country code (Latvia)
+ OSVDB-3092: /lb/: This might be interesting... potential country code (Lebanon)
+ OSVDB-3092: /ls/: This might be interesting... potential country code (Lesotho)
+ OSVDB-3092: /lr/: This might be interesting... potential country code (Liberia)
+ OSVDB-3092: /ly/: This might be interesting... potential country code (Libyan Arab Jamahiriya)
+ OSVDB-3092: /li/: This might be interesting... potential country code (Liechtenstein)
+ OSVDB-3092: /lt/: This might be interesting... potential country code (Lithuania)
+ OSVDB-3092: /lu/: This might be interesting... potential country code (Luxembourg)
+ OSVDB-3092: /mo/: This might be interesting... potential country code (Macao)
+ OSVDB-3092: /mk/: This might be interesting... potential country code (Macedonia)
+ OSVDB-3092: /mg/: This might be interesting... potential country code (Madagascar)
+ OSVDB-3092: /mw/: This might be interesting... potential country code (Malawi)
+ OSVDB-3092: /my/: This might be interesting... potential country code (Malaysia)
+ OSVDB-3092: /mv/: This might be interesting... potential country code (Maldives)
+ OSVDB-3092: /ml/: This might be interesting... potential country code (Mali)
+ OSVDB-3092: /mt/: This might be interesting... potential country code (Malta)
+ OSVDB-3092: /mh/: This might be interesting... potential country code (Marshall Islands)
+ OSVDB-3092: /mq/: This might be interesting... potential country code (Martinique)
+ OSVDB-3092: /mr/: This might be interesting... potential country code (Mauritania)
+ OSVDB-3092: /mu/: This might be interesting... potential country code (Mauritius)
+ OSVDB-3092: /yt/: This might be interesting... potential country code (Mayotte)
+ OSVDB-3092: /mx/: This might be interesting... potential country code (Mexico)
+ OSVDB-3092: /fm/: This might be interesting... potential country code (Federated States Of Micronesia)
+ OSVDB-3092: /md/: This might be interesting... potential country code (Republic Of Moldova)
+ OSVDB-3092: /mc/: This might be interesting... potential country code (Monaco)
+ OSVDB-3092: /mn/: This might be interesting... potential country code (Mongolia)
+ OSVDB-3092: /me/: This might be interesting... potential country code (Montenegro)
+ OSVDB-3092: /ms/: This might be interesting... potential country code (Montserrat)
+ OSVDB-3092: /ma/: This might be interesting... potential country code (Morocco)
+ OSVDB-3092: /mz/: This might be interesting... potential country code (Mozambique)
+ OSVDB-3092: /mm/: This might be interesting... potential country code (Myanmar)
+ OSVDB-3092: /na/: This might be interesting... potential country code (Namibia)
+ OSVDB-3092: /nr/: This might be interesting... potential country code (Nauru)
+ OSVDB-3092: /np/: This might be interesting... potential country code (Nepal)
+ OSVDB-3092: /nl/: This might be interesting... potential country code (Netherlands)
+ OSVDB-3092: /an/: This might be interesting... potential country code (Netherlands Antilles)
+ OSVDB-3092: /nc/: This might be interesting... potential country code (New Caledonia)
+ OSVDB-3092: /nz/: This might be interesting... potential country code (New Zealand)
+ OSVDB-3092: /ni/: This might be interesting... potential country code (Nicaragua)
+ OSVDB-3092: /ne/: This might be interesting... potential country code (Niger)
+ OSVDB-3092: /ng/: This might be interesting... potential country code (Nigeria)
+ OSVDB-3092: /nu/: This might be interesting... potential country code (Niue)
+ OSVDB-3092: /nf/: This might be interesting... potential country code (Norfolk Island)
+ OSVDB-3092: /mp/: This might be interesting... potential country code (Northern Mariana Islands)
+ OSVDB-3092: /no/: This might be interesting... potential country code (Norway)
+ OSVDB-3092: /om/: This might be interesting... potential country code (Oman)
+ OSVDB-3092: /pk/: This might be interesting... potential country code (Pakistan)
+ OSVDB-3092: /pw/: This might be interesting... potential country code (Palau)
+ OSVDB-3092: /ps/: This might be interesting... potential country code (Palestinian Territory)
+ OSVDB-3092: /pa/: This might be interesting... potential country code (Panama)
+ OSVDB-3092: /pg/: This might be interesting... potential country code (Papua New Guinea)
+ OSVDB-3092: /py/: This might be interesting... potential country code (Paraguay)
+ OSVDB-3092: /pe/: This might be interesting... potential country code (Peru)
+ OSVDB-3092: /ph/: This might be interesting... potential country code (Philippines)
+ OSVDB-3092: /pn/: This might be interesting... potential country code (Pitcairn)
+ OSVDB-3092: /pl/: This might be interesting... potential country code (Poland)
+ OSVDB-3092: /pt/: This might be interesting... potential country code (Portugal)
+ OSVDB-3092: /pr/: This might be interesting... potential country code (Puerto Rico)
+ OSVDB-3092: /qa/: This might be interesting... potential country code (Qatar)
+ OSVDB-3092: /re/: This might be interesting... potential country code (RÉunion)
+ OSVDB-3092: /ro/: This might be interesting... potential country code (Romania)
+ OSVDB-3092: /ru/: This might be interesting... potential country code (Russian Federation)
+ OSVDB-3092: /rw/: This might be interesting... potential country code (Rwanda)
+ OSVDB-3092: /bl/: This might be interesting... potential country code (Saint BarthÉlemy)
+ OSVDB-3092: /sh/: This might be interesting... potential country code (Saint Helena)
+ OSVDB-3092: /kn/: This might be interesting... potential country code (Saint Kitts And Nevis)
+ OSVDB-3092: /lc/: This might be interesting... potential country code (Saint Lucia)
+ OSVDB-3092: /mf/: This might be interesting... potential country code (Saint Martin)
+ OSVDB-3092: /pm/: This might be interesting... potential country code (Saint Pierre And Miquelon)
+ OSVDB-3092: /vc/: This might be interesting... potential country code (Saint Vincent And The Grenadines)
+ OSVDB-3092: /ws/: This might be interesting... potential country code (Samoa)
+ OSVDB-3092: /sm/: This might be interesting... potential country code (San Marino)
+ OSVDB-3092: /st/: This might be interesting... potential country code (Sao Tome And Principe)
+ OSVDB-3092: /sa/: This might be interesting... potential country code (Saudi Arabia)
+ OSVDB-3092: /sn/: This might be interesting... potential country code (Senegal)
+ OSVDB-3092: /rs/: This might be interesting... potential country code (Serbia)
+ OSVDB-3092: /sc/: This might be interesting... potential country code (Seychelles)
+ OSVDB-3092: /sl/: This might be interesting... potential country code (Sierra Leone)
+ OSVDB-3092: /sg/: This might be interesting... potential country code (Singapore)
+ OSVDB-3092: /sk/: This might be interesting... potential country code (Slovakia)
+ OSVDB-3092: /si/: This might be interesting... potential country code (Slovenia)
+ OSVDB-3092: /sb/: This might be interesting... potential country code (Solomon Islands)
+ OSVDB-3092: /so/: This might be interesting... potential country code (Somalia)
+ OSVDB-3092: /za/: This might be interesting... potential country code (South Africa)
+ OSVDB-3092: /gs/: This might be interesting... potential country code (South Georgia And The South Sandwich Islands)
+ OSVDB-3092: /es/: This might be interesting... potential country code (Spain)
+ OSVDB-3092: /lk/: This might be interesting... potential country code (Sri Lanka)
+ OSVDB-3092: /sd/: This might be interesting... potential country code (Sudan)
+ OSVDB-3092: /sr/: This might be interesting... potential country code (Suriname)
+ OSVDB-3092: /sj/: This might be interesting... potential country code (Svalbard And Jan Mayen)
+ OSVDB-3092: /sz/: This might be interesting... potential country code (Swaziland)
+ OSVDB-3092: /se/: This might be interesting... potential country code (Sweden)
+ OSVDB-3092: /ch/: This might be interesting... potential country code (Switzerland)
+ OSVDB-3092: /sy/: This might be interesting... potential country code (Syrian Arab Republic)
+ OSVDB-3092: /tw/: This might be interesting... potential country code (Taiwan)
+ OSVDB-3092: /tj/: This might be interesting... potential country code (Tajikistan)
+ OSVDB-3092: /tz/: This might be interesting... potential country code (United Republic Of Tanzania)
+ OSVDB-3092: /th/: This might be interesting... potential country code (Thailand)
+ OSVDB-3092: /tl/: This might be interesting... potential country code (Timor-leste)
+ OSVDB-3092: /tg/: This might be interesting... potential country code (Togo)
+ OSVDB-3092: /tk/: This might be interesting... potential country code (Tokelau)
+ OSVDB-3092: /to/: This might be interesting... potential country code (Tonga)
+ OSVDB-3092: /tt/: This might be interesting... potential country code (Trinidad And Tobago)
+ OSVDB-3092: /tn/: This might be interesting... potential country code (Tunisia)
+ OSVDB-3092: /tr/: This might be interesting... potential country code (Turkey)
+ OSVDB-3092: /tm/: This might be interesting... potential country code (Turkmenistan)
+ OSVDB-3092: /tc/: This might be interesting... potential country code (Turks And Caicos Islands)
+ OSVDB-3092: /tv/: This might be interesting... potential country code (Tuvalu)
+ OSVDB-3092: /ug/: This might be interesting... potential country code (Uganda)
+ OSVDB-3092: /ua/: This might be interesting... potential country code (Ukraine)
+ OSVDB-3092: /ae/: This might be interesting... potential country code (United Arab Emirates)
+ OSVDB-3092: /gb/: This might be interesting... potential country code (United Kingdom)
+ OSVDB-3092: /us/: This might be interesting... potential country code (United States)
+ OSVDB-3092: /um/: This might be interesting... potential country code (United States Minor Outlying Islands)
+ OSVDB-3092: /uy/: This might be interesting... potential country code (Uruguay)
+ OSVDB-3092: /uz/: This might be interesting... potential country code (Uzbekistan)
+ OSVDB-3092: /vu/: This might be interesting... potential country code (Vanuatu)
+ OSVDB-3092: /ve/: This might be interesting... potential country code (Venezuela)
+ OSVDB-3092: /vn/: This might be interesting... potential country code (Viet Nam)
+ OSVDB-3092: /vg/: This might be interesting... potential country code (British Virgin Islands)
+ OSVDB-3092: /vi/: This might be interesting... potential country code (U.S. Virgin Islands)
+ OSVDB-3092: /wf/: This might be interesting... potential country code (Wallis And Futuna)
+ OSVDB-3092: /eh/: This might be interesting... potential country code (Western Sahara)
+ OSVDB-3092: /ye/: This might be interesting... potential country code (Yemen)
+ OSVDB-3092: /zm/: This might be interesting... potential country code (Zambia)
+ OSVDB-3092: /zw/: This might be interesting... potential country code (Zimbabwe)
+ OSVDB-3092: /www/2: This might be interesting...
+ OSVDB-3093: /includes/db.inc: Include files (.inc) should not be served in plain text.
+ OSVDB-3093: /includes/sendmail.inc: Include files (.inc) should not be served in plain text.
+ OSVDB-3092: /license.txt: License file found may identify site software.
+ OSVDB-3092: /install.txt: Install file found may identify site software.
+ OSVDB-3092: /LICENSE.TXT: License file found may identify site software.
+ OSVDB-3092: /INSTALL.TXT: Install file found may identify site software.
+ /config/config.txt: Configuration file found.
+ /config/readme.txt: Readme file found.
+ /data/readme.txt: Readme file found.
+ /log/readme.txt: Readme file found.
+ /logs/readme.txt: Readme file found.
+ /uploads/readme.txt: Readme file found.
+ /admin1.php: Admin login page found.
+ /admin.asp: Admin login page/section found.
+ /admin/account.asp: Admin login page/section found.
+ /admin/account.html: Admin login page/section found.
+ /admin/account.php: Admin login page/section found.
+ /admin/controlpanel.asp: Admin login page/section found.
+ /admin/controlpanel.html: Admin login page/section found.
+ /admin/controlpanel.php: Admin login page/section found.
+ /admin/cp.asp: Admin login page/section found.
+ /admin/cp.html: Admin login page/section found.
+ /admin/cp.php: Admin login page/section found.
+ /admin/home.asp: Admin login page/section found.
+ /admin/home.php: Admin login page/section found.
+ /admin/index.asp: Admin login page/section found.
+ /admin/index.html: Admin login page/section found.
+ /admin/login.asp: Admin login page/section found.
+ /admin/login.html: Admin login page/section found.
+ /admin/login.php: Admin login page/section found.
+ /admin1.asp: Admin login page/section found.
+ /admin1.html: Admin login page/section found.
+ /admin1/: Admin login page/section found.
+ /admin2.asp: Admin login page/section found.
+ /admin2.html: Admin login page/section found.
+ /admin2.php: Admin login page/section found.
+ /admin4_account/: Admin login page/section found.
+ /admin4_colon/: Admin login page/section found.
+ /admincontrol.asp: Admin login page/section found.
+ /admincontrol.html: Admin login page/section found.
+ /admincontrol.php: Admin login page/section found.
+ /administer/: Admin login page/section found.
+ /administr8.asp: Admin login page/section found.
+ /administr8.html: Admin login page/section found.
+ /administr8.php: Admin login page/section found.
+ /administr8/: Admin login page/section found.
+ /administracao.php: Admin login page/section found.
+ /administraçao.php: Admin login page/section found.
+ /administracao/: Admin login page/section found.
+ /administraçao/: Admin login page/section found.
+ /administracion.php: Admin login page/section found.
+ /administracion/: Admin login page/section found.
+ /administrateur.php: Admin login page/section found.
+ /administrateur/: Admin login page/section found.
+ /administratie/: Admin login page/section found.
+ /administration.html: Admin login page/section found.
+ /administration.php: Admin login page/section found.
+ /administration/: Admin login page/section found.
+ /administrator.asp: Admin login page/section found.
+ /administrator.html: Admin login page/section found.
+ /administrator.php: Admin login page/section found.
+ /administrator/account.asp: Admin login page/section found.
+ /administrator/account.html: Admin login page/section found.
+ /administrator/account.php: Admin login page/section found.
+ /administrator/index.asp: Admin login page/section found.
+ /administrator/index.html: Admin login page/section found.
+ /administrator/index.php: Admin login page/section found.
+ /administrator/login.asp: Admin login page/section found.
+ /administrator/login.html: Admin login page/section found.
+ /administrator/login.php: Admin login page/section found.
+ /administratoraccounts/: Admin login page/section found.
+ /administrators/: Admin login page/section found.
+ /administrivia/: Admin login page/section found.
+ /adminisztrátora.php: Admin login page/section found.
+ /adminisztrátora/: Admin login page/section found.
+ /adminpanel.asp: Admin login page/section found.
+ /adminpanel.html: Admin login page/section found.
+ /adminpanel.php: Admin login page/section found.
+ /adminpro/: Admin login page/section found.
+ /admins.asp: Admin login page/section found.
+ /admins.html: Admin login page/section found.
+ /admins.php: Admin login page/section found.
+ /admins/: Admin login page/section found.
+ /AdminTools/: Admin login page/section found.
+ /amministratore.php: Admin login page/section found.
+ /amministratore/: Admin login page/section found.
+ /autologin/: Admin login page/section found.
+ /banneradmin/: Admin login page/section found.
+ /bbadmin/: Admin login page/section found.
+ /beheerder.php: Admin login page/section found.
+ /beheerder/: Admin login page/section found.
+ /bigadmin/: Admin login page/section found.
+ /blogindex/: Admin login page/section found.
+ /cadmins/: Admin login page/section found.
+ /ccms/: Admin login page/section found.
+ /ccms/index.php: Admin login page/section found.
+ /ccms/login.php: Admin login page/section found.
+ /ccp14admin/: Admin login page/section found.
+ /cmsadmin/: Admin login page/section found.
+ /configuration/: Admin login page/section found.
+ /configure/: Admin login page/section found.
+ /controlpanel.asp: Admin login page/section found.
+ /controlpanel.html: Admin login page/section found.
+ /controlpanel.php: Admin login page/section found.
+ /controlpanel/: Admin login page/section found.
+ /cp.asp: Admin login page/section found.
+ /cp.html: Admin login page/section found.
+ /cp.php: Admin login page/section found.
+ /cpanel_file/: Admin login page/section found.
+ /customer_login/: Admin login page/section found.
+ /database_administration/: Admin login page/section found.
+ /Database_Administration/: Admin login page/section found.
+ /dir-login/: Admin login page/section found.
+ /directadmin/: Admin login page/section found.
+ /ezsqliteadmin/: Admin login page/section found.
+ /fileadmin.asp: Admin login page/section found.
+ /fileadmin.html: Admin login page/section found.
+ /fileadmin.php: Admin login page/section found.
+ /formslogin/: Admin login page/section found.
+ /globes_admin/: Admin login page/section found.
+ /hpwebjetadmin/: Admin login page/section found.
+ /Indy_admin/: Admin login page/section found.
+ /irc-macadmin/: Admin login page/section found.
+ /LiveUser_Admin/: Admin login page/section found.
+ /login_db/: Admin login page/section found.
+ /login-redirect/: Admin login page/section found.
+ /login-us/: Admin login page/section found.
+ /login.asp: Admin login page/section found.
+ /login.html: Admin login page/section found.
+ /login.php: Admin login page/section found.
+ /login1/: Admin login page/section found.
+ /loginflat/: Admin login page/section found.
+ /logo_sysadmin/: Admin login page/section found.
+ /Lotus_Domino_Admin/: Admin login page/section found.
+ /macadmin/: Admin login page/section found.
+ /maintenance/: Admin login page/section found.
+ /manuallogin/: Admin login page/section found.
+ /memlogin/: Admin login page/section found.
+ /meta_login/: Admin login page/section found.
+ /modelsearch/login.asp: Admin login page/section found.
+ /modelsearch/login.php: Admin login page/section found.
+ /moderator.asp: Admin login page/section found.
+ /moderator.html: Admin login page/section found.
+ /moderator.php: Admin login page/section found.
+ /moderator/: Admin login page/section found.
+ /moderator/admin.asp: Admin login page/section found.
+ /moderator/admin.html: Admin login page/section found.
+ /moderator/admin.php: Admin login page/section found.
+ /moderator/login.asp: Admin login page/section found.
+ /moderator/login.html: Admin login page/section found.
+ /moderator/login.php: Admin login page/section found.
+ /myadmin/: Admin login page/section found.
+ /navSiteAdmin/: Admin login page/section found.
+ /newsadmin/: Admin login page/section found.
+ /openvpnadmin/: Admin login page/section found.
+ /painel/: Admin login page/section found.
+ /panel/: Admin login page/section found.
+ /pgadmin/: Admin login page/section found.
+ /phpldapadmin/: Admin login page/section found.
+ /phppgadmin/: Admin login page/section found.
+ /phpSQLiteAdmin/: Admin login page/section found.
+ /platz_login/: Admin login page/section found.
+ /power_user/: Admin login page/section found.
+ /project-admins/: Admin login page/section found.
+ /pureadmin/: Admin login page/section found.
+ /radmind-1/: Admin login page/section found.
+ /radmind/: Admin login page/section found.
+ /rcLogin/: Admin login page/section found.
+ /server_admin_small/: Admin login page/section found.
+ /Server.asp: Admin login page/section found.
+ /Server.html: Admin login page/section found.
+ /Server.php: Admin login page/section found.
+ /ServerAdministrator/: Admin login page/section found.
+ /showlogin/: Admin login page/section found.
+ /simpleLogin/: Admin login page/section found.
+ /smblogin/: Admin login page/section found.
+ /sql-admin/: Admin login page/section found.
+ /ss_vms_admin_sm/: Admin login page/section found.
+ /sshadmin/: Admin login page/section found.
+ /staradmin/: Admin login page/section found.
+ /sub-login/: Admin login page/section found.
+ /Super-Admin/: Admin login page/section found.
+ /support_login/: Admin login page/section found.
+ /sys-admin/: Admin login page/section found.
+ /sysadmin.asp: Admin login page/section found.
+ /sysadmin.html: Admin login page/section found.
+ /sysadmin.php: Admin login page/section found.
+ /sysadmin/: Admin login page/section found.
+ /SysAdmin/: Admin login page/section found.
+ /SysAdmin2/: Admin login page/section found.
+ /sysadmins/: Admin login page/section found.
+ /system_administration/: Admin login page/section found.
+ /system-administration/: Admin login page/section found.
+ /ur-admin.asp: Admin login page/section found.
+ /ur-admin.html: Admin login page/section found.
+ /ur-admin.php: Admin login page/section found.
+ /ur-admin/: Admin login page/section found.
+ /useradmin/: Admin login page/section found.
+ /UserLogin/: Admin login page/section found.
+ /utility_login/: Admin login page/section found.
+ /v2/painel/: Admin login page/section found.
+ /vadmind/: Admin login page/section found.
+ /vmailadmin/: Admin login page/section found.
+ /webadmin.asp: Admin login page/section found.
+ /webadmin.html: Admin login page/section found.
+ /webadmin.php: Admin login page/section found.
+ /webmaster/: Admin login page/section found.
+ /websvn/: Admin login page/section found.
+ /wizmysqladmin/: Admin login page/section found.
+ /wp-admin/: Admin login page/section found.
+ /wp-login/: Admin login page/section found.
+ /xlogin/: Admin login page/section found.
+ /yonetici.asp: Admin login page/section found.
+ /yonetici.html: Admin login page/section found.
+ /yonetici.php: Admin login page/section found.
+ /yonetim.asp: Admin login page/section found.
+ /yonetim.html: Admin login page/section found.
+ /yonetim.php: Admin login page/section found.
+ OSVDB-3092: /test.asp: This might be interesting...
+ OSVDB-3092: /test.aspx: This might be interesting...
+ OSVDB-3092: /test.php: This might be interesting...
+ /maintenance.asp: This might be interesting...
+ /maintenance.aspx: This might be interesting...
+ /maint/: This might be interesting...
+ /maint.asp: This might be interesting...
+ /maint.aspx: This might be interesting...
+ /jk-status: mod_jk status page is visible.
+ /balancer-manager: mod_proxy_balancer management page is visible.
+ /servlets-examples/: Tomcat servlets examples are visible.
+ /admin-console: JBoss admin console is visible.
+ /help.php: A help file was found.
+ /gif/hp_invent_logo.gif: This device may be an HP printer/scanner and allow retrieval of previously scanned images.
+ /gif/tricolor_ink_guage.gif: This device may be an HP printer/scanner and allow retrieval of previously scanned images.
+ OSVDB-3092: /messages/: This might be interesting...
+ 6448 items checked: 9 error(s) and 2137 item(s) reported on remote host
+ End Time: 2012-09-25 07:34:47 (4368 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Whois Information:
Registrant:
Alegria Enterprises Limited
Trust Company Complex,
Ajeltake Road
PO Box 1405
Ajeltake Island, 96960
MH
Domain name: PETSEX.COM
Administrative Contact:
Administrator, Domain
Trust Company Complex,
Ajeltake Road
PO Box 1405
Ajeltake Island, 96960
MH
+44 1624-617-050
Technical Contact:
Administrator, Domain
Trust Company Complex,
Ajeltake Road
PO Box 1405
Ajeltake Island, 96960
MH
+44 1624-617-050
Registration Service Provider:
Netgroup A/S,
+45 70252686
+45 70252687 (fax)
http://www.netgroup.dk
This company may be contacted for domain login/passwords,
DNS/Nameserver changes, and general domain support questions.
Registrar of Record: TUCOWS, INC.
Record last updated on 20-Sep-2012.
Record expires on 14-Jan-2013.
Record created on 15-Jan-1998.
Registrar Domain Name Help Center:
http://tucowsdomains.com
Domain servers in listed order:
NS1.OXYGEN.NET
NS2.OXYGEN.NET
Domain status: clientTransferProhibited
clientUpdateProhibited
Reverse IP:
he hostname petsex.com resolves to the following IP addresses:
IPv4 address:199.27.135.40
Reverse DNS:cf-199-27-135-40.cloudflare.com
RIR:ARIN
Country:United States
City:San Francisco, CA
RBL Status:Clear
IPv4 address:173.245.61.114
Reverse DNS:cf-173-245-61-114.cloudflare.com
RIR:ARIN
Country:United States
City:San Francisco, CA
RBL Status:Clear
Whois information on 199.27.135.40:
#
# Query terms are ambiguous. The query is assumed to be:
# "n 199.27.135.40"
#
# Use "?" to get help.
#
#
# The following results may also be obtained via:
# http://whois.arin.net/rest/nets;q=199.27.135.40?showDetails=true&showARIN=false&ext=netref2
#
NetRange:199.27.128.0 - 199.27.135.255
CIDR:199.27.128.0/21
OriginAS:AS13335
NetName:CLOUDFLARENET
NetHandle:NET-199-27-128-0-1
Parent:NET-199-0-0-0-0
NetType:Direct Assignment
RegDate:2010-08-19
Updated:2012-03-02
OrgName:CloudFlare, Inc.
OrgId:CLOUD14
Address:665 Third Street #207
City:San Francisco
StateProv:CA
PostalCode:94107
Country:US
RegDate:2010-07-09
Updated:2011-11-03
Comment:http://www.cloudflare.com/
OrgAbuseHandle:ABUSE2916-ARIN
OrgAbuseName:Abuse
OrgAbusePhone:+1-650-319-8930
OrgNOCHandle:NOC11962-ARIN
OrgNOCName:NOC
OrgNOCPhone:+1-650-319-8930
OrgTechHandle:ADMIN2521-ARIN
OrgTechName:Admin
OrgTechPhone:+1-650-319-8930
RAbuseHandle:ABUSE2916-ARIN
RAbuseName:Abuse
RAbusePhone:+1-650-319-8930
RNOCHandle:NOC11962-ARIN
RNOCName:NOC
RNOCPhone:+1-650-319-8930
RTechHandle:ADMIN2521-ARIN
RTechName:Admin
RTechPhone:+1-650-319-8930
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#